13.07.2015 Views

Reference manual with Door and I/O module - Videx, Inc.

Reference manual with Door and I/O module - Videx, Inc.

Reference manual with Door and I/O module - Videx, Inc.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Operating OptionsSet System OptionsLock OptionsMultikey - Different SchedulesRe-key All LocksPeople <strong>and</strong> Key OptionsExpiration RulesMaster Keys in CyberAudit-WebDisable keys when event memory becomes full<strong>Door</strong> Access NumbersCommunicators OptionsPortable LinksUSB StationsWeb StationsWeb AuthorizersThe CyberLock Flex SystemThe CyberKey Vault 20 FXSingle CyberKey VaultLAN Authorizer Product DescriptionAudit Data TrimmingReactivate the SoftwareSystem AdministratorsAdministrator LoginsEdit LoginAdd a New AdministratorAssociated Person - New PersonAdministrator PermissionsCommunicatorsWeb AuthorizersWeb AuthorizersWeb Authorizer DetailsSetting Up Web AuthorizersResetting a Web AuthorizerConfiguring a Web AuthorizerWeb Authorizer USB ConfigurationWeb Authorizer Audit Trail EventsWeb Authorizer Keyport Messages2-Key Inputs for Web AuthorizersThe Present IconWeb Authorizer DiagnosticsPortable Links, Stations, <strong>and</strong> CyberLinkComm LinksCyberLinkCyberLink Result CodesUsing CyberLink as an RFID Card Reader


Communicator Issue NumbersPortable Links ListPortable Link PropertiesIR EncoderAdding a Comm LinkUSB Station ListUSB Station PropertiesWeb Station ListWeb Station PropertiesStation Light DefinitionsAdding a New StationView Communicator Audit DataComm Link Audit Trail EventsLAN AuthorizersLAN AuthorizersLAN Authorizer DetailsAdding a LAN AuthorizerSetting Up LAN AuthorizersResetting a LAN AuthorizerThe present iconLAN Authorizer Audit Trail EventsWorking <strong>with</strong> Modem AuthorizersConfiguration where Local Modem Authorizers may dial any Remote Modem AuthorizersConfiguration where Local Modem Authorizers may only dial specific Remote ModemAuthorizersConfiguration where Remote Modem Authorizers may dial up to two Local Modem AuthorizersSyncKeyport Messages Generated by LAN AuthorizersKey Records in AuthorizersThe Flex SystemFlex System Hub ListView/Edit Flex Hub ModulesModule Conflict IconAdding a Flex System Hub <strong>and</strong> ModulesFlex System Hub PropertiesProgramming Flex System Hubs from a USB flash driveMounting Flex System ModulesFlex System Demo ModeUsing CyberKeys <strong>with</strong> Flex System Weatherized VaultsLED Indicator on the Weatherized VaultUsing the Data Knob <strong>and</strong> DisplayFlex System Power RequirementsFlex System Module Cable PinoutThe Molex® Mini Jr Series ConnectorFlex System Display MessagesFlex System Audit Trail EventsFlex System Special Key InputFlex System Hub Diagnostics


LocksLock PropertiesMulti-Key Mode <strong>and</strong> Open Delay SettingsAdd a Lock ManuallyAdding Locks <strong>with</strong> a Gr<strong>and</strong> MasterAdding Locks <strong>with</strong> a CyberLock ProgrammerImporting Lock DataNaming LocksProgramming LocksProgramming JobsProgramming Job PropertiesSteps to Create a Programming JobDownloading a CyberLock <strong>with</strong> a CyberKeySteps to Reset CyberLocksReset LockChange Icon Report for CyberLocksLock Properties - TagsLocks Bulk EditLock TagsLock Tag PropertiesReplace LockView Audit Trail Data for CyberLocksProgrammed or DownloadedCommunication LogsCyberPointsCyberPoint ListCyberPoint Properties<strong>Door</strong>s<strong>Door</strong>s in CyberAudit-WebThe <strong>Door</strong>s Listing Page<strong>Door</strong> PropertiesAdding <strong>and</strong> Configuring a <strong>Door</strong>Suspending the Keep-Unlocked ScheduleThe Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>Terminal Output PatternsGlobal Terminal Output Patterns<strong>Door</strong> <strong>and</strong> I/O Module PropertiesView Audit Trail Data for <strong>Door</strong>sAudit Trail for <strong>Door</strong>s<strong>Door</strong> Tags<strong>Door</strong> Tag PropertiesGranting Access to <strong>Door</strong>sEmail Notification for <strong>Door</strong> Left Open


PeoplePeoplePeople DetailsAdding People <strong>and</strong> KeysImporting Personnel DataPeople <strong>and</strong> Keys Bulk EditPeople TagsPeople Tag PropertiesPeople <strong>with</strong> this TagCyberKeysIssue NumbersReplace KeyChange Vault Access NumberAssigning Master Key AccessChange Icon Report for CyberKeysLost KeysDesignating a Lost Key <strong>with</strong> Disabling PointsHow to Mark a Key as Not Lost <strong>and</strong> Reset Locks from being Disabling PointsCyberKey Behavior SettingsLock to DownloadHow to Issue a CyberKey to a PersonLost Keys ListUpdating a Key by Issue NumberUpdating a KeyView Audit Trail Data for CyberKeysAudit Trail Events from CyberKeysCyberKey Communications LogUpdating CyberKey FirmwareRFID Access CardsRFID Access CardsSupported RFID Access CardsSteps to Assign an RFID Access CardSchedule Access/ExpirationSchedule PropertiesAdd or Edit HolidaysAdding HolidaysCyberAudit-Web Global SchedulesSet a CyberLock as a CyberPointAdding SchedulesSchedule Time FramesCombining SchedulesMatrix SymbolSchedule IconsSetting Schedules in the Access Matrix <strong>with</strong> a Bulk Operation


About This ManualThis <strong>manual</strong> is intended for the top-level administrator of a CyberAudit-Web Professional system.Functionality <strong>and</strong> setup is described from this administrator's perspective. It was generated fromCyberAudit-Web Professional context help. Chapters <strong>and</strong> sections are organized in approximateorder of recommended implementation for a CyberAudit-Web Professional system.Context help is built in to CyberAudit-Web. It is viewable from the many "?" links throughout theapplication web pages. Many pages of the <strong>manual</strong> are nothing but brief descriptions of the page orsection they reference.The least effective use of this <strong>manual</strong> would be to print it. It is best used by viewing it on screen asa .pdf file. It enables browsing to related topics through its many hyperlinks. Like a web browser,the Adobe® Reader PDF viewer has forward <strong>and</strong> back buttons to enhance the browsingexperience.


IntroductionThank you for using CyberAudit-Web Professional to manage your CyberLock system. Thissection introduces CyberAudit-Web <strong>and</strong> offers a How-to reference to perform common tasks.


About CyberAudit-Web Professional<strong>Videx</strong> offers several software solutions for small, medium, <strong>and</strong> large installations. ThisCyberAudit-Web Professional tutorial gives an overview of CyberLock hardware <strong>and</strong> software. TheGetting Started section provides the easiest order of implementation to set-up a system. The firsttopic is hardware which is the foundation of the system. Afterward, the focus will be WebProfessional features <strong>and</strong> capabilities.CyberLock HardwareCyberLocks are high security access control cylinders which have no conventional keyway <strong>and</strong>can not be picked. These electronic cylinders are the exact dimensions of the mechanical cylindersthey replace. They install into the lock hardware <strong>with</strong> the same ease of the mechanical cylinder<strong>and</strong> do not change how the lock hardware functions. No wiring or battery is needed at the lock;power is provided by the battery in the key.With over 200 cylinder designs, CyberLocks install in interior <strong>and</strong> exterior doors, padlocks,containers, <strong>and</strong> cabinets.


CyberKeysCyberKeys contain four levels of intelligence:Encrypted access codes to ensure the key is from thesame installation as the lock.The unique ID of the key.Access schedules for the user of the key.Storage of up to 3900 events, both authorized <strong>and</strong>denied.The key also houses a clock <strong>and</strong> the battery that powers the key<strong>and</strong> locks.There are two types of CyberKeys: one <strong>with</strong> a rechargeablebattery <strong>and</strong> one <strong>with</strong> a replaceable battery.It's important to note that all the data <strong>and</strong> schedule information isalways retained in the key, regardless of the status of thebattery.How is it Powered?The battery inside this key is a st<strong>and</strong>ard lithium3-volt battery that is easily replaced in the field. Asingle battery will provide between 2000 <strong>and</strong> 5000openings <strong>with</strong> a maximum life of one year.When the voltage of the battery is low, the keybeeps much in the same way as a smoke alarm.


The rechargeable battery charges in 1 - 2 hours. Asingle charge will provide an average of 500openings. The rechargeable battery has a five yearlife.When the voltage of the battery is low, the key's redLED will flash. If fully depleted, the key will not workuntil it has been charged <strong>and</strong> the clock has beenreset by communicating <strong>with</strong> the software.When a Key <strong>and</strong> Lock Communicate...The key supplies power to thecylinder <strong>and</strong> communications areestablished. In a fraction of asecond, a sequence of eventsoccurs to determine if the key mayopen the lock.The cylinder <strong>and</strong> keyexchange IDs.The key verifies that it hasaccess to the lock ID <strong>and</strong>that the it's there during itsscheduled access times.If everything matches up, thekey sends its access code tothe lock. An "Accessgranted" event is written intothe lock <strong>and</strong> the key.If the key does not haveaccess to the lock at thattime, the key alarms <strong>and</strong> a"denied" event is written inthe key.


At the same time, the lock checksthe key ID against its list of lostkeys.If the key ID is in the list, the lockdenies entry <strong>and</strong> the key alarms.A denied event is written in thememory of the lock <strong>and</strong> the key.The key is also disabled fromworking in any other lock.If the key ID is not on the list of lostkeys, <strong>and</strong> the lock <strong>and</strong> key accesscodes match, the key gains access.An "Authorized to Open" event iswritten in the key <strong>and</strong> the lock.Enhanced SecurityThere are additionalfeatures that provide aneven higher level ofsecurity.For high security areas,CyberLocks can beprogrammed for eithermultiple key custody ordelayed access.Multiple key custody isused to require 2, 3, or 4keys to be presented to thelock before a lock will grantaccess.Delayed access is used incustomer applications thatrequire a delay of a fewseconds or up to 20minutes between the timethe key is first presented<strong>and</strong> the time the lock is ableto be opened.CyberKeys, unlikemachanical keys,can be set toexpire regularly,even on a dailybasis.Frequent expirationof keys provides ahigher level ofoverall security<strong>with</strong>:Better keycontrolDecreasedrisk due tolost keysAccess totheinformationregularlydownloadedfrom thekeys


CommunicatorsExpired keys need to be reathorizedbefore they will work again, <strong>and</strong>communicators are the products thekey holders use to reauthorize theirkeys.To find the balance between security<strong>and</strong> convenience for the users, thereare many types of communicators tochoose from:AuthorizersIR EncodersUSB <strong>and</strong> Web StationsCyberKey Authorizer


CyberKey Authorizers are durable <strong>and</strong> ideal for remote locations. They allow users to convenientlyrenew their expired keys on a daily basis, for a high degree of key control.The CyberKey Authorizer has two components: the hub <strong>and</strong> the keyport.There are two types of hubs: Web Authorizers <strong>and</strong> network/modem Authorizers.The Web Authorizer is the more versatile of the two. It can be used on the Internet or a LAN.The network/modem hub can be used to update keys in remote areas that the network does notreach via a dedicated phone line.The keyport allows users to convenientlyupdate their keys. It is rated for outside use<strong>and</strong> attaches to a single electrical box <strong>with</strong>security screws. It has an easy-to-read displaythat leads the key holder through the processof updating their key.For example, when the key holder arrives, thekeyport displays "Ready." When the key isplaced in the keyport, if a PIN is required, theLCD display will request the operator to enterit. Once entered, the display will showdownloading, updating, <strong>and</strong> "Key Ready."


USB IR EncoderThe CyberKey IR Encoder utilizes a st<strong>and</strong>ard USB connection.USB StationWeb Station


CyberAudit-Web Professional uses menus to manage a CyberLock system.Each menu has submenus that can be selected by hovering over the main menu.There are several ways to navigate to different subjects <strong>with</strong>in Web Professional. For example, toget to the first set-up option, select "Options" from the "System" drop down menu, then click "LockOptions" highlighted text. Or select "Options" from the "Locks" drop down menu. Both ways resultin the global options for locks.


Operations for each window appear by clicking the item. For example, to see the address <strong>and</strong>phone number for Nellie Pyle, click on her name. Click "Properties" from the drop down window asseen above.


How-To'sAdd:CyberKeysCylinders<strong>Door</strong>sFlex System HubHolidaysIR EncodersIssue a KeyLAN AuthorizersLocksModem AuthorizersPeopleProgramming JobsSchedulesStationsVault 20 FXWeb AuthorizersReset:CylindersFlex System HubLAN AuthorizersLocksWeb AuthorizersMisc:Audit Trail EventsCyberKey DocumentsCyberLock CleaningDownloading LocksLost KeysLost System KeysSet a CyberLock as a CyberPointUpgrading CyberKey FirmwareWeb Authorizer KeyportComm<strong>and</strong>s


CyberAudit-Web Professional CreditsColoCons icons used in this software provided by Ken Saunders at http://www.MouseRunner.com.Licensed under the Creative Commons license.Silk icon set provided by Mark James at http://www.famfamfam.com/lab/icons/silk/ . Licensed underthe Creative Commons license.Sweetie BasePack icons are provided by Joseph North at http://sweetie.sublink.ca. Licensedunder the Creative Commons license.dbMenu is written by David Boggus at http://www.boggusweb.com.CyberAudit-Web Professional was written entirely in-house by <strong>Videx</strong>, <strong>Inc</strong>.


CyberAudit-Web Professional LicensePLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE INSTALLING ORUSING THIS SOFTWARE. THE SOFTWARE COVERED BY THIS LICENSE IS COPYRIGHTEDAND LICENSED, NOT SOLD, FOR USE SOLELY UNDER THE TERMS OF THIS LICENSE.VIDEX IS ONLY WILLING TO GRANT YOU A LICENSE TO USE THE SOFTWARE ON THECONDITION THAT YOU ACCEPT ALL TERMS AND CONDITIONS IN THIS LICENSE.1. Definitions"Licensed Software" means the <strong>Videx</strong> owned software delivered under this License, including theoriginal <strong>and</strong> all whole or partial copies, software documentation, <strong>and</strong> any updates, upgrades, <strong>and</strong>enhancements to the <strong>Videx</strong> owned software acquired through technical support."Support Location" means the primary installation point of the Licensed Software where it will beaccessed by the related hardware for the purpose of managing the overall CyberLock system. ASupport Location can consist of more than one site if the purpose is for load balancing <strong>and</strong>/ornetwork redundancy.2. Scope of LicenseSubject to the payment of applicable fees <strong>and</strong> acceptance of all terms <strong>and</strong> conditions in thisLicense, <strong>Videx</strong> grants You a non-exclusive, non-transferable, non-sublicensable right <strong>and</strong> licenseto use the Licensed Software on one Support Location <strong>and</strong> to make copies of the LicensedSoftware only as necessary for back-up, load balancing or disaster recovery purposes. Once youhave deployed the Licensed Software, it is not transferable to another Support Location <strong>with</strong>outprior written authorization from <strong>Videx</strong>, except if the Licensed Software continues to manage theidentical CyberLock hardware from the original deployment location. You will take all necessarysteps to ensure that any authorized agents, contractors, or third parties who use the LicensedSoftware do so only on Your behalf <strong>and</strong> fully comply <strong>with</strong> the terms of this License. You shall nottransfer, sublicense, re-license, rent, or lease the Licensed Software <strong>with</strong>out obtaining prior writtenauthorization from <strong>Videx</strong>. You shall not cause or permit the reverse engineering, disassembly,decompilation, or attempt to derive the source code of the Licensed Software or any updates,upgrades, or extensions. You shall not, at any time, use, copy, modify, or distribute the LicensedSoftware except as expressly permitted in this License. The terms of this License will govern anyupdates, upgrades, <strong>and</strong> extensions that replace <strong>and</strong>/or supplement the Licensed Software, unlesssuch updates, upgrades, <strong>and</strong> extensions are accompanied by a separate License in which casethe terms of that License will govern the Licensed Software.3. ActivationThe Licensed Software was provided <strong>with</strong> a license number (License Number). You must registerthis License Number <strong>with</strong> <strong>Videx</strong> to secure an activation code to load <strong>and</strong> operate the LicensedSoftware. A unique License Number is required for each support location. Failure to register thisLicense Number <strong>with</strong> <strong>Videx</strong> will render the Licensed Software inoperable.4. Term <strong>and</strong> TerminationThis License shall remain in effect until terminated by either party under the termination provisionsset forth herein.


Either party may cancel this License for cause based upon a material breach of its terms, providedthe non-breaching party provide written notice to the breaching party specifying the breach <strong>and</strong>affording the breaching party a thirty (30) day period in which to cure the breach. In addition, eitherparty may seek any legal or equitable remedy available for any violation of the terms of thisLicense. In the event of a breach of any of the provisions in this License, the parties acknowledgethat the non-breaching party may not have an adequate remedy in money or damages. Thenon-breaching party will therefore be entitled to obtain an injunction against such breach from anycourt of competent jurisdiction immediately upon request <strong>with</strong>out posting a bond. Thenon-breaching partys right to obtain injunctive relief shall not limit its right to seek further remedies.Any terms of this Agreement that by their nature extend beyond termination of this License remainin effect until fulfilled, <strong>and</strong> apply to both parties' respective successors <strong>and</strong> assignees.5. SupportTechnical support services for the Licensed Software, other than the services expressly providedfor herein, are not covered by this License. In addition, You agree that <strong>Videx</strong> may utilize itsauthorized agents, distributors, or contractors to provide technical support services for theLicensed Software, including the installation of any updates, upgrades, <strong>and</strong> extensions. Theprovisions of this Section 5 (Support) shall not prohibit, preclude, or otherwise supersede anyseparate agreement concerning support services for the Licensed Software.6. AssignmentYou may assign all of your rights <strong>and</strong> obligations under this License to another party only if thatparty agrees to all of the terms <strong>and</strong> conditions of this License. Upon assignment You must providethe party <strong>with</strong> a hard copy of this License.7. Warranty, Exclusions, <strong>and</strong> Limitation of Liability7.1 Limited WarrantyFor a period of sixty (60) days following delivery of the Licensed Software to You, <strong>Videx</strong> warrantsthat the Licensed Software shall perform in all material respects according to <strong>Videx</strong>s specifications.<strong>Videx</strong> does not warrant that Your use of the Licensed Software will be errorfree, virus-free oruninterrupted. Your sole remedy for a breach of this warranty shall be that <strong>Videx</strong> shall usecommercially reasonable efforts to correct the Licensed Software so that it operates according tothe warranty. This warranty shall not apply if the Licensed Software is modified by anyone otherthan <strong>Videx</strong> or an authorized agent of <strong>Videx</strong> acting <strong>with</strong>in the scope of its authority, is misused, orused <strong>with</strong> software or hardware <strong>with</strong> which the Licensed Software is not intended to be used.The warranty set forth above will not be enlarged, diminished or affected by, <strong>and</strong> no obligation orliability will arise from, <strong>Videx</strong>'s rendering of technical advice, assistance or service in connection<strong>with</strong> Your selection or use of the Licensed Software.Certain open source or other-vendor software may be distributed <strong>with</strong> the Licensed Software orrecommended in connection <strong>with</strong> its installation <strong>and</strong> use. Such products are provided orrecommended for Your convenience only. <strong>Videx</strong> makes no representation or warranty of any kindregarding such products. <strong>Videx</strong> offers no support for such products <strong>and</strong> shall have no liabilityassociated <strong>with</strong> their use. Your use of these products shall be in accordance <strong>with</strong> the applicablelicenses for such products.


7.2 ExclusionsTHE LIMITED WARRANTY SET FORTH ABOVE IS THE EXCLUSIVE WARRANTY COVERINGTHE LICENSED SOFTWARE AND REPLACES ALL OTHER WARRANTIES OR CONDITIONS,EXPRESS OR IMPLIED. TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW THELICENSED SOFTWARE AND ANY SUPPORT SERVICES ARE PROVIDED "AS IS," WITH ALLFAULTS AND WITHOUT REPRESENTATIONS OR WARRANTIES OF ANY KIND. VIDEXSPECIFICALLY DISCLAIMS ALL OTHER PROMISES, REPRESENTATIONS OR WARRANTIES,EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENTOF THIRD PARTY RIGHTS AND ANY IMPLIED WARRANTY ARISING FROM COURSE OFPERFORMANCE OR COURSE OF DEALING.7.3 Limitation of LiabilityTO THE FULL EXTENT NOT PROHIBITED BY APPLICABLE LAW VIDEX SHALL NOT BELIABLE FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USEOF OR INABILITY TO USE THIS PRODUCT, WHETHER ARISING OUT OF CONTRACT,NEGLIGENCE, TORT, OR UNDER ANY WARRANTY, OR OTHERWISE, EVEN IF VIDEX HASBEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR FOR ANY OTHER CLAIM BYANY OTHER PARTY. VIDEXS LIABILITY FOR DAMAGES IN NO EVENT SHALL EXCEED THECOST OF SOFTWARE LICENSED HEREUNDER. CERTAIN STATES DO NOT ALLOW THEEXCLUSION OF IMPLIED WARRANTIES, OR THE EXCLUSION OR LIMITATION OF CERTAINDAMAGES. IF SUCH LAWS APPLY, CERTAIN EXCLUSIONS OR LIMITATIONS MAY NOTAPPLY; HOWEVER, ALL OTHER RESTRICTIONS AND LIMITATIONS SHALL REMAIN INEFFECT.8. IndemnificationTO THE FULL EXTENT NOT PROHIBITED BY APPLICABLE LAW VIDEX EXPRESSLYDISCLAIMS ALL OBLIGATIONS TO INDEMNIFY, DEFEND, OR HOLD HARMLESS FORCLAIMS ARISING OUT OF THE USE OF THE LICENSED SOFTWARE.9. Generala) If any term or provision of this License is found to be invalid by any court of competentjurisdiction, they are to that extent omitted, <strong>and</strong> all other provisions shall remain in full force <strong>and</strong>effect.b) You may not export or re-export the Software or any copy or adaptation in violation of anyapplicable laws or regulations.c) The Licensed Software <strong>and</strong> any related documentation are commercial items <strong>and</strong> thus,pursuant to Section 12.212 of the Federal Acquisition Regulations (FAR) <strong>and</strong> Defense FederalAcquisition Regulations (DFAR) Supplement Section 227.7202, Government's use, duplication ordisclosure of the Licensed Software is subject to the restrictions set forth by <strong>Videx</strong>. The LicensedSoftware was developed at private expense <strong>and</strong> was not developed <strong>with</strong> government funds. It is atrade secret of <strong>Videx</strong> for all purposes of the Freedom of Information Act.


d) The agents, employees, distributors, <strong>and</strong> dealers of <strong>Videx</strong> are not authorized to makemodifications to this License, nor to make statements, representations, or terms binding on <strong>Videx</strong>.Accordingly, any statements, representations, or terms not made or given directly <strong>and</strong> expressly by<strong>Videx</strong>, such as reseller presentations, whether oral or written, are not binding on <strong>Videx</strong>. Purchaseorder terms inconsistent <strong>with</strong> this License are expressly rejected.e) Waiver by either party of any rights under this License shall not be a waiver of or prejudice theparty's right to require strict performance of the same provision in the future or of any otherprovision. Any modification must be in writing <strong>and</strong> signed by the parties.f) Nothing contained in the License will be construed so as to make the parties partners or jointventurers or to permit either party to bind the other party to any agreement or purport to act onbehalf of the other party in any respect.g) Any notices or written approvals required or permitted under this License will be given, byeither party, in the English language <strong>and</strong> will be sent in writing by registered mail or nationallyrecognized overnight delivery service, postage prepaid, to the parties at the following addresses:To VIDEX at:Attention: Paul Davis<strong>Videx</strong>, <strong>Inc</strong>.1105 N.E. Circle BoulevardCorvallis, OR 9733010. Governing LawThe laws of the State of Oregon shall govern <strong>with</strong>out reference to the place of execution orperformance. The parties agree that the U.N. Convention on the International Sale of Goods shallnot apply to the License. Any <strong>and</strong> all disputes between the parties shall be brought <strong>and</strong> resolvedsolely <strong>and</strong> exclusively in the state or federal courts located in the State of Oregon, United States ofAmerica. Both parties hereby irrevocably consent to the jurisdiction of such courts <strong>and</strong> service ofprocess in connection there<strong>with</strong>. Any judgment rendered by such courts may be entered <strong>and</strong>enforced by any court having jurisdiction over the party against which an award is entered or itsassets. Both parties hereby irrevocably waive any objections to the jurisdiction of such courtsbased on any ground, including <strong>with</strong>out limitation improper venue or forum non conveniens.BY CLICKING ON THE "ACCEPT" BUTTON BELOW, OR BY INSTALLING OR USING THISSOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ THE LICENSE ANDUNDERSTAND IT COMPLETELY. FURTHER, YOU ARE BINDING THE ENTITY THATORDERED THE LICENSED SOFTWARE FROM VIDEX TO THE TERMS OF THIS LICENSE,AND ACKNOWLEDGE THAT YOU HAVE THE AUTHORITY TO DO SO.


ConceptsDefines the hardware components that may be used <strong>with</strong> a CyberLock system as well as thesoftware objects <strong>and</strong> features used to manage them.


CyberLocksTable Fields:This page allows new CyberLocks to be added to the system as well as edited. The locks arelisted in rows. Each row contains information about the lock including:Name - The name of the CyberLock.Serial - The serial number of the CyberLock.Change Icon - If the lock is not programmed <strong>with</strong> access codes a red 'C' icon ( )appears in thecolumn. If the system has information for the lock but the lock has not yet been updated, ayellow 'C' icon ( ) appears. Clicking on the change icon for the lock brings up a change iconreport that compares the current settings for the lock <strong>with</strong> the new settings.Reset Status - If a lock has been reset, a green check mark will be in the Reset column. If alock has been marked to be reset, but not yet reset, there will be both a yellow change icon <strong>and</strong>a green check mark.Multi-key Mode / Open Delay - A lock may be set to require more than one CyberKey before itopens or to wait a certain amount of time before opening after an authorized key makescontact.Tagged With - The tags the CyberLock is associated <strong>with</strong>. Click on a link to open the tag'sProperties page.Note: Once a lock is updated or reset, the Programmer Key or Gr<strong>and</strong> Master that communicatedthe change to the lock must be downloaded to CyberAudit-Web to clear the yellow change icon.Operations -Page Navigation is controlled by the arrows bracketing thelink. Clicking the linkwill open more options including browsing to the first <strong>and</strong> last pages, selecting a page to jumpto, or the number of locks per page.New - Click to add a new lock.- This icon appears if there is more than one CyberLock in the list. It enablesresetting <strong>and</strong> tagging all selected locks at once using bulk editing.


1.2.- Creates a printable list of the lock records displayed on the page, excluding those notseen because of any applied filters.Clicking in a non-linked section of a lock row will display a drop-down menu of options for the lockthat includes:Properties - Displays the details of the selected CyberLock.Show in Matrix - Creates a filter in the Access Matrix to display the tags <strong>and</strong> people thathave access to this lock <strong>and</strong> its associated lock tags.People Access - Generates a report listing people authorized to open the lock.Audit Report - Generates a report of audit trail data associated <strong>with</strong> the selectedCyberLock.Comm Log - Generates a report of CyberLock status retrieved from the lock whendownloaded by a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.Delete - Removes the selected CyberLock record after confirmation.Filters -Two types of filters are available to help find a lock or set of locks quickly:Filter by Keyword - Use the list filter to reduce the list of CyberLocks displayed.Filter by Tag - A lock tag may be used separately or in combination <strong>with</strong> the list filter tofurther reduce the list. If lock tags are defined, they will be shown to the left of the list of locks.Click on one of them to reduce the list to locks <strong>with</strong> that tag.To remove all filters, click on the Remove Filter link near the page controls at the top of the list.Related Topics:Adding LocksAudit Trail EventsCyberLock CleaningDownload a LockImporting LocksLock TagsProgramming JobsReset a LockSet a CyberLock as a CyberPointTags


What is a Tag?In CyberAudit-Web, a tag is a free-form way to classify People <strong>and</strong> Locks. Tags help organizePeople <strong>and</strong> Locks into logical categories by providing an unlimited number of ways to describethem. There is no "wrong" choice for how to use them. Instead of belonging to one "group,"People <strong>and</strong> Locks may have any number of tags.Here are some examples how tags may be used.ABC EnterprisesUses people tags to organize their employees by department. The departments are Accounting, Engineering,Human Resources, Maintenance, Marketing, Production, <strong>and</strong> Support. Employees of each department havea set of locks they must be able to open.ABC creates lock tags to group CyberLocks for access. Finally, using the Access Matrix, ABC grants eachpeople tag access to each of the groups of CyberLocks it requires."Maintenance" is a lock tag. It tags CyberLocks needed to do the Maintenance functions at ABC. The"Maintenance" tag also includes some locks that are tagged <strong>with</strong> Production <strong>and</strong> Human Resources becauseall three departments require common access to some locks.Gail Ash, as supervisor of Marketing <strong>and</strong> Support, is tagged <strong>with</strong> both "Marketing" <strong>and</strong> "Support" people tags.This allows her to access both "Marketing" <strong>and</strong> "Support" tagged CyberLocks. And Norman Cooper, normallytagged <strong>with</strong> Production, temporarily gets the "Maintenance" tag when Eric Montoya, the regular Maintenanceemployee, goes on vacation.Green Construction CompanyEmploys electricians, plumbers, carpenters, <strong>and</strong> other specialists. Each employee serves a role in theconstruction process. Green uses CyberLocks to help them maintain control on their supply of raw materials.They use people tags to classify their employees by the role they play in the company. They use lock tags toidentify the CyberLocks each employee group must access.When Green adds a new electrician, Kashif Saleem, they simply tag his record <strong>with</strong> the "Electrician" peopletag. When they issue him a CyberKey, it will automatically be programmed to open the locks that electriciansat Green Construction need to open.Wilson VendingUses CyberLocks on their vending machines to prevent key duplication <strong>and</strong> to maintain an audit trail ofactivity for each vending machine asset. Most key holders are either route drivers or service technicians.Wilson uses lock tags to identify the assets <strong>and</strong> CyberLocks on each route. Then they use people tags toidentify the drivers that will service each route.The service technicians must be able to open a broader group of locks. Wilson again uses lock tags, thistime to identify the assets that fall into each service area. As a result, each asset (CyberLock) gets two tags;


one for its route <strong>and</strong> one for its service area. The service technicians are then tagged <strong>with</strong> a descriptor fortheir service area <strong>and</strong> access is granted to the appropriate group of locks.Finally, auditors for Wilson want to classify the vending assets by the "type" of product they dispense(snacks, cold beverage, hot beverage, money token). They create additional lock tags that add theseadditional descriptors <strong>and</strong> apply them to the locks. They now use the descriptors to help them createcustomized reports for audit trails from these locks.


SchedulesSchedules allow keys to open locks at specified times. CyberAudit-Web Professional supportsusing up to 49 different schedules.Table Fields:Name - The name assigned to the schedule.Matrix Symbol - The letter or icon used to represent the schedule in the Access Matrix.Times Used in Matrix - The number of common squares in the Access Matrix <strong>with</strong> theschedule assigned.Master Keys Using - The number of Master Keys restriced by the schedule.Operations:New - Click to add a new schedule.- Creates a printable list of the schedules.Properties - Displays the editable properties of the schedule.Delete - Removes the selected Schedule record after confirmation.Three schedules are always present in CyberAudit-Web:CyberPoint - Assigning a CyberPoint schedule to a cell in the Access Matrix will not allowthose keys to open that lock or locks <strong>with</strong> that tag. Instead, the key will beep 3 times <strong>and</strong> recordthe fact that the person contacted the lock. The CyberPoint schedule is great for security guardrounds. Creating a st<strong>and</strong>ard schedule <strong>and</strong> using the CyberPoint schedule to assign to asecurity guard enables the guard to use the same key to both open locks he or she needsaccess to (such as the lock on the door of the employee entrance <strong>and</strong> his or her personallocker) <strong>and</strong> to record that security checkpoints were visited during the times they needed to bechecked. CyberPoint schedules are valid at all times, including holidays.Full Access - The Full Access schedule is valid at all times, including holidays.


No Access - The No Access schedule is never valid. This schedule exists for the purpose ofrestricting master key access. When this schedule is used in the Access Matrix for a person ortag <strong>with</strong> a master key, it will prevent the master key from accessing those locks.Related Topics:Adding CylindersAdding People <strong>and</strong> CyberKeysAudit Trail EventsCommunicatorsHolidaysNotificationsSet a CyberLock as a CyberPointTags


Holidays"Holidays," which do not have to be literal holidays, are meant to be schedule exceptions inCyberAudit-Web. Any day of a year may be designated a holiday, such as the company CEO'sbirthday.Holidays are meant to block access on specified days which would normally be valid, according tothe time frames <strong>with</strong>in an access schedule. Access can still be granted on holidays, but it must bespecifically added in the Add or Edit Schedule screen, in the "Time Frames" section. Whenspecifying days of the week for a schedule time frame, check the box labeled "Holidays" to allowaccess on days that would normally be excepted from the schedule.Table Fields:Name - The name assigned to the holiday.Date - The month, day, <strong>and</strong> year of the holiday.Recurring - If the holiday is set to occur every year, a green checkmark will be in this field.Operations:New - Adds a new holiday.- Creates a printable list of the holidays.Properties - Displays the details of the holiday for editing.Delete - Removes the selected holiday record after confirmation.


The Access MatrixThe CyberAudit-Web Access Matrix displays the People <strong>and</strong> CyberLocks, <strong>and</strong> Single CyberKeyVaults in the system <strong>and</strong> facilitates granting access. It lists People <strong>and</strong> people tags vertically.Vaults, CyberLocks <strong>and</strong> their tags are listed horizontally.Schedules are designated in the common square where a key <strong>and</strong> lock meet. Schedules arerepresented by icons or letters. In the Access Matrix above, Maintenance is a tag that consists offour people. The cell where the Maintenance people tag meets the Electrical CyberLock tag showsa " D" which indicates Maintenance has access to the three electrical locks during the " D" schedule.Clicking on a person will open that Person's Properties page. Clicking a people tag will open thetag's properties page. Respective pages for CyberLocks will open by clicking on a lock, lock tag, orVault.


Granting Access to Locks - Access is granted by applying a schedule in the cell where a Personmeets a CyberLock in the matrix. To apply a schedule, click on the common cell. The "CellSchedule" overlay will appear. A dropdown list is used to choose a schedule. Clicking a link to thePeople, lock, or tag name will open the corresponding Properties page. Additionally the "CellSchedule" overlay has a link to create a new schedule.Controlling the Display - The number of displayed CyberLocks <strong>and</strong> CyberKeys is controlled inthe Display Settings submenu under Access Matrix. The matrix position is represented above thelist of people. The blue section is the current position; the grey section is not currently beingviewed. The view is navigated by the arrows framing the CyberLock <strong>and</strong> people lists or bydragging the blue box to the desired location in the position box. The numbers by the boxrepresent how many total people <strong>and</strong> locks are displayed <strong>with</strong> the current filter (discussed below).Position BoxNavigation - Navigation controls are available for when there is more data than can be displayedon a single page of the Access Matrix.In addition to the Position Box, Navigation controls are available forscrolling data up, down, right, or left. Single-arrow controls scroll onerow or column at a time. Double-arrow controls scroll one page.Navigation Controls


Menu OperationsColumn MenuRow MenuFilters -Another feature to aid in managing locks, lock tags, people or peopletags are the Access Matrix Filters.To find a person or tag quickly, click on the People Filter link <strong>and</strong> the Filter overlay will appear.Enter the string of characters to filter on. For example, typing "ti" in the people filter will find anypeople or tags containing those letters in that order.


The Keyword filter supports pattern matching by these rules:Matching looks for substrings. he would match she <strong>and</strong> there.All matching ignores differences between upper case <strong>and</strong> lower case.Additional substrings may be added to increase the possible matches. Separate each substring<strong>with</strong> a space. For example searching for ma against a list containing Peter, Paul, <strong>and</strong> Marywould result in a list of Mary. A search of ma pa would result in a list of Mary <strong>and</strong> Paul.Use double quotes to look for a phrase. Within double quotes a space is meaningful. Forexample, " he sat" would not match she sat.Quoted phrases <strong>and</strong> substrings may be used at the same time. Separate each <strong>with</strong> a space.A quote character (") cannot be searched.The search is done on both names <strong>and</strong> IDs.The most recent search will be saved as "Quick Filter" in the dropdown list. If the same search isperformed multiple times, a name can be given to it to save the filter in the dropdown list.Advanced features of the filter overlay include:Finding only TagsHiding unused TagsSorting Tags first so they appear at the top of the resultsCustomizing the matrix dimensions


Related Topics:How-To'sLock TagsMatrix Display SettingsPeoplePeople TagsSchedulesTag Definition


CyberKeysThree types of CyberKeys are available, St<strong>and</strong>ard, Rechargeable, <strong>and</strong> Blue. All are shownbelow. A Key Comparison document describes the difference among these keys.These documents are common to all keys:CyberKey Product InfoCyberLock CleaningTips for Using a CyberKeySt<strong>and</strong>ard CyberKey documents:St<strong>and</strong>ard CyberKey Battery CapRemovalSt<strong>and</strong>ard CyberKey Tones (seeCyberKey Tones.pdf)Rechargeable CyberKey documents:CyberKey Rechargeable LEDFlash GuideBattery ManagementBeeper <strong>and</strong> LED Patterns forCyberKey II


CyberKey ComparisonThese keys can be used interchangeably <strong>with</strong> your CyberLock system. The memory capacity <strong>and</strong>programmability are the same.The CyberKey Rechargeable is an excellent choicefor CyberLock® customers that want a small,environmentally-friendly key. There's no need toreplace <strong>and</strong> discard batteries: the lithium-ion polymerbattery is rechargeable. This battery fully charges intwo hours, provides 500 openings per charge, <strong>and</strong>lasts for 3 to 4 years. The CyberKey II has a st<strong>and</strong>ardmicro USB port <strong>and</strong> can be charged from that port. Itcan also communicate to CyberAudit-Web using thatsame connection.The St<strong>and</strong>ard CyberKey is an excellent choice forthose who want the convenience of a key <strong>with</strong>outrecharging. This key uses a replaceable 3-volt lithiumbattery, easy to source <strong>and</strong> replace on-the-fly.The durable fiberglass-reinforced case <strong>and</strong>replaceable brass tip make this choice a toughperformer in all environments. This key uses acombination of a green LED <strong>and</strong> a beeper to providefeedback (see CyberKey Tones.pdf) to the user.CyberKey Rechargeables are made <strong>with</strong> a durablefiber nylon case <strong>with</strong> brass tip. Highly visible red <strong>and</strong>green LEDs provide feedback to the user on accessevents <strong>and</strong> key status.


CyberKey Product InfoCyberKeys are electronic keys used to operate CyberLocks.St<strong>and</strong>ard CyberKeys are made of durable nylon-basedplastic <strong>and</strong> have a replaceable brass tip. They arepowered <strong>with</strong> a replaceable CR-2 lithium battery. Anindicator light shows battery power <strong>and</strong> key activation. Aspeaker makes tones indicating access, no access, <strong>and</strong>communication.Battery Life - 2000 to 5000 openings, depending onsettings <strong>and</strong> battery.CyberKey Rechargeables are made <strong>with</strong> adurable fiber nylon case <strong>with</strong> brass tip. Theyhave a rechargeable lithium-ion polymerbattery, <strong>and</strong> use red <strong>and</strong> green LEDs toprovide feedback to the key holder on accessevents <strong>and</strong> key status.Battery fully charges in two hours,provides up to 500 openings percharge, <strong>and</strong> lasts for 3 to 4 years.The CyberKey II has the same durable nylon-based plastic case as the other CyberKeys <strong>and</strong> has the samerechargeable lithium-ion polymer battery as the st<strong>and</strong>ard CyberKey Rechargeable. In addition it ...Has a st<strong>and</strong>ard micro USB portCan be charged using the USB portCan communicate to CyberAudit-Web using CyberLink via the USB portHas both LEDs <strong>and</strong> a beeper, for visual <strong>and</strong> audio feedbackDoes not have infrared for communication


CyberKeys have memory that contains encrypted access codes, a list of locks it may access,schedules of dates <strong>and</strong> times for accessing locks, <strong>and</strong> a begin/end date range during which thekey will operate. A CyberKey also contains an audit trail of up to 3,900 access events. Each timethe key touches a CyberLock, it records the lock ID, date, time, <strong>and</strong> authorization status.CyberKeys communicate to CyberAudit-Web either through the tip when placed in a Station orAuthorizer keyport, or by making an infrared connection to an IR device. Infrared devices includePDA/cell phones, PCs <strong>with</strong> an infrared port or an IR Encoder.Additional Features:CyberKeys can generate a denied event in both the key memory <strong>and</strong> lock memory.A CyberKey can record when it was removed from a lock.A St<strong>and</strong>ard Cyberkey <strong>and</strong> CyberKey II beeper can be disabled.Additional Features <strong>with</strong> CyberAudit-Web Enterprise:A key can use multiple schedules per lock.Schedules can expire independently.Specifications:Operating Temperature - 32° to 122° F; 0° to 50° COperating Conditions - Keep key dry. If exposed to water, remove battery from St<strong>and</strong>ardCyberKeys or cap from CyberKey Rechargeables <strong>and</strong> allow key to dry completely before use.Number of Locks per Key - Up to 3300 locks can be accessed <strong>with</strong> a st<strong>and</strong>ard user key.A Master key has no limit to the number of locks it can access.Access Schedules - Schedules programmed into CyberKeys provide complete control overspecific days <strong>and</strong> times that a key will operate. A key can use up to 49 different schedules toaccess locks.Holidays may be set as exceptions to the schedules.Audit Capacities - A CyberKey remembers up to 3900 events <strong>with</strong> date <strong>and</strong> time. It can be setto keep only the most recent set of events or to stop operating when its audit trail is full.Electronic Security Features - Key Expiration - a begin/end date range can be set during whichthe key will work.A key retains its audit trail if the power is interrupted.Electronic Rekeying - Rekeying a system is done via the software; no need to install new locks<strong>and</strong> issue new keys.Related Topics:Add a KeyCyberKey DocumentsCommunicatorsLost Key Help


System Key PropertiesIf a system key is lost or broken, click the replace link to issue a new key.The name of the key <strong>and</strong> its settings can be changed through this page.Gr<strong>and</strong> Masters can be set to open locks <strong>and</strong> program emergency keys that will open any lock forthe specified time. They can also be set to program locks <strong>with</strong> one touch whereas a Programmerkey must touch the lock, be updated <strong>with</strong> the software, <strong>and</strong> touch the lock once again to finishprogramming it.Audit Trail - Generates an audit trail report for People associated <strong>with</strong> the tag.Comm Log - Generates a report of key status logged by communicators when a CyberKeyis downloaded for all keys associated <strong>with</strong> this tag.Lost - Initiates the steps to mark a system key as . lostDelete - Removes the selected system key after confirmation.


CommunicatorsCommunicators are a core component of a CyberAudit-Web system. They are the hardwaredevices that enable CyberAudit-Web to download <strong>and</strong> program CyberKeys, Gr<strong>and</strong> Masters, <strong>and</strong>CyberLock Programmers.IR EncoderUSB StationWeb StationLAN AuthorizerWeb AuthorizerThe Flex System


Vault 20 FXSingle Key Vault


CyberAudit-Web System HelpCyberAudit-Web offers online help <strong>with</strong> all aspects of CyberKeys, CyberLocks, Communicators,<strong>and</strong> the CyberAudit-Web Enterprise software system.Context help answers questions about the current area. Just click the question mark link nearest tothe areain question.If this is the first time using CyberAudit-Web Professional this may help:Getting Started GuideSystem OverviewTroubleshootingContext Help PDF <strong>manual</strong> (see ProHelp<strong>Door</strong>s.pdf)Installation Worksheet (see Installation Worksheet.pdf)CyberAudit-Web Professional License AgreementAdd:CyberKeys Modem AuthorizersCylindersPeopleFlex System Programming JobsHolidays RFID Access CardsIR Encoders SchedulesIssue a Key Single Key VaultLAN Authorizers StationsLocks Vault 20 FXWeb AuthorizersReset:LocksLAN AuthorizersWeb AuthorizersMisc:Audit Trail EventsCyberKey DocumentsCyberLock CleaningDownloading LocksLost KeysLost System KeysSet a CyberLock as a CyberPointUpgrading CyberKey FirmwareWeb Authorizer KeyportComm<strong>and</strong>sDescriptions:Audit Trail Events Flex System LAN Authorizers ReportsCommunicators Gr<strong>and</strong> Master CyberKeys Master Keys StationsCyberLink Holidays Notifications System LogsCyberLock Programmers IR Encoders People TagsCyberPoints Journal of Changes Programming Jobs Web Authorizers


ConventionsThis chapter describes some of the tools <strong>and</strong> methods used to perform operations inCyberAudit-Web.


CyberAudit-Web Context HelpContext help answers questions about the current area. Just click the question mark link nearest tothe area in question.


MenusCyberAuditWeb - Professional uses menus to manage a CyberLock system. These menusinclude:Each menu has submenus that can be selected by hovering over the main menu.


Change IconA change icon, , indicates that the settings of a lock, key, or communicator have changed in thedatabase but the item still needs to be updated.Update process:Authorizers - No action is required. The Authorizer will be updated automatically by the system.Flex System Hubs - No action is required. The Flex System Hub will be updated automaticallyby the system.KeysLocks - A red change icon ( ) indicates an unprogrammed CyberLock. The CyberLock shouldbe programmed to ensure maximum security.Stations - Launch CyberLink <strong>and</strong> connect the station <strong>with</strong> the USB cable.Vaults - No action is required. The Vault will be updated automatically by the system.


The Present IconThe present icon, , indicates that a has connected to the CyberAudit-Web serverCommunicator<strong>with</strong>in the last minute.


The CyberAudit-Web Item Chooser ControlThe CyberAudit-Web Item Chooser is a control used to select items <strong>and</strong> create lists. Below are twoexamples of Item Choosers.Item Chooser for applying tags to people in a reportTo use the item Chooser control, select items from one list <strong>and</strong> click the direction arrow to movethem to the other list. Use Ctrl-Click to add individual items to the selection or Shift-Click to select arange of items.Click onto further reduce the list of choices in the item chooser.All items may be filtered byrules:. The Keyword filter supports pattern matching by theseMatching looks for substrings. he would match she <strong>and</strong> there.All matching ignores differences between upper case <strong>and</strong> lower case.Additional substrings may be added to increase the possible matches. Separate eachsubstring <strong>with</strong> a space. For example, searching for ma against a list containing Peter, Paul,<strong>and</strong> Mary would result in a list of Mary. A search of ma pa would result in a list of Mary <strong>and</strong>Paul.Use double quotes to look for a phrase. Within double quotes a space is meaningful. Forexample, " he sat" would not match she sat.Quoted phrases <strong>and</strong> substrings may be used at the same time. Separate each <strong>with</strong> a space.A quote character (") cannot be searched.The search is done on both names <strong>and</strong> IDs.


The List FilterList Filters are a component of CyberAudit-Web that enable reducing the list of Locks or People toonly those that match these rules:Matching looks for substrings. he would match she <strong>and</strong> there.All matching ignores differences between upper case <strong>and</strong> lower case.Additional substrings may be added to increase the possible matches. Separate each substring<strong>with</strong> a space. For example searching for ma against a list containing Peter, Paul, <strong>and</strong> Marywould result in a list of Mary. A search of ma pa would result in a list of Mary <strong>and</strong> Paul.Use double quotes to look for a phrase. Within double quotes a space is meaningful. Forexample, " he sat" would not match she sat.Quoted phrases <strong>and</strong> substrings may be used at the same time. Separate each <strong>with</strong> a space.A quote character (") cannot be searched.The search is done on both names <strong>and</strong> IDs.


Wildcard RulesAn astrisk "*" means that any number of characters (including no characters) will match.A question mark "?" means that any single character existing in that position will match.Anything else entered must match exactlyExamples:To search for any person's name that starts <strong>with</strong> "B" type "B*" in the search box.To search for a four letter name that starts <strong>with</strong> a "B" type "B???" in the search box.To search for any name <strong>with</strong> a "B" in it, type "*B*" in the box.


System SetupThis chapter contains information for setting up a CyberAudit-Web Professional system.


CyberAudit-Web Installation KeyDefinition:The Installation Key is derived by CyberAudit-Web from a hardware component of the computer.On Linux systems it uses the MAC address of the first discovered Network Interface Card. OnWindows installations it attempts to identify the components in this order:A <strong>Videx</strong> IR Encoder or USB Station (or Web station connected <strong>with</strong> the USB cable)The serial number of the computer hard driveA CPU IDNetwork Interface Card MAC addressIf none of these items are located, it will display the message Installation Key InvalidCyberAudit-Web is unable to generate an installation key for this computer. Please install a USBStation or IR Encoder <strong>and</strong> restart the CyberAudit-Web Professional service (Apache Tomcat).Click here for instructions to restart Apache Tomcat Service, or restart the computer.If you need help, please contact your CyberAudit-Web Professional provider or <strong>Videx</strong>, <strong>Inc</strong>. atsupport@videx.comwww.videx.com541-738-5500The identified component is used as a basis to create <strong>and</strong> display a unique Installation Key. TheInstallation Key should be in the form of six sets of four alpha-numeric characters followed by twoalpha-numeric characters, for a total of 26 characters separated by hyphens.Installation Key SampleHyphens are optional when entering the Installation Key <strong>and</strong> License into the CyberAudit-WebSoftware Registration forms. If your CyberAudit-Web computer is offline, enter the Activation Codein the CyberAudit-Web Professional Offline Registration screen <strong>and</strong> click "Submit".


CyberAudit-Web Professional Data SourceStart a new system - Select this option if there is no previous data to import.Upgrade from CyberAudit-Web Lite - Select this option if upgrading from CyberAudit-WebLite. It will require a backup copy of the Lite database plus the Gr<strong>and</strong> Master CyberKey of thatsystem.Import from CyberAudit Professional 2.0 - This option requires matching one of thepasswords used to create the encrypted access codes for the CyberLocks in the old system. Itwill populate the CyberAudit-Web system <strong>with</strong> data from a CyberAudit Professional 2.0 system.These items will be imported:LocksAccess Codes ( <strong>with</strong> mode 6 for lock passwords created since June 2002)KeysSchedulesHolidaysKey Access ProfilesPeopleAuthorizersThese items are not imported:Audit Trail recordsLog of ChangesReportsEmail NotificationsAuthorizer Key assignmentsLost KeysRestore from a CyberAudit-Web Professional backup - Select this option to restore anexisting system.


New DatabaseThe next decision is related to the security of the locks <strong>and</strong> keys.The keys must match an access code in the cylinder before it gains access. The access codes canbe created in two ways: Using the Gr<strong>and</strong> Master's encrypted access codes or creating accesscodes by entering passwords. Here are the advantages of both to help make this decision.Unlike mechanical systems where a key is limited physically by the possible combinations, theCyberLock system has trillions of possible combinations of access codes.The Gr<strong>and</strong> Master's encrypted access codes are r<strong>and</strong>omly generated, unique codes. <strong>Videx</strong> doesnot keep a record of them. There are no passwords to remember. The Gr<strong>and</strong> Master becomes ahardware key to the system. This is an easier route for system evaluations. Care should be takento ensure the Gr<strong>and</strong> Master used for the access codes is kept in a safe place.When creating passwords, they can be up to 32 characters long. They are case sensitive <strong>and</strong>special characters can be used. Knowing the passwords would allow recreating a database if theoriginal database was lost or corrupted. Creating <strong>manual</strong> passwords enables systemadministrators to create a reset key.Choose either " Gr<strong>and</strong> Master key" or " Manual password entry"by clicking on the radio button.


Access Code SourceAccess codes are the first line of security in CyberLocks. They must be programmed intoCyberLocks using a Gr<strong>and</strong> Master CyberKey or a CyberLock Programmer. Sometimes calledfamily codes, a CyberKey must present one of the access codes in the lock to open it.In the event a system is destroyed because of a loss of computer equipment or other disaster, asystem may be reconstructed using the same access codes. Without those access codes, it isimpossible to rebuild a system.Manual Password Entry - This option uses <strong>manual</strong>ly entered passwords as the source for theaccess codes. Each password must be 6 to 32 characters. Select passwords that will be difficult toguess. Use a word or phrase that is easily remembered. Avoid using personal names, familynames, company names, dates of birth, Social Security Numbers, etc. A good password includes amixture of upper- <strong>and</strong> lower-case letters, punctuation, <strong>and</strong> numbers. An often used example is"All4One." This phrase would be easy to remember, yet still involves both upper- <strong>and</strong> lower-caseletters <strong>and</strong> numbers.Manually entered passwords should be written down <strong>and</strong> stored in a secure location. If they arecompromised the security of the CyberLock system is compromised as well.Manually entered passwords enable the system to create <strong>and</strong> utilize a reset key.Gr<strong>and</strong> Master CyberKey - Gr<strong>and</strong> Master CyberKeys are manufactured <strong>with</strong> built-in access codes.With trillions of possible codes, these access codes are nearly certain to be unique. When a Gr<strong>and</strong>Master is used as the source for access codes CyberAudit-Web designates it as the "Base"Gr<strong>and</strong> Master.A "Base" Gr<strong>and</strong> Master should be kept in a secure location when not in use. It may be used torebuild a system if the database is destroyed. If the "Base" Gr<strong>and</strong> Master is lost, it should bedesignated as "lost;" in CyberAudit-Web <strong>and</strong> replaced <strong>with</strong> another. This will ensure that no onemay use it to create keys to open the CyberLocks.


Passwords from Manual InputsEnter <strong>manual</strong> inputs to create the access codes for the keys <strong>and</strong> cylinders. Two passwords areneeded <strong>and</strong> must be between 6 <strong>and</strong> 32 characters. They are case sensitive passwords <strong>and</strong> can'tbe the same. These passwords are directly related to the security of the cylinders <strong>and</strong> keys - keepthem secure.There are also software administrators passwords that should be added for each administrator.


Add the Gr<strong>and</strong> Master by introducing it to the database through the IR Encoder or Station <strong>and</strong> theCyberLink software.CyberLink - The program that communicates <strong>with</strong> the keys <strong>and</strong> the database through either an IREncoder or a USB Station. CyberLink will display the key's serial number <strong>and</strong> the status of thecommunication. Keep the key in contact <strong>with</strong> the device until the CyberLink software displays"Configuration successful."


Passwords from a Gr<strong>and</strong> MasterThe software will step through Programming CyberLocks, CyberKeys, populating the database<strong>with</strong> their serial numbers, launching CyberLink, <strong>and</strong> updating the Gr<strong>and</strong> Master.


Place the Gr<strong>and</strong> Master's IR in front of the IR Encoder. CyberLink will confirm when to remove theGr<strong>and</strong> Master. Leave CyberLink running as it will be used several time during set-up.


CyberLink - The program that communicates <strong>with</strong> the keys <strong>and</strong> the database through either an IREncoder or a USB Station. CyberLink will display the key's serial number <strong>and</strong> the status of thecommunication. Keep the key in contact <strong>with</strong> the device until the CyberLink software displaysConfiguration successful.


Login <strong>and</strong> PasswordCyberAudit-Web requires a login <strong>and</strong> password for each system administrator. This page sets upthe login <strong>and</strong> password for the top level administrator.Logins <strong>and</strong> Passwords must be 4 to 64 characters. Select passwords that will be difficult to guess.Use a word or phrase that is easily remembered. Avoid using personal names, family names,company names, dates of birth, Social Security Numbers, etc. A good password includes a mixtureof upper- <strong>and</strong> lower-case letters, punctuation, <strong>and</strong> numbers. An often used example is "All4One."This phrase would be easy to remember, yet still involves both upper- <strong>and</strong> lower-case letters <strong>and</strong>numbers.The Person Name is used to identify the administrator in CyberAudit-Web in the People records. Italso makes them a potential key holder.


Upgrading from CyberAudit Professional 2.01. Choose "Import from CyberAudit Professional 2.0" from the data source window.2. CyberAudit - Web Professional will attempt to automatically detect the database to import. If none are detected,choose to browse to the database.3. Enter the passwords from the old software.4. Select the time zone.


5. Enter the user name <strong>and</strong> password that will be used to log in to thesystem.


Import WarningsCyberAudit-Web requires keys <strong>with</strong> a product hardware version of 102 or greater. Keys <strong>with</strong> olderhardware versions in the CyberAudit 2.0 database will not be imported into the CyberAudit-Webdatabase.Keys marked as lost in CyberAudit 2.0 are also not imported.One time access is not supported in CyberAudit-Web Professional. Keys that have one timeaccess to locks will be updated to have no access to prevent any unscheduled opennings.


Upgrading from CyberAudit - Web LiteWhen prompted, choose Import from CyberAudit-Web Lite <strong>and</strong> click the Continue button.Browse to the desired Lite backup (default location - C:\Documents <strong>and</strong>Settings\*USER*\CyberAudit-Web Lite backups) <strong>and</strong> click Continue.Insert an IR Encoder.


Update the Gr<strong>and</strong> Master used in the Lite software.The software will automatically progress to the Time Zone selection screen.Select the login <strong>and</strong> password that will be the root user.


The Access Matrix will be shown <strong>and</strong> the software is ready to use.


1.2.3.4.5.Getting StartedThis section is an overview of how to get a system set up. For an index of step-by-step directionsof system operations, please visit the How-To page.Order of ImplementationThe order of implementation is not critical. However, for the purpose of efficiency in programminglocks <strong>and</strong> keys, the following order is recommended:Set system optionsAdd communicationsAdd cylindersAdd schedulesAdd people <strong>and</strong> keysCreating New, Importing, <strong>and</strong> Restoring DatabasesThe set-up wizard will step through the set up of the system.Options include creating a New database, Upgrading from CyberAuditWeb-Lite or CyberAuditProfessional system or restoring to a Web Professional backup.


Setting Access ControlTo set access for a key, click on a common intersection for the key <strong>and</strong> lock. In the exampleabove, Kathrine is to be given access to the Elevator Exhaust lock Monday through Friday plusholidays from 8:00 AM to 5:00 PM.


Update each key using either the Encoder or USB Station <strong>and</strong> CyberLink. An Authorizer is anotheroption to update keys.In CyberAudit-Web, a tag is a free-form way to classify People <strong>and</strong> Locks. Tags help organizePeople <strong>and</strong> Locks into logical categories by providing an unlimited number of ways to describethem. There is no "wrong" choice for how to use them. Instead of belonging to one "group,"People <strong>and</strong> Locks may have any number of tags. More information on tagsIf a key has been lost, thefirst thing to do is to seewhen the key expires. Oncea key expires, there is nolonger a risk of that keyopening locks. If the key hasalready expired, or if itexpires in a reasonable timeframe, do not mark the keyas lost. Simply use the "NoAccess" schedule for anylock the key had access to.This way if the keycommunicates <strong>with</strong>CyberAudit-WebProfessional, access will notbe extended. If the key'sexpiration presents anunreasonable risk, mark thekey as lost.A CyberLock Programmer <strong>with</strong> a Configure type Programming job will reset locks inits list <strong>with</strong> this setting.Why reset a lock?To move it to a different system or database.To return it to the factory in the event that service or exchange is needed.Additional Note:Resetting a CyberLock does not cause it to lose its audit trail; only its access codes.How to reset a lock


BackupsA backup of the database is made each time it is started. A dem<strong>and</strong> backup may also be made byclicking the "Backup Now" button in the Backup screen. A networked folder may be used to storethe backup on a system other than the local computer.Date <strong>and</strong> TimeDate <strong>and</strong> Time formats effect how data is rendered for viewing.


Audit ReportsAudit Reports are used to see the activity history of keys. Audit information includes:Time/Date StampsType of Activity (Access Denied/Granted)Key <strong>and</strong> Lock NameAudit Reports can be run by lock, key, or the whole system.


Remote AccessCyberAudit-Web may be accessed by other computers on the network <strong>and</strong> by remoteCommunicators. With this feature enabled, the remote computers may access the CyberAuditWebcomputer by entering https:// in the browser address bar. Thisfeature requires knowledge of general networking <strong>and</strong> familiarity <strong>with</strong> any firewall software runningon the host computer or the network.When access to Cyberaudit-Web is local, there is typically no need for a secure connection. Forremote access, HTTPS encrypts <strong>and</strong> decrypts CyberAudit-Web browser page requests <strong>and</strong>returns as well as traffic from remote communicators. The use of HTTPS protects againsteavesdropping <strong>and</strong> man-in-the-middle attacks.


Email SetupEmail server: - CyberAudit-Web relays its email notification messages through an email server.Enter the email server's IP Address or DNS name here. By default, the email server must supportSMTP on port 25 <strong>with</strong>out secure sockets (TLS).Default FROM email account: - Use this field to identify the sender of the email notification. In thepicture above, CyberAudit is used as the easily recognized account.Email server requires authentication: - An email server that operates on the Internet willtypically only relay messages from authorized accounts. If so, check this box <strong>and</strong> enter the username <strong>and</strong> password for the account. Check <strong>with</strong> the email server administrator if an account isneeded for CyberAudit-Web.Click Save to save the settings.Related Topics:NotificationsReports


Backup OptionsCyberAudit-Web automatically performs a daily backup. The backup is named for the day of theweek. It overwrites previous backups for the weekday.When specifying a backup to a network drive, note that the server installation of CyberAudit-Webdoes not transmit a password to authenticate. The server installation requires either ananonymous connection to the target folder or that the Tomcat service be modified to run as a user<strong>with</strong> permissions to that folder.It will also back up its data fileon dem<strong>and</strong>. This form controls where the backup files are placed.An email server must be set up for the record to be saved <strong>and</strong> for a failed backup notification to besent.


Operating OptionsThe preferences selected under the Options section of CyberAudit-Web affect the operation of thesystem. Preference selection affect the entire system <strong>and</strong> should be considered early in systemsetup.


Matrix OptionsLock OptionsKey OptionsEmail Notification SetupCommunicator OptionsDate & TimeAudit Data TrimmingBackup OptionsRemote AccessCombine SchedulesRe-key All LocksReactivate the SoftwareSet System Options


Lock OptionsIf CyberLocks will be programmed <strong>with</strong> Multi-key or delay requirements, it must be enabled fromthis page first. With this enabled, CyberLocks may be further programmed to require that each keyof a multi-key access verifies against a different schedule as shown in CyberAudit-Web's AccessMatrix.Re-keying all locks will require updating all locks <strong>and</strong> keys in the system.


Multikey - Different SchedulesThis option enables locks set to Multikey require each key holder to have a different schedule togain access. Each person needs to have access at the time the lock is contacted but theschedules allowing access need to differ from each.For example, a casino may want to ensure different groups of personnel attend each opening of asafe. These groups include security, accounting, <strong>and</strong> management. Each of these groups have adifferent schedule but allow access to the safe lock at the same time period. The safe lock wouldhave a Multikey setting for 3 keys <strong>and</strong> require each key to have a different schedule.Changing this setting will require that all locks <strong>with</strong> multi-key access be reprogrammed. All keyswill also need to be updated.


Re-key All LocksRe-keying CyberLocks involves changing the access code for each lock in the system. Every lockin the system must be re-programmed. After the locks are programmmed, every key in the systemmust be updated.Re-keying is only needed when the number of high-risk lost keys exceeds 16 (those requiringDisabling Points), when the passwords for <strong>manual</strong>ly entered passwords are compromised, orwhen the base Gr<strong>and</strong> Master is lost.


People <strong>and</strong> Key OptionsThis page sets up rules <strong>and</strong> defaults for how CyberKeys will behave <strong>and</strong> enables the optional useof door access numbers .Allow creation of keys that never expire - Expiration is an important means to achieve keycontrol <strong>with</strong> CyberKeys <strong>and</strong> CyberLocks. Regular expiration <strong>and</strong> renewal reduces the exposure<strong>and</strong> subsequent risk of a lost or stolen key because an expired key will not open locks. There aresome cases where expiration may not be desirable or the consequences of a lost key can beovercome by designating the key as lost or by re-keying the system.Allow master keys - Enables creating master keys that have access to all locks in the system.Memory-full behaviorDisable keys when memory is full - Audit trail data is the other important component of keycontrol <strong>with</strong> CyberAudit-Web. Regularly downloading the key to update its expiration <strong>and</strong> fetchits audit trail data ensures a steady stream of information. It also ensures that the CyberKey'sclock is kept up-to-date. moreOverwrite old data when memory is full - There may be cases where the key cannot beregularly downloaded <strong>and</strong> it is more important to ensure the key continues to operate. This isthe default behavior for those who upgraded from CyberAudit-Web Lite.Generate "No Access" events in locks - By default, CyberLocks do not record events where thekey is not permitted access. This includes events such as:Out of schedule for lockKey expired or out of scheduleAccess Denied - No PermissionsKey disabledAccess count expendedCyberLocks always record these events:Key DisabledAccess code failedCyberKeys always record "No Access" events in their audit trail. They are recorded as events suchas "Out of Schedule for Lock," "Not in access list," <strong>and</strong> others. If this option is selected, keys willalso write an "Access Denied" event to the lock's audit trail.Record "Removed From Lock" events - Normally, CyberKeys only record a "Removed FromLock" event if they are left in contact <strong>with</strong> the lock for more than one minute. If this option isselected, CyberKeys will record the time at which they were removed from a lock after contact,regardless of how long they are left in contact.


Disable the key's IR - CyberKeys use an Infrared transceiver to communicate <strong>with</strong> somecommunicators using IrDA protocol. Other IrDA devices including some laptop computers <strong>and</strong> PCsmay cause a CyberKey to "chatter" when it comes in proximity. There is no security risk associated<strong>with</strong> this behavior but if no Infrared communicators will be used <strong>with</strong> the system, this toggle willstop CyberKeys from responding to these other IrDA devices.Low battery warning level - If CyberAudit-Web finds CyberKeys in your system that weremanufactured before 2009, it will display this control at the bottom of the key options frame.For the older keys, this control sets the level at which St<strong>and</strong>ard CyberKeys, communicators, <strong>and</strong>CyberAudit-Web warn that a key's CR2 lithium battery is nearing end of life.All CyberKeys measure their battery each time they open a lock <strong>and</strong> during communications. Iftheir battery voltage is below the low battery warning level for 5 or more consecutive readings (1reading on newer keys), the St<strong>and</strong>ard CyberKey will emit a low battery warning beep once every 8seconds for a minute.When setting the low battery warning level, use these guidelines:Low - St<strong>and</strong>ard CyberKeys will open 75 or more CyberLocks per day.Moderate - St<strong>and</strong>ard CyberKeys will open 25-75 openings per day.(default)Aggressive - St<strong>and</strong>ard CyberKeys will open less than 25 openings per day or there is a strongrequirement for key holders to get the low battery warning prior to its end of life.Default Expiration Rule for New Keys - CyberKey expiration takes effect as soon as it ceases tobe the day or date of expiration. For most expiration rules, that means the key will work till the endof the day or date specified. The key will expire as soon as the clock rolls to 12:00am, since thedate will have advanced. Expirations rules of "minutes" or "hours" will set the key to stop workingat a specific hour <strong>and</strong> minute of the day.Docking key will extend expiration - Another option is to have the expiration move furtherahead every time the key is updated. This rule is often called a rolling expiration. Since there isno set day or date for key expiration, the key's next expiration is calculated when the key isupdated at a communicator. Each time the key is docked at an Authorizer or IR Encoder, thetime until expiration is reset to the interval specified in the input fields. Note that rollingexpiration by days, weeks, or months extends the key's expiration to midnight(relative to thetime zone of the Authorizer contacted) of the last day.Example: A key <strong>with</strong> a one day extend expiration updated today at a communicator will be setto expire at the end of the day tomorrow.Note: A rolling expiration of minutes or hours takes priority over the time frames assigned tomaster keys. For example if a master key has a 24 hour rolling expiration <strong>and</strong> the key isupdated at 10am on Wednesday, it will continue to operate until 10am on Thursday even if timeframes for the master key indicate that key cannot operate on a Thursday.Never Expire - This involves the least keyholder interaction but is the least secure expirationrule because a lost or stolen key can pose an ongoing threat to security. It removes the need toregularly update the key so there will likely be no current audit trail data available for that key.


Fixed period expiration rules - The following rules select a specific day of the week, month,or year or the end of a quarter as the key expiration target date.Day of the Week - Select this expiration rule to make the key expire on a specific day ofthe week. The key will function through the end of the selected day, <strong>and</strong> stop working atmidnight (00:00) of the following day.Monthly Expiration - Select this expiration rule to make the key expire on a specific dayevery month. The key will function through the end of the selected day, expiring atmidnight. If the key should expire on the last day of every month, select the "End ofmonth" option from the bottom of the pull-down menu.Quarterly - If this option is selected, the date of expiration will be set to the end of everythird month, beginning January 1st. Expiration dates will be 31 March, 30 June, 30 Sept.,<strong>and</strong> 31 Dec.Yearly - Expiration occurs at the end of the selected day.Expiration Renewal Grace - This setting allows a key holder to renew their key before the keyexpires where CyberAudit-Web will move the expiration ahead to the next expiration day, ratherthan the current one. For example, if a key is set to expire weekly on Fridays, <strong>and</strong> the renewalperiod is set to 12PM, 1 day prior to expiration, the key can be renewed by docking it at acommunicator anytime after Noon on a Friday. The key will then be set to expire the nextFriday. It is set to (1) day prior because expiration occurs at 12AM midnight of the next daywhich is Saturday in this example.


Expiration RulesExpiration is an important means to achieve key control <strong>with</strong> CyberKeys <strong>and</strong> CyberLocks. Regularexpiration <strong>and</strong> renewal reduces the exposure <strong>and</strong> subsequent risk of a lost or stolen key becausean expired key will not open locks. This form enables setting expiration "rules" to enable ongoingcontrol. In addition, a start date for the key may be set to prevent the key from working before itshould.Start Date - The "Start Date" is the day a key will begin working. By default, it is the day the key isadded to the system.Expiration Rules - CyberKey expiration takes effect as soon as it ceases to be the day or date ofexpiration. For most expiration rules, that means the key will work till the end of the day or datespecified. The key will expire as soon as the clock rolls to 12:00am, since the date will haveadvanced. Expirations rules of "minutes" or "hours" will set the key to stop working at a specifichour <strong>and</strong> minute of the day.Fixed Date - This rule simply sets a date after which the key will not work.Extend Expiration - Another option is to have the expiration move further ahead every timethe key is updated. This rule is often called a rolling expiration. Since there is no set day or datefor key expiration, the key's next expiration is calculated when the key is updated at acommunicator. Each time the key is docked at an Authorizer or IR Encoder, the time untilexpiration is reset to the interval specified in the input fields. Note that rolling expiration by days, weeks, or months extends the key's expiration to midnight (relative to the time zone of theAuthorizer contacted) of the last day.Example: A key <strong>with</strong> a one day extend expiration updated today at a communicator will be setto expire at the end of the day tomorrow.Note: A rolling expiration of minutes or hours takes priority over the time frames assigned to


master keys. For example if a master key has a 24 hour rolling expiration <strong>and</strong> the is updated at10am on Wednesday, it will continue to operate until 10am on Thursday even if time frames forthe master key indicate that key cannot operate on a Thursday.Never Expire - This involves the least keyholder interaction but is the least secure expirationrule because a lost or stolen key can pose an ongoing threat to the system. It removes theneed to regularly update the key so there will likely be no current audit trail data available forthat key.Fixed period expiration rules - The following rules select a specific day of the week, month,or year or the end of a quarter as the key expiration target date.Day of the Week - Select this expiration rule to make the key expire on a specific day ofthe week. The key will function through the end of the selected day, <strong>and</strong> stop working atmidnight (00:00) of the following day.Monthly Expiration - Select this expiration rule to make the key expire on a specific dayevery month. The key will function through the end of the selected day, expiring atmidnight. If the key should expire on the last day of every month, select the "End ofmonth" option from the bottom of the pull-down menu.Quarterly - If this option is selected, the date of expiration will be set to the end of everythird month, beginning January 1st. Expiration dates will be 31 March, 30 June, 30 Sept.,<strong>and</strong> 31 Dec.Yearly - Expiration occurs at the end of the selected day.Expiration Renewal Grace - This setting allows a key holder to renew their key before the keyexpires where CyberAudit-Web will move the expiration ahead to the next expiration day, ratherthan the current one. For example, if a key is set to expire weekly on Fridays, <strong>and</strong> the renewalperiod is set to 12PM, 1 day prior to expiration, the key can be renewed by docking it at acommunicator anytime after Noon on a Friday. The key will then be set to expire the nextFriday. It is set to (1) day prior because expiration occurs at 12AM midnight of the next daywhich is Saturday in this example.Email Expiration Settings for CyberKeys About to ExpireEnabling an expiration email notification will result in an email being sent to the key holder whenthe key is nearing its expiration. This can help remind the key holder to update their key at acommunicator to get a new expiration date <strong>and</strong> time.To enable this notification:The CyberAudit-Web system must be set up to use a .valid email serverThe owner of the key must have a valid email address in their "People" record. This is usedas the To: field of the email.There must be a valid entry in the From field.


Master Keys in CyberAudit-WebA CyberKey may be granted master access to all locks in the system. When a CyberKey isdesignated as a master key, it can open any lock <strong>with</strong>out granting access to locks or lock tags <strong>with</strong>a schedule at each juncture in the Access Matrix.Individual master keys will display <strong>with</strong> the Master Icon (assigned.) in each cell where no schedule isBy default, a master key operates at all times <strong>and</strong> all days. The operating time may be restricted tooperate only during the time frames of a selected schedule.Finally, a master key normally has access to all locks. It may be given restricted or no access toindividual locks, if desired, through the Access Matrix by assigning a more restrictive or the "NoAccess" schedule.Administrators may choose to use master keys because:Master keys are easier to create <strong>and</strong> manage when a key is to open most or all CyberLocks inthe system.New locks are being added to the system that the key must open but it is inconvenient to addthe additional permissions <strong>and</strong> update the key.The number of locks a CyberKey must open exceeds 3300.


Disable keys when event memory becomes fullCyberKeys can hold up to 3900 events in memory. Normally, when the key's memory limit isreached, it begins overwriting the oldest events <strong>and</strong> continues functioning. If this option is selected,keys <strong>with</strong>in this subsystem will not overwrite events when the memory limit is reached, <strong>and</strong> willcease to open CyberLocks until the key has been downloaded at a communicator.


<strong>Door</strong> Access NumbersA <strong>Door</strong> Access Number is used by a person to enter at a Flex System Keypad Display to gainaccess to a <strong>Door</strong>. They are from 4 to 16 digits in length.Since <strong>Door</strong> Access Numbers are unique, they identify the person who enters them so the FlexSystem hub can determine if that person has permission to open the door when the number isentered. <strong>Door</strong> Access Numbers may be used in combination <strong>with</strong> a PIN.Note: CyberKey issue numbers, vault access numbers, <strong>and</strong> door access numbers must becollectively unique.


Communicators OptionsThis page enables setting networking defaults <strong>and</strong> the behavior of certain communicators.CyberAudit-Web URL - IP address or DNS name of the computer or server runningCyberAudit-Web.Note: If using the computer's name for the URL, enter the fully qualified domain name.Proxy - Many larger networks route web browsing through a proxy server to reach the Internet.Because the Web Authorizer is fundamentally a web client, its web traffic must also be routedthrough the proxy.Key Record Associations - Flex System Hubs, Web Authorizers, <strong>and</strong> LAN Authorizers areable to store CyberKey records locally. This allows the Authorizer to program the CyberKey<strong>with</strong> the stored access <strong>and</strong> expiration rules <strong>with</strong>out first contacting CyberAudit-Web. IfCyberAudit-Web is not available, CyberKeys may still be updated.If a key record is not stored locally, the Authorizer will contact CyberAudit-Web for instructionswhen a CyberKey is inserted into the Authorizer's keyport. With network connections,Authorizers can normally contact CyberAudit-Web quickly <strong>and</strong> program the key in a fewseconds. For Remote Modem LAN Authorizers,however, the process of dialing the modem


<strong>and</strong> communicating <strong>with</strong> CyberAudit-Web will take noticably longer. In these cases, it is betterto "pre-load" the key records in the Authorizer so the key updates quickly.CyberAudit-Web automatically pre-loads CyberKey records into both Flex System Hubs <strong>and</strong>Web Authorizers. LAN Authorizers may be preloaded using the Authorizer Key Associationpage.PIN Use Overrides - Neither Web Stations nor CyberKey Vaults present a way to enter a PIN.Therefore if a key holder or card holder has a PIN it could preclude them from using thosecommunicators. In some cases system administrators may want to bypass that requirement.Vault door details - If a Single CyberKey Vault's door is left open longer than the selectedamount of time, the Vault will emit a low tone beep once every two seconds.The Hold Open Time is the amount of time the Vault's solenoid will hold the latch release openbefore it times out.


Portable LinksName - Name assigned to the Portable Link. This will cross-reference to CyberKey downloads toindicate where a CyberKey was downloaded.ID - An identifier of the Portable Link. This identifier must be present in the database before thePortable Link may be used.Comment - An optional field for entering additional information.Type - There are two types of Portable Link:IR Encoder- Inserts into a computer's USB port <strong>and</strong> launches from CyberAudit-Web.CyberKey II - Connects to a computer directly by USB cable.Related Topics:Adding Comm LinksCyberLinkIR Encoder DescriptionOther Communicators


USB StationsThe USB Station is used to communicate <strong>and</strong> charge. Itincludes a USB-to-USB cable to connect directly to acomputer. In addition, the CyberKey Rechargeable ischarged while connected to the computer. The USBStation is also available <strong>with</strong> a USB-enabled powersupply for those customers that want the additionaloption of connecting directly to a power outlet to chargetheir key.Related Topics:Adding Stations to CyberAudit-WebOther CommunicatorsStation Light DefinitionsWeb Station information


USB Station informationStation Light DefinitionsHow to add a Web StationWeb StationsThe Web Station is used to communicate <strong>and</strong> charge. It includes a USB-to-USBcable to connect directly to a computer for configuring the unit <strong>and</strong> a powertransformer that is used when the Web Station will be used for networkcommunications.Note: Connecting the Web Station to the power transformer automaticallyturns off the USB <strong>and</strong> turns on networking.After configuring, the Web Station may be used as a USB Station or may insteadbe connected to a network or the Internet. This allows for communicationbetween CyberKeys to both the Professional <strong>and</strong> Enterprise software. In addition,it charges the CyberKey Rechargeable.


Web AuthorizersThe CyberKey Web Authorizer Hub is a remote interfacedesigned to allow a computer <strong>and</strong> a key to exchangeinformation via an Ethernet network connection or over theInternet. This allows a CyberLock system spread over a largegeographical area to be controlled from one location. The WebAuthorizer Hub works <strong>with</strong> Enterprise software version 1.4 orhigher <strong>and</strong> uses TCP/IP protocols in conjunction <strong>with</strong> theoption of DHCP or static IP address selection.In addition to being a remote terminal, the Web Authorizer Hubstores key configurations. This storage ability allows it toprogram a key even if it doesn't have a current connection tothe CyberAudit database. It also downloads <strong>and</strong> stores theaudit trail of known keys that touch a keyport, <strong>and</strong> relays this tothe database the next time it has a connection. The CyberKeyWeb Authorizer Hub is made of black powder coated extrudedaluminum, <strong>and</strong> supports (3) RJ-45 connections, as well asUSB connections for programming. Dual LED lights indicatepower <strong>and</strong> status.The CyberKey Authorizer keyport is part of the CyberKeyAuthorizer system. It requires an Authorizer hub to function. Ithas a single line, eight character display <strong>and</strong> twelve keys forentering a PIN or other information.The keyport includes mounting hardware for a single outletelectrical box. A Cat-5 patch cable provides power <strong>and</strong>communication from the Authorizer hub. It can be placed up to100 feet away from the hub, outside of the first lock (entryway)of the local CyberLock system. A second keyport can beadded at any time.Installing a Keyport (see Installing a Keyport.pdf)How to add a Web AuthorizerLAN Authorizer Information


The CyberLock Flex SystemThe CyberLock Flex System is a hub plus a family of <strong>module</strong>s that add the capability to store <strong>and</strong>issue CyberKeys in indoor or outdoor environments or to control hardwired door systems .


Flex System HubAt the heart of the system is the Flex System Hub which fetches <strong>and</strong> stores CyberKeyprogramming <strong>and</strong> door access permissions from CyberAudit-Web <strong>and</strong> controls the Flex SystemModules attached to it. Up to eight <strong>module</strong>s may attach to a single hub. Since the hub storesCyberKey programming <strong>and</strong> door access permissions, it can continue to issue <strong>and</strong> check-inCyberKeys <strong>and</strong> grant door access even in occasions when it is unable to maintain connection <strong>with</strong>CyberAudit-Web.The <strong>module</strong>s may be combinations of:Weatherized Key Vault - Stores a CyberKeyat a point of entry or other indoor or outdoorlocation.


RFID Reader - For scanning 13.56 MHzRFID access cards used to identify theperson <strong>and</strong> their permissions.Data Display - To provide feedback,instructions, <strong>and</strong> warnings.


Data Knob - Used <strong>with</strong> the Data Display toenable numeric input for PINs or missionnumbers.Keypad Display - Combines quick numerickeypad input for PINs or mission numbersplus a data display to provide feedback,instructions, <strong>and</strong> warnings.


Flex System Keyport - For programmingCyberKeys. A flashing green LED indicatesprogramming has completed. Combine <strong>with</strong>a Keypad Display to request PINs or missionnumbers.<strong>Door</strong> <strong>and</strong> I/O Module - For controlling adoor strike. In addition it offers input <strong>and</strong>output lines to enable using indicators,alarms, door sensors, request to exit, <strong>and</strong>Wieg<strong>and</strong> input.


Additional Topics:Adding a Flex System Hub <strong>and</strong> ModulesMounting Flex System ModulesGranting Access to Flex System Weatherized VaultsFlex System Power RequirementsFlex System Module Cable PinoutsFlex System Hub ListView/Edit Flex System ModulesUsing the Data Knob <strong>and</strong> DisplayLED Indicator on the Weatherized VaultUsing CyberKeys <strong>with</strong> Flex System Weatherized VaultsThe Flex System <strong>Door</strong> <strong>and</strong> I/O ModuleFlex System Demo ModeFlex System Audit TrailsFlex System Display MessagesFlex System Hub Diagnostics


The CyberKey Vault 20 FXThe CyberKey Vault 20 FX is a dynamic key management device supporting <strong>and</strong> dispensing up to20 CyberKeys. It requires an authorized RFID access card or a valid mission entered at its KeyPadDisplay before it will program <strong>and</strong> release a CyberKey. Once the key has been programmed <strong>with</strong>the user's access permissions it will flash, signaling the user to remove the key from the Vault. Theremaining keys stay locked in the Vault in an unprogrammed state.Additional Topics:Vault 20 FX Demo ModeSetting Up <strong>and</strong> Configuring a Vault 20 FXProgramming a Vault 20 FX from a USB flash driveVault 20 FX Power RequirementsPower Over Ethernet for VaultsFlex System Hub ListVault 20 FX PropertiesPush Notification PortGranting Access to VaultsValid Keys for Vault 20 FXFlex System Audit Trail EventsFlex System Display MessagesFlex System Special Key Inputs


Single CyberKey VaultThe Single CyberKey Vault is a key cabinet designed toprogram <strong>and</strong> dispense a single CyberKey. The CyberKey isstored unprogrammed in the cabinet until the approved RFIDcard is presented. After reading the RFID card, the cabinetcommunicates <strong>with</strong> CyberAudit-Web <strong>and</strong> programs theCyberKey <strong>with</strong> permissions.The Vault cabinet body is gray powder-coated aluminum <strong>and</strong>the latch can <strong>with</strong>st<strong>and</strong> 1200 pounds of force. It can mount toa single-gang electrical box. It connects to the network via aCAT 5 or a CAT 6 patch cable. Initial programming is donevia USB cable. During network operation, the vault can utilizePoE (Power over Ethernet).The Vault reads a 13.56 MHz RFID Access card <strong>and</strong> canstore any of the following CyberKey models: CK-IR7,CK-RXD, CK-RBT, CK-IR6C <strong>and</strong> the CK-IR7C. TheCyberKey Vault can also recharge the keys <strong>with</strong> rechargeablebatteries. The front of the Vault has the RFID card reader aswell as status indicator lights.Finally, the CyberKey Vault has a speaker that emits tones toindicate status such as invalid key inserted or that aCyberKey is ready for use.Additional Links:Adding a Single CyberKey VaultCyberKey Vault Audit Trail EventsCyberKey Vault LEDsSingle CyberKey Vault TonesMiscellaneous Notes about Single CyberKey VaultsUsing CyberLink as an RFID Card ReaderUsing Power Over Ethernet (POE) <strong>with</strong> VaultsValid Keys for Vaults


LAN Authorizer Product DescriptionThe CyberKey LAN Authorizer is a remote interface that allows CyberAudit-Web <strong>and</strong> a CyberKeyto exchange information via an Ethernet network connection. An Authorizer <strong>with</strong> a modem may beadded to this system to enable communications where a network connection is not available.In addition to being a remote terminal, an Authorizer hub stores key configurations. This storageability allows it to program a key even if it doesn't have a current connection to CyberAudit-Web. Italso downloads <strong>and</strong> stores the audit trail of known keys that touch a keyport <strong>and</strong> sends it toCyberAudit-Web the next time it has a connection.Several indicator lights show the status of the network <strong>and</strong> keyport connections. The hub cancontrol two Authorizer keyports. These can be placed up to 100 feet away from the hub.The keyport includes mounting hardware for a single outlet electrical box. For increased security,the Authorizer can be set to require a personal identification number (PIN) before updating a key.How to add a LAN AuthorizerInstalling a Keyport (see Installing a Keyport.pdf)Web Authorizer Information


Audit Data TrimmingCyberAudit-Web automatically trims old audit events from it's database on a periodic basis. Thiskeeps daily backups of CyberAudit-Web smaller <strong>and</strong> helps ensure that audit reports can bedisplayed in a timely manner. The trimmed audit data cannot be restored to CyberAudit-Web but itcan be imported into Excel or a third party database for SQL queries <strong>and</strong> reporting.The format of the file is CSV (comma separated value). The general CSV format is documented inRFC 4180. CyberAudit-Web CSV files conform to the following rules:The file is Unicode text encoded as UTF-8. If text fields appear incorrectly after import be sureto specify UTF-8 when importing.One record per line.Lines are terminated using the Windows conventional CRLF (\r\n)Fields in a record are delimited by comma: ,The first line is the table header. It lists the field names for each column. Each field name issuffixed <strong>with</strong> it's type.Text fields are double quoted.Text fields will never contain newlines.Double quotes <strong>with</strong>in a text field will be escaped by a second double quote.All fields can be NULL (unknown or not-applicable)NULL fields are left emtpy (even text fields). (eg ...,"before null",,"after null",... )Field types are:Integer ( i) Example: 12345Text ( t) Example: "hello world"Boolean ( b) 0 for false, 1 for trueReal ( r) Example: 3.14Time ( m) Example: 14:37:41Date ( d) Example: 2012-02-14Timestamp ( p) Example: 2012-02-14 14:37:41Real numbers will be in either st<strong>and</strong>ard or scientific notation. (eg 3.14 or 1.230e-09)Dates <strong>and</strong> times are output according to ISO 8601 ( yyyy-mm-dd"T"hh:mm:ss). For example:2012-02-28T11:09:03 The time zone designator suffix is ommitted.Dates <strong>and</strong> times are local to the time zone in which the event occurred unless the field namehas the "_utc" suffix. UTC (aka GMT) times will need to be converted to your local time zonewhen displaying reports.The records should be assumed to be unordered.


Spreadsheet Import -Most spreadsheet programs such as Microsoft Excel can open CSV files directly. However, if theCSV file is over 100MB it may tax the RAM of the computer loading it. Loading it into a databasesuch as: Microsoft Access, OpenOffice Base or MySQL is a good way to overcome the limitation.Microsoft Access -Generic instructions for importing CSV files into Microsoft Access can be found here.Filemaker Pro -Follow these steps:1.2.3.4.5.6.7.Add a new table in the FileMaker databaseAdd fields to the table corresponding to the CSV file you are importing.Note: FileMaker may not parse ISO 8601 dates properly. The workaround is to import themas Text fields.Select File->Import Records->From File...Verify that the fields are aligned properlySelect the UTF-8 character set.Check the box to ignore the first record (header).Import (will be slow for millions of records).


Reactivate the SoftwareReactivating should only be necessary if the CyberAudit-Web license or information about thelicense changes.


System AdministratorsCyberAudit-Web allows <strong>and</strong> tracks different system administrators. This is useful when the task ofmanaging CyberLocks <strong>and</strong> CyberKeys needs to be delegated.Navigate to the "Administrators" page.The top level or 'root'() administrator of CyberAudit-Web may add additional administrators toassist in managing the system. All software administrators see the same locks <strong>and</strong> keys but maybe assigned different permissions.


Administrator LoginsEach CyberAudit-Web system has one "primary" or "root" administrator. This administrator maynever be deleted <strong>and</strong> no other administrators may change that password. The "root" administratorwill always be the first one in the list.Table Fields:Login - The identifier of the administrator used in the CyberAudit-Web Login page. The rootadministrator is represented by an anchor icon ( ).Associated Person - Links the administrator to a record in the list of people.Operations:New - The root administrator ( ) may click this to add a new administrator.- Creates a printable list of the administrator records.Clicking in a non-linked section of a People record will display a drop-down menu of operations:Properties- Displays editable details of the selected administrator.Journal - Displays a journal of changes for the selected administrator.Delete - Removes the selected Administrator record after confirmation.Automatic Disabling: With the exception of the root administrator, CyberAudit-Web disables anadministrator's login after three consecutive incorrect password entries.Related Topics:Adding AdministratorsSystem HelpSystem Logs


Edit LoginLogin - The identifier of the administrator used in the CyberAudit-Web Login page.Change Password - Check this box to change the password of the administrator.Associated Person - Each CyberAudit-Web Administrator must have a record in the list of list ofpeople.Disable this login - Check this box to temporarily prevent an administrator from logging in toCyberAudit-Web. An administrator's login may also become disabled from failing to properly entertheir password three consecutive times.Permissions - Displays the list of sections in CyberAudit-Web the administrator may modify. Clickhere for a detailed description of the permissions.Journal - Displays a journal of changes for the selected administrator.Delete - Removes the selected Administrator record after confirmation.


Add a New AdministratorCyberAudit-Web Professional permits additional administrators for system management. Inaddition, a set of permissions may be granted to each that restricts their ability to make changes inspecific sections of CyberAudit-Web.Create a Login name or word that will be entered at the login screen. Logins <strong>and</strong> Passwords mustbe 4 to 64 characters. Select passwords that will be difficult to guess. Use a word or phrase that iseasily remembered. Avoid using personal names, family names, company names, dates of birth,Social Security Numbers, etc. A good password includes a mixture of upper- <strong>and</strong> lower-caseletters, punctuation, <strong>and</strong> numbers. An often used example is "All4One." This phrase would be easyto remember, yet still involves both upper- <strong>and</strong> lower-case letters <strong>and</strong> numbers.Choose the person who will be an administrator from the dropdown box in the "Associated Person"section or create a new person by selecting the " New Person" radio button.Finally, select the sections of CyberAudit-Web to allow or restrict the new administrator's ability tomake changes. Click here for a detailed description of the permissions.


Associated Person - New PersonUse this option to add a new personnel record to the system <strong>and</strong> designate that person as anadministrator <strong>with</strong> a login at the same time. Using this method to add a person to the system onlyadds their name to the list shown in the People & page. If additional details of their personnelrecord are desired, they must be <strong>manual</strong>ly added later.


Administrator PermissionsIn CyberAudit-Web Professional, all administrators can see all sections. Permissions determinewhich sections of CyberAudit-Web an administrator can modify.Access to locks - Required for modifying cells in the Access Matrix. Also allows creating,modifying, <strong>and</strong> deleting schedules <strong>and</strong> holidays.Lock properties - Enables adding, removing, <strong>and</strong> naming CyberLocks <strong>and</strong> CyberPoints,including importing. Also allows assigning a Multi-key Mode / Open Delay if that option isenabled.<strong>Door</strong> properties - Enables adding, removing, <strong>and</strong> naming doors <strong>and</strong> editing their settings.People properties - Allows adding <strong>and</strong> removing people, including importing, <strong>and</strong> editing theirname, email, PIN, phone number, Department or ID, address, <strong>and</strong> notes.Key properties - Allows issuing <strong>and</strong> removing keys assigned to people. Enables setting theirbeeper, solennoid hold times <strong>and</strong> designating them as lost.Reports <strong>and</strong> email notifications - Enables adding, editing, <strong>and</strong> deleting reports <strong>and</strong>notifications.Communicator properties <strong>and</strong> options - Allows adding, editing, <strong>and</strong> deleting all types ofCyberAudit-Web communicators as well as setting up default behaviors <strong>and</strong> network settings.System options - Allows setting up default behaviors in these system areas:Access Matrix -Hide individual locksHide individual peopleDisplay properties of lock <strong>and</strong> lock tag labelsLocks -Display or hide multi-key/delay settingsKeys -Set key options <strong>and</strong> default expirationSystem -Delete system log filesCreate, delete, or restore system backup filesSet the target folder(s) for database backupsUse CyberAudit-Web to check for updates


Set date <strong>and</strong> time optionstrim audit trail <strong>and</strong> journal dataToggle remote accessCombine SchedulesCombinations of permissions are required to perform these actions.ActionCreating <strong>and</strong> modifying people tags <strong>and</strong> assigning people tothem.Creating <strong>and</strong> modifying lock tags <strong>and</strong> assigning locks tothem.Automatic tag creationPermissionsPeople properties + Access to locks.Lock properties + Access to locks.People properties + Lock properties + Access tolocks.Designating a key assigned to a person as a master key.Key properties + Access to locks.Importing people records from a file People properties + Key propertiesCreating <strong>and</strong> modifying system keys.Re-key all locksOnly one of two or more permissions is required to perform these actions.ActionPermissionsKey properties + Access to locks + Systemoptions.Access to locks + Lock properties + Systemoptions.Programming Jobs Lock properties OR Reports <strong>and</strong> email notifications OR Key propertiesEmail setup Communicator properties <strong>and</strong> options OR System options


CommunicatorsCommunicators are a core component of a CyberAudit-Web system. They are the hardwaredevices that enable CyberAudit-Web to download <strong>and</strong> program CyberKeys, Gr<strong>and</strong> Masters, <strong>and</strong>CyberLock Programmers.


Web Authorizers


Web AuthorizersA CyberKey Web Authorizer system consists of an Authorizer keyport <strong>and</strong> a Web AuthorizerHub. This page lists the Web Authorizers in the system <strong>with</strong> some of their properties <strong>and</strong>provides the means to view or change settings.Table FieldsThe present icon, , indicates that an Authorizer has communicated <strong>with</strong> CyberAudit-Web<strong>with</strong>in the last minute.The change icon, , indicates that the settings of the Authorizer has changed inCyberAudit-Web but the Hub still needs to be updated.Name - Name assigned to the Authorizer Hub.ID - Serial number of the Hub assigned at the factory. Web Authorizers have an ID <strong>with</strong> theformat HXXXXXXXX.Last Contact - The last date <strong>and</strong> time that the Web Authorizer contacted CyberAudit-Web.Keyport 1Keyport 2 - The name <strong>and</strong> ID of the keyport connected to the Authorizer.OperationsNew - Click to add a new Web Authorizer.- Creates a printable list of the Web Authorizers.USB flash memory.Properties - Displays the details of the Authorizer setup.- Downloads the Web Authorizer settings for saving ontoAudit Trail - Generates a report of activities logged by the Web Authorizer. This can behelpful information for monitoring CyberKey activity <strong>with</strong> an Authorizer or fortroubleshooting.Diagnostics - Brings up the Web Authorizer Diagnostics page to view <strong>and</strong> enable thestatus of the Web Authorizer remote diagnostic web service <strong>and</strong> to fetch diagnostics fromthe Web Authorizer.Delete - Removes the selected Web Authorizer record after confirmation.


Related Topics:Adding Web AuthorizersInstalling a KeyportAudit Trail EventsOther CommunicatorsResetting Web AuthorizersWeb Authorizer 2-Key InputsWeb Authorizer DescriptionWeb Authorizer Keyport Messages


Web Authorizer DetailsName - Name assigned to the Web Authorizer hub.ID - Serial number of the hub assigned at the factory. Web Authorizer hubs IDs have theformat HXXXXXXXX.Client Version - Indicates the version numbers of the software components running in theAuthorizer.Last Contact - The last date <strong>and</strong> time the server succesfully communicated <strong>with</strong> theAuthorizer hub.Keyport 1 NameKeyport 2 Name - Authorizer hubs support up to 2 keyports. It is important to assign aunique location name to each keyport because user key activity can then be traced tothese locations <strong>with</strong> dates <strong>and</strong> times.Keyport 1 IDKeyport 2 ID - Serial number of the keyport. The system automatically discovers <strong>and</strong> fillsin this value.


CyberAudit-Web URL - The IP address or domain name of the CyberAudit-Web server. Ifthe subsystem preference will be used, the checkbox will be checked.Automatic (DHCP) / Manual - As shipped from the factory a reset Web Authorizer willrequest a dynamic IP address. A static address may be assigned if desired (see "GenerateConfiguration File(s)" below).Proxy - Many larger networks require web browsing to be routed through a proxy server toreach the Internet. Because the Web Authorizer is fundamentally a web client, its webtraffic must also be routed through the proxy. If a proxy server is required, its informationmust be entered here.Generate Configuration File(s) - When special configurations are needed, the WebAuthorizer must be updated using a USB Flash Drive. This button creates the files that willbe loaded onto the USB Flash Drive <strong>and</strong> carried to the Web Authorizer.Audit Trail - Generates a report of activities logged by the Web Authorizer. This can behelpful information for monitoring CyberKey activity <strong>with</strong> an Authorizer or fortroubleshooting.Delete - Removes the selected Web Authorizer record after confirmation.Additional linksWeb Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerAudit Trail EventsWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


Setting Up Web AuthorizersWeb Authorizers contact the CyberAudit-Web server as web clients.Click here for instructions to add LAN AuthorizersTo add a Web Authorizer to the system, follow these steps:1.Select "Web Authorizers" from the "Communicators" menu <strong>and</strong> click thelink.2. Enter the ID of the Web Authorizer. This is found on the label attached to the bottom of the Web Authorizerhub or by using the keyport comm<strong>and</strong>.3. Give the Web Authorizer <strong>and</strong> keyport(s) a name or enter a description of their physical location in the Namefields.


4. Verify that the CyberAudit-Web server address is correct - The CyberAudit-Web server IP address is used bythe Web Authorizer to contact the CyberAudit-Web server. It must be provided to the Web Authorizer to enableit to function correctly <strong>with</strong>in the CyberAudit-Web system. It may be entered in one of two ways:By default, the Web Authorizer is a DHCP client <strong>and</strong> does not require a proxy server to enable it toconnect to a web site. In this case, the server IP may be <strong>manual</strong>ly entered on the Web Authorizerkeyport.If the CyberAudit-Web server will be referred to by domain name instead of IP address or if a proxyserver is required to connect to the CyberAudit-Web service, enter the required information in thesupplied fields. In this case, the Web Authorizer network settings must be written to a USB flashmemory disk drive <strong>and</strong> carried to each Web Authorizer to load the settings.5. Save the settings <strong>and</strong> Configure the Web AuthorizerAdditional links:Web Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Audit Trail EventsWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


1.2.Resetting a Web AuthorizerResetting an Authorizer will revert it back to the original, unprogrammed state as it wasshipped from the factory. To reset a Web Authorizer:Disconnect the power <strong>and</strong> all other cables from the rear of the Authorizer.Use a single Ethernet cable to bridge the ports labeled Keyport1 <strong>and</strong> Keyport2.3.Reapply power to the Authorizer. The LEDs on the front of the Authorizer will cycle throughthese startup steps:Power LED only - InitializingPower <strong>and</strong> 1 - Loading software components from memoryPower <strong>and</strong> 2 - Acquiring network, starting software components <strong>and</strong> applicationPower solid <strong>and</strong> 1, 2 flashing - Scanning USBWhen Power stays solid <strong>and</strong> 1 flashes about once every 4 seconds, the system is operatingnormally. At this point it is ready to configure.Additional links:Web Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerAudit Trail Events


Web Authorizer Keyport MessagesWeb Authorizer 2-Key Inputs


Configuring a Web AuthorizerThere are two ways to configure a Web Authorizer:Reset <strong>and</strong> enter the server IP from the keyportConfigure <strong>with</strong> a USB Flash DriveReset <strong>and</strong> enter the server IP from the keyportA Web Authorizer may be reset <strong>and</strong> configured in the field if all of these conditions are true:The Web Authorizer will request a dynamic IP address using DHCP.The CyberAudit-Web server can be reached <strong>with</strong> a known IP address on the defaulthttps:// port 443.No proxy server is required to reach the CyberAudit-Web server.1. . A reset Web Authorizer stores a server IP address of 000.000.000.000. At theReset the Web Authorizerkeyport, enter 999 <strong>and</strong> press the '#' key. The '*' <strong>and</strong> '#' keys on an Authorizer keyport function like the"Backspace" <strong>and</strong> "Enter" keys of a keyboard, respectively. When the IP configuration mode has beenactivated, the keyport display will change to "X--- 000".


2. The letter 'X' indicates theoctet of the IP address beingedited. The number 000indicates the present value ofthe octet. To replace thevalue, enter a new one <strong>and</strong>press the '#' key. To keep thecurrent value <strong>and</strong> move on tothe next octet in the IPaddress, enter 999 <strong>and</strong> pressthe '#' key again.Octets <strong>with</strong> 1 or 2 digits maybe entered <strong>with</strong>out leadingzeroes.After all 4 octets have beenset, cycle through the IPaddress again (by entering999# for each) to verify thateach was set correctly. Theexample shows the keyportdisplay at each cycle if the IPhas been set to192.168.121.234.Enter 000# to exit IP addressentry mode <strong>and</strong> force the WebAuthorizer to sync <strong>with</strong> theCyberAudit-Web server.Additional linksWeb Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerAudit Trail EventsWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


If any of these conditions are true...Web Authorizer USB ConfigurationThe Web Authorizer must use a static IP address.The CyberAudit-Web server can only be reached <strong>with</strong> a domain name or it cannot bereached on the default https:// port 443.A proxy server is required to reach the CyberAudit-Web server....then the Web Authorizer must be configured using a USB Flash Drive.1. Edit the configuration settings for the WebAuthorizer as needed. Save the settings. Thenclick on the "Generate USB Configuration Script"link.2. Save the generated .tar.gz file onto a USB FlashDrive. Before removing the USB Flash Drive fromthe computer, check the files to be sure that thelatest .tar.gz file is on the stick <strong>with</strong>out anappended version number. If not, delete all .tar.gzfiles from the USB Flash Drive <strong>and</strong> save the filesagain. Then remove the USB Flash Drive fromthe computer <strong>and</strong> take it to the Web Authorizer.Insert it into either recessed USB port on the WebAuthorizer. If the USB Flash Drive does notdirectly fit into the recessed opening, use anextension as shown in the picture.(Note: A Web Authorizer normally ships <strong>with</strong> 1of its 2 USB ports covered.)


3. With the USB Flash Drive inserted, unplug thepower cable from the Web Authorizer, wait 3seconds, <strong>and</strong> re-insert it. After starting up, the WebAuthorizer will update itself from the USB FlashDrive <strong>and</strong> load the new configuration. When this ishappening, LEDs 1 <strong>and</strong> 2 flash in unison. Whenloading is completed, the flashing stops <strong>and</strong> theUSB Flash Drive may be removed. When LED 1flashes once every 4 seconds the Web Authorizeris back to normal operations.The only limit to the number of configurations thatmay be carried by a USB Flash Drive is theamount of memory on the Flash Drive. GenerateConfiguration File(s) creates configurations for allWeb Authorizers in the system <strong>and</strong> loads themonto the drive.Additional linksWeb Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerAudit Trail EventsWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


Web Authorizer Audit Trail Events# Message Description Keyport # Datakey ID not16 found inAuthorizerkey ID found in17Authorizerkey removed18from keypad19 keydownloaded20 key configured21PIN ok - key isready22 bad PIN23 communications<strong>with</strong> key failed2425265764656680systemidentifier did notmatchtoo many PINtries: keydisabledno responsefrom host forunknown keykeyportcontrollerrestartkeyport addedto Authorizerkeyportremoved fromAuthorizernon-PINnumbersentered atkeypad (2 orfewer numbers)updateretrieved fromserverNo key record found in the Authorizer's keydatabase. UPLINK HOST is displayed at thekeyport.Key record for key ID found in Authorizer'skey database.Key data was downloaded <strong>and</strong> stored in theAuthorizer.Key has been updated from the Authorizer'sdatabases but has not yet been enabled.If a PIN was required, it was correctlyentered. The key has been enabled <strong>and</strong> isready to use - KEYREADY is displayed atthe keyport.A PIN was required. One was entered but itdidn't match the required PIN for the key.Broken or intermittent connection to key orcommunication interrupted. COMMFAIL isdisplayed at the keyport.The database identifier programmed into thekey does not match the one used by theAuthorizer - WRONG PW is displayed at thekeyport.1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 (not implemented) 1 or 2 The Authorizer attempts to contact the hostIP for up to 30 seconds. The keyport displaysUPLINK HOST. If it does not receive aresponse, it displays COMMFAILThe Web Authorizer keyport controller chipreset itself. This will occur as a 'cleanup'action if the chip finds itself in a bad statedue to corrupt or unexpected data.1 or 2 1 or 2 (none)A keyport was plugged into the Authorizer. 1 or 2 A keyport was unplugged from theAuthorizer.The keypad received 1 or 2 characters plusthe '#' key.The Web Authorizer downloaded an updatefrom the server.1 or 2 (none)1 or 2 (none)


81 memory full82 memoryrestored838485868788connectionestablished <strong>with</strong>serverno connectionto serveroffline too long:resettingremoving allkey recordsadding keyrecord(s)removing keyrecord(s)89 uploadingdiagnostics90919495correcting localdate/timeserver busy:waiting to syncoperationparametersupdatednetworksettingschanging97 applicationstartup98 abnormalterminationMemory in the Web Authorizer has reachedthe minimum allowable level. It will no longerupdate keys.Free memory has been restored above theminimum allowable level. Keys may beupdated.The Web Authorizer has successfullyconnected to <strong>and</strong> synchronized <strong>with</strong> theserver. This event is only recorded <strong>with</strong>successful synchronization after one or moreconnection failures.The Web Authorizer failed to connect to orsynchronize <strong>with</strong> the server. This event isonly recorded when connection to serverfails after one or more successful attempts.The Web Authorizer has been unable toconnect to Cyberaudit-Web for too long(default 90 seconds). The data columndisplays the number of seconds it was offline.The Web Authorizer received a comm<strong>and</strong>from CyberAudit-Web to remove all of its keyrecords.One or more key records were added to theWeb Authorizer's memory. The data columnindicates the number of keys added.One or more key records were removed. Thedata column indicates the number of keysremoved.The Web Authorizer received a comm<strong>and</strong>from CyberAudit-Web to upload adiagnostics file.The Web Authorizer received a comm<strong>and</strong> toadjust its clock. The data column indicatesthe number of seconds adjusted. A negativenumber indicates the clock was shiftedbackward.This message indicates CyberAudit-Web isbusy processing requests for updated keyrecords for other Web Authorizers.The configuration of the Web Authorizerchanged as a result of a change on theserver. For example, when the serveraddress changes.User modified the network configurationsettings of the Web Authorizer. The WebAuthorizer will then reset itself to apply thechanges.Indicates the Web Authorizer Applicationstarted or restarted.The Web Authorizer application stoppedrunning because of an unexpected condition.(none)(none)(none)(none)(none)(none)(none)(none)(none)(none)(none)(none)(none)Software versionExit or reason codefor factorytroubleshooting.


99 watchdogrestart100 database error101clock adjustedfor dst change102 time zone set103 restart initiatedThe monitoring process of the WebAuthorizer application triggered a restart.The system is attempting recovery from adatabase related issue.The Web Authorizer application detected areason to restart.(none)The error messageas received fromdatabase system.The number ofseconds shifted (+/-)The resulting UTCoffset in seconds101 = unh<strong>and</strong>ledexception or otherunexpectedcondition102 = clientsoftware update103 = normal reboot104 = networkconfigurationchange106 = system halt107 = databasecorruption detected108 = updateddisplay stringsdetected104 key disabledOccurs when a key is returned from amission or on detection of a lost key.1 or 2 serial ID of the keyreceived reboot105 request from(none)serverUSB drive106inserted(none)107 key inserted 1 or 2 serial ID of the key108key cannotsupportrequestedfeaturesThe configuration for the selected key ormission contains features that are notsupported by the firmware in the key.A number that is asum of one or moreof the followingunsupportedfeatures:1 = duplicate lockIDs in lock list2 = fixed usecountdownschedules4 = download lock8 = program lock16 = temporaryactivation32 = enhancedsecurity multi-keyaccess


109attempting keyfirmwareupgradekey firmwareupdatecompletedThe Web Authorizer has identified a knownkey that requires a firmware upgrade <strong>and</strong>has started the process.The Web Authorizer has identified a knownkey that requires a firmware upgrade <strong>and</strong>has started the process.1 or 2Old version to newversion1101 or 2Old version to newversionOther audit trail event types:CyberKey <strong>and</strong> CyberLock audit trail eventsVault 1 audit trail eventsComm Link audit trail eventsFlex System audit trail eventsLAN Authorizer audit trail eventsAdditional linksWeb Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


Web Authorizer Keyport MessagesMessages when IdleMessages <strong>with</strong> CyberKeysMessages <strong>with</strong> 2-Key InputNetwork <strong>and</strong> Server Communication MessagesMessages Scanning USB During StartupSystem ErrorsMessageWAITLOADINGSTARTINGUSB SCANREAD USBCONFIGAPPLIEDNOCONFIGNO USBSTARTINGREMOVEUSBREADYREADY *X___ 192INVALID#NOSERVERDescriptionMessages at StartupThe keyport is waiting for the Authorizer to respond.The Web Authorizer is loading software components from memory.The Web Authorizer is starting software components, acquiring the network <strong>and</strong>starting the application.After starting the application, the Web Authorizer checks its USB ports for a USBFlash Drive <strong>and</strong> scans for a configuration file to load.A USB Flash Drive has been found <strong>and</strong> the Web Authorizer is searching it for aconfiguration file.A configuration file was found <strong>and</strong> the changes have been applied.No configuration file was found for the Web Authorizer.No USB Flash Drive was found.USB processing is complete <strong>and</strong> startup is continuing. Displayed only if a USB Flashdrive was found.If a USB Flash Drive is present after the scanning process is completed, the WebAuthorizer will display this message until the USB Flash Drive is removed.The Web Authorizer is ready but has not synchronized <strong>with</strong> the CyberAudit-Webserver.The Web Authorizer is ready <strong>and</strong> has successfully synchronized <strong>with</strong> theCyberAudit-Web server.The Web Authorizer is in IP Address mode. Entering 999# saves the current value<strong>and</strong> moves to the next octet.An invalid IP octet has been entered during IP address assignment.The Web Authorizer has no information about how to contact the CyberAudit-WebServer because it has not been configured yet.Messages at StartupMessages <strong>with</strong> CyberKeysMessages <strong>with</strong> 2-Key InputNetwork <strong>and</strong> Server Communication MessagesMessages Scanning USB During StartupSystem Errors


MessageREADYREADY *DescriptionMessages When IdleThe Web Authorizer is ready but has not synchronized <strong>with</strong> the CyberAudit-Webserver.The Web Authorizer is ready <strong>and</strong> has successfully synchronized <strong>with</strong> theCyberAudit-Web server.Messages at StartupMessages when IdleMessages <strong>with</strong> 2-Key InputNetwork <strong>and</strong> Server Communication MessagesMessages Scanning USB During StartupSystem ErrorsMessageDescriptionMessages <strong>with</strong> CyberKeysWAIT The keyport is waiting for the Authorizer to respond.PIN# Key requires a PIN before it will be enabled.BAD PIN# The PIN input does not match the expected PIN for the key.ISSUE# The server is prompting the user to input an issue number for this key.ISSUE#ORMISSION#The server is prompting the user to input an issue number or a mission number forthis key.BADISSUE#JOB# ORLOGIN #BAD JOB#NEW LOCKLOGIN #BADLOGIN #CANT ADDNEW LOCKDISABLEDCLEARINGREADINGWRITINGVERIFYNOTVERIFIEDKEYREADYLOW BATTFWUdateFWUpd XX%The server has determined that the number input does not match any ISSUE#s in thedatabase.The server is prompting the user to input a job number or an administrator's loginnumber for a programmer or Gr<strong>and</strong> Master.The server has determined that the number input does not match any JOB#s orLOGIN#s in the database.A Gr<strong>and</strong> Master contains newly programmed lock records <strong>and</strong> requires a login # toadd them.A non-existent login number was given to the above prompt (user can try again).The login number entered does not have permission to add new locks.The Web Authorizer has determined that this key has an active mission or is anun-issued key. In both cases, the Web Authorizer disables the key prior to re-issuing.The key is zeroing the audit trail events <strong>and</strong> preparing the key to accept aconfiguration.The Web Authorizer displays this message while downloading data from a key.This message is displayed while updating the key's configuration.The key has been configured <strong>and</strong> the Web Authorizer is confirming successfulconfiguration.The Web Authorizer was not able to verify that the key received the intendedconfiguration.The key has been programmed <strong>and</strong> is ready to use.The Web Authorizer has determined that this key has a low battery.The Web Authorizer is loading a firmware update into the key. This message appears<strong>with</strong> St<strong>and</strong>ard CyberKeys <strong>and</strong> CyberKey Rechargeables.The Web Authorizer is loading a firmware update into a CyberKey II.


UPGRADESUCCESSBUSY8 DIGITSLINKUPHOSTKEY NOT FOUNDUNKNOWNKEYWRONGKEY TYPEKEYDENIEDKEY GONEKEYCOMMFAILRETURNTO VAULTCLOCKSTOPPEDMEMORYFULLThe Web Authorizer successfully updated the CyberKey firmware.Web Authorizer is processing data received from the key or the server.Issue, Mission, Job <strong>and</strong> Login numbers all consist of 8 digits. This message isdisplayed when the incorrect number of digits has been entered.The Web Authorizer is attempting to contact the CyberAudit-Web server. Typically thisoccurs when information is needed to program a key that is not in the Authorizer's keyrecord database.This key does not have a key record in the Authorizer <strong>and</strong> the Authorizer does nothave a designated host server to contact.The server has not found the key ID in the database but has found the key's DB flag isset. This indicates that the key belongs to another database <strong>and</strong> will be rejected.A different key type among CyberLock Programmers, Gr<strong>and</strong> Masters, or st<strong>and</strong>ardCyberKeys was expected. For example, this message could occur if a serial numberwere entered for a st<strong>and</strong>ard CyberKey but the serial number belonged to a Gr<strong>and</strong>Master.A key may not be used for a mission because the mission is not available or the keycannot support the mission configuration.Key was removed from the keyport before completing the session.There were communication failures between the Web Authorizer <strong>and</strong> the key.A CyberKey assigned to a Vault was inserted into the keyport.The Web Authorizer's clock has stopped, typically because of an extended powerloss. It will continue to display this message when a key is inserted into the keyportuntil the server updates the Authorizer's clock.Memory in the Web Authorizer has reached the minimum allowable level. It will nolonger update keys.Messages at StartupMessages when IdleMessages <strong>with</strong> CyberKeysNetwork <strong>and</strong> Server Communication MessagesMessages Scanning USB During StartupSystem ErrorsMessageINSERTKEYONLINE!SERVERCOMMFAILDescriptionMessages <strong>with</strong> 2-Key InputA 2-Key Input has been received that requires inserting a CyberKey into the keyport.The Web Authorizer successfully synchronized <strong>with</strong> the CyberAudit-Web serverfollowing a 22# .No response from the CAW server when the Authorizer attempted to contact it orcommunications were interrupted.


MessageSYNC...LOAD HUBFIRMWARESOFTWAREUPDATEUPDATEFAILEDUNKNOWNWEBAUTHTIME OUTNO ROUTECONNECTREFUSEDSSL FAILDNS FAILNET UNREACHABLEUNKNOWNNET ERRDescriptionNetwork <strong>and</strong> Server Communication MessagesThe Web Authorizer is attempting to synchronize <strong>with</strong> the CyberAudit-Web server.This will occur automatically every 30 seconds while the Web Authorizer is idle.Displayed during the process of updating Authorizer firmware.Displayed while a Web Authorizer update is being downloaded from the server.Failed to download an update from the server.The Web Authorizer contacted a CyberAudit-Web server but the ID of the WebAuthorizer was not recognized.There was no response from CyberAudit-Web server.No route to host - The Web Authorizer does not have routing to reach theCyberAudit-Web server.The Web Authorizer reached the CyberAudit-Web server but the server is not listeningon the requested port.The Web Authorizer connected to the server on the designated port but was unable toestablish the secure sockets layer.The Web Authorizer could not resolve the CyberAudit-Web server domain name.The Web Authorizer cannot establish connection to a network. This will happen if thenetwork cable is unplugged. After the network cable is re-inserted, allow up to 30seconds for the Web Authorizer to recognize the connection.An unrecognized networking error occurred.Messages at StartupMessages when IdleMessages <strong>with</strong> CyberKeysMessages <strong>with</strong> 2-Key InputNetwork <strong>and</strong> Server Communication MessagesSystem ErrorsMessageDescriptionMessages Scanning USB During StartupUSB SCANThe Web Authorizer is looking for a USB drive, reading from a USB drive, or installinga software update.NO FILE A USB drive was found but does not contain a file named authorizer.tar.gz.REMOVE USBThe Web Authorizer is done processing files on the USB drive. The drive must beremoved before continuing.LOAD HUBFIRMWAREThe Web Authorizer keyport controller <strong>module</strong> is being updated. DO NOT interrupt thedevice during this process.


Messages at StartupMessages when IdleMessages <strong>with</strong> CyberKeysMessages <strong>with</strong> 2-Key InputNetwork <strong>and</strong> Server Communication MessagesMessages Scanning USB During StartupMessageERROR9B6F51DAERRORShRW1291ERR 101 2System ErrorsDescriptionUnexpected program errors; contact the system administrator if they happenrepeatedly.Additional linksWeb Authorizer Description Installing a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerWeb Authorizer Keyport MessagesWeb Authorizer 2-Key InputsResetting Web Authorizers


2-Key Inputs for Web AuthorizersSeveral 2-key keypad inputs are supported by Web Authorizers for special functions.InputDescription11# Displays Web Authorizer ID.22#Directs Web Authorizer to synchronize <strong>with</strong> the CyberAudit-Web server.If successful ONLINE! will display.33# Displays current date <strong>and</strong> time from the Web Authorizer's clock.55#Special function for displaying the ID of a CyberKey. Prompts INSERTKEY.66#Special function for displaying the battery voltage of a CyberKey.Prompts INSERT KEY.Special function for displaying the next expiration date <strong>and</strong> time of a77# CyberKey. Prompts INSERT KEY. Keys that are not in the same systemas the Web Authorizer will display UNKNOWN KEY.Additional linksWeb Authorizer DescriptionInstalling a Keyport (see Installing a Keyport.pdf)Steps to add a Web AuthorizerAudit Trail EventsWeb Authorizer Keyport MessagesResetting Web Authorizers


The Present IconThe present icon, , indicates that a Web Authorizer synchronized <strong>with</strong> the CyberAudit-Webserver <strong>with</strong>in the last minute.


Web Authorizer DiagnosticsThe Web Authorizer Diagnostics page enables the administrator to view the last reported IPaddress of the Web Authorizer plus a router/proxy address <strong>and</strong> to request a diagnosticsdownload from the Web Authorizer. Clicking the Fetch button will cause the Web Authorizer topost a diagnostics file to CyberAudit-Web where it may be fetched for troubleshooting.The Web Authorizer remote diagnostic web service allows remote troubleshooting <strong>and</strong> for thepurpose of fixing problems <strong>with</strong> Web Authorizers. This is convenient for installations whereWeb Authorizers are installed some distance from the server or are otherwise difficult to reachphysically.Many of the features of this web service are useful only for manufacturer technical support.However two useful features are the ability to:1.2.Reboot the Web Authorizer.Inspect or change the CyberAudit-Web Server Address which the Authorizer is currentlyconfigured to use. This is useful if the CyberAudit-Web IP address or DNS name changed<strong>with</strong>out updating the Authorizer or if the Authorizer was configured <strong>with</strong> the wrong address.Limitations:This web service has some limitations to be aware of:You must know the IP address of the web authorizer. This is not a problem if you'veconfigured them <strong>with</strong> a <strong>manual</strong>/static IP address. DHCP is more problematic.If the authorizer is behind a firewall you must configure the firewall to allow HTTP trafficthrough port 13647.


If a Web Authorizer reaches CyberAudit-Web through a NAT router or a proxy, it is unlikelythat http requests sent to it can reach it. As an indicator, both the last contact IP address<strong>and</strong> the last contact Router/Proxy address are shown. If they are different, routing from theCyberAudit-Web server to the Web Authorizer must be explicitly enabled.Disabling the service requires an additional step: you must reboot the authorizer. This canbe done remotely via the web service.Enabling the ServiceThe service can be enabled on a per-Authorizer basis by clicking the "Enable" button. Toenable it globally for all Web Authorizers add nga.enable_diag_service=true to theCyberAuditWeb.properties file on the server. Once the change icon clears for the Authorizerthe service should be enabled. If the Authorizer has been unable to reach CyberAudit-Webthen the Authorizer must be configured <strong>with</strong> a USB drive to enable the service.The next time the authorizer synchronizes <strong>with</strong> the server the diagnostics file will be placed onthe server in /Users/Shared/cawent-backup/diagnostics <strong>and</strong> the change icon will be cleared.Once the service has been enabled you can reach it by typing an address like the followinginto your browser:http://192.168.0.93:13647/


Portable Links, Stations, <strong>and</strong> CyberLink


Comm LinksComm Links in CyberAudit-Web refers to a variety of simple communicators that enableupdating CyberKeys at remote locations. None of them store key programming informationdirectly <strong>and</strong> instead depend on a local software program such as CyberLink or an applicationthat runs on a PDA to establish a connection <strong>with</strong> CyberAudit-Web. In the case of the webstation, the local software is embedded in the station itself. In all cases, the software serves toexchange information between the key <strong>and</strong> the CyberAudit-Web system.Below are examples of Comm Links:Web StationUSB StationIR EncoderCyberKey II


CyberLinkCyberLink is a program written in Java® that establishes communications betweenCyberAudit-Web <strong>and</strong> a CyberKey, CyberLock Programmer, or Gr<strong>and</strong> Master using an IREncoder, USB Station, or Web Station.CyberLink Result Codes


CyberLink Result CodesCyberLink gets result codes from the IR Encoder, USB Station , <strong>and</strong> Web Station duringcommunications. Many are not directly seen by the user interface. Some results may beinterpreted as errors. Below is the complete list of result codes.Result CodeDescription40 Disconnected - Key is no longer present41 Device reset42434445464748494A4B4C4D, 4E4FFile Not Ready - The communicator has not finished downloadingthe key yet.Wrong Key ID - The current key ID does not match the key IDwhen the session started.Wrong key system code - A database identifier in the instructionsfor the key does not match the identifier in the key.Key file system disabled - The CyberKey will not acceptinstructions because its file system has been disabled.Bad File ID - The CyberKey has rejected a configuration file <strong>with</strong>an ID that matches the key's current configuration but the file sizeis different.Older File - The CyberKey has rejected a configuration file <strong>with</strong> anID older than the key's current configuration.File too large - The CyberKey has rejected a configuration filebecause it exceeds 32K.Bad File - The CyberKey has rejected a configuration file becauseit failed the integrity check (product ID, version, or CRC).Too many files - The CyberKey has rejected a configuration filebecause its file system is full.Write Failed - The communicator could not write to the key'smemory.Encryption ErrorIllegal Comm<strong>and</strong> - A comm<strong>and</strong> contained in the configuration isillegal for the communication mode.Bad Firmware Update File - The IR Encoder, USB Station, or WebStation has rejected a firmware update file because of a meta dataerror.50 Key Communications Interrupted - No response from key.51Wrong Firmware Update File - The IR Encoder, USB Station, orWeb Station has rejected a firmware update file because it was afile intended for another device. For example, this error wouldoccur if IR Encoder firmware were sent to a USB Station.


Using CyberLink as an RFID Card ReaderCyberLink can be used <strong>with</strong> a CyberKey Vault or a CyberAudit RFID Reader to capture the IDof 13.56MHz RFID access cards. Once captured, it will paste the ID at the cursor location onthe local computer. This is most useful when entering RFID access card IDs into CyberAuditas it verifies the ID stored will match the ID read by the Vault.To enable CyberLink to capture ID scans from a CyberKey Vault, launch CyberLink <strong>and</strong> dropdown the Options menu. If it is not already "checked", select the Card Scanner menu item toenable it. CyberLink automatically enables the card reader function when it detects aCyberAudit RFID reader.


Then <strong>with</strong> a CyberKey Vault or a CyberAudit RFID Reader connected, scan an RFID card.The ID will appear briefly on CyberLink's main window <strong>and</strong> will output to the cursor position inthe current program.


Communicator Issue NumbersCommunicators such as USB Stations, Web Stations, IR Encoders, LAN Authorizers, <strong>and</strong>Single Key Vaults may be added to the system by issue number. Issue numbers are placeholders for the unique ID of the device until the real ID is determined.When logged in to CyberAudit-Web <strong>and</strong> CyberLink is launched, CyberAudit-Webautomatically issues the station, IR Encoder, or Single Key Vault <strong>with</strong>out an issue number.For Stations, IR Encoders, <strong>and</strong> Single Key Vaults, CyberLink will prompt for an 8-digitissue number if neither the ID of the communicator nor the serial number of the CyberKeyis found in the system <strong>and</strong> the device was not automatically issued when launched.LAN Authorizers always get an issue number when a new one is added. CyberAudit-Webthen replaces the issue number when it finds a LAN Authorizer at the IP address assignedto it.Web Authorizers <strong>and</strong> Flex System hubs must always be added using their serial numberID.


Portable Links ListThis page lists the Portable Links (all Comm Linksin the system that are not USB Stations orWeb Stations <strong>and</strong> enables adding, configuring, <strong>and</strong> managing them.Table Fields:Name - The name associated <strong>with</strong> the Link.ID - The serial number or issue number assigned to the Link.Type - The specific type of hardware device of the Comm Link.Comment - Additional (optional) notes about the device.Last IP - The last IP address reported by the computer running CyberLink or of the clientsoftware that exchanges information between CyberAudit-Web <strong>and</strong> the CyberKey.Key Name - Displays the name of the key currently communicating <strong>with</strong> the Link.Battery - Displays the current battery level of the key currently communicating <strong>with</strong> theLink.Operations:New - Click to add a new portable link.- Creates a printable list of the portable link records.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays editable details of the portable link.Audit Report - Generates an audit trail logged for the Link.Delete - Removes the selected portable link record after confirmation.Related Topics:Adding StationsCyberLinkOther Communicators


Portable Link PropertiesThis page enables editing the name, Type, <strong>and</strong> comments of the selected Link. The name willcross-reference to CyberKey 'comm' logs to indicate which station was used to download theCyberKey.In addition it displays the serial number ID of the device.


IR EncoderThe IR Encoder is a USB-to-infrared device designed to enablecommunications between a computer <strong>and</strong> a CyberKey. It mounts as aUSB mass storage device <strong>and</strong> can be used <strong>with</strong> PC <strong>and</strong> Maccomputers.Other CommunicatorsSteps to add an IR Encoder


Adding a Comm LinkCyberAudit-Web can automatically add Comm Links to the system if one or more of theseconditions is true:CyberLink is launched by someone already logged in to the system using thelink.- or -The serial number ID of the CyberKey II is assigned to someone in the system.If neither of these conditions is met, use the following steps to add a Comm Link to thesystem.1. Select one of the three items fromthe Comm Links submenu.2. Click the "New" link.3. Choose to add by issue number orenter the serial number.4. Click the "Save" button.5. Insert the IR Encoder into a USBport <strong>and</strong> launch the CyberLinkprogram.


6. If the device was added using anissue number <strong>and</strong> CyberLink wasnot launched from thelink,the program will prompt to enterthe issue number.7. After the issue number is entered,or if the serial number was<strong>manual</strong>ly entered, the device willconnect to CyberAudit-Web <strong>and</strong>look for a CyberKey.


USB Station ListThis page lists the USB Stations in the system <strong>and</strong> enables adding, configuring, <strong>and</strong>managing them.Table Fields:Present - If the system has communicated <strong>with</strong> the USB Station in the last minute, a iconwill be shown.Name - The name associated <strong>with</strong> the Station.ID - The serial number or issue number assigned to the Station.Last Contact - The last time the server <strong>and</strong> vault communicated successfully.Last IP - The last IP address reported by the computer running CyberLink.Key Name - Displays the name of the key currently docked in the Station.Battery - Displays the current battery level of the docked key.Operations:New - Click to add a new Station.- Creates a printable list of the Stations.- Starts the CyberLink program that enables the communications between theStation <strong>and</strong> CyberAudit-Web.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays the details of the Station setup.Audit Trail - Generates a report of activities logged during communications <strong>with</strong> theStation. This can be helpful information for monitoring CyberKey activity <strong>with</strong> a Station orfor troubleshooting.Delete - Removes the selected Station record after confirmation.


Related Topics:Adding StationsCyberLinkOther CommunicatorsStation DescriptionsStation Light Definitions


USB Station PropertiesThis page enables editing the name of the selected station. The name will cross-reference toCyberKey 'comm' logs to indicate which station was used to download the CyberKey.In addition it displays the serial number ID <strong>and</strong> current firmware version running in the station.


Web Station ListThis page lists the Web Stations <strong>and</strong> enables adding, configuring, <strong>and</strong> managing them.Table Fields:Present - If the system has talked to the Web Station in the last minute, ashown.icon will beChange icon - A icon appears in the column when network settings for the Web Stationrequire updating to match the settings in CyberAudit-Web.Name - The name associated <strong>with</strong> the Web Station.ID - The serial number or issue number assigned to the Web Station.Last Contact - The last time the server <strong>and</strong> Web Station communicated successfully.Last IP - The last IP address used by the Web Station during network communications toCyberAudit-Web.Key Name - Displays the name of the key currently docked in the Web Station.Battery Level - Displays the current battery level of the docked key.Operations:New - Click to add a new Station.- Creates a printable list of the Stations.- Starts the CyberLink program that enables the communications between theStation <strong>and</strong> CyberAudit-Web.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays the details of the Station setup.Audit Trail - Generates a report of activities logged during communications <strong>with</strong> theStation. This can be helpful information for monitoring CyberKey activity <strong>with</strong> a Station orfor troubleshooting.Delete - Removes the selected Station record after confirmation.


Additional Links:Adding StationsCyberLinkOther CommunicatorsStation DescriptionsStation Light Definitions


Web Station PropertiesSerial - An identifier of the Station. This identifier must be present in the database before theStation may be used. If an issue number is used, the issue number will appear here untilCyberAudit-Web gets the ID of the Station from CyberLink.Name - Name assigned to the Station. This will cross-reference to CyberKey 'comm' log toindicate which Station was used to download the CyberKey.Firmware: - Displays the current firmware versions running on the device.Web Stations must be configured for network settings. Since the Web Station is a web client,it must get a URL to contact CyberAudit-Web.By default it will attempt to get its networking configuration from a DHCP server. If a <strong>manual</strong>configuration is needed that may be entered after selecting the "Manual:" option.Audit Trail - Generates a report of activities logged during communications <strong>with</strong> theWeb Station. This can be helpful information for monitoring CyberKey activity <strong>with</strong> a WebStation or for troubleshooting.Delete - Removes the selected IR Encoder record after confirmation.


Related Topics:Adding StationsCyberLinkOther CommunicatorsStation DescriptionsStation Light Definitions


Station Light DefinitionsReady Blinking - CyberKey hasbeen configured <strong>and</strong> is ready to beremoved.Ready Solid - Station is connectedto CyberAuditWeb <strong>and</strong> is ready toupdate keys.Busy Flashing, Ready Off - Stationis busy processing the key. WatchCyberLink for status information.Busy Flashing, Ready Off - USBconnected Station is unable toprocess the key because the keybelongs to a different system.


Busy Flashing, Ready Flashing -Web Station is unable to process thekey.


Adding a New StationBoth USB Stations <strong>and</strong> Web Stations are added by following these steps:1. To add a new Station, choose"Stations" from the"Communicators" menu.2. Click the "New" button.3. Stations may be added by issue number or by <strong>manual</strong>ly entering the serial number. Enter a name that willidentify the Station. This name will cross-reference to the CyberKey comm log to indicate which Station wasused to download the CyberKey.


4. For Web Stations, networking information must be entered.CyberAudit-Web URL - IP address or DNS name of the computer or server running CyberAudit-Web.The default setting is checked on by default. To change the URL, uncheck the box.Note: If using the computer's name, enter the fully qualified domain name.Automatic (DHCP) / Manual - As shipped from the factory, a Web Station will request a dynamic IPaddress. A static address may be assigned if desired. If using a static address for the Web Station incombination <strong>with</strong> a DNS name for CyberAudit-Web, a valid Primary DNS IP address must be enteredto enable the Web Station to resolve the CyberAudit-Web IP address.5. Click 'Save' to save the newStation record.


6. If adding a USB Station, skip thisstep. After entering <strong>and</strong> saving thenetwork settings, the Web Stationmust be configured using the USBcable <strong>and</strong> the CyberLink software.Note: Web Stations have twoseparate modes ofcommunications, USB <strong>and</strong>Ethernet. When no power isconnected from the 12Vtransformer, the Web Station is inUSB mode. Applying powerthrough the power jack toggles it toEthernet mode. The web stationmust be configured in the next stepin USB mode (USB cableconnected, no power connected).7. Plug the Station in via the USBcable <strong>and</strong> click the "LaunchCyberLink" link.8. If the Station was created using anissue number, enter that number.9. After CyberLink updates the station<strong>and</strong> its change icon ( ) clears,the Station will be ready tocommunicate <strong>with</strong> keys. A WebStation may be disconnected fromUSB <strong>and</strong> connected to its powercable <strong>and</strong> Ethernet cable. When itmakes contact <strong>with</strong>CyberAudit-Web, its green 'Ready'light will glow on the station <strong>and</strong>the green OK ( ) will appear inthe stations list page.


View Communicator Audit DataEnter begin <strong>and</strong> end dates to limit the size of the resulting report. Communicators such asFlex System hubs, Single CyberKey Vaults, LAN Authorizers <strong>and</strong> Web Authorizers <strong>with</strong> manyaudit trail records can take noticeable amounts of time to render <strong>and</strong> display.


Comm Link Audit Trail Events# Event Description22keyThe key was given a file that changed its configurationconfigurationsettings.loaded23keyconfiguration The key was sent a comm<strong>and</strong> or configuration file.transferred24The key produced a file containing events or other informationkey downloadedabout the key.Portable Link0 already indatabasePortable Link is-1not in databasekey is not in-2databasedata file was-3baderror talking to-4serverkey download-5file invalidvalid PIN-6requiredprogramming-7 job numberrequiredprogramming-8 job number notfound-9 key/datamismatchkey addition-10deniedkey already-11 exists indatabaseunknown issue-12numberhigh security bit-13setcatalog does-14not existkey is not-15initializeduser is not-16logged incannot auto-17 issue (CommLink or key)Client attempted to issue an already present Portable Link(rare).The Portable Link is not in the database <strong>and</strong> thus needs to beissued.The key being used is not in the database <strong>and</strong> thus needs tobe issued.A key file uploaded to the server appears to be corrupt.A generic event indicating unexpected error conditions on theserver.The key file uploaded to the server is intact but malformed insome way.A personnel identification number is required beforeconfiguring this key.A login number or programming job number is required.The given login number or job number was not found.The file uploaded to the server does not appear to be from thecorrect key.The server denied issuing the key for one or more reasons.Client attempted to issue a key that is already in the database.Given key or Portable Link issue number does not exist.The key cannot be issued because its database flag is set (it'salready being used in another database).The client specified an account name that doesn't exist on theserver.The key is new <strong>and</strong> thus the server needs to see its hardwareinformation before further processing is allowed.( CyberAudit-Web Lite only) User is not allowed to configurekeys because they are not logged into the web application.Failed to automatically issue the Portable Link device orCyberKey (rare).


information fromThe Gr<strong>and</strong> Master is new to the system <strong>and</strong> thus the server-18 the gr<strong>and</strong>masterneeds to download information specific to the Gr<strong>and</strong> Master.is missingmission not Client attempted to download a mission configuration that was-20cached not checked out to it.locklistdownload The two files submitted for event processing are from different-21doesn't match keys.event download-22key typemismatch-23 Firmwareupdate requiredNo permission-24 to add newlockskey clock300 correctionrequiredThe type of key presented to the client does not match thetype as it exists in the database. For example, the user istrying to configure a programmer key as a normal user key.Not implemented at this time.The user gave a login number that does not have permissionto add new locks to the system (<strong>and</strong> the key has new lockevents).The key's clock has drifted from the server clock <strong>and</strong> needs tobe corrected.CyberKey <strong>and</strong> CyberLock audit trail eventsVault 1 audit trail eventsWeb Authorizer audit trail eventsLAN Authorizer audit trail eventsFlex System audit trail eventsAudit trails for <strong>Door</strong>s


The Flex System


Flex System Hub ListThis page lists the Flex System Hubs in the system <strong>and</strong> enables adding, configuring, <strong>and</strong>managing them.Table Fields:Present - If the system has communicated <strong>with</strong> the Flex Hub in the last minute, a icon willbe shown.Change icon - If the system has information for the Flex Hub but the Flex Hub has not yetbeen updated, a icon appears in the column.Name - The name associated <strong>with</strong> the Flex Hub.ID - The serial number of the Flex Hub.Last Contact - The last time the server <strong>and</strong> Flex Hub communicated successfully.Modules - The number of connected <strong>module</strong>s reported at last contact. Click on the link togo to the <strong>module</strong>s listing page.Module Status -Module status OKModule status problemDemo The hub is in demo modeFXThe device is a Flex System Vault FXThe door is open on a vaultVault Keys -All Weatherized Vault or Vault 20 FX CyberKeys are validThere are one or more invalid keys in Vaults controlled by the hub


Memory Used - The amount of available memory currently used by CyberAudit-Web tostore People <strong>and</strong> mission records.Power Source - Indicates the source of power currently running the Flex System Hub.- Powered by an external source such as AC power through a transformer.- Powered by an optional battery connected to the molex battery port on theFlex System Hub. In this mode CyberKeys are not charged <strong>and</strong> the system will havelimited life, typically 5 hours or less depending on frequency of use.Battery Level - Indicates whether a battery is present <strong>and</strong> its charge level.Operations:- Battery charge level is good.- The battery charge level is below 50% capacity.- Battery life is less than two minutes.- The Flex Hub detected no battery.New - Click to add a new Flex System Hub.- Creates a printable list of the Flex System Hubs.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays editable networking details of the selected Flex Hub.Modules - Brings up the Modules listing page <strong>with</strong> details about the <strong>module</strong>s bothplanned <strong>and</strong> currently connected.Audit Report - Generates an audit trail records logged for the Flex Hub.Keys - Displays a page for viewing <strong>and</strong> editing the list of CyberKeys currently to beused <strong>with</strong> Weatherized Vaults or a Flex System Vault FX. This menu item only appears onFlex System hubs <strong>with</strong> one or more Vault <strong>module</strong>s.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selected FlexHub to to display the tags <strong>and</strong> people who have access. This menu item only appears onFlex System hubs <strong>with</strong> one or more Vault <strong>module</strong>s.Notification - This is a branched menu to set up emails notifications to send to one ormore email addresses for either of these topics:Informing that the CyberKey has expired but has not been returned to a Vault.Warning that the door on a Weatherized Vault or Vault 20 FX has been left open.This menu item only appears on Flex System hubs <strong>with</strong> one or more Vault <strong>module</strong>s.Diagnostics - Another branched menu to retrieve or view detailed status from theselected Flex System Hub.Sync - Causes CyberAudit-Web to attempt to make an immediate TCP/IP connection<strong>with</strong> the Flex System Hub. If the connection attempt is successful, the Flex Hub willimmediately synchronize <strong>with</strong> CyberAudit-Web rather than waiting for the next synchronizecycle.


Delete - Removes the selected Flex System Hub record after confirmation.Additional Topics:Adding a Flex System Hub <strong>and</strong> ModulesMounting Flex System ModulesFlex System Power RequirementsFlex System Module Cable PinoutsAbout the Flex SystemVault 20 FX OverviewView/Edit Flex System ModulesGranting Access to Flex System Weatherized VaultsUsing the Data Knob <strong>and</strong> DisplayLED Indicator on the Weatherized VaultUsing CyberKeys <strong>with</strong> Flex System Weatherized VaultsThe Flex System <strong>Door</strong> <strong>and</strong> I/O ModuleFlex System Demo ModeFlex System Audit TrailsFlex System Display MessagesFlex System Special Key InputFlex System Hub DiagnosticsFlex System Hub LED IndicatorsResetting a Flex Hub


View/Edit Flex Hub ModulesView the individual <strong>module</strong>s attached to a Flex System Hub by clicking a record in the FlexSystem Hub List <strong>and</strong> selecting Modules.This page contains the list of <strong>module</strong>s either currently attached or expected to be attached tothe selected Flex System Hub.Table Fields:Port - The number on the RJ-45 port on the Flex System Hub Module Panel. These arenumbered 1-8.Present - If the system has talked to the Vault in the last minute, a icon will be shown. Ifthe type of <strong>module</strong> for the port does not match the type of <strong>module</strong> originally added orplanned for the port, a conflict icon, appears.Grade - A green check ( ) indicates the <strong>module</strong>s are set up in a workable arrangement.All other icons indicate a problem or ambiguity. See the Grade Column section of Adding aFlex System Hub <strong>and</strong> Modules for more information about the Grade icons.Group - Identifies the set of <strong>module</strong>s that work together.Display Link - Identifies the Display <strong>module</strong> <strong>and</strong> the input devices that work together. Formore information see the Groups <strong>and</strong> Display Links section of Adding a Flex System Hub<strong>and</strong> Modules.Serial# - The Serial Number ID of the <strong>module</strong>, if known or the last known attached <strong>module</strong>.A blank cell indicates the <strong>module</strong> has not been connected to the port.Module Type - None, Weatherized Vault, Display, Knob, RFID Reader, <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>, Keyport, Vault 20 FX Key Controller, Vault 20 FX Powerboard. A icon aside a<strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> may be clicked to go to the <strong>Door</strong> <strong>and</strong> I/O Module Properties page.Firmware - Each <strong>module</strong> has a processor that executes firmware. This column shows thelast reported firmware version of the <strong>module</strong>.Name - The name given to the <strong>module</strong>, if it has one. Assigning a name to a WeatherizedVault can be useful for displaying which vault to open when a CyberKey is checked out or


eturned <strong>and</strong> for audit trail reports to clearly indicate which Vault was used to check out theCyberKey.Status - Additional information about the current status of the <strong>module</strong>. For WeatherizedVaults, this column indicates whether a CyberKey is present, if it is valid, its battery chargelevel, <strong>and</strong> whether the vault door is open.Click Edit to modify settings on this page.


Module Conflict IconA <strong>module</strong> conflict icon, indicates the type of <strong>module</strong> for the port does not match the type of<strong>module</strong> originally added or planned for the port on the Flex System Hub.


Go to:Options for Adding Flex System ModulesAbout Groups <strong>and</strong> Display LinksThe Grade ColumnAdding a Flex System Hub <strong>and</strong> ModulesAdding a Flex System Hub to CyberAudit-Web1. Select Flex Hubs from the Communicators menu.2.Clickto add a new hub.


3. Enter a name for the hub plus the serial number ID of the Flex Hub. This may be read from the sticker on thebottom of the hub.4. Enter the additional flex hub properties <strong>and</strong> click Save.5. The hub may now be connected to the network <strong>and</strong> programmed from USB.Go to:Adding a Flex System Hub to CyberAudit-Web


About Groups <strong>and</strong> Display LinksThe Grade ColumnOptions for Adding Flex System ModulesModules may be added to a Flex System Hub either before installing them or by automaticallyacquiring them after the Flex System Hub is installed <strong>and</strong> the <strong>module</strong>s are plugged in.Adding Flex System Modules before installation - The advantage of this method is thatonce the <strong>module</strong>s are entered then key <strong>and</strong> RFID card holders may be granted access tothe Weatherized Vaults or <strong>Door</strong>s. Once the <strong>module</strong>s are assigned to the Flex Hub ports,each <strong>module</strong> type must be paired <strong>with</strong> a port number on the Hub <strong>and</strong> clearly noted for theinstaller. If the <strong>module</strong>s are installed in the wrong ports, there could be conflicts among the<strong>module</strong> Groups. Modules installed <strong>with</strong> the wrong <strong>module</strong> type will appear <strong>with</strong> an icon, ,that indicates a conflict.Automatically acquiring Flex System Modules - Unless otherwise configured, a Flex Hubwill automatically add all newly discovered Flex System Modules to Group 1, Display Link1. If the combination of <strong>module</strong>s does not support this configuration, the CyberAudit-Webadministrator must reassign Groups <strong>and</strong> Display Links as necessary.Adding Flex System Modules to a Flex System Hub before installing themGo to the Flex System Modules page by selecting a Flex System Hub from the listing page<strong>and</strong> selecting Modules from the click menu. Modules may be added by clicking Edit from thispage. This will bring up the Module Edit page for the selected hub.


The Edit Flex Hub Modules page enables:Selecting the <strong>module</strong>sMatching them to a port on the hub to which they will connectPre-configuring how they will work together


There are three categories of Flex Hub Module functions; Input, Feedback, <strong>and</strong> Output. At aminimum each Group on a Flex System Hub requires at least one input <strong>and</strong> one output<strong>module</strong>. Each <strong>module</strong> type falls into these categories as follows:Vault 20 FX Powerboard <strong>with</strong> Vault 20 FX KeyControllersWeatherized VaultOutputRFID ReaderData KnobInputDisplayFeedbackKeypad DisplayInput <strong>and</strong>FeedbackKeyportInput <strong>and</strong> OutputThe <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> could fall into any of all three categories. It is an output <strong>module</strong> if itcontrols opening a door, an input <strong>module</strong> if a Wieg<strong>and</strong> RFID access card reader is connected,<strong>and</strong> a feedback <strong>module</strong> if it outputs to a door sounder or other indicator device.CyberAudit-Web requires every Data Knob to be linked to a distinct Display. Other inputdevices do not requre a display but if a display is present, they may be linked to it.Go to:Adding a Flex System Hub to CyberAudit-WebOptions for adding Flex System ModulesThe Grade Column


About Groups <strong>and</strong> Display LinksFlex System Modules are arranged in a way to determine which <strong>module</strong>s work together. Thisis called Groups <strong>and</strong> Display Links. A Group is a set of <strong>module</strong>s that operate together. Theseare examples of <strong>module</strong>s that may be grouped <strong>and</strong> that will operate together correctly. Thefollowing <strong>module</strong>s Groups are examples of <strong>module</strong>s that will function properly together.WeatherizedVaultRFID ReaderKeypad Display<strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>RFID Reader1-7 WeatherizedVaultsRFID Reader<strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>RFID ReaderKeypad Display<strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>KeyportWeatherizedVaultData KnobDisplayA Display Link includes a display <strong>module</strong> plus one or more input devices such as a Data Knobor RFID reader or an input attached to a <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>. Of all the <strong>module</strong>s, only a DataKnob must be linked to a display .Go to:Adding a Flex System Hub to CyberAudit-WebOptions for adding Flex System ModulesAbout Groups <strong>and</strong> Display LinksThe Grade ColumnThe Grade column is an indicator for each <strong>module</strong> indicating whether the Modules, Groups,<strong>and</strong> Display Links are present <strong>and</strong> installed in a workable arrangement. Each <strong>module</strong> type hasa range of different possible icons as follows:Data KnobMore than one data knob same linkormore than one display <strong>with</strong> the same linkora keypad display <strong>with</strong> the same linkorno output <strong>module</strong> (Keyport or Weatherized Vault or Vault 20 FX or <strong>Door</strong><strong>and</strong> I/O <strong>module</strong> <strong>with</strong>out a connected <strong>Door</strong> )No display <strong>with</strong> the same linkOK


RFID ReaderMore than one RFID reader same linkormore than one data knob <strong>with</strong> the same linkorno output <strong>module</strong> (Keyport or Weatherized Vault or Vault 20 FX or <strong>Door</strong><strong>and</strong> I/O <strong>module</strong> <strong>with</strong>out a connected <strong>Door</strong> )OKDisplayMore than one display in the same linkorkeypad display <strong>with</strong> the same linkormore than one data knob <strong>with</strong> the same linkorno output <strong>module</strong> (Keyport or Weatherized Vault or Vault 20 FX or <strong>Door</strong><strong>and</strong> I/O <strong>module</strong> <strong>with</strong>out a connected <strong>Door</strong> )OKWeatherized VaultNo data knob <strong>and</strong> no RFID reader <strong>and</strong> no keypad display <strong>and</strong> no door <strong>and</strong>i/o <strong>module</strong> in the same GroupA <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> connected to a door in the same Groupora Keyport in the same GroupOK<strong>Door</strong> <strong>and</strong> I/O <strong>module</strong><strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> not supportedA Weatherized Vault in the same Group when the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> isconnected to a door.OK


Keypad DisplayMore than one keypad display in the same linkora display <strong>with</strong> the same linkora data knob <strong>with</strong> the same linkorno output <strong>module</strong> (Keyport or Weatherized Vault or Vault 20 FX or <strong>Door</strong><strong>and</strong> I/O <strong>module</strong> <strong>with</strong>out a connected <strong>Door</strong> )OKKeyportA Weatherized Vault or a Vault 20 FX in the same GroupVault 20 FX PowerboardNo Vault 20 FX Key Controller in the same Group<strong>and</strong>no keypad display or display <strong>and</strong> data knob in the same GroupA <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> connected to a door in the same Groupora Keyport in the same GroupVault 20 FX Key ControllerNo Vault 20 FX powerboard in the same GroupA <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> connected to a door in the same Groupora Keyport in the same GroupGo to:Adding a Flex System Hub to CyberAudit-WebOptions for adding Flex System ModulesAbout Groups <strong>and</strong> Display LinksThe Grade ColumnAdditional Links:Mounting Flex System ModulesAbout the Flex SystemVault 20 FX OverviewGranting Access to Flex System Weatherized Vaults


Using the Data Knob <strong>and</strong> DisplayThe Flex System <strong>Door</strong> <strong>and</strong> I/O Module


Flex System Hub Properties


GeneralName - The name assigned to the Flex System Hub. This name appears in the AccessMatrix for the purpose of granting access to any connected Weatherized Vaults.ID - The serial number of the hub assigned at the factory. Flex System Hub IDs have theformat OXXXXXXXX.Firmware - Indicates the version number of the software running in the hub. This field willdisplay only after CyberAudit-Web communicates <strong>with</strong> the hub <strong>and</strong> captures thisinformation.Demo Mode - Check this box as the first step to setting the Flex System hub into demomodeUpdate Frequency - By default, Flex System Hubs check in for updates <strong>with</strong>CyberAudit-Web once every 30 seconds. In some cases where there is a per-byte cost ofdata transmission, it may be desirable to reduce the frequency of check-in.CyberAudit-Web does attempt to make an immediate TCP/IP connection <strong>with</strong> the FlexSystem Hub when an update is pending for the hub. If the connection attempt issuccessful, the Flex Hub will immediately synchronize <strong>with</strong> CyberAudit-Web rather thanwaiting for the next check-in time. However if it is not possible to make that connection, theadministrator should be aware that any updates the hub affecting configuration or accesspermissions may be delayed until the hub successfully checks in <strong>with</strong> CyberAudit-Web.NetworkingCyberAudit-Web Server Address - The IP address or domain name of theCyberAudit-Web server. If the system default from communicator options will be used, thecheckbox will be checked.Automatic (DHCP) / Manual - Choose the settings appropriate to the subnet where thehub will be installed.Push Notification Port - The network port on the Flex System hub that listens for aTCP/IP signal from the CyberAudit-Web server. This signal tells the hub to immediatelycontact CyberAudit-Web for instructions.Proxy - Many larger networks require web browsing to be routed through a proxy server toreach the Internet. Because the Flex System hub is fundamentally a web client, its webtraffic must also be routed through the proxy. I If a proxy server is required, its informationmust be entered here.Note: Once a Flex System hub has been added <strong>and</strong> configured, changes to the Proxysettings may only be updated by programming the hub from a USB flash drive.


Open Vault - There may be occasions where Weatherized Vaults or a Vault 20 FX may needto be opened to introduce CyberKeys or remove one that does not belong to that Flex Hub. Inthese circumstances the Vault may be opened either by a specific RFID card, a specific inputnumber, or both. Using this method, the Flex System Hub does not program a CyberKey sowhen the key is removed it has no access permissions. If there are more than oneWeatherized Vaults available in the same group, it rotates through the vaults, selecting adifferent one to open after each input. For the Vault 20 FX it will open the door <strong>and</strong> brieflyopen each key retainer to allow removing one or more keys. To add a key just insert one intoany available key retainer.Click the Scan card button to use any card reader in the system to capture the ID from anRFID card. CyberAudit-Web will automatically capture the ID <strong>and</strong> save it if the card is notalready issued to someone in the system.Additional Topics:About the Flex SystemVault 20 FX OverviewAdding a Flex System Hub <strong>and</strong> ModulesMounting Flex System ModulesFlex System Power RequirementsFlex System Module Cable PinoutsFlex System Hub ListView/Edit Flex System ModulesGranting Access to Flex System Weatherized VaultsUsing the Data Knob <strong>and</strong> DisplayLED Indicator on the Weatherized VaultUsing CyberKeys <strong>with</strong> Flex System Weatherized VaultsFlex System Demo ModeFlex System Audit TrailsFlex System Display MessagesFlex System Hub DiagnosticsFlex System Special Key InputFlex System Hub LED IndicatorsResetting a Flex Hub


Programming Flex System Hubs from a USB flash driveThis process requires the use of the USBflash drive packaged <strong>with</strong> the Flex Systemhub or an equivalent unencrypted USBdrive.Once the Flex System hub has been added to the system it may be programmed <strong>with</strong> a USBflash drive.1. Click on the LaunchCyberTransfer linkfrom the Flex SystemHubs listing page.2. With theCyberTransferapplication started,insert the USB flashdrive. CyberTransferwill detect it an add itto its list of availabledrives.


3. Click Go.CyberTransfer will pullany available FlexHub data files from thedrive <strong>and</strong> upload themto CyberAudit-Web<strong>and</strong> then willdownloadprogramminginstructions for all FlexHubs <strong>with</strong> changeicons.4. When CyberTransferhas completed,unmount <strong>and</strong> removethe USB drive.


5. With power applied to the Flex System hub, insert the USB flash drive. The USB LED on the hub will flashbriefly. When the LED is steady on, remove the drive. The hub has now received its configuration <strong>and</strong> willattempt to connect to CyberAudit-Web as indicated by a flashing CAW LED. When connection has beenestablished, the CAW LED remains steady on.Flex System Hub LED Indicators


Mounting Flex System ModulesThe following chart <strong>and</strong> drawings contain dimensional information that may be needed formounting CyberLock Flex System Modules <strong>and</strong> fabricating mounting plates. In most cases it isassumed that <strong>module</strong>s will mount to a metal mounting plate (not shown) using the gasket plusthe retaining nut <strong>with</strong> set screw that ships <strong>with</strong> each <strong>module</strong>. When tightening the retaining nutit is desireable to align the set screw <strong>with</strong> the keyway in the <strong>module</strong> so the screw may becaptured <strong>and</strong> prevent the nut from turning.


FeatureLarge diameter <strong>module</strong>Weatherized VaultSmall diameter<strong>module</strong>RFID, Display, DataKnobOverall Diameter3 inches (Item A in the dimensiondrawing2 inchesHole diameter 2.647 inches (Item B)Retaining nut diameter 3 inches (Item C)Retaining nut thickness 0.50 inches (Item D)1.77 inches2 inches0.75 inchesRetaining nut set screws#3 Phillips screw driverrecommended#2 Phillips screwdriverRecommended depth behind gasket(includes clearance for RS-485connection cable)3.25 inchesData Knob - 3.00inchesRFID - 2.00 inchesDisplay - 1.50 inches


Hole dimension for small diameter <strong>module</strong>sHole dimension for large diameter <strong>module</strong>s


Flex System Demo ModeDemo Mode enables demonstrating basic functionality of a Flex System Hub. Any recognizedinput to an RFID reader or a data knob will cause the Flex Hub to open the Weatherized Vaultor <strong>Door</strong>/IO <strong>module</strong> door control outputs . If there are more than one output devices, italternates opening them. A Flex System Hub is in Demo Mode when new as shipped from thefactory.Demo Mode may be toggled from Flex System Hub properties. To switch to demo mode,select Flex Hubs from the Communicators menu to bring up the Flex System Hubs list. Hoverover the desired Flex Hub record <strong>and</strong> select Properties from the click menu. In the Generalsection Edit Flex Hub properties page, check on Use Demo Mode. Click Save. If the FlexSystem Hub is online CyberAudit-Web will update it at the next communications. Otherwise itmay be updated using the USB flash drive method.Demo Mode does not change the Flex Hub's network settings so the Flex Hub will continue tocheck in <strong>with</strong> CyberAudit-Web during Demo Mode. While the Flex System Hub is in DemoMode, <strong>module</strong> settings may not be modified.


Using CyberKeys <strong>with</strong> Flex System Weatherized VaultsThe Weatherized Vault enables people to check out a CyberKey programmed <strong>with</strong> a mission.Each Flex System Hub keeps a list of "valid" CyberKeys it may use for issuing missions. Thatlist comes from CyberAudit-Web. If a CyberKey is not a member of that list, the Flex SystemHub will not use that key to program a mission.There are two ways to assign CyberKeys to a Flex Hub;Manual Assignments - The list of valid CyberKeys for a Flex Hub may be edited byselecting Keys from the Flex Hub listing page click menu. CyberKey serial number IDsmay be individually added to or removed from the list. The number of Key IDs is limited tothe number of Weatherized Vaults in the system.Automatic Assignments - If an unknown CyberKey is inserted in a Weatherized Vault,the Flex Hub sees it as an invalid key <strong>and</strong> reports it to CyberAudit-Web. CyberAudit-Webwill automatically add the CyberKey ID to the list of valid keys if:The key ID is not issued to another personThe key ID is not associated <strong>with</strong> another Flex Hub or VaultThe CyberKey is not a Gr<strong>and</strong> Master CyberKey or CyberLock ProgrammerThe CyberKey is recent enough to support multiple access lists (2005 <strong>and</strong> later)The number of CyberKeys assigned to the Flex Hub is less than the number ofWeatherized Vault Modules defined for the HubThe Flex Hub CyberKeys page displays an editable list of CyberKey serial numbers assignedto its Vaults. It also displays a list of the CyberKeys currently checked out <strong>and</strong> a list of anyinvalid CyberKeys inserted into the Vault.


LED Indicator on the Weatherized VaultAn LED on the Weatherized Vault is used to indicate status.LEDOffQuick flash once every twosecondsFlash on/off every secondSolid OnRapid flashingIndicationVault is closed <strong>and</strong> latched. No key presentVault is closed <strong>and</strong> has a CyberKey insertedVault latch is retracted. Vault is ready to open.Vault is open.Vault has returned to the closed <strong>and</strong> latchedposition.


Using the Data Knob <strong>and</strong> DisplayThe weatherized Data Knob <strong>and</strong> Display enable a person to enter amission number to check out a CyberKey or to enter a PIN. Once theData Knob <strong>and</strong> Display are set up in the same Group <strong>and</strong> Display Link,simply turn the knob to the right or left to cycle through the numbers.When the desired number is reached, press the knob to move to savethat number <strong>and</strong> move to the next number position. When the entry iscomplete, the hash character (?#?) is used to submit the entry.To backspace, push <strong>and</strong> hold the knob while turning to the left.The Data Knob can enter up to 16 numbers. Once the 16th number is accepted the entry isautomatically submitted.


Flex System Power RequirementsThe Flex System hub can be supplied from a 12-24 volt power source. It ships <strong>with</strong> a 2 amp12 volt DC, center post positive, power supply transformer using either 110V or 220V ACpower. While 24V power supplies are less common, some legacy systems may still operate at24 volts <strong>and</strong> can be supported by the Flex System hub.In addition, the Flex System hub can receive backup power from a battery via a Molex® MiniJr Series connector (39-01-2040) . The system charges the backup battery when transformerinput voltage matches battery system voltage.The Flex System is designed to supply operating power <strong>and</strong> communicate to its connected<strong>module</strong>s using CAT5 Ethernet patch cable <strong>with</strong> 8P8C connectors (RJ45) using an RS-485protocol. The cable supplies both communications <strong>and</strong> power to the <strong>module</strong>. Thecommunications baud rate limits cable length to a 350 foot (105 meter) maximum under idealconditions. Maximum cable length is further limited by the power requirements of each<strong>module</strong>. Under most conditions, CAT5 cable may extend 100 feet (30 meters) to any FlexSystem <strong>module</strong>.The ability to extend beyond 100 feet depends on varying conditions such as actual powersupply voltage, varying loads, multiple <strong>module</strong> power/surge requirements, <strong>and</strong> environmentalconditions that affect communications such as electromagnetic interference from machinery,radios, etc.Because of their lower power requirements, under ideal conditions, cable to these <strong>module</strong>smay extend out to the maximum of 350 feet (105 meters):Data KnobDisplayKeypad DisplayRFID ReaderKeyport


Weatherized VaultThe Weatherized Vault <strong>module</strong> has a higher power requirement. Maximum cable length islargely dependent on input voltage supplied to the Flex System hub.Maximum possible cable distances for the Weatherized VaultInput Power12V input <strong>with</strong>12V battery backup<strong>with</strong> 10V minimumoperating voltage12V input onlyno battery backup<strong>with</strong> 11V minimumoperating voltage24V input <strong>with</strong> or<strong>with</strong>out battery backup<strong>with</strong> 20V minimumoperating voltageMaximum Range150 feet45 meters250 feet75 meters350 feet105 meters<strong>Door</strong> <strong>and</strong> I/O ModuleThe <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> can supply power to either a door strike. Because of this maximumcable length will vary depending on both the input voltage supplied to the Flex System hub<strong>and</strong> the power drawn by the connected devices.12 Volt System 24 Volt System<strong>Door</strong> Strike Power 0mA350 feet105 meters350 feet105 meters<strong>Door</strong> Strike Power 250mA150 feet45 meters150 feet45 meters


Flex System Module Cable PinoutCat 5 or Cat 6 cable is recommended for Flex System <strong>module</strong>s. The following tablereferences st<strong>and</strong>ard conductor colors for those cable types <strong>with</strong> 8P8C (RJ45) connectors.Pin Number Name Conductor Color1 RS-485A white <strong>and</strong> orange2 RS-485B orange3 Ground white <strong>and</strong> green4 not used blue5 Ground white <strong>and</strong> blue6 not used green7 Power Positive white <strong>and</strong> brown8 Power Positive brown<strong>Reference</strong> pictures:


The Molex® Mini Jr Series Connector


Messages at setup <strong>and</strong> administrationUser interactionsSystem messages <strong>and</strong> errorsFlex System Display MessagesMessageUNKNOWNUSBDEVICELOAD NETSETTINGSBAD NETSETTINGSBADPROXYSETTINGSBADCONFIGDOWNLOADSTATUSDOWNLOADFLEXEVENTSDOWNLOADKEYEVENTSUSBREADYCHECKUSBFORMATBADUSBFORMATDescriptionMessages at Setup <strong>and</strong> AdministrationA USB device was not recognized as a mass storage type by the Flex System hub.The Flex System hub is loading network settings from a USB configuration. Thismessage normally will not be seen because the process happens very quickly.The USB network configuration settings failed an integrity check.The proxy settings received from USB failed an integrity check.The USB configuration file failed an integrity check.Indicates the Flex System hub is writing its status <strong>and</strong> diagnostic information to a USBflash drive.Indicates the Flex System hub is writing its audit trail events to a USB flash drivebased on instructions received in the fetch diagnostics page.The Flex System hub successfully wrote the requested data to the USB flash drive.The drive may now be removed.The Flex System hub discovered a newly inserted USB flash drive <strong>and</strong> is determiningwhether it can decipher the format of the drive.The Flex System hub could not decipher the format of the newly inserted USB flashdrive.MessagePIN"BAD PINENTERNEW PINCONFIRMNEW PINREADYREADY*BUSYDescriptionUser InteractionThe person record was found <strong>and</strong> requires a PIN be entered to validate identity.The PIN entered does not match the PIN on record for the identified person.The user has been identified by RFID card scan or mission number <strong>and</strong> must create anew PIN. At this point 4 to 8 digits must be entered followed by the ,#,.The user has just entered a new PIN <strong>and</strong> must enter the new PIN again to confirm it iscorrect.The Flex System hub is idle but it does not have a connection <strong>with</strong> CyberAudit-Web.The Flex System hub is idle <strong>and</strong> has a connection to CyberAudit-Web.The Flex System hub is processing a comm<strong>and</strong> or request.


UNKNOWNCARDLINKUPHOSTUNKNOWNMISSIONACCESSEXPIREDACCESSOUT OFSCHEDULENOACCESSRETURNKEYKEY INCLOSEVAULTINVALIDKEYREMOVEINVALIDKEYKEY INDISABLEKEYKEY OUTCLOSEVAULTKEY OUTNO KEYSETTINGMISSIONALREADYOUTNOMISSIONASSIGNEDPROGRAMKEYDOWNLOADKEYISSUE"orMISSION"UNKNOWNISSUE"MISSION"KEY COMMFAILThe scanned RFID access card was not recognized.The Flex System hub did not recognize the scanned RFID card, entered mission #, orinserted CyberKey <strong>and</strong> is attempting to contact CyberAudit-Web for resolution. If it isThe mission entered using the Data Knob or Keypad Display was not recognized.The schedule paired <strong>with</strong> the <strong>Door</strong> or Vault(s) has expired for the person attemptingaccess or the mission is past its Final End Date.Access was attempted to the <strong>Door</strong> or Vault(s) outside the time frames of thescheduled access for the person.The person assigned to the RFID access card or mission # does not have permissionto access the door or to use the Vault.Instuction to return a CyberKey to a Vault from a mission.Once the Flex System hub determines that the key inserted into the WeatherizedVault is valid it displays this message.An invalid key was inserted into a Weatherized Vault or Vault 20 FX. CyberAudit-Webevaluates the key ID. If that ID is eligible to assign to the Flex Hub, it will do soautomatically <strong>and</strong> update the hub at the next opportunity.A CyberKey in the current Vault is not valid. If it is in a Weatherized Vault, it must beremoved from the Vault to resume normal operations.A CyberKey was inserted into a Vault 20 FX or Keyport.CyberAudit-Web sent a configuration to the CyberKey to disable all accesspriviledges.A CyberKey was removed from a Weatherized Vault.A CyberKey was removed from a Vault 20 FX or a Keyport.A mission number was found but no corresponding CyberKey programminginstructions were found.The requested mission has already been checked out from another communicator<strong>and</strong> may not be checked out again until that mission has been checked in.No mission is assigned to the scanned RFID access card.Displays when the Flex System hub is loading a CyberKey <strong>with</strong> a mission or disablingit after returning it to a Vault.Displays when the Flex System hub is downloading the audit trail records from aCyberKey.The CyberKey inserted into the KeyPort may be issued to a person or used <strong>with</strong> amission . The user may enter the unique number followed by '"'.The number entered was not recognized by CyberAudit-Web as either a valid Issuenumber or Mission.Indicates the Flex Hub was not able to maintain good communications <strong>with</strong> aCyberKey. Typically this occurs because of contamination on the key contacts on theVault <strong>and</strong>/or the key tips. ( CyberKey Cleaning Instructions)


KEYREADYKEYADDITIONDENIEDKEYASSIGNEDTO VAULTUNKNOWNKEYJOB"ORADMIN"BAD JOB"ORLOGIN"NEWKEYINPUTISSUE"UNKNOWNISSUE"ISSUINGKEYNEW LOCKLOGIN"BADLOGIN"NEW LOCKADDDENIEDOPENVAULTOPENVAULTCLOSEDNO EMPTYVAULTOPENDOORDOOROPENDOORCLOSEDOUT OFINPUTSCHEDULEThe CyberKey in the Vault or Keyport is programmed <strong>and</strong> may be removed.CyberAudit-Web cannot issue or use the CyberKey for the requested purpose.A CyberKey assigned to a Vault was inserted in a Keyport.A key inserted into a Keyport is unknown to the current system <strong>and</strong> its flag is setindicating it belongs to another system.A CyberLock Programmer or Gr<strong>and</strong> Master was inserted into a Keyport <strong>and</strong>CyberAudit-Web is prompting to enter the programming job number or the adminnumber of the administrator adding or programming CyberLocks.CyberAudit-Web did not find a Programming Job or Administrator number matchingthe number entered.A Gr<strong>and</strong> Master is not a member of the system <strong>and</strong> must first be issued beforeconfiguring it <strong>with</strong> a programming job.CyberAudit-Web did not find the Issue Number entered.The entered Issue Number was found <strong>and</strong> CyberAudit-Web is proceeding to add theGr<strong>and</strong> Master to the system. It will next prompt for a JOB" or LOGIN".The Gr<strong>and</strong> Master automatically programmed CyberLocks unknown to the system. ALOGIN" is needed to add the locks to the system <strong>with</strong> visibility at the correctCyberAudit-Web did not find the Login Number entered.CyberAudit-Web did not permit adding lock IDs to the system. Check the permissionsof the administrator associated <strong>with</strong> the LOGIN".Alternates <strong>with</strong> the KEY READY message. Instructs to open the Vault to retrieve theprogrammed CyberKey.The door on the Weatherized Vault has been turned away from the locked position.The door on the Weatherized Vault has been returned to the closed <strong>and</strong> lockedposition.There is no empty Weatherized Vault or key retainer available for returning aCyberKey from a mission.Access has been granted to the <strong>Door</strong>. It may now be opened.The <strong>Door</strong> has been opened. (Requires a door sensor connected to the <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>.The <strong>Door</strong> has returned to the closed position. (Requires a door sensor connected tothe <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>.Out of the permitted time to get response from an input device such as an RTE.


LINKUPHOSTKEYDISABLEDNOKEYRETURNKEYNO VAULTOR DOORKEYADDITIONDENIEDThe Flex System hub does not have a record cached for the requested access so it isattempting to notify CyberAudit-Web of the request.A deleted CyberKey has been cleared of all access permissions. It may now beissued to another person or used <strong>with</strong> a mission.There are no available CyberKeys in the Vault or Vaults but the Vault is open to returna CyberKey if desired.An operation requires a Vault or a <strong>Door</strong> but there is currently no Vault in the group.The key in the KeyPort cannot be used because the Key is the wrong type or themission is no longer valid.MessageNOVAULTNO VALIDKEYNO DOORNOTVAULT20 FXIHS DOORCLOSEIHS DOOROPENSTARTIHSCANCELIHSBAD KEYSETTINGRTC STOPMEMORYFULLBOOTLOADFLEX HUBBOOTLOADMODULEBOOTLOADFAILBYPASSMODEDescriptionSystem Messages <strong>and</strong> ErrorsThe group is configured to use a Vault but no physical connection to a Vault is found.The person has permission to check a CyberKey out from a Vault but the Vault doesnot have a valid CyberKey available to issue.The Flex System Hub is attempted to operate a <strong>Door</strong> but could not connect to theassociated <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>.A special key input was entered applicable only to a Vault 20 FX.The Flex Hub received a signal to lock the <strong>Door</strong>.The Flex Hub received a signal to unlock the <strong>Door</strong>The hub is responding to an Inter-hub signal.The hub received a comm<strong>and</strong> to stop responding to an Inter-hub signal.Occurs if a cached record in the Flex System hub for a mission is corrupt.The Flex System hub clock stopped. No access will be granted to either a Vault or a<strong>Door</strong>.The Flex System hub memory is full. No additional activity is allowed until it canconnect <strong>and</strong> upload to CyberAudit-Web.The Flex System hub is updating its firmware from CyberAudit-Web.The Flex System hub is updating the firmware of one of its <strong>module</strong>s.A firmware update process failed.The Flex System hub needs to contact CyberAudit-Web about an unknown key in itsKeyport but the permission to contact has been disabled.


Flex System Audit Trail Events1 System Reset23Message Description DataFirmwareUpdatedReset toFactory Settings4 All Data Cleared5UTC offsetupdatedA comm<strong>and</strong> was sent from CyberAudit-Web to reset thehub. The resulting behavior is the same as a powercycle.CyberAudit-Web sent new firmware. This event isrecorded following the restart after loading the newfirmware.The hub received a reformat comm<strong>and</strong> which revertsthe hub to factory settings. <strong>Inc</strong>ludes clearing networksettings. This comm<strong>and</strong> is not included inCyberAudit-Web.The hub received <strong>and</strong> executed a comm<strong>and</strong> to deleteall stored permissions.UTC offset read from configuration fileN/AN/AN/AN/AUTC offset inminutes6 Clock Stopped Clock registers indicate the time is no longer reliable N/A7891011121314No transformerpower detectedTransformerpower detectedBattery powerdetectedBattery powernot detectedCritical batterydetectedLow batterydetectedUSB flash drivedetectedUSB flash driveremovedBattery voltage is below 10V on a 12V system or below20V on a 24V systemBattery voltage is below 12V on a 12V system or below24V on a 24V systemA readable USB flash drive was insertedPower status infoPower status infoPower status infoPower status infoPower status infoPower status infoN/AN/A


15Data written toUSBDrive ID, File ID,list of tasksperformed:FetchedcurrentconfigurationdataFetched hubaudit trailFetchedCyberKeyaudit trailsUpdatednetworksettingsCleared hubaudit trailsCleared keyaudit trails16171819202122323334Internal memoryerrorNo networkconnectionNetworkconnectionrestoredFailed tocontactCyberAudit-WebConnectionestablished toCyberAudit-WebConnection toproxy failedConnectionestablished toproxyValid CyberKeyinserted intoVaultInvalidCyberKeyinserted intoVaultCyberKeyremovedThe hub encountered an error reading or writing itmemory.The hub did not detect a networkA network was detectedConnection to CyberAudit-Web was lost. If present, theicon will be cleared in the Flex System Hubs listingpage.Connection to CyberAudit-Web succeeded.The hub did not find the CyberKey serial number in itslist of valid keys for the Vault.The data is the rawhexascii diagnosticbytesThe icon will nowshow in the FlexSystem Hubslisting page.TCP/IP status codeCyberKey serialnumber35 RFID scan ID of the card


36373839404142Data receivedfrom I/O <strong>module</strong>Keypad inputreceivedPeople recordverifiedCyberKeyconfigurationverifiedAccess Granted- <strong>Door</strong> lockreleasedFound issuedkey recordAccess grantedto Vault43 PIN verifiedMission, issue, or PINThe Flex hub found the record of the person who ownsthe keyThe PIN entered matched the PIN on record for theperson.Data receivedInput device,number ofcharacters enteredName of personThe name of themission or keyName of doorName of personKey IDName of VaultInput device,number ofcharacters entered44 Request to exit Received RTE input signal Name of door45 <strong>Door</strong> closed <strong>Door</strong> sensor returned to closed position Name of door46 <strong>Door</strong> opened <strong>Door</strong> sensor changed to open position Name of door47IHS button inputreceivedInput received to generate inter-hub signal48 IHS received Inter-hub signal received via network49505253IHS responsecompletedBegin "keepunlocked"schedule<strong>Door</strong> schedulecompleted<strong>Door</strong> opened<strong>with</strong>out accesspermissions54 RTE deniedIHS response duration was served. The response hasended.A door sensor indicates the door changed to the openposition <strong>with</strong>out any associated permissions.Request to exit was received when an inter-hub signalresponse or other condition had higher priorityName of doorSender:Receiver:Time:Level:Mode:Type:Class:Group:Port:Input type:Controls:Type of <strong>module</strong>:Name ofassociated door:Name of doorName of doorName of doorName of door


555758596061626567IHS inputrejected<strong>Door</strong> left opentoo long<strong>Door</strong> releasetimed outDeadbolt lineopenDeadbolt lineclosedGeneric buttonpressedGeneric switchtoggledKey commfailedKeydownloaded68 Key configured69 Key disabled74757677787982<strong>Door</strong> lockre-activatedIssued keyrecord foundUnknown keyinserted intokeyPortMissionable keyinserted intokeyPortKeydownloadedfrom serverKeyprogrammedfrom serverOut of schedulefor WeatherizedVault(s)83 Mission expired86 RFID not foundInter-hub signal input received while still responding to aprevious inter-hub inputA door was left open past its alarm timerThe solenoid, mag lock, or other mechanism thatreleased the door to open reached the end of its "holdopen" timeThe optional Deadbolt input toggled openThe optional Deadbolt input toggled closedOptional Generic Button input pressedOptional Generic Switch closedCommunications <strong>with</strong> the CyberKey failed. Ensure allcontacts are clean.The audit trail was captured from a CyberKey.The Flex hub gave the CyberKey an updatedconfigurationThe ability to open CyberLocks was removed from theCyberKeyThe key ID was issued to a person <strong>and</strong> the record wasfound in the hub database.The key ID is not in the list of vault keys or missionablekeys. The Flex hub attempts to notify CyberAudit-Web.The key ID was found in the Flex hub's list ofmissionable keys. The Flex hub prompts for an ISSUE #or MISSION #.The key was downloaded in response to a request fromCyberAudit-Web.The key was programmed from a configuration sent byCyberAudit-Web.The person attempted to check out a CyberKey from aWeatherized Vault during a time outside of theirscheduled time frames for the vaults on the FlexSystem Hub.The person attempted to check out a mission from aWeatherized Vault after the mission had expired.The hub did not find the ID of the RFID card in its list ofpeople or missions.Name of doorName of doorName of personName of doorID of <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>ID of <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>ID of <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>ID of <strong>Door</strong> <strong>and</strong> I/O<strong>module</strong>CyberKey serialnumber IDKey serial numberIDName of personKey serial numberIDConfiguration IDKey serial numberIDKey IDKey IDKey IDKey IDKey IDName of personName of personName of missionID of the card


87888996Mission numbernot foundNo storedCyberKeyconfigurationfoundNo doorpermissionsfoundPIN input<strong>module</strong> notavailableThe hub did not find a mission number matching theone entered at the keypad or data knob.A mission number was found but no correspondingCyberKey programming instructions were found.The person was found but there were no associatedpermissions for the door.Access to a Vault or door requires entry of a PIN but noData Knob, Keypad, or other device is available in thegroup.98 Vault opened The Weatherized Vault was opened.99 Vault latched100Access out ofscheduleThe Weatherized Vault lid was returned to the closedposition that captures it in its latch.A person attemted access to a door outside of theirscheduled time frames for the doorMission numberenteredMission templatenameName of personName of doorName of PersonName of VaultName of PersonName of VaultName of personName of doorRequest detail:107Special actionrequestreceivedAn Input # or RFID card scan generated an Open Vaultrequest. Or a Request to open request was sent toopen a <strong>Door</strong>.Request toopen VaultRequest toopen <strong>Door</strong>Request toopen Vault20 FX <strong>and</strong>unlocksocketRequest toremoveinvalid keyfrom a Vault20 FXRequest toopen Vaultto return key108109111112Requestedmission alreadychecked outMission # notfoundKey RinginsertedModulefirmware updatefailedFlex System hubs will track missions checked out <strong>and</strong>will not issue a second CyberKey for the same mission.CyberAudit-Web also updates all Flex hubs in thesystem when a mission is checked out from a Vault onanother hub.The Flex hub did not find the mission number entered inits list of cached missions.A Key Ring CyberKey has been identifiedName of missionName of personMission # enteredKey ID


113114115116117Modulefirmware updatesuccessfulHub dataclearedSpecial keypadinputNew PIN inputreceivedCyberKeyfirmwareupdated118 Hardware reset119120121123128129Keypad inputrequested fromserverRequestedRFID input sentto serverCard scan -mission optionpresentedMissionselectedFirmwareexecution error(128)Firmwareexecution error(129)The hub received a comm<strong>and</strong> to clear one or more ofits stored records or data.Three or fewer digits were entered <strong>and</strong> submitted froma data knob or keypad/display.The key holder successfully entered <strong>and</strong> confirmed anew PIN.A hardware reset was performed on the Flex Systemhub.CyberAudit-Web requested user inputCyberAudit-Web requested RFID scan inputRFID input was received for a system where multiplemissions per card are available to selectThe missionContact Flex System resellerContact Flex System reseller130 System Error Error details shown in the data column1312816128163281652817628177Firmwareexecution error(131)External powerdetectedPOE powerdetectedBattery powerdetected<strong>Door</strong> releasebutton released<strong>Door</strong> releasebutton pressedContact Flex System resellerThe Vault 20 FX powerboard detected primary powersource is now its external (transformer)The Vault 20 FX powerboard detected primary powersource is now Power Over EthernetThe Vault 20 FX powerboard detected primary powersource is now from batteryThe door release button is located inside the front panelof the Vault 20 FX28192 <strong>Door</strong> opened The door on the Vault 20 FX was opened28193 <strong>Door</strong> closed The door on the Vault 20 FX was closedA list of the datatypes clearedInput receivedKeypad or dataknob inputID of the cardMission name ornumberError category <strong>and</strong>detail


2821028211Low batterydetectedCritical batterydetectedThe Vault 20 FX detected low voltage on its battery. Itscharge is less than 50% capacity.Vault 20 battery life is at approximately 2 minutesCyberKey <strong>and</strong> CyberLock audit trail eventsVault 1 audit trail eventsComm Link audit trail eventsWeb Authorizer audit trail eventsLAN Authorizer audit trail events


Flex System Special Key InputSpecial functions are available to Flex Systems which have a Keypad/Display or Data Knob<strong>module</strong>. Entering the combination of numbers shown below will bring up information about theFlex System hub or the CyberKey inserted in the Keyport.Input Description Display11#Displays the full ID of the FlexSystem hub <strong>with</strong>out the leading "O"XXXXXXXX22#Forces the Flex System hub tocontact or "Sync" <strong>with</strong> itsCyberAudit-Web server.While attempting to connect toCyberAudit-Web:SYNC...For success: ONLINE!For failures:NET UNREACHABLE - The DNS nameor IP address of the CyberAudit-Webserver is not <strong>with</strong>in the networking rangeof the hub.NO SERVER - The hub has no DNSname or address of a CyberAudit-Webserver in its configurationNO ROUTE - The hub does not haveadequate information to contact theCyberAudit-Web server. This errorwould appear if the hub had not yetbeen programmed from USBTIME OUT - The hub timed out waitingfor a response from the CAW serverCONNECT REFUSED - TheCyberAudit-Web server refused aconnection to the hub. This would occurif the hub attempted to use an incorrectportSSL FAIL - The SSL link <strong>with</strong>CyberAudit-Web failedDNS FAIL - The hub was unable toresolve the DNS name of theCyberAudit-Web serverUNKNOWN NET ERR - A networkingerror occured outside the range of theones shown above


33#Displays the current date, time, UTCoffset, <strong>and</strong> day of week of the FlexSystem hub.If system clock is OK:yyyy-mm-ddhh:mm:ssUTC offsetday of weekIf system clock is not reliable:CLOCKED STOPPED55#Used to show the unique CyberKey8-character ID in combination <strong>with</strong> aKeyport.If a Keyport is available:INSERT KEY THEN PRESS #If no Keyport is available:NO FLEX KEYPORT66#Checks <strong>and</strong> displays the batteryvoltage <strong>and</strong> warns if the voltage islow.If a Keyport is available:INSERT KEY THEN PRESS #If no Keyport is available:NO FLEX KEYPORT77#Displays the key expiration status. Ifthe key has not expired it shows thenext expiration date. Otherwise itshows either KEY EXPIRED orNEVER EXPIRES.If a Keyport is available:INSERT KEY THEN PRESS #If no Keyport is available:NO FLEX KEYPORT88#This input is used <strong>with</strong> a Vault 20 FXto release an invalid key. The dooron the Vault 20 FX must me openbefore this request will be executed.If an invalid key is present, the displayshows a map of the CyberKey retainers<strong>and</strong> the released invalid key isrepresented <strong>with</strong> an uppercase 'X'.111#Displays the current IP address ofthe Flex System hub. If the IPaddress is 0.0.0.0 then the IPaddress has not yet been set.CLIENTIPxxx.xxx.xxx.xxx999#Displays the resolved IP address ofthe CyberAudit-Web server. If the IPaddress is 0.0.0.0 then the IPaddress has not yet been set.SERVERIPxxx.xxx.xxx.xxxAll other inputsless than 4charactersReports as unknown input.UNKNOWN CODE


Flex System Hub DiagnosticsFlex System hub Diagnostics involves capturing <strong>and</strong> reporting the a hub's system status <strong>and</strong>configuration. This configuration may be captured the next time the hub checks in <strong>with</strong>CyberAudit-Web or by using a USB flash drive. Diagnostic logging provides verbose loggingof Flex Hub activities for the specified period of time. Diagnostic logs may be useful fortechnical support troubleshooting.Open the Fetch Diagnostics page by clicking on Fetch Diagnostics from a Flex System hubrecord in the Flex Hub list page.If using a USB flash drive, audit trail data from both the Flex System hub <strong>and</strong> from CyberKeysdownloaded by the hub may be added to the diagnostic request.


When the diagnostic file is captured, either directly from the network check-in or by uploadinga USB flash drive, it is added to the list in the Diagnostics files list page. Click on a diagnosticrecord in that list <strong>and</strong> click Audit Report to view the diagnostic data.


Flex System Hub LED IndicatorsThe Flex System Hub has four LED status indicators on its power panel.LEDCAWUSBModBatStatusSteady ON - Connected to its CyberAudit-Web serverFlashing - Searching for a connectionFlashing - Reading USB flash driveSteady ON - Reading complete remove USB flash driveOFF - No USB flash drive detectedPeriodic flash - Actively checking for <strong>module</strong>sOFF - No battery detectedSlow flash (1 per second) - Battery chargingSteady ON - Battery full chargeRapid flash - Running on battery power


Resetting a Flex HubResetting a Flex System Hub clears its networking, permissions, <strong>and</strong> audit trail data. ThisHardware Reset is done <strong>with</strong> these steps:1. Remove power from the FlexHub.2. Using an Ethernet patch cable, connect one end to any of the eight numbered <strong>module</strong> connectionports.


3. Connect the other end of the patch cable to the Aux port on the other end of the Flex SystemHub.4. With the Ethernet patch cable jumpered from the two ports, restore power to thehub.The hub typically restarts <strong>with</strong>in 5 seconds. The reset is complete when the CAW LED flashes.


LAN Authorizers


LAN AuthorizersThe CyberKey LAN Authorizer system consists of an Authorizer keyport <strong>and</strong> a LAN AuthorizerHub. This page lists the LAN Authorizers in the system <strong>with</strong> some of their properties <strong>and</strong>provides the means to view or change settings.Table FieldsThe present icon, , indicates that an Authorizer has communicated <strong>with</strong> CyberAudit-Web<strong>with</strong>in the last minute.The change icon, , indicates that the settings of the Authorizer have changed inCyberAudit-Web but the Hub still needs to be updated.Name - Name assigned to the Authorizer hub.ID - Serial number of the hub assigned at the factory. A hub that has been found by thesystem will have an ID <strong>with</strong> the format hXXXXXXXX.Last Contact - The last date <strong>and</strong> time that CyberAudit-Web successfully communicated<strong>with</strong> the Authorizer.Keyport 1Keyport 2 - The name <strong>and</strong> ID of the keyport connected to the Authorizer.OperationsNew - Click to add a new LAN Authorizer.- Creates a printable list of the LAN Authorizers.Properties - Displays the details of the Authorizer setup.Audit Trail - Generates a report of activities logged by the LAN Authorizer. This can behelpful information for monitoring CyberKey activity <strong>with</strong> an Authorizer or fortroubleshooting.Keys - If LAN Authorizers store key records (based on the setting in CommunicatorOptions) this will bring up the list of keys that have programming instructions stored in theselected Authorizer <strong>and</strong> will allow adding or removing additional key assignments.Sync - Sets the icon which causes Cyberaudit-Web to try to contact the Authorizer.Delete - Removes the selected LAN Authorizer record after confirmation.


Related Topics:Adding LAN AuthorizersInstalling a KeyportLAN Authorizer DescriptionOther CommunicatorsResetting LAN Authorizers


LAN Authorizer DetailsName - Name assigned to the Authorizer hub.ID - Serial number of the hub assigned at the factory. A hub that has communicated <strong>with</strong>the system will have an ID <strong>with</strong> the format hXXXXXXXX.Firmware - Indicates the version number of software running in the Authorizer.IP AddressSubnet Mask - Network settings for the hub.GatewayKeyport 1 NameKeyport 2 Name - Authorizer hubs support up to 2 keyports. It is important to assign aunique location name to each keyport because user key activity can then be traced tothese locations <strong>with</strong> dates <strong>and</strong> times.Keyport 1 IDKeyport 2 ID - Serial number of the keyport. The system automatically discovers <strong>and</strong> fillsin this value.Type - Indicates the mode of communications to the server.Network - Authorizer will communicate <strong>with</strong> the server by a network connection only.Local Modem - Authorizer communicates <strong>with</strong> the server by a network connection.Its modem serves as a communication link between the server <strong>and</strong> remote modemAuthorizers.


Remote Modem - Communicates <strong>with</strong> the server by phone line via one or two localmodem Authorizers.Local Properties - Local Modem Authorizers may be toggled to either dial any remotemodem Authorizer in the database or only those on a given list.Remote Properties - Remote Modem Authorizers must have at least one Local Authorizerto dial. A second one may be selected if desired.Audit Trail - Generates a report of activities logged by the LAN Authorizer. This can behelpful information for monitoring CyberKey activity <strong>with</strong> an Authorizer or fortroubleshooting.Keys - If LAN Authorizers store key records (based on the setting in CommunicatorOptions) this will bring up the list of keys that have programming instructions stored for theselected Authorizer.Sync - Sets the icon which causes Cyberaudit-Web to try to contact the Authorizer.Delete - Removes the selected LAN Authorizer record aftefter confirmation.Related Topics:Keypad MessagesClick here for instructions to add <strong>and</strong> set up modem Authorizers


Adding a LAN Authorizer1. Select "LAN Authorizers" from the "Communicators" drop down menu.2. Click the "New" link.3. Fill in the appropriate information. Field description <strong>and</strong> Modem Authorizer instructions.4. Click the "Save" button.5. Set up the Authorizer.


6. CyberAudit-Web will immediately attempt to communicate <strong>with</strong> the new Authorizer. If successful, it will loadaccess codes, schedules, <strong>and</strong> holidays in the Authorizer's memory. When successful, CyberAudit-Web willclear the change icon flag in the database. At that time, a page reload will cause the change icon to clear.


Setting Up LAN AuthorizersClick here for instructions to add Web AuthorizersClick here for instructions to add modem AuthorizersTo add a network Authorizer to the system, follow these steps:1. Set the Authorizer IP - The LAN Authorizer must be programmed <strong>with</strong> an IP address reachable via a LAN orWAN. A reset Authorizer has an IP address of 192.168.192.192. Enter '999' press the '#' key. The '*' <strong>and</strong> '#'keys on an Authorizer keyport function like the "Backspace" <strong>and</strong> "Enter" keys of a keyboard, respectively.When the IP configuration mode has been activated, the keyport display will change to "X--- 192". Note: if thekeyport of a reset LAN Authorizer does not display "X--- 192" after '999' has been entered, the LANAuthorizer's firmware will need to be updated before an IP address can be set <strong>manual</strong>ly.2. The letter 'X' indicates the octet of the IP addressbeing edited. The number 192 indicates thepresent value of the octet. To replace the value,enter a new one <strong>and</strong> press the '#' key. To keep thecurrent value <strong>and</strong> move on to the next octet in theIP address, enter a 3-digit number greater than255 <strong>and</strong> press the '#' key. After all 4 octets havebeen set, cycle through the IP address again (byentering a number greater than 255 for each) toverify that each was set correctly. The examplebelow shows the keyport displaying that the IP hasbeen set to 192.168.121.234.


3. Give the LAN Authorizer <strong>and</strong> keyport(s) a name - or enter a description of their physical location in theName fields.Enter the Authorizer network addresses - The IP address is used by the server to contact the Authorizer.The Subnet <strong>and</strong> Gateway IPs are used by the Authorizer when it initiates communication back to the server.4. Click Save to commit the changes to thedatabase - This will close the Add New LANAuthorizer page.5. CyberAudit-Web will immediately attempt to communicate <strong>with</strong> the new Authorizer. If successful, it will loadaccess codes, schedules, <strong>and</strong> holidays in the Authorizer's memory. Once synced, the change icon will clear.Click here for instructions to add modem Authorizers


Resetting a LAN AuthorizerResetting an Authorizer will revert it back to the original, unprogrammed state as it wasshipped from the factory. To reset a LAN Authorizer:Disconnect the power <strong>and</strong> all other cables from the rear of the Authorizer.Use a single Ethernet cable to bridge the ports labeled Keyport1 <strong>and</strong> Keyport2.Reapply power to the Authorizer. The LEDs on the front of the Authorizer will cycle throughvarious patterns as the memory <strong>and</strong> component configurations are being re-initialized.The reset process is finished when the LEDs labeled Keyport1 <strong>and</strong> Keyport2 on the front ofthe Authorizer continuously flicker in unison.


The present iconThe present icon, , indicates that an Authorizer was successfully contacted the last time thesystem attempted to communicate <strong>with</strong> it.If this icon is not displayed, then the Authorizer could not be contacted during the lastcommunication attempt.Troubleshooting Help


LAN Authorizer Audit Trail Events# Message Description Keyport # Data16171819key ID notfound inAuthorizerkey ID found inAuthorizerkey removedfrom keypadkeydownloaded20 key configured21PIN ok - key isready22 bad PIN232425264849505152communications<strong>with</strong> key failedsystemidentifier did notmatchtoo many PINtries: keydisabledno responsefrom host forunknown keyno modempresent or failedto initializemodemmodem failed toconnect tophone numberperiodicEthernetconnectioncheck failedconnected tophone numbermodem ringindicatorreceivedNo key record for key in the Authorizer'skey database. UPLINK HOST is displayedat the keyport.Key record for key ID found in theAuthorizer's key database.Key data was downloaded <strong>and</strong> is stored inthe Authorizer.Key has been updated from theAuthorizer's databases but has not yetbeen enabled.If a PIN was required, it was correctlyentered. The key has been enabled <strong>and</strong> isready to use - KEYREADY is displayed atthe keyport.A PIN was required. One was entered but itdidn't match the required PIN for the key.Broken or intermittent connection to the keyor communication was interrupted.COMMFAIL is displayed at the keyport.The database identifier programmed intothe key does not match the one used bythe Authorizer - WRONG PW is displayedat the keyport.1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 1 or 2 (not implemented) 1 or 2 The Authorizer attempts to contact the hostIP for up to 30 seconds. The keyportdisplays UPLINK HOST. If it does notreceive a response, it displays COMMFAIL.This could occur if there is NO DIALTONE,BUSY, NO ANSWER.Authorizers set up for use on a networksend out an ARP every 45 seconds to fetchthe MAC address of the CyberAudit-Webserver. If there is no response for 1 hour,this event is recorded.Dial out successful - connected to hostmodem. Keyport displays CONNECT.1 or 2 noneKeyport displays RING. (none)


53 power-on resetPower was restored after being off. Keyportdisplays WAIT, then REBOOT HUB, then(none)HUBREADY.54-55 hub reset Hub was reset. Settings cleared. (none)Clock stopped. This could occur from an56 Clock stopped extended power loss, greater than 24(none)hours.64keyport addedto AuthorizerA keyport was plugged into the Authorizer. 1 or 2 6566keyportremoved fromAuthorizernon-PINnumbersentered atkeypad (2 orfewer numbers)A keyport was unplugged from theAuthorizer.The keypad received 1 or 2 characters plusthe '#' key.1 or 2 (none)1 or 2 LAN Authorizer Keyport MessagesOther audit trail event types:CyberKey <strong>and</strong> CyberLock audit trail eventsVault 1 audit trail eventsComm Link audit trail eventsWeb Authorizer audit trail eventsFlex System audit trail eventsAudit trails for <strong>Door</strong>s


Working <strong>with</strong> Modem AuthorizersModem Authorizers may be used in place of network Authorizers where network service is notavailable. A CyberAudit-Web system uses one modem Authorizer to dial another. Hence thereare two types of modem Authorizer:Local Modem Authorizers - These Authorizers are connected to a network <strong>and</strong> arereachable by CyberAudit-Web. They are used to bridge communications from phonesystem to network <strong>and</strong> network to phone system.Remote Modem Authorizers - These Authorizers are located where networkcommunications are not available.The figure below illustrates the relationship <strong>and</strong> positioning of the two Authorizer types.


===============================Adding a Local Modem AuthorizerAdd Remote ModemTo add a local modem Authorizer, do steps 1 through 4 in the Setting Up Authorizers help.Then follow these steps:1. Select "Local Modem" as the Authorizer Type.2. Enter the phone number that the local modem Authorizer will be connected to.3. In the Local Properties frame:Dial any remote - The local modem may be used to dial any remote modem Authorizer inthe database as indicated by the linked Diagram.Dial from the list - The local modem Authorizer may only be used to dial remote modemAuthorizers selected from the list. Use Shift-Click or Control-Click to select multiple lines.The resulting positioning could appear like this linked Diagram.4. Click Save to commit the changes to the database - This will close the Add NewAuthorizer page


===============================Adding a Remote Modem AuthorizerAdd Local ModemTo add a remote modem Authorizer, do steps 2 <strong>and</strong> 3 in the Setting Up Authorizers help.Then follow these steps:1. Select "Remote Modem" as the Authorizer Type.2. Enter the phone number that the remote modem Authorizer will be connected to.3. In the Remote Properties frame:


Primary Local Authorizer - This dropdown selects the local modem Authorizer that will bedialed when the remote Authorizer tries to communicatate <strong>with</strong> CyberAudit-Web. A primarylocal Authorizer must be selected.Secondary Local Authorizer - This dropdown selects an alternate local modemAuthorizer to dial if the primary cannot be contacted (line busy, no answer). This selectionis optional. If both a primary <strong>and</strong> a secondary are selected, the resulting configurationmight be similar to this linked Diagram.


Configuration where Local Modem Authorizers may dial any RemoteModem Authorizers


Configuration where Local Modem Authorizers may only dial specificRemote Modem Authorizers


Configuration where Remote Modem Authorizers may dial up to two LocalModem Authorizers


SyncSelect "Sync" from the Lan Authorizers click menu to force CyberAudit-Web to contact theLAN Authorizer. When contact is made, CyberAudit-Web determines whether its configurationflags match the system. This may be useful if the server's IP address has changed or theAuthorizer firmware has been updated.


Keyport Messages Generated by LAN AuthorizersModem Authorizer MessagesAuthorizers Messsages Generated by the ServerMessagePIN#WAITKEY NOT FOUNDHUBREADYREBOOT HUBREADYREADY *KEYREADYLOW BATTBAD PIN#WRONG PWKEY FAILCOMMFAILLINKUPHOSTHUB BUSYWAITKEYPADDISABLEDCLOCKSTOPKEYLOCKEDLOAD HUBFIRMWAREUPDATEBOOTLOADSEC CODEBAD CODEDescriptionKey record in the Authorizer requires a PIN before key will be enabled.The keyport is waiting for the Authorizer to respond.This key does not have a key record in the Authorizer <strong>and</strong> the Authorizer does nothave a designated host server to contact.The Authorizer successfully completed a power-on reset.The Authorizer is restarting after power-on.The Authorizer is ready but it is not connected to a network device. This would benormal for a remote modem connection.The Authorizer is ready <strong>and</strong> connected to a network device.The key has been programmed <strong>and</strong> is ready to use.The Authorizer has determined that this key has a low battery.The PIN input does not match the expected PIN for the key.The database identifier between the Authorizer <strong>and</strong> the key do not match.Keyport was unable to communicate <strong>with</strong> the key.No response from the CAW server when Authorizer attempted to contact it.The Authorizer is attempting to contact the CAW server. Typically this occurs to getinformation to program a key that is not in the Authorizer's key record database.This message is displayed when the server has instructed the Authorizer to erase oneof its databases; schedules, key records, holidays, etc.The server has temporarily disabled the keyport during an update. This temporarilyprevents a key from being processed.The Authorizer's clock has stopped, typically because of an extended power loss. Itwill continue to display this message when a key is inserted into the keyport until theserver updates the Authorizer's clock.The Authorizer has reached the number of times it will allow retrying a PIN.Displayed during the process of updating Authorizer firmware.Displayed during the process of updating Authorizer firmware.The Authorizer is prompting for a security code.The security code does not match the one the Authorizer is expecting.


Authorizer Modem MessagesTopMessageDIAL MODEMINIT MODEMHANGUPMODEMCONNECTRINGNO CARRIERMODEM ERRORNO DIAL TONEDescriptionAuthorizer is attempting to connect <strong>with</strong> another Authorizer.Authorizer is loading the modem from its stored configuration.Authorizer is terminating its modem connection.Authorizer has established a modem connection <strong>with</strong> another Authorizer.The Authorizer being called displays this message.Connection dropped by remote.Internal error. Possible hardware or configuration problem.No phone line detected when attempting to dial out.Keyport Messages Generated by CyberAudit-WebTopMessagePLS WAITCOMMFAILLOOKUPUNKNOWNKEYISSUE#ISSUE#ORMISSION#BAD ISSUE#JOB# ORLOGIN #BAD JOB#NEW LOCKLOGIN #CANT ADDNEW LOCKPIN#BAD PIN#DISABLEDCLEARINGDescriptionA short period of time is expected after removing a key to allow the processing of thekey's events from an Authorizer. The server will also display this message whileissuing or missioning a key, or gathering status information.This message will be displayed by the server if an exceptional error occurred while theserver programs a key.The server is determining if the key is known to the system <strong>and</strong> if it should be issued,missioned, <strong>and</strong>/or dynamically programmed.The server has not found the key ID in the database but has found the key's DB flag isset. This indicates that the key belongs to another database <strong>and</strong> is rejected by theserver.The server is prompting the user to input an issue number for this key.The server is prompting the user to input an issue number or a mission number forthis key.The server has determined that the number input does not match any numbers in thedatabase.The server is prompting the user to input a job number or an administrator's loginnumber for a Programmer or Gr<strong>and</strong> Master.The server has determined that the number input does not match any JOB#s orLOGIN#s in the database.A Gr<strong>and</strong> Master contains newly programmed lock records <strong>and</strong> requires a login # toadd them.The login number entered does not have permission to add new locks.If a PIN is required to program this key, the server will prompt <strong>with</strong> this message.The server has determined that the PIN input does not match the expected PIN for thekey.The server has determined that this key has an active mission or is a deleted key. Inboth cases, the server disables the key prior to re-issuing.The key is zeroing the audit trail events <strong>and</strong> preparing to accept a configuration.


READINGWRITINGKEYREADYINSERT KEYLOW BATTNOREADINGDB FLAGERROROLD KEYREMOVEKEYDISABLEDCAN NOTPROGRAMThe server will display this message while gathering information for programming thiskey.This message is displayed while the key's new configuration is being written to it.The key has been configured <strong>and</strong> is ready to use.The server will prompt <strong>with</strong> this message in response to a 2 digit input requesting anID(55#) or battery voltage check(66#).The server has determined that this key has a low battery.The server can not read the battery voltage of this key.The server was unable to check the database flag for this key.The server has determined that this key has firmware too old to be used byCyberAudit-Web.The server has determined that this key was designated as lost <strong>and</strong> is now disabled.The server has determined that this key can not be programmed for one of severalreasons.The person may not have permission to add keys.If the key currently has an active mission, it would need to be completed firstbefore reissuing.This key may not have the required firmware to support configuring locks,downloading locks, or multiple access.HUB BUSYDOWNLOADDATABUSYUPDATINGREADY #The server is busy gathering status information from an Authorizer.The server is downloading <strong>and</strong> processing events from an Authorizer, including datadownloaded from CyberKeys.The server is writing instructions to an Authorizer.Indicates the server has completed its current job <strong>and</strong> is ready for new input oranother key.


Key Records in AuthorizersAll Authorizers may optionally store key records in their memory. This allows the Authorizer toprogram the CyberKey <strong>with</strong> its set of expiration <strong>and</strong> access permissions regardless of whetherCyberAudit-Web is available on the network. These "cached" records enable the Authorizer toprogram the key very quickly.If a key record is not stored locally, the Authorizer will contact CyberAudit-Web for instructionswhen a CyberKey is inserted into the Authorizer's keyport. With network connections,Authorizers can normally contact CyberAudit-Web quickly <strong>and</strong> program the key in a fewseconds. For Remote Modem LAN Authorizers, however, the process of dialing the modem<strong>and</strong> communicating <strong>with</strong> CyberAudit-Web will take noticably longer. In these cases, it is betterto "pre-load" the key records in the Authorizer so the key holder does not experience the longwait times.A memory calculator at the bottom of the page computes <strong>and</strong> displays the percent of LANAuthorizer memory.


Vaults


CyberKey VaultsVault 20 FXSingle Key VaultFlex System Weatherized Vault


Granting Access to CyberKey VaultsPermission to check out or return a CyberKey to a Vault must be explicitly granted to a personthrough the Access MatrixAfter one or more Vaults have been added to the system, they become available to grant accessto them.Grant access to Vaults by first selecting Show in Matrix from the list page click menu for the SingleKey Vault or the Flex System Hub.A filtered Access Matrix will appear. Click cellsin the Matrix to grant access one-by-one orselect Bulk Schedule Change to grant or revokeaccess in bulk.


Power Over Ethernet (POE) for VaultsPower may be supplied to CyberKey Vaults via Power Over Ethernet (POE) using the IEEE802.3af industry st<strong>and</strong>ard. The following chart shows the pinouts.IEEE 802.3afusing datapairsIEEE 802.3afusing sparepairsPin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8RXDC+RXDC+TXDCsparespareTXDCsparespareRX RX TX DC+ DC+ TX DC- DC-* Note: <strong>Inc</strong>onsistent implementation of the 802.3af specification using data pairs may preventVaults from recognizing available power. In general POE over spare pairs will have fewerinconsistencies.In addition, a splitter made or endorsed by the manufacturer of the POE device may be a morereliable alternative to deliver st<strong>and</strong>ard power to the Vault.


Email Notification Settings for CyberKeys Not ReturnedAn email notification may be sent to one or more recipients when a CyberKey is not returned to thesystem after checking it out from a Vault. A "TO" email address must be provided as well as theamount of time elapsed after the key expires. The actual key expiration date <strong>and</strong> time is calculatedfrom the expiration rules of the card holder.Email SettingsNote: - A valid email server must be identified in the Email Setup page for this feature to be used.


Email Notification Settings for Vault <strong>Door</strong> OpenAn email notification may be sent to one or more recipients when the door on a Single Key Vault,Vault 20, or Weatherized Vault is left open beyond a certain amount of time. A "TO" email addressmust be provided as well as the amount of time elapsed that the Vault has been opened.Note: - A valid email server must be identified in the Email Setup page for this feature to be used.


Vault 20 FX


Vault 20 FX OverviewThe CyberKey Vault 20 FX is a dynamic key management device supporting <strong>and</strong> dispensingup to 20 CyberKeys. It requires an authorized RFID access card or a valid mission entered atits KeyPad Display before it will program <strong>and</strong> release a CyberKey. Once the key has beenprogrammed <strong>with</strong> the user's access permissions it will flash, signaling the user to remove thekey from the Vault. The remaining keys stay locked in the Vault in an unprogrammed state.Additional Topics:Vault 20 FX Demo ModeSetting Up <strong>and</strong> Configuring a Vault 20 FXProgramming a Vault 20 FX from a USB flash driveVault 20 FX Power RequirementsPower Over Ethernet for VaultsFlex System Hub ListVault 20 FX PropertiesPush Notification PortGranting Access to VaultsValid Keys for Vault 20 FXFlex System Audit Trail EventsFlex System Display MessagesFlex System Special Key Inputs


Vault 20 FX PropertiesGeneralName - The name assigned to the Vault 20 FX. This name appears in the Access Matrixfor the purpose of granting access to any connected Weatherized Vaults.ID - The serial number of the hub assigned at the factory. Flex System Hub IDs have theformat OXXXXXXXX. The serial number ID must be <strong>manual</strong>ly entered when adding theVault 20 FX.


Firmware - Indicates the version number of the software running in the hub. This field willdisplay only after CyberAudit-Web communicates <strong>with</strong> the hub <strong>and</strong> captures thisinformation.Demo Mode - Check this box as the first step to setting the Vault 20 FX hub into demomodeUpdate Frequency - By default a Vault 20 FX checks in for updates <strong>with</strong> CyberAudit-Webonce every 30 seconds. In some cases where there is a per-byte cost of datatransmission, it may be desirable to reduce the frequency of check-in. CyberAudit-Webdoes attempt to make an immediate TCP/IP connection <strong>with</strong> the Vault 20 FX when anupdate is pending for the hub. If the connection attempt is successful, the Vault 20 FX willimmediately synchronize <strong>with</strong> CyberAudit-Web rather than waiting for the next check-intime. However if it is not possible to make that connection, the administrator should beaware that any pending updates the hub affecting configuration or access permissionsmay be delayed until the hub successfully checks in <strong>with</strong> CyberAudit-Web.Alarm if open longer than - If the door on the Vault 20 FX is left open for longer than thespecified time it will cause the beeper in its RFID <strong>module</strong> to beep repeatedly as a warningto close the door.NetworkingCyberAudit-Web Server Address - The IP address or domain name of theCyberAudit-Web server. If the subsystem preference will be used, the checkbox will bechecked.Automatic (DHCP) / Manual - Choose the settings appropriate to the subnet where thehub will be installed.Push Notification Port - The network port on the Flex System hub that listens for aTCP/IP signal from the CyberAudit-Web server. This signal tells the hub to immediatelycontact CyberAudit-Web for instructions.Proxy - Many larger networks require web browsing to be routed through a proxy server toreach the Internet. Because the Vault 20 FX is fundamentally a web client, its web trafficmust also be routed through the proxy. If a proxy server is required, its information must beentered here.Note: Once a CyberKey Vault 20 FX has been added <strong>and</strong> configured, changes to theProxy settings may only be updated by programming its hub from a USB flash drive.


Open Vault - There may be occasions where the Vault 20 FX may need to be opened tointroduce CyberKeys or to remove one that does not belong to that Vault. In thesecircumstances the Vault may be opened either by a specific RFID access card, a specificinput number, or both. Using this method, the Vault 20 FX does not program a CyberKey sowhen the key is removed it has no access permissions. For the Vault 20 FX this input willopen the door <strong>and</strong> open one the key retainer in the upper left of the cabinet. If there is aCyberKey present in that retainer it may be removed. Each subsequent scan or keypad inputwill open the next retainer moving from left to right. To remove an invalid CyberKey, enter 88#after the door is open. To add a key just insert one into any available key retainer.Click the Scan card button to use any card reader in the system to capture the ID from anRFID card. CyberAudit-Web will automatically capture the ID <strong>and</strong> save it if the card is notalready issued to someone in the system.


Power Requirements for Vault 20 FXThe CyberKey Vault 20 FX is designed to receive primary power from a 12 volt DC, centerpositive, power supply transformed from 110-220V AC power. It will require 1AMP minimum.The Vault 20 FX manufacturer offers both 110V <strong>and</strong> 220V power transformers.In addition, two backup power sources may be employed.Battery - The Vault 20 FX is designed to use a HR 1221W F2 Sealed Lead-Acid battery.Battery output is 12 volts, 4 Amp/Hours. On its own <strong>with</strong>out POE the fully charged batterycan typically provide operational power to the Vault 20 FX for 5 hours or more <strong>with</strong> typicaluse. When primary power is restored, it will recharge the battery at a rate of approximately10% of capacity. At that rate, a Vault 20 FX that has run on battery power forapproximately 2½ hours will return to fully charged <strong>with</strong>in 5 hours after transformer poweris restored.Power Over Ethernet - POE may be used as a source of trickle charge to extend thebattery life while it is providing power to the Vault 20 FX. With moderate use (issuing up to100 keys per day), <strong>and</strong> a battery in good condition POE can keep the cabinet batterycharged enough to power the cabinet for several days. This is not, however,recommended as a source of power long term.Note: Although the Vault 20 FX hub has a Molex® Mini Jr Series connector for a backupbattery, that connector should not be used when the hub is installed in a Vault 20 FX becausethe hub does not supply power to either the main power board or the key retainer <strong>module</strong>s ofthe Vault.


Setting Up <strong>and</strong> Configuring a Vault 20 FXItems required:A CyberKey to open theCyberLock on the Display/CardReader panel of the Vault 20 FX.The USB Memory stick that came<strong>with</strong> the CyberKey Vault 20 FXpackageThe Vault 20 FX Serial NumberLabel card.Note: A CyberKey Vault 20 may be set up <strong>and</strong> configured <strong>with</strong> CyberAudit-Web either beforeor after mounting (see V20 Mounting Instructions.pdf).


Steps:PowerConnect power <strong>and</strong> Ethernet.EthernetWhen the vault starts up it will be in demo mode. If there are already CyberKeys in the cabinet, scan anRFID card or enter 4 or more digits on the Keypad. The Vault 20 FX will select a key <strong>and</strong> release it.Repeat the process for each key until all are removed. When all the keys have been removed from theVault, close the door.


Since the Vault 20 FX is fundamentally a FlexSystem Device it is added to the system as aFlex System hub. From the Communicatorsmenu, open the Flex Hubs list page.Clickto add a new hub.


In the Add new Flex Hub page,Enter a name for the Vault 20 FX.Enter its serial number from the Vault 20 FX Serial Number Label card into the ID field.Update network settings as appropriate. The Vault 20 is a web client <strong>and</strong> will attempt to reachCyberAudit-Web via https. Ensure that the networking settings are correct so that the Vault 20 FXcan reach CyberAudit-Web from the subnet where it will be installed. The Push Notification Portas well as Key Programming <strong>and</strong> Open Vault setttings may be entered now or later <strong>and</strong> may bechanged at any time. The settings in the Vault 20 FX will be automatically updated as long as itmaintains its network connection to CyberAudit-Web.Click Save to save the new Vault 20 FX record.


Insert the USB Memory Stick into the localcomputer which is logged in toCyberAudit-Web.The Vault 20 FX may now be connected to the network <strong>and</strong> programmed from USB.Go to the Locks page <strong>and</strong> add the Lock ID,again referring to the Vault 20 FX SerialNumber Label card. Refer to the Vault 20 FXwhen naming the lock.


Programming a Vault 20 FX from a USB flash driveThis process requires the use ofthe USB flash drive packaged<strong>with</strong> the Vault 20 FX or anequivalent unencrypted USBdrive.Once the Flex System hub has been added to the system it may be programmed <strong>with</strong> a USBflash drive.1. Click on theLaunchCyberTransfer linkfrom the FlexSystem Hubslisting page.2. With theCyberTransferapplication started,insert the USBflash drive.CyberTransfer willdetect it an add itto its list ofavailable drives.


3. Click Go.CyberTransfer willpull any availableFlex Hub data filesfrom the drive <strong>and</strong>upload them toCyberAudit-Web<strong>and</strong> then willdownloadprogramminginstructions for allFlex Hubs in thesystem <strong>with</strong>change icons.4. WhenCyberTransfer hascompleted,unmount <strong>and</strong>remove the USBdrive.


5. Open the frontpanel of the Vault20 FX <strong>and</strong> set itaside.


6. With powerapplied to theVault 20 FX, insertthe USB flashdrive. The USBLED on the hubwill flash briefly.When the LED issteady on, removethe drive. The hubhas now receivedits configuration<strong>and</strong> will attempt toconnect toCyberAudit-Webas indicated by aflashing CAWLED. Whenconnection hasbeen established,the CAW LEDremains steady on.


7. Return the frontpanel to the Vault20 FX.


Push Notification PortBoth Flex System Hubs <strong>and</strong> Web Authorizers periodically contact CyberAudit-Web to reporttheir status <strong>and</strong> fetch updates. By default that occurs once every 30 seconds. In addition,CyberAudit-Web attempts to notify a hub using TCP/IP on port 80 when it has an update forthat hub. This "push notification" causes the hub to contact CyberAudit-Web immediatelyrather than wait for its normal check-in time. If desired, port 80 may be changed to anothervalue on a hub-by-hub basis using the Push Notification Port setting in the hub propertiespage. The result of this notification is that online hubs can get instructions to update key ,vault, <strong>and</strong> door records in nearly real time.In cases where TCP/IP traffic is routed in both directions between CyberAudit-Web <strong>and</strong> theFlex System hub or Web Authorizer, push notifications will occur automatically. In some casesthe hub may not be on the same network as CyberAudit-Web. An example of this is whenCyberAudit-Web is being served on the Internet <strong>and</strong> the hub is behind a NAT router. ThePush Notification Port enables the use of port forwarding on the router to direct thosenotifications to hubs in the local network.


Valid Keys for Vault 20 FXThe CyberKey Vault 20 FX enables people to check out a CyberKey programmed <strong>with</strong> amission. Flex System hub, including the Vault 20 FX, keeps a list of "valid" CyberKeys it maystore in its Vault(s) for issuing missions. That list comes from CyberAudit-Web. If a CyberKeyis not a member of that list, that key may not be used.There are two ways to assign CyberKeys to a Vault 20 FX;Manual Assignments - The list of valid CyberKeys may be edited by selecting KeyInventory from the Flex Hub listing page click menu. CyberKey serial number IDs may beindividually added to or removed from the list. The number of Key IDs is limited to thenumber of key sockets in the Vault 20 FX (20).Automatic Assignments - If an unknown CyberKey is inserted in a Vault 20 FX, the Vaultsees it as an invalid key <strong>and</strong> reports it to CyberAudit-Web. CyberAudit-Web willautomatically add the CyberKey ID to the list of valid keys if:


The key ID is not issued to another personThe key ID is not associated <strong>with</strong> another Flex Hub or VaultThe CyberKey is not a Gr<strong>and</strong> Master CyberKey or CyberLock ProgrammerThe CyberKey is a rechargeable CyberKey (excluding CyberKey Blue)The number of CyberKeys assigned to the hub is less than the number of totalavailable key socketsIf an invalid CyberKey is inserted into a Vault 20 FX, scan an RFID access card, enter amission or the Open Vault inputto open the vault door then enter 88# at the keypad to release<strong>and</strong> remove the invalid key.The Vault 20 FX Key Inventory page displays an editable list of CyberKey serial numbersassigned to the Vault. It also displays a list of the CyberKeys currently checked out <strong>and</strong> a listof any invalid CyberKeys inserted into the Vault.


Vault 20 FX Demo ModeUntil it has been paired <strong>with</strong> a CyberAudit?Web system, the Vault 20 FX will boot into demomode when power is connected to the cabinet. This allows for verification <strong>and</strong> demonstrationof basic system operation.Entering Demo ModeConnect power to the cabinet. The display will briefly show the <strong>Videx</strong> logo, thenthe word "READY" for about 15 seconds.At this point, the Vault is ready for demonstration. If no action is taken, the displaywill show the <strong>Videx</strong> logo again, then go black after about 20 seconds.Inserting KeysNote:The Vault 20 FX accepts CK-RXD CyberKeys.Scan an RFID card or enter four or more digits on the keypad, followed by #. Thecabinet will beep <strong>and</strong> release the door latch. The keypad display will show a mapof the key locations inside the cabinet. The letter o represents an open socket.Open the door.Insert a key into any open socket. The display will briefly show DOWNLOAD KEY. . .. . . <strong>and</strong> then KEY IN.Repeat Step 3 for each key, until all keys have been inserted.Close the door. The display will showREADY, then go black after 20 seconds.Note: If the door is held open for longer than 1 minute, the light in the center of the RFID reader <strong>module</strong>will change from green to red, <strong>and</strong> the cabinet will begin to beep. This is the "<strong>Door</strong> Open" alarm. Tosilence it, close the door.


Removing KeysScan an RFID card or enter four or more digits on the keypad, followed by #. Thecabinet will beep <strong>and</strong> release the door latch. The keypad display will show a mapof the key locations inside the cabinet represented by the letter v. The letter orepresents an open socket, <strong>and</strong> the letter X represents the key which has beenreleased for removal.Open the door. The key indicated by the letter X will be flashing.Remove the key. The display will show KEY OUT.Close the door. The display will showREADY, then go black after 20 seconds.Number Code FunctionsEntering a 2-digit code on the keypad, followed by the # key, will cause the cabinet to performvarious functions which are a subset of those available in Normal Mode. These functions areas follows:11#: displays the serial number of the Vault 20 FX, minus the leading O.22#: causes the Vault 20 FX to contact its CyberAudit-Web server. If successful,it displays "ONLINE!". Otherwise, it displays an error message indicating thecause of the failure.33#: displays the date <strong>and</strong> time from the Vaults clock.44#: not used in demo mode55#: not used in demo mode66#: not used in demo mode77#: not used in demo mode88#: unlatches the Vault door. The display shows the key map.


99#: not used in demo mode00#: exits whatever mode the system was in <strong>and</strong> returns to normal operation.The display shows "READY".


CyberKey Vault 1


Single CyberKey VaultsThis page lists the Single CyberKey Vaults in the system <strong>and</strong> enables adding, configuring, <strong>and</strong>managing them.Table Fields:Present - The present icon, , indicates that a Vault has communicated <strong>with</strong>CyberAudit-Web <strong>with</strong>in the last minute.Change icon - If the system has information for the vault but the vault has not yet beenupdated, a icon appears in the column.Name - The name associated <strong>with</strong> the vault.Serial or Issue # - The serial number or issue number assigned to the vault.Last Contact - The last time the server <strong>and</strong> vault communicated successfully.Key - Displays the name of the key currently docked at the vault.- Displays if the docked key is valid for the vault <strong>and</strong> if not.Battery Level - Displays the current battery level of the docked key.<strong>Door</strong> - If the vault door is open, is displayed. means the door is closed.Operations:- Click this button to create a printable report for the current list.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays editable details of the selected vault.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selectedVault to to display the tags <strong>and</strong> people who have access.Audit Report - Generates an audit trail logged for the vault.


Notification - Enables setting up an email notification to send to one or more emailaddresses informing that the CyberKey has expired but has not been returned to theVault.Delete - Removes the Vault from the system after confirmation.Additional Links:About Single CyberKey VaultsAdding a Single CyberKey VaultSingle CyberKey Vault Audit Trail EventsSingle CyberKey Vault LEDsSingle CyberKey Vault TonesMiscellaneous Notes about Single CyberKey VaultsUsing CyberLink as an RFID Card ReaderUsing Power Over Ethernet (POE) <strong>with</strong> VaultsValid Keys for Single CyberKey Vaults


Single CyberKey Vault PropertiesName - The descriptive name or location of the Single CyberKey Vault. This name will beused to cross reference the Vault when running Audit Trails on a person <strong>with</strong> an RFID AccessCard.ID - The serial number identifier of the Vault.Valid Vault Key - This property determines which CyberKeys will be valid to use in the Vault.There are two choices that determine a valid key:1.2.Same - key must be returned to the same vault. This setting might be chosen whenThere is only one Vault in a location <strong>and</strong> you want some assurance that when a keyis checked out of the Vault it will be returned to the same Vault.The Vault holds a ring of one or more mechanical keys <strong>and</strong> the Vault has beennamed to indicate the Key Ring it holds.In Same mode, only one CyberKey is considered 'valid'.Shared - key may be returned to any Vault. This setting might be chosen whenThere are multiple Vaults in the same general location <strong>and</strong> it doesn't matter whichVault gets the returned key.


2.Email Notification for CyberKeys Not Returned - CyberAudit-Web can send an email to notifyone or more recipients that a CyberKey checked out from the Vault has not been returned.Networking - A Vault must be configured for network settings. Since the Vault is a web client,it must get an address or DNS name to contact CyberAudit-Web.By default it will attempt to get its networking configuration from a DHCP server. If a <strong>manual</strong>configuration is needed, that may be entered after selecting the "Manual:" option.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selected Vaultto to display the tags <strong>and</strong> people who have access.Audit Report - Generates an audit trail logged for the vault.Notification - Enables setting up an email notification to send to one or more emailaddresses informing that the CyberKey has expired but has not been returned to the Vault.Delete - Removes the Vault from the system after confirmation.


Single CyberKey Vault Audit TrailsA set of logs is kept by CyberAudit-Web in response to certain events. Use this log for trackingcheck-out <strong>and</strong> check-inof the key, activities, <strong>and</strong> troubleshooting. It is available for each Vaultfrom the drop-down menu in the Vaults page.Event<strong>Door</strong> Status Events601 <strong>Door</strong> opened602 <strong>Door</strong> closedEvents working <strong>with</strong> theCyberKeyDescription624 Valid key detected <strong>Inc</strong>ludes name or serial number of the CyberKey.608 PIN required609Error - Key is from adifferent system614 Key type mismatch623Key is not valid forVaultThe card holder requires a PIN for validation <strong>and</strong> no PIN bypass has beenset. Therefore the Vault cannot issue the key.The detected CyberKey is not valid because it is not a member of thecurrent database <strong>and</strong> its database flag is set.The detected CyberKey is not valid because it is a CyberLock Programmer,Gr<strong>and</strong> Master, or it does not support the minimum set of features becausethe key is an early model CyberKey.The detected CyberKey failed the validity test.607 Key disabled All access permissions have been removed from the key.606 Key configured A configuration has been sent to the key.605 Key readyThe CyberKey has been programmed <strong>and</strong> confirmed. The Ready LED isflashing. The key is ready for use.625 Comm error <strong>with</strong> key The data column contains the error number.628 Low battery629Key does not respondto communications604 Key removedEvents about the RFIDAccess Card630631621611Access approved forcard <strong>with</strong> no keypresent in VaultAccess approved forcard <strong>with</strong> invalid keypresent in VaultAccess approved forcard <strong>with</strong> key presentin VaultNo mission has beenassigned to the cardThe battery level of the CyberKey in the Vault is low. If the key has areplaceable battery it should be changed. If the key has a rechargeablebattery the Charging LED should be on.This could occur if the key's battery is too low to support communications.This allows the card holder to open the door <strong>and</strong> insert a CyberKey.This allows the card holder to remove the invalid key.The Vault was holding a valid key when the RFID Access card waspresented. CyberAudit-Web then proceeded to program the CyberKey.No mission has been assigned to the card <strong>and</strong> the Vault properties requirea card mission to program the key <strong>and</strong> grant access.


612 Mission denied706707Card access denied -Mission expiredKey Ring in vault doesnot match the missionKey RingAn otherwise good mission was denied because the card holder alreadyhas an active mission <strong>and</strong> subsystem rules prohibit having more than oneactive mission at a time.The mission template associated <strong>with</strong> the RFID access card is past its FinalEnd Date <strong>and</strong> may no longer be used to check out a mission.The CyberKey in the Vault does not have the same serial number as theKey Ring requested by the mission template of the RFID card or the statictemplate of the Vault.615 Unknown card The RFID Access card was not found in the system.616617618619RFID cards aredisabled for thesubsystemDuplicate ID found<strong>with</strong> a different cardCard access denied -no permission to vaultOut of schedule forVaultEvents about the Vault<strong>and</strong> networkcommunicationsThe subsystem must permit the use of RFID cards in subsystempreferences.A duplicate ID from a card was found but the manufacturer ID or lot# did notmatch.The RFID card is recognized as a member of the system but it has nopermissions to check out the CyberKey from the Vault.The RFID card has permissions to check out the CyberKey from the Vaultbut not at this time.620 Power restored This indicates the Vault returned from a power loss or was otherwise reset.626627Connection to serverestablishedConnection to serverlost701 Vault Network Reset702Timeout on comm<strong>and</strong>confirmationOther audit trail event types:CyberKey <strong>and</strong> CyberLock audit trail eventsComm Link audit trail eventsWeb Authorizer audit trail eventsLAN Authorizer audit trail eventsFlex System audit trail eventsAudit trails for <strong>Door</strong>sIf the Vault has been online but goes off line this event will be logged byCyberAudit-Web. This event is not logged if CyberAudit-Web is restartedwhile the Vault is off line.Logs <strong>with</strong>in approximately 90 seconds of not receiving a packet from theVault.The Vault 1 reset its networking program because it was unable to connectto CyberAudit-Web.CyberAudit-Web issued a comm<strong>and</strong> to the Vault 1 but did not receiveconfirmation from the Vault that it had received that comm<strong>and</strong>.


Adding a Single CyberKey VaultFollow these steps to add a Single CyberKey Vault to the system:1. In communicatoroptions, enter the URLthat the vault will use toreach CyberAudit-Web.


2. Connect the CyberKeyVault to the computervia the USB cable. Alsoconnect the powercable.3. Open the Single KeyVaults page underCommunicators.4. Click the LaunchCyberLink link.CyberLink willautomatically add theVault to the list. Wait forCyberLink to updatenetwork settings <strong>and</strong>for the change icon toclear.


5. Click on the Vaultrecord in the list <strong>and</strong>select Properties.6. Give the Vault a name,select the appropriatesettings <strong>and</strong> networking<strong>and</strong> click Save.7. If networking requiresupdating, CyberLink willdo it <strong>with</strong>in 30 seconds.Wait for the changeicon to clear.


8. You may insert aCyberKey in the Vaultnow to associate <strong>with</strong>the Vault. Any13.56MHz RFIDAccess Card will triggerthe vault to release itsdoor latch. If the key isvalid for the Vault,CyberLink will displayKey is valid for vaultYou may now removethe keyAt this point the keyshould be removed <strong>and</strong>the Vault may bedisconnected from USB<strong>and</strong> power, mounted inplace, <strong>and</strong> connectedto the network.


Single CyberKey Vault Status Indicator Lights <strong>and</strong> TonesThe Single CyberKey Vault uses both status indicator lights <strong>and</strong> tones to indicate status <strong>and</strong>error conditions.RFIDreaderlight incenter ofpanelPowerFlashes continuously when the Vault is powered. Off when there is no power or if the RFIDunit is not functioning.Steady on when the Vault is powered <strong>and</strong> ready to use. Off when there is no power.Charging Steady on when the Vault is charging a CyberKey battery. Otherwise off.ChargeCompleteSteady on when the Vault is holding a CyberKey Rechargeable <strong>and</strong> the key's battery is at fullcharge. Otherwise off.ReadyOff when the Vault has no connection to a computer or server.Steady on <strong>with</strong> a USB connection to any computer.Steady on when the Vault establishes network connection to CyberAudit-Web in thedatabase or account to which it was added.Flashing alternately <strong>with</strong> the Busy LED when CyberAudit-Web denies access to anRFID Access Card. This sequence is repeated seven times. Denied Vault access isalso accompanied <strong>with</strong> a single low-tone. And if a valid CyberKey is present,CyberAudit-Web ensures that the key is disabled <strong>and</strong> sounds the disable tones.Flashing when the CyberKey in the Vault has been programmed <strong>and</strong> is ready for use.When the flashing starts it is accompanied by a single low-high audio tone combination<strong>and</strong> a release of the door latch.BusyOff when idleFlashing when the Vault is attempting to process the inserted CyberKey.Flashing alternately <strong>with</strong> the Ready LED when CyberAudit-Web denies access to anRFID Access Card.Flashing alternately <strong>with</strong> the Key Present LED during network communications whenCyberAudit-Web discovers the inserted CyberKey is invalid. This is accompanied <strong>with</strong>a continuous alternating high-low tone sequence.


KeyPresentOff when the Vault cannot detect a CyberKeySteady on when a CyberKey is detectedFlashing alternately <strong>with</strong> the Busy LED when CyberAudit-Web discovers an invalidkey.Note: All lights flash on simultaneously <strong>and</strong> the Vault emits a single tone when it successfullyreads an RFID Access Card.


1.2.What is a "Valid" CyberKey for a Single CyberKey Vault?A valid key for a Single CyberKey Vault is one that is allowed to be inserted while the Vault ison line <strong>with</strong> CyberAudit-Web. If a CyberKey is found to be "Invalid", CyberAudit-Web willcause the Vault to siren <strong>with</strong> alternating high-low tones <strong>and</strong> alternately flash the Busy <strong>and</strong> KeyPresent LEDs.Vault property settings include two choices that determine a valid key:Same - key must be returned to the same Vault. This setting might be chosen whenThere is only one Vault in a location <strong>and</strong> you want some assurance that when a keyis checked out of the Vault it will be returned to the same Vault.The vault holds a ring of one or more mechanical keys <strong>and</strong> you have labeled theVault to indicate the Key Ring it holds.In Same mode, only one CyberKey is considered 'valid'.Shared - keys may be returned to any Vault. This setting might be chosen whenThere are multiple Vaults in the same general location <strong>and</strong> it doesn't matter whichVault gets the returned key.Additional notes:Each card swipe is treated as a separate transaction <strong>and</strong> completely processed before thenext card swipe is processed.CyberAudit-Web will ensure that a Vault's CyberKey is disabled following any RFID accesscard scan where the card does not have permissions to get the key.Vaults do not program invalid keys, even when the keys are known by the system. Forexample if Joe Brown has an issued CyberKey, the Vault will not download <strong>and</strong> update it.


Single CyberKey Vault TonesTone/SignalLow tone three times per five secondscontinuously until the door is closed.A high-low tone combination once persecond continuously.This is combined <strong>with</strong> alternatingflashes of the Busy <strong>and</strong> Key PresentLEDs.A single quick low-high tonesequence.This is combined <strong>with</strong> a flashingReady LED.A single quick low-high-low tonesequence.This is combined <strong>with</strong> eight alternatingflashes of the Busy <strong>and</strong> Ready LEDsA single low tone.StatusThe Vault door has been left open toolong. By default this time is 30seconds but is adjustable incommunicator options.CyberAudit-Web has detected that theVault is holding an invalid key.The CyberKey in the vault has beenprogrammed <strong>and</strong> is ready for use.CyberAudit-Web has disabled theCyberKey in the Vault.If a valid CyberKey is present in theVault, CyberAudit-Web will alsoensure the Key has been disabled<strong>with</strong> the accompanying tones <strong>and</strong>flashes.CyberAudit-Web has denied access toan RFID Access card.Miscellaneous Notes about Single CyberKey Vaults


Miscellaneous Notes about Single CyberKey VaultsHow to release the door latch on a Vault.The vault will release the latch on the door under these circumstances:1. The latch will always release for 5 to 10 seconds after powering up.2. When the unit is new, it will open from successfully scanning any RFID access card.3. When the unit goes online <strong>and</strong> connects to CyberAudit-Web over the network,CyberAudit-Web sets the unit in secure mode. In that mode, the Vault will only openwhen CyberAudit-Web sends it an instruction to open based on these rules:A valid CyberKey is present in the vault - Only cards authorized for the vault<strong>and</strong> are entitled to check out the mission will get access. For example a card<strong>with</strong> a mission may not get access if the card holder already has anothermission checked out <strong>and</strong> would violate the rule of 'one mission at a time' insubsystem preferences.An invalid CyberKey is present in the vault or no CyberKey is present in thevault - The cabinet will open to any card that is in the CyberAudit-Webdatabase.If an invalid card is presented, CyberAudit-Web will ensure that the key has been disabled<strong>and</strong> will instruct the Vault to emit a single low tone card denied beep ahead of thelow-high-low key key disabled tone set.CyberAudit-Web h<strong>and</strong>les each card swipe as a separate transaction <strong>and</strong> completelyprocesses one swipe before the next card swipe is processed. Card swipes are ignoredwhile CyberAudit-Web is processing the Vault's CyberKey.The Vault operates in either USB mode or Network mode. USB mode is only for setting upthe Vault <strong>and</strong> using the Vault <strong>with</strong> CyberLink as a scanner for RFID Access Cards. Whenboth power <strong>and</strong> USB are connected the Vault operates in USB mode. Power <strong>and</strong> Ethernetmust be connected <strong>with</strong>out USB to enable full Vault functionality.The Vault may be powered using Power Over Ethernet (POE).


System KeysSystem Keys have special capabilities <strong>with</strong>in CyberAudit-Web.Gr<strong>and</strong> Master CyberKey - May be used to open any lock in the system, program anyunprogrammed CyberLock <strong>with</strong> a selected set of access codes, configuring programmed locksusing a programming job <strong>and</strong> generate emergency keys.CyberLock Programmer - Used to program or download locks using a programming job.USB Programmer - Connects to a USB port on a PC <strong>and</strong> used to program or download locksusing a programming job.Subsystem Reset Key - Uses a subsystem code to reset any CyberLock programmed <strong>with</strong>that code.


System KeysSystem keys are a special class of CyberKey used for specific tasks in a CyberLock system. Theyconsist of Gr<strong>and</strong> Master Keys, CyberLock Programmers, <strong>and</strong> USB Programmers. This pageenables defining <strong>and</strong> managing these keys.In addition, systems created by <strong>manual</strong>ly entering passwords for the CyberLock access codes mayalso create a reset key.Table Fields:Name - The name or descriptor of the system key.Serial or Issue # - The identifier of the system key. A serial number will start <strong>with</strong> a 'K'. Issuenumbers are 8 digits.Change Status - If the system has information for the system key but the key has not yet beenupdated, a yellow 'C' icon appears in the column.Base GM - Systems whose CyberLock access codes originate from a Gr<strong>and</strong> Master willdisplay one of the Gr<strong>and</strong> Master records <strong>with</strong> an anchor icon ( ). This indicates that the Gr<strong>and</strong>Master was the source of those access codes.Type - Gr<strong>and</strong> Master, Programmer, or Reset (for systems whose CyberLock access codesoriginate from <strong>manual</strong>ly entered passwords)Operations:New - Click to add a new system key.- Creates a printable list of the system keys.Clicking in a row in the list of system keys will display a drop-down menu of options that includes:Properties - Displays the details of the selected system key.Audit Trail - Generates an audit trail report associated <strong>with</strong> the system key.


Comm Log - Generates a report of key status logged by communicators when the systemkey is downloaded.Lost - Initiates the steps to mark a system key as . lostDelete - Removes the selected system key after confirmation.


Gr<strong>and</strong> MastersThe Gr<strong>and</strong> Master CyberKey is a key <strong>with</strong> multiple functionality. Each Gr<strong>and</strong>Master contains unique, pre-programmed encrypted codes which mayoptionally be used to program locks <strong>and</strong> keys.When used <strong>with</strong> CyberAudit-Web Professional, this key may be used in one oftwo ways:1.2.As an enhanced CyberLock Programmer that can also programlocks <strong>with</strong> one touchTo open locks <strong>and</strong> generate emergency keys. Emergency keys willopen any lock <strong>with</strong> the same system. Those keys will then expire after aspecified duration of time.


AnchorThe Anchor icon,for the subsystem., indicates that this Gr<strong>and</strong> Master is the original source of the Access Codes


CyberLock ProgrammerThe CyberLock Programmer is a device that is used to program <strong>and</strong> downloadCyberLocks in conjunction <strong>with</strong> the Professional <strong>and</strong> Enterprise softwaresolutions. The Programmer case is made of a durable nylon-based plastic. Anindicator light shows battery power <strong>and</strong> activation. A speaker makes tonesindicating communication <strong>and</strong> programming status. Although the Programmerresembles a key, it will not open a CyberLock.Once programmed, the Programmer's memory contains the needed encryptedaccess codes, a list of locks to program, <strong>and</strong> the programming instructions forthose locks.The CyberLock Programmer is also used to download the audit trail from alock.


USB ProgrammersThe USB Programmer is a USB device which provides the ability to exchange information betweena CyberLock <strong>and</strong> CyberAudit-Web Professional or CyberAudit-Web Enterprise. In addition, it canload a programming job to download or program CyberLocks for use when the computer will beoffline. The resulting data may be uploaded to CyberAudit-Web later when the computer is backonline.Specifically, the USB Programmer can do the following:1.2.3.Add a new, unprogrammed lock to CyberAudit-Web. (requires permissions through a login <strong>and</strong>password)Program locks that require it either online or through a programming job.Download audit data from locks that are part of the current system via a programming job.Unlike <strong>with</strong> CyberLock Programmers, Gr<strong>and</strong> Master CyberKeys, <strong>and</strong> CyberKeys, the number oflock downloads that may be done is not limited by the memory of a CyberKey.The USB Programmer cannot open CyberLocks.


Reset KeyA reset key is available for systems created by <strong>manual</strong>ly entering passwords for the lock accesscodes. When a reset key touches a lock in its system it clears the access codes <strong>and</strong> configurationsfrom the lock thereby resetting it to the original (unprogrammed) factory configuration. It does not,however, remove its audit trail data.A reset key can be made from any st<strong>and</strong>ard CyberKey.Because of its ability to open any lock in the system <strong>and</strong> clear the access codes, a reset keyshould be kept in a secure location.


Adding <strong>and</strong> Editing System KeysAdd a new System Key ( Gr<strong>and</strong> Master or reset key) by issue number or <strong>manual</strong>ly enter the serialnumber <strong>and</strong> assign it a meaningful name.In addition, Gr<strong>and</strong> Masters can be set to open locks <strong>and</strong> program emergency keys that will openany lock for the specified time. They can also be set to program locks <strong>with</strong> one touch whereas aProgrammer key must touch the lock, be updated <strong>with</strong> the software, <strong>and</strong> touch the lock once againto finish programming it.When editing a system key that has already been entered in the system, the replace operationenables issuing a system key <strong>with</strong> the same settings as the previous one.


Steps to Add System KeysSubsystem keys include Reset keys, Gr<strong>and</strong> Master keys, CyberLock Programmers, <strong>and</strong> USBProgrammers.1. Choose "System Keys"from the "Keys" menu.2. Click the New button.3. Choose to add a newsystem key by issue orserial number <strong>and</strong>enter a name for thekey.


4. Select the type of System Key. Choices are Gr<strong>and</strong> Master, Programmer, <strong>and</strong> Reset. If Gr<strong>and</strong> Master is selectedselect its function between programming locks or opening locks <strong>and</strong> generating emergency keys.5. Update the key.Update throughissue numberUpdate through<strong>manual</strong>ly enteredserial number


Gr<strong>and</strong> Master Will Open Locks <strong>and</strong> Program Emergency KeysGenerally, Gr<strong>and</strong> Masters will be used either for accessing locks, programming emergency keys,or programming locks. If the Gr<strong>and</strong> Master will be used as a Programmer, this function wouldgenerally be disabled.Gr<strong>and</strong> Masters can create emergency keys that open any locks added <strong>with</strong>in their system. Thekeys created are master keys that operate 24-7 until they expire. Valid operating times include:1 - 64 minutes1 - 24 hours1 - 127 daysFinally, Gr<strong>and</strong> Masters must be activated by contacting a CyberLock before they will program theemergency keys. After that contact, they will be active for two minutes as indicated by their LEDthat flashes every second. Programming a key restarts the two minute timer in the Gr<strong>and</strong> Master.After the 2 minutes elapse, the LED flashes once every eight seconds.


Gr<strong>and</strong> Master Will Program LocksA Gr<strong>and</strong> Master is a versatile tool that can perform a variety of functions in CyberAudit-Web. It hasall the functionality of a CyberLock Programmer because it can program <strong>and</strong> download locks. Inaddition it automatically programs any unprogrammed CyberLock <strong>with</strong> one touch. This is incontrast to CyberLock Programmers which require contacting the lock, downloading to thesoftware, then re-contacting the CyberLock.


Lost System KeysClick here for instructions concerninga lost Base Gr<strong>and</strong> Master.Follow these steps if a Gr<strong>and</strong> Master key is lost:1. Find the key in the System Keys window, click on a non-linked section of its row, <strong>and</strong> choose"Lost."2. Select the "This key is Lost" option. Check the box to automatically create a , if desired.Programming Job NumberThen choose which locks should be set as disabling points. When the key contacts one of these disabling locks,the key is denied access <strong>and</strong> becomes disabled for all of its access permissions.


3. Click the "Save" button.4. The disabling points will be displayed to confirm the selected locks will need to be updated. Click "Save" toproceed. This will cause change icons to appear for the designated locks.5. The key will be removed from the SystemKeys window <strong>and</strong> added to the Lost Keyswindow.6. Lost keys are viewed in the Lost Keyssection in the "People & Keys" drop downmenu.


7. Update the Programmer Key or Gr<strong>and</strong> Master using the Programming Job associated <strong>with</strong> the lost key.8. Touch the locks designated as disablingpoints.


9. Update the Programmer Key or Gr<strong>and</strong> Master again.10. The change icons will clear for the disabling points.11. If the key is updated, the change icon will clear on the "Lost Keys" page <strong>and</strong> the key isdisabled.


Lost Base Gr<strong>and</strong> MasterFollow these steps if a base Gr<strong>and</strong> Master key is lost:1. Find the base key inthe System Keyswindow, click on anon-linked section of itsrow, <strong>and</strong> choose "Lost."2. If the Gr<strong>and</strong> Master was lost or stolen, a new one will be required to regain control of the system. If it wasdestroyed or broken, it is no longer a threat to the system.3. Click the "Save" button.4. If the GM was lost or stolen, a new Gr<strong>and</strong> Master needs to be added to thesystem.5. Once a new GM is presented, the lost one will be moved to the "Lost Keys" list <strong>and</strong> the new base GM will beshown in system keys..


LocksThis section describes functionalities found under the Locks menu of CyberAudit-Web.


Lock PropertiesThis page displays the properties for an individual CyberLock <strong>and</strong> allows them to be edited.Serial - The unique ID of the CyberLock. This cannot be edited. The CyberLock can, however,be replaced by clicking on the link.Name - An identifier for the lock. The name selected here will also be displayed in the audit traildata downloaded from CyberKeys or downloaded from the CyberLock.Reset - Checking this box tells CyberAudit-Web that the CyberLock is to be reset. This willclear all access codes from the lock <strong>and</strong> return it to factory settings after updating it.Tag information is also displayed on this page. Use the item chooser to add or remove associationto tags. In the picture above, the A - Gate 3 lock is associated <strong>with</strong> two tags - Gates <strong>and</strong> Padlocks.Show in Matrix - Creates a filter in the Access Matrix to display the tags <strong>and</strong> people havingaccess to this lock <strong>and</strong> its associated lock tags.Audit Trail - Generates a report of audit trail data associated <strong>with</strong> the selected CyberLock.Comm Log - Generates a report of communication logs retrieved from the lock whendownloaded by a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.Delete - Removes the selected CyberLock record after confirmation.


Multi-Key Mode <strong>and</strong> Open Delay SettingsMulti-key mode <strong>and</strong> open delay are advanced settings for a CyberLock.Multi-key mode - Indicates the number of user keys that must be presented to the CyberLockto open it.Each key must be presented to the CyberLock, then the first key must be returned to open it.The keys must be presented <strong>with</strong>in a set time frame to open the lock.For 2 keys, the process must be completed <strong>with</strong>in 60 seconds.For 3 keys, the process must be completed <strong>with</strong>in 90 seconds.For 4 keys, the process must be completed <strong>with</strong>in 120 seconds.Open Delay - Indicates the amount of time the key will wait between contacting an authorizedlock <strong>and</strong> receiving authorization to open it.When the key is presented to the lock, it begins a countdown timer.While that key is counting down, it may open other non-open delay locks. Contacting anotheropen delay lock will stop the countdown for the first lock <strong>and</strong> start a new countdown.After the countdown is complete, IrDA CyberKeys will beep for up to 5 minutes to indicate theyare ready to open the lock. Previous models will beep for up to 60 seconds. After the beepingtimes out, the key will no longer open the lock <strong>and</strong> the process must be started over.Additional Notes:Master keys bypass multi-key <strong>and</strong> open delay settings in locks.Locks will accept either a multi-key mode or an open delay - not both.


Add a Lock Manually1. Click on the "New" link in the "LocksList" page.2. Enter the serial number <strong>and</strong> name of the lock. Add any that should be associated <strong>with</strong> it as well. Click thetags"Save" button when finished.


3. Place a serial number label on thecylinder <strong>and</strong> the location sheet (seeInstallation Worksheet.pdf). Write thelocation the cylinder will be installed.4. Create a Programming Job that includes the new lock(s).


5. Update the CyberLock Programmer <strong>and</strong>enter the Job Number associated <strong>with</strong>the new locks.6. Touch the locks once more to programthem into the system. Finally, updatethe Programmer Key to clear thechange icons.


To add locks <strong>with</strong> a Gr<strong>and</strong> Master:Adding Locks <strong>with</strong> a Gr<strong>and</strong> Master


1. to theAdd the Gr<strong>and</strong> MasterCyberAudit-Web system <strong>with</strong> theoption to program new locks <strong>with</strong>one touch. Place the GM key's IRport in line-of-sight to the IR Encoderor insert it into the USB Station. Ifnot already running, launch theCyberLink program. Leave the fieldblank <strong>and</strong> click 'OK' when promptedfor a job number. The CyberLinkprogram will update the Gr<strong>and</strong>Master <strong>with</strong> the access codes for thecylinders.


2. Place a serial number label on thecylinder <strong>and</strong> the location sheet. Writethe location the cylinder will beinstalled. Then touch the Gr<strong>and</strong>Master to a cylinder. It will emit abuzz. A second touch will cause theGr<strong>and</strong> Master to siren. This is anormal <strong>and</strong> expected response.3. Now, the Gr<strong>and</strong> Master contains theserial numbers of each newlyprogrammed cylinder it contacted. Ifnot still running, launch CyberLinkfrom the title bar <strong>and</strong> place the GMkey's IR port in line-of-sight to the IREncoder or insert it into the USBStation. The CyberLink program willdownload the serial numbers of allthe cylinders touched in the last stepinto the database. They will now bevisible from the Locks page <strong>with</strong>outchange icons. You are now ready torefer to the location sheet to namethe locks in CyberAudit-Web.


1. Place a serial number label on thecylinder <strong>and</strong> the location sheet. Writethe location the cylinder will be installed.Then insert the Programmer into thecylinder. It will emit a short buzz sound.Repeat this for each cylinder.Adding Locks <strong>with</strong> a CyberLock Programmer


2. Now, the Programmer contains theserial numbers of each unprogrammedcylinder it contacted. Launch CyberLinkfrom the title bar <strong>and</strong> place the key's IRport in line-of-sight to the IR Encoder orinsert it into the USB Station. CyberLinkwill download the serial numbers of allthe cylinders touched in the last step.When the download is complete, thenew unprogrammed locks will be visiblefrom the Locks page, each of them <strong>with</strong>change icons.3. After downloading, CyberLink willprompt for an 8 digit job number. Enterthe job number or the '11111111' (8ones) Job Number. This will loadprogramming instructions into theCyberLock Programmer for all the locks<strong>with</strong> change icons (up to 1250 total).4. Touch the locks once more to program them into the system. Finally, update the Programmer Key to clear thechange icons. You are now ready to refer to the location sheet to name the locks in CyberAudit-Web.


Importing Lock DataCyberLocks <strong>and</strong> CyberPoints may be imported from a file to populate CyberAudit-Web or toupdate the names of existing locks. In addition, they may be tagged <strong>with</strong> one or more lock tagsusing the item chooser.The file format should be st<strong>and</strong>ard Comma Separated Values (as exported from most spreadsheetprograms).Each line is one row of data.Commas separate the fields.Fields <strong>with</strong> embedded commas must be surrounded by double quotes.Fields <strong>with</strong> embedded double quotes must have all the double quotes doubled then the entirefield is surrounded <strong>with</strong> double quotes.New-line <strong>and</strong> carriage return characters embedded in a field are not permitted.The import supports these fields; only Lock ID is required.FieldLock IDLocknameRequired InfoYesStarts <strong>with</strong> 'L' followed by 8 hexadecimal digits. Lower case letters in the ID will bepromoted to upper case.NoIf left blank the CyberLock or CyberPoint will be named <strong>with</strong> the ID. Names may be amaximum of 128 characters.If there are any errors on the import due to invalid ID or name formats, the error will be reported onthe Import Lock page <strong>and</strong> no rows from the import file will be inserted or updated.Once the locks are imported, they may need to be programmed <strong>with</strong> a Gr<strong>and</strong> Master or CyberLockProgrammer.


Naming Locks1. Once the Gr<strong>and</strong> Master or Programmer has finished downloading, the Access Matrix of the Web Professionalsoftware will display the serial number of each lock (<strong>and</strong> key in the case of the Gr<strong>and</strong> Master) it has programmed.To name a lock, click the label for that lock.


2. Change the name field to reflect where the lock will be located. Add the cylinder to any tags it is associated<strong>with</strong>.3. Click the "Save" button.


Programming LocksProgram locks by:Using a Gr<strong>and</strong> MasterUsing a CyberLock ProgrammerImporting from a CSV FileAdding Manually


Programming JobsProgramming Jobs are a means by which selected groups of CyberLocks can be configured ordownloaded. They provide a way to explicitly select the list of locks to process. It enables anadministrator to delegate the task of carrying out the job to others.Each Programming Job has a unique ID. When a CyberLock Programmer or Gr<strong>and</strong> Master ispresented to a communicator, it will prompt for a Job Number. By entering this unique ID,CyberAudit-Web loads the key <strong>with</strong> the correct set of instructions.Each Programmer or Gr<strong>and</strong> Master can accomodate Programming Jobs of up to 1250 locks.CyberAudit-Web recognizes a "reserved" Job Number of ' 11111111'. Using that number will set upthe Programmer or Gr<strong>and</strong> Master <strong>with</strong> all of the CyberLocks in the system that need to beprogrammed, up to the 1250 lock maximum.Table Fields:Job Number - The number assigned to the Job. This number must be entered in thecommunicator that updates the Programming Key to load the correct Job into memory.Name - The name assigned to the Job.Type - Two types of Jobs can be created: Download <strong>and</strong> configure. Download Jobs capture theaudit trail events out of the selected locks. Configure Jobs update the selected locks to themost current system configuration.Number of Locks - The number of locks associated <strong>with</strong> the Job.Operations:New - Adds a new Job.- Creates a printable list of the programming jobs.Properties - Displays the details of the Job for editing.Delete - Removes the selected Job record after confirmation.How to Create a Programming Job


Related Topics:CommunicatorsDownloading LocksGr<strong>and</strong> MasterProgrammerProgramming Locks


Programming Job PropertiesThe Job Number is r<strong>and</strong>omly generated when the Job is created <strong>and</strong> may be changed on thispage. This number will be entered at the keyboard or keyport when the Gr<strong>and</strong> Master orCyberLock Programmer is presented to the communicator.A name may be given to the Job as well as comments.Two types of Jobs are available:Configure - A Configure Job updates locks that have change icons.Download - Download Jobs are used to download the audit trails from the locks in the Job.To select the locks for the current Job, use the item chooser to move them from "Available Locks"box to "Selected Locks". An additonal filter is available to reduce the list of locks in the list to onlythose <strong>with</strong> a pending change ( ).


Steps to Create a Programming Job1. Select "Programming Jobs" from the"Locks" menu.2. Click on the "New" link to open the "JobProperties" page.3. Make note of the Job Number which must be entered when loading a Job into a Programmer Key. Name the Job,if desired.


4. Choose whether to have the Job download the audit events from locks or program the locks <strong>with</strong> the latestconfiguration. Then use the item chooser to choose which locks to include in the Job <strong>and</strong> click the "Save" button.A filter is available to find locks quickly.5. Update the Programmer Key or Gr<strong>and</strong>Master <strong>and</strong> enter the Job Numberassociated <strong>with</strong> the locks.


6. Touch the locks.7. Update the Programmer Key or Gr<strong>and</strong> Master again to clear change icons <strong>and</strong>/or add the audit information to thedatabase.


Downloading a CyberLock <strong>with</strong> a CyberKeyUse a Programmer or Gr<strong>and</strong> Master to download locksClick on the "People <strong>and</strong> Keys" menu.Click on the person that is to downloada lock <strong>and</strong> select "Properties."Click on the "Lock to Download" link.


Click on the "This lock or CyberPoint" radial button <strong>and</strong> move the desired lock from the "Available Locks"section to the "Selected Lock" section.Click the "Save" button.Update the key.Touch the CyberLock or CyberPoint<strong>with</strong> the key <strong>and</strong> wait for the key tobeep, indicating it has finisheddownloading the events.Update the key again to load theevents into the database.


Steps to Reset CyberLocksCyberLocks are given access codes when they enter the CyberAudit-Web system. This preventsthem from being opened by unauthorized CyberKeys. If a CyberLock is to be removed from thesystem or is sent to the factory for service, it must be reset. These are the steps for resetting aCyberLock.1. Create a Programming Job. Alternately, use the '11111111' (8 ones) Job Number when updating the ProgrammerKey or Gr<strong>and</strong> Master to load all locks that have change icons into the key.2. Find the lock in the list of CyberLocks.Click on the row <strong>and</strong> click 'Properties'from the menu.


3. Check the "Reset" checkbox <strong>and</strong> clickthe "Save" button.4. The lock is now marked for reset,indicated by the green check mark <strong>with</strong>the yellow change icon.5. Update a Programmer Key using the'11111111' Job Number or the JobNumber that includes the lock to bereset.6. Touch the lock <strong>with</strong> the ProgrammerKey. A short buzz followed by threebeeps indicates the lock has been reset.Update the key once again to clear thechange icon.


Reset LockChecking the "Reset" checkbox notifies the system that a lock should be restored to its originalfactory configuration.A CyberLock Programmer <strong>with</strong> a Configure type programming job will reset locks in its list <strong>with</strong> thissetting.Why reset a lock?To move it to a different system or database.To return it to the factory in the event that service or exchange is needed.Additional Note:Resetting a CyberLock does not cause it to lose its audit trail; only its access codes.Steps to reset a lock


Change Icon Report for CyberLocksA Change Icon report is available when the record in the CyberLock listing page has a ChangeIcon. Clicking on the Change Icon brings up the report.The report compares current lock settings <strong>with</strong> the new ones. If the lock has a ProgrammingChange Loaded marked as true a new configuration has already been loaded into a ProgrammerKey or Gr<strong>and</strong> Master <strong>and</strong> changes may not be reversed.


Lock Properties - TagsUse the item chooser to add <strong>and</strong> remove lock tag associations for the selected lock. To find tagsquickly, use the filter below the boxes.


Locks Bulk EditWith "Bulk Editing" a CyberAudit-Web administrator may apply the same settings <strong>and</strong> tags to aselected group of CyberLocks. Operations include:Reset - Checking this box tells CyberAudit-Web whether the selected CyberLocks are to bereset. Resetting clears the access codes from the lock <strong>and</strong> returns it to factory settings afterupdating it.Note: CyberPoints may not be reset.Tagged - Assigns or removes one or more lock tags to or from the selected locks.Delete All - Removes the selected CyberLocks after confirmation.


Lock TagsLock tags are used to group CyberLocks together both for management <strong>and</strong> function. CyberPointsmay also be tagged <strong>with</strong> Lock tags.Table Fields:Name - The name assigned to the lock tag.Locks / CyberPoints <strong>with</strong> this Tag - The number of locks or CyberPoints associated <strong>with</strong> thetag. Clicking a link here will open the Locks or CyberPoints list page <strong>with</strong> a filter applied so onlythe tagged items appear. For example, clicking the "2" in the "Common" row will display twolocks in the list.


People <strong>with</strong> Access - The number of people that have access to locks <strong>with</strong> this tag. Clickingthe link will generate a report listing the people who have access to the tagged lock(s) viaschedule <strong>and</strong> tag.Operations:New - Click to add a new lock tag.- Creates a printable list of the lock tags.Clicking in a row in the list of lock tags will display a drop-down menu of options that includes:Properties - Displays the details of the lock tag for editing.Show in Matrix - Opens the Access Matrix <strong>with</strong> a filter applied for only the selected tag.Audit Report - Generates a report of audit trail for the tagged locks.


People Access - Generates a report showing the people <strong>and</strong> people tags having accesspermissions to the selected tag. It is the same information as the Show in Matrix operation butshown in report form.Comm Log - Generates a report of CyberLock status retrieved from all of the tagged lockswhen downloaded by a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.Locks tagged - Opens the Lock list page <strong>with</strong> a filter applied to show only the tagged locks.Delete - Removes the selected lock tag record after confirmation.Related Topics:Adding LocksCyberLock CleaningReset a LockTags


Lock Tag PropertiesA tag's name can be changed on this page. Locks <strong>and</strong> CyberPoints not tagged are listed in the"Available Locks" frame of the item chooser. CyberPoints <strong>and</strong> locks that are tagged are in the"Selected Locks" frame. Locks can be quickly found using the filter.


Replace LockOne lock may be replaced <strong>with</strong> another lock, keeping all the settings, key access permissions<strong>and</strong> tag associations.A lock already in the database may be used to replace another lock.If settings are different, the new lock may need to be updated after replacing the old lock.


View Audit Trail Data for CyberLocksView data beginning ... <strong>and</strong> ending - Only the audit trail data since the beginning date throughthe end date will be shown.View Data Downloaded from keys/locks - Data from CyberKeys is retrieved each time aCyberKey is programmed <strong>with</strong> a Communicator. Data from the lock must be retrieved explicitlythrough instructions to a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.View dates <strong>and</strong> times not rendered to a time zone - By default, CyberAudit-Web attempts torender all times retrieved from CyberKeys <strong>and</strong> CyberLocks to a Time Zone. The accuracy of thisprocess depends on having accurate time zone information either in the database, the key, orboth. In some cases time zone information might not be available. Examples of this include:Times from audit data prior to programming a CyberKey for the first timeTimes from lock audit data where the key is not <strong>and</strong> never was a member of the databaseCyberAudit-Web Professional has always recorded the raw value of dates <strong>and</strong> times from audittrail data as retrieved from CyberKeys <strong>and</strong> CyberLocks. Check this box to view this data <strong>with</strong>outrendering it to a time zone.View repetition count for each event - Audit trail events are recorded by CyberKeys <strong>and</strong>CyberLocks <strong>with</strong> a 2 second resolution. If the same event happens more than once <strong>with</strong>in that 2second window, CyberAudit-Web increments a counter <strong>with</strong>in the same record. This is called a"repetition count." Keys or locks <strong>with</strong> recurring repetition counts may indicate poor contact <strong>and</strong> maybenefit from cleaning.


Programmed or DownloadedThis column of the lock audit trail specifies whether the lock was programmed or downloaded. If itwas programmed it will show C, if it was downloaded it will show D.Related Topics:Audit Trail EventsReports


Communication LogsWhen a CyberLock or CyberPoint is downloaded, a record is kept of the download "session." Thesession information is viewable from the Communications Log.Date <strong>and</strong> Time Downloaded by CyberAudit-Web - This is the date <strong>and</strong> time thatCyberAudit-Web pulled the audit trail data from the CyberKey, Gr<strong>and</strong> Master, or CyberLockProgrammer <strong>and</strong> recorded it in the system.Key - The CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer that downloaded the lock.Records Added to the Database - A CyberLock holds up to the most recent 1100 events in itsmemory. This memory is never cleared but the oldest record is overwritten. If the count ofrecords reported in this field is near 1100 events, it is likely the older records have beenoverwritten <strong>with</strong> the newer ones. This count will never report exactly 1100 because:Some records in the lock's memory are used to store the date of the resulting date <strong>and</strong>time.Records <strong>with</strong> identical key IDs, timestamps, <strong>and</strong> audit trail events are only recorded oncein the database.Lock is Programmed - Indicates whether the lock has been secured <strong>with</strong> access codes. If noinformation was captured when the lock record was written, this field will be blank.Access Codes - Indicates which access codes have been programmed into the lock.1 - The lock contains a system code. This indicates the locks came from a system where<strong>manual</strong> passwords were entered.2 - The lock contains an access code. All programmed locks will contain this code.3 - The lock contains a secondary access code. If there is no This indicates the lockseither came from a system where a Gr<strong>and</strong> Master was the source of the access codes ora CyberAudit-Web Enterprise system.If this information was not captured when the lock record was written, this field will be blank.Lost Keys - The number of individual lost keys currently programmed into the lock. If thisinformation was not captured when the lock record was written, this field will be blank.Mode/Delay - Indicates whether multiple keys are required or a delay has been set in the lock.If this information was not captured when the lock record was written, this field will be blank.MKDS - Indicates whether a multi-key setting requires each key present a different schedule. Ifthis information was not captured when the lock record was written, this field will be blank.Access Count - The CyberLock increments this counter each time it authorizes a CyberKey toopen it. This can be an indicator of the number of openings the CyberLock has had over its life.


CyberPointsA CyberPoint is an electronic tag designed to serve as a data checkpoint during security guardtours. CyberPoints differ from CyberLocks in that:There is no need to program CyberPoints. They are ready to install <strong>and</strong> use.They have no moving parts.They have no editable settings.CyberPoint User Tips


CyberPoint ListThis page displays the CyberPoints in the system.Operations -Page Navigation is controlled by the arrows bracketing thelink. Clicking the linkwill open more options including browsing to the first <strong>and</strong> last pages, selecting a page to jumpto, or the number of CyberPoints per page.New - Click to add a new CyberPoint.- Creates a printable list of the CyberPoints displayed on the page, excluding those notseen because of any applied filters.1.2.Clicking in a non-linked section of a CyberPoint row will display a drop-down menu of optionsfor the CyberPoint that includes:Properties - Enables editing the CyberPoint name <strong>and</strong> tags.Audit Trail - Generates a report of audit trail data associated <strong>with</strong> the selected CyberPoint.Comm Log - Generates a report of CyberPoint status retrieved from the CyberPoint whendownloaded by a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.Delete - Removes the selected CyberPoint record after confirmation.Filters -Two types of filters are available to help find a CyberPoint or set of CyberPoints quickly:Filter by Keyword - Use the list filter to reduce the number of CyberPoints displayed.Filter by Tag - A lock tag may be used separately or in combination <strong>with</strong> a Keyword filter tofurther reduce the list. If lock tags are defined they will be shown to the left of the list ofCyberPoints. Click on one of them to reduce the list to CyberPoints <strong>with</strong> that tag.


To remove all filters, click on the Remove Filter link near the page controls at the top of the list.


CyberPoint PropertiesThis page displays the properties for an individual CyberPoint <strong>and</strong> enables editing them.Serial - The unique ID of the CyberPoint. This cannot be editedName - An identifier for the CyberPoint. The name selected here will also be displayed in theaudit trail data downloaded from CyberKeys or downloaded from the CyberPoint.Tag information is also displayed on this page. Use the item chooser to add or remove associationto tags.Audit Trail - Generates a report of audit trail data associated <strong>with</strong> the selected CyberPoint.Comm Log - Generates a report of CyberPoint status retrieved from the lock whendownloaded by a CyberKey, Gr<strong>and</strong> Master, or CyberLock Programmer.Delete - Removes the selected CyberPoint record after confirmation.


<strong>Door</strong>sThis chapter describes <strong>Door</strong>s <strong>and</strong> their implementation in CyberAudit-Web


<strong>Door</strong>s in CyberAudit-WebA <strong>Door</strong> in CyberAudit-Web is a general term that represents aphysical barriers to entry or access. It may represent a door, agate, a locker, or some other portal. CyberAudit-Web grantsaccess to a door through the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> of the FlexSystem.The Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> is designed to connectto <strong>and</strong> control either an electric door strike or a mag lock. Powerto the electric strike/mag lock is switched on or off to grant orrestrict egress.<strong>Door</strong>s have settings to control their own behavior:A Keep Unlocked scheduleA Hold <strong>Door</strong> Open time when access is grantedA sliding gateAnd if a <strong>Door</strong> has a door sensor input,An alarm trigger if the door is not closed after a specifiedamount of timeLockersCyberAudit-Web controls a <strong>Door</strong> <strong>with</strong> a <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> in the Flex System. Each <strong>Door</strong> <strong>and</strong>I/O <strong>module</strong> includes two input lines, two output lines, <strong>and</strong> power output options in addition to therelay switch for an electic strike or mag lock. If additional input or output lines are needed, the <strong>Door</strong>may extend to add up to six additional <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>s.


Additional Topics:The Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>Sample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex HubThe <strong>Door</strong>s Listing PageAudit Trails for <strong>Door</strong>s<strong>Door</strong> Tags


The <strong>Door</strong>s Listing PageThis page allows new <strong>Door</strong>s to be added to the system as well as edited. The <strong>Door</strong>s are listed inrows. Each row contains the current information about the door.Table Fields:Name - The name given to the <strong>Door</strong>.Connected To - The <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> that controls the <strong>Door</strong>'s electric strike or mag lock.Tagged <strong>with</strong> - Lists the tags associated <strong>with</strong> the <strong>Door</strong>.Lock Status - Shows the last reported electric strike or mag lock status. Possible valuesinclude:Locked - This is the normal positionUnlocked by authorized access - Based on an authorized card swipe or missionnumberUnlocked by schedule - Based on the Keep unlocked schedule in <strong>Door</strong> propertiesUnlocked by RTE - Based on triggering a Request-To-ExitUnlocked by force - Some unknown <strong>and</strong> unauthorized method was used to energize thestrike or release power to the mag lockUnlocked by IHS - The door has responded to a Request to Open comm<strong>and</strong> fromCyberAudit-Web.<strong>Door</strong> Status - Shows the last reported status of the door sensor (if present). Possible valuesinclude:No Sensor - There is no door sensor connected to either input terminalClosed - As indicated by the door sensorOpen - As indicated by the door sensorOpen <strong>with</strong> alarm - The door has been left open past the alarm time set in the <strong>Door</strong>Properties page


Open Time (seconds) - The number of seconds the door has been open as reported by theFlex System hub


Operations:- Click this button to create a printable report for the current list.Clicking in a non-linked section of a record will display a drop-down menu of operations:Properties - Displays editable details of the selected <strong>Door</strong>.Audit Report - Generates an audit trail logged for the <strong>Door</strong>.Request to Open - Sends an Inter-hub Signal comm<strong>and</strong> to the Flex Hub connected to the<strong>Door</strong> instructing it to unlock the <strong>Door</strong> for its normal hold open time. CyberAudit-Web willattempt to notify the Flex System Hub immediately to open the door. If it is not able to contactthe hub it will instruct the hub to open the <strong>Door</strong> the next time the hub checks in <strong>with</strong>CyberAudit-Web.Suspend hold open - Temporarily stop holding the <strong>Door</strong> unlocked for the remainder of thecurrent time frame or for the remainder of the day.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selected <strong>Door</strong> to todisplay the tags <strong>and</strong> people who may gain access to the selected door.Notification - Enables setting up an email notification to send to one or more emailaddresses informing that the <strong>Door</strong> has been left open past a specified time.Delete - Removes the selected <strong>Door</strong> record after confirmation.Additional Topics:<strong>Door</strong>s in CyberAudit-WebAdding <strong>and</strong> Configuring a <strong>Door</strong>Granting Access to <strong>Door</strong>sAudit Trails for <strong>Door</strong>sThe Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>Sample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex Hub<strong>Door</strong> Tags


<strong>Door</strong> PropertiesPropertiesName - A name or label assigned to the <strong>Door</strong> to enable easy identification.Connected To - A drop-down list of the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>s that have been added to aFlex Hub <strong>and</strong> are available to connect to a <strong>Door</strong>.Hold Open Time - The amount of time the door will be unlocked for an authorized open, eitherby an identified person or for a Request To Exit.Alarm if open longer than - A checkbox <strong>with</strong> an input for a number plus a drop-down to selectfrom seconds, minutes, <strong>and</strong> hours. If the checkbox is checked, the Flex System hub can triggerone or more outputs on <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>s that are members of the <strong>Door</strong> configuration. Adoor sensor must be connected to the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> to use this feature.Keep unlocked during the time frames of this schedule: - A checkbox <strong>with</strong> a drop-down list ofschedules. When the checkbox is checked the Flex System hub will keep the door unlocked<strong>with</strong>in that schedule. A begin date <strong>and</strong> end date may be added for additional control. The begindate may be useful on occassions where the Keep Unlocked setting is to be suspended ordelayed for one or more days.Wait for the first authorized person - When checked, the Flex System hub will not unlock thedoor until an authorized person gains access. If the access is granted during a time frame ofthe Keep unlocked schedule, the hub will keep the <strong>Door</strong> unlocked for the remainder of theschedule.TagsAn item chooser is used to assign or remove <strong>Door</strong> Tags to the <strong>Door</strong>.Additional Topics:<strong>Door</strong>s in CyberAudit-WebGranting Access to <strong>Door</strong>sThe Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>Sample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex Hub


The <strong>Door</strong>s Listing PageAudit Trails for <strong>Door</strong>s<strong>Door</strong> TagsInter-hub Signals


Adding <strong>and</strong> Configuring a <strong>Door</strong>To be functional, a <strong>Door</strong> record in CyberAudit-Web must connect to a <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>. It maybe connected either before or after the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> is added to a Flex System hub.Adding a <strong>Door</strong> RecordSelect <strong>Door</strong>s from the<strong>Door</strong>s menu.Click thelink.Enter the properties forthe <strong>Door</strong>.Assign <strong>Door</strong> Tags asdesired.


Click SaveConfiguring a <strong>Door</strong>To fully configure a <strong>Door</strong> it must be connected to a <strong>Door</strong> <strong>and</strong> I/O Module. Properties for a <strong>Door</strong> areset in two places:1. <strong>Door</strong> Properties2. In the properties of the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>.Additional Topics:<strong>Door</strong>s in CyberAudit-WebGranting Access to <strong>Door</strong>sAudit Trails for <strong>Door</strong>sThe Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>Sample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable Requirements


Adding Modules to a Flex Hub<strong>Door</strong> Tags


Suspending the Keep-Unlocked ScheduleThe keep-unlocked schedule may be suspended for the remainder of the current schedule timeframe or for the remainder of the day.If a door has a First Authorized Person option, a third option appears to suspend the scheduleuntil the next authorized person attempts access.


The Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>The Flex System <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> adds a number of capabilities to the CyberLock FlexSystem:Control of electric strikes or mag locks that control access to <strong>Door</strong>sToggling of output devices such as LEDs <strong>and</strong> sounders to indicate the current status of a dooror to toggle a device like a cameraRecognition <strong>and</strong> response to a momentary input like an RTE signalRecognition <strong>and</strong> response to a continuous on-off input like a door sensorThe ability to provide power to some or all of the above devices


The <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> consists of a 12-pin terminal strip <strong>with</strong> an8P8C connector (RJ45) that provides an RS-485 protocol connectionto the Flex System hub. Each terminal pin functions as follows:1. Relay toggle for a normally open circuit to serve an electricstrike2. Common power supply for the electric strike or mag lock3. Relay toggle for a normally closed circuit to serve a mag lock4. An output line for an LED indicator or otherdevice5. An output line for a sounder or other device6. A ground connection7. Raw power output supplied directly from the Flex System hub (250mamaximum)- The voltage will match the input voltage of the power sourcefor the hub.8. A ground connection10. An input line for Request to Exit (RTE) or other device or for theWieg<strong>and</strong> Dat (D1) output11. Regulated 5 volt power output (140 ma maximum) forWieg<strong>and</strong>-compatible reader or other device12. A ground connectionAdditional Topics:<strong>Door</strong>s in CyberAudit-WebGranting Access to <strong>Door</strong>sAudit Trails for <strong>Door</strong>s<strong>Door</strong> <strong>and</strong> I/O Module PropertiesSample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex HubThe <strong>Door</strong>s Listing Page


Terminal Output PatternsA <strong>Door</strong> <strong>and</strong> I/O Module may be configured to trigger outputs connected to its terminals 4 or 5.Typically these devices may be an LED <strong>and</strong> sounder to indicate current <strong>Door</strong> status such as"Unlocked by RTE" or "Open too long". Terminal Output Patterns provide a way to define thepattern of behavior for the output. For example, a rapid-flash LED accompanied by a solid-onsounder might be desired for a door that has been forced open.CyberAudit-Web provides four global output patterns: Fast Flash, Off, Slow Flash, <strong>and</strong> Solid On.Additional patterns may be defined by clicking theTerminal Output Pattern page.link. This will bring up the Add NewEnter a name, on-time, <strong>and</strong> duration for the pattern <strong>and</strong> click Save. The pattern may then be usedto define outputs in the <strong>Door</strong> <strong>and</strong> I/O Module properties page.


Global Terminal Output PatternsCyberAudit-Web provides four global output patterns:Fast FlashOffSlow FlashSolid OnThese patterns cannot be edited.


<strong>Door</strong> <strong>and</strong> I/O Module PropertiesThis page enables connecting a <strong>Door</strong> to the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>, defining the <strong>module</strong> input lines,<strong>and</strong> determining a series of responses for the output lines.Controls <strong>Door</strong> - A drop-down list of <strong>Door</strong>s in the system which are not already associated <strong>with</strong> a<strong>Door</strong> <strong>and</strong> I/O Module. Select the desired <strong>Door</strong> from the list or select None.Input 1:Input 2: - Each input has a drop-down list of available input types:Request-To-Exit (RTE) - A momentary signal typically used to request access through a door.<strong>Door</strong> Sensor - A continuous on-off signal typically used to indicate whether a door is open orclosed.Wieg<strong>and</strong> Device - Typically used for 125KHz RFID cards. Defining one input for Wieg<strong>and</strong>Device automatically assigns the other input to Wieg<strong>and</strong> Device.Outputs 1 & 2Triggers: - A list of Output line - trigger pairs. Possible triggers for each output line include:<strong>Door</strong> Lock Opened<strong>Door</strong> Lock ClosedThe <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> has released the door solenoidThe <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> is not holding the door solenoidopenAuthorized <strong>Door</strong> Opened - (requires door sensor) *Authorized <strong>Door</strong> Open too long - (requires doorsensor)<strong>Door</strong> Forced Open - (requires door sensor) *During Hold-Open Schedule *Request to Exit *Each output trigger may be configured <strong>with</strong> a Terminal Output Pattern that indicates how theoutput line will behave.*


Additional Topics:<strong>Door</strong>s in CyberAudit-WebGranting Access to <strong>Door</strong>sSample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex HubThe <strong>Door</strong>s Listing Page


View Audit Trail Data for <strong>Door</strong>sView data beginning ... <strong>and</strong> ending - Only the audit trail data since the beginning date throughthe end date will be shown.When viewing data from <strong>Door</strong>s, select between viewing just the access events or all of the FlexHub events in the <strong>Door</strong>'s group.


Audit Trail for <strong>Door</strong>s<strong>Door</strong> audit trail data is a subset of the data from a Flex System hub. The following events arethose events associated <strong>with</strong> a <strong>Door</strong>.40Message Description DataAccess Granted - <strong>Door</strong>lock released44 Request to exit Received RTE input signal45 <strong>Door</strong> closed <strong>Door</strong> sensor returned to closed position46 <strong>Door</strong> opened <strong>Door</strong> sensor changed to open position50Begin "keep unlocked"schedule52 <strong>Door</strong> schedule completed53<strong>Door</strong> opened <strong>with</strong>outaccess permissions54 RTE denied89No door permissionsfound100 Access out of scheduleA door sensor indicates the door changed to the open position<strong>with</strong>out any associated permissions.Request to exit was received when an inter-hub signal responseor other condition had higher priorityThe person was found but there were no associatedpermissions for the door.A person attemted access to a door outside of their scheduledtime frames for the doorName ofdoorName ofpersonName ofdoorName ofdoorName ofdoorName ofdoorName ofdoorName ofdoorName ofdoorName ofpersonName ofdoorName ofpersonName ofdoor


<strong>Door</strong> Tags<strong>Door</strong> tags are used to group <strong>Door</strong>s together for both management <strong>and</strong> function.Table Fields:Name - The name assigned to the <strong>Door</strong> tag.<strong>Door</strong>s <strong>with</strong> this Tag - The number of <strong>Door</strong>s associated <strong>with</strong> the tag. Clicking this link will openthe <strong>Door</strong>s list page <strong>with</strong> a filter applied so only the tagged <strong>Door</strong>s appear.Operations:- Click to add a new <strong>Door</strong> tag.- Creates a printable list of the <strong>Door</strong> tags.Clicking in a row in the list of <strong>Door</strong> tags will display a drop-down menu of options that includes:Properties - Displays the details of the <strong>Door</strong> tag for editing.Show in Matrix - Opens the Access Matrix <strong>with</strong> a filter on the selected <strong>Door</strong> tag.Audit Report - Generates a report of audit trail for the tagged doors.<strong>Door</strong>s tagged - Opens the <strong>Door</strong>s list page <strong>with</strong> a filter applied to show only the taggedlocks.Delete - Removes the selected <strong>Door</strong> tag record after confirmation.


Additional Topics:<strong>Door</strong>s in CyberAudit-WebGranting Access to <strong>Door</strong>s<strong>Door</strong> <strong>and</strong> I/O Module PropertiesSample <strong>Door</strong> Installations (see Sample <strong>Door</strong> Installations.pdf)Flex System Power <strong>and</strong> Cable RequirementsAdding Modules to a Flex HubThe <strong>Door</strong>s Listing Page


<strong>Door</strong> Tag PropertiesA <strong>Door</strong> tag's name can be changed on this page. <strong>Door</strong>s not tagged are listed in the "Available<strong>Door</strong>s" frame of the item chooser. <strong>Door</strong>s that are tagged are in the "Selected <strong>Door</strong>s" frame. <strong>Door</strong>scan be quickly found using the filter.Show in Matrix - Opens the Access Matrix <strong>with</strong> a filter on the selected <strong>Door</strong> tag.Audit Report - Generates a report of audit trail for the tagged doors.<strong>Door</strong>s tagged - Opens the <strong>Door</strong>s list page <strong>with</strong> a filter applied to show only the taggedlocks.Delete - Removes the selected <strong>Door</strong> tag record after confirmation.


Granting Access to <strong>Door</strong>sFollow the instructions to add <strong>and</strong> configure a <strong>Door</strong>.Follow the instructions to assign RFID access cards to people.Click on the cell in the Access Matrix that intersects the <strong>Door</strong>/<strong>Door</strong> Tag <strong>and</strong> People/People Tag record.This will bring up a dialog to select a list of schedules to select from. Once the schedule is assigned,access will be granted to that door for that person.


Alternatively, bulk access may be granted to a person or a door by clicking on the label of the <strong>Door</strong>, <strong>Door</strong>Tag, person, or People tag.


Email Notification for <strong>Door</strong> Left OpenAn email notification may be sent to one or more recipients when a <strong>Door</strong> is left open beyond acertain amount of time. A "TO" email address must be provided as well as the amount of timeelapsed since the <strong>Door</strong> was opened.This feature requires a door sensor attached to the <strong>Door</strong> <strong>and</strong> I/O Module.Note: - A valid email server must be identified in the Email Setup page for this feature to be used.


PeopleThe People section of CyberAudit-Web provides a way to manage both key holders <strong>and</strong>administrators.


PeopleThis page displays information about people <strong>and</strong> the CyberKeys associated <strong>with</strong> them.Table Fields:Name - The person's name.Key Serial/Issue Number - The CyberKey the person uses. The serial number will start <strong>with</strong> a'K' whereas issue numbers are 8 digits.Change Status - If the system has information for the key but the key has not yet beenupdated, a yellow 'c' icon appears in the column. Clicking on the change icon for the lock bringsup a change icon report for the CyberKey.Next Expiration - The date the key is set to expire.Master Key - Displays a check mark if the key is a master key.Tagged With - Lists the tags associated <strong>with</strong> the key.Operations:Page Navigation is controlled by the arrows bracketing thelink. Clicking the linkwill open more options including browsing to the first <strong>and</strong> last pages, selecting a page to jumpto, or the number of people per page.New - Click to add a new record.


- Creates a printable list of the people records displayed on the page, excluding those notseen because of any applied filters.Clicking in a non-linked section of a People record will display a drop-down menu of operations:Properties - Displays editable details of the selected person.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selected person todisplay the tags <strong>and</strong> locks this person <strong>and</strong> this person's tags may access.Accessible Locks - Generates a report showing the person's access permissions to locks<strong>and</strong> <strong>Door</strong>s via the Access Matrix, tags, <strong>and</strong> master key. Clicking on the link shows the details ofthese access permissions sorted by lock.Audit Report - Generates a lock access audit trail logged for the person.Comm Log - Generates a report of key status logged by communicators when a CyberKeyis downloaded.Delete - Removes the selected People record after confirmation.Filters -Two types of filters are available to help find a person or set of people quickly:1.2.Filter by Keyword - Use the list filter to reduce the list of people displayed.Filter by Tag - A people tag may be used separately or in combination <strong>with</strong> the list filter tofurther reduce the list. If people tags are defined they will be shown to the left of the list ofpeople. Click on one of them to reduce the list to people <strong>with</strong> that tag.To remove all filters, click on the Remove Filter link near the page controls at the top of the list.Related Topics:Add a PersonCommunicatorsDownloading LocksInformation About CyberKeysLost KeysPeople Options


People TagsTagsUpdating Keys


People DetailsProperties for a people record includes information about the person, their tags, <strong>and</strong> theirCyberKey.Key or Card section - One CyberKey or RFID access card may be issued to each person. Itssettings are controlled in this frame.How to issue a CyberKey or RFID Access CardReplace - Replaces the key if it is lost or broken. The new key will automatically have the samesettings <strong>and</strong> schedules as the replaced key.Hardware info - Design model <strong>and</strong> firmware version can be helpful during troubleshooting.Expiration - The date the key will expire.Behavior - Displays whether or not the beeper is on <strong>and</strong> how long a key will hold the solenoidof a lock open.Master Key Mode - Displays whether or not the key is a master key <strong>and</strong> the schedule it isrestricted by, if applicable.Locks to Download - This shows the locks the key is to download.Lost Key - Shows if the key is marked as lost in the system.Delete - Allows removal of the current key from the system, after confirmation.


Person section:Name - The person's name will appear in the system <strong>and</strong> in email notifications exactly how it isdisplayed here.Email - If email notifications are enabled, this is the address to which corresponding emails willbe sent.PIN - If PINs are required to update keys, this is where they are assigned. PINs increasesecurity because they authenticate that the person updating the key is the same personassigned to have that key.Phone Number - A phone number the person can be reached at.Department or ID - An identifier such as employee ID. This field may used to identify the uniquePeople record. It is called personnel ID when using people import operations.Address - Home address.Notes - Any additional information pertaining to the person.Tags - The tags associated <strong>with</strong> the person are listed in the "Selected Tags" window. Availabletags are listed in the "Available Tags" window. A filter is available for finding tags quickly.Show in Matrix - Displays the Access Matrix <strong>with</strong> a filter applied for the selected person todisplay the tags <strong>and</strong> locks this person <strong>and</strong> this person"s tags may access.Accessible Locks - Generates a report showing the person's access permissions to locks<strong>and</strong> <strong>Door</strong>s via the Access Matrix, tags, <strong>and</strong> master key. Clicking on the link shows the details ofthese access permissions sorted by lock.Audit Trail - Generates a lock access audit trail logged for the person.Comm Log - Generates a report of key status logged by communicators when a CyberKeyis downloaded.Delete - Removes the selected people tag record after confirmation.


Adding People <strong>and</strong> Keys1. People can be added to the database<strong>manual</strong>ly or by importing a commaseparated values file. To add people<strong>manual</strong>ly, select "People" from the menu.2. Click the "New" link.3. There are three options for key assignments:No key - The person has no key assigned to them.Issue by number - An issue number is assigned to this person. The first time the key given to theperson makes contact <strong>with</strong> the database, the issue number must be entered for the key to beupdated. This allows the administrator to grab any unassigned key <strong>and</strong> give it to a person. Afterconfiguration, the issue 5 number will be replaced by the key's serial number in the "PeopleProperties" page.Enter serial number - Manually entering the serial number of the key will allow the person to updatethe key the first time <strong>with</strong>out needing an issue number. Use this method only if specific keys arebeing assigned to people.


4. Click "Apply."5. There are several areas to define how a key may behave. For example, clicking "Expiration" will open a form thatdetermines how often a key carrier will need to update <strong>and</strong> download their key. Reminder: The frequency ofexpiring a key addresses security, key control, most recent data in the database, <strong>and</strong> lost keys.This form allows configuration of Expiration, behavior, master key capability, locks to download, <strong>and</strong> lost keys.6. Click "Apply."


7. Update the KeyUpdate through issuenumberUpdate through <strong>manual</strong>ly enteredserial number


Importing Personnel DataPeople records may be imported from a file to populate CyberAudit-Web or to update the names ofexisting records. In addition, they may be tagged <strong>with</strong> one or more people tags using the itemchooser.The rules are as follows:Each line is one row of data.Commas separate the fields.Fields <strong>with</strong> embedded commas must be surrounded by double quotes.Fields <strong>with</strong> embedded double quotes must have all the double quotes doubled then theentire field is surrounded <strong>with</strong> double quotes.New-line <strong>and</strong> carriage return characters imbedded in a field are not permitted.Data is controlled through the first data column referred to as 'personnel ID'. This columnmust contain data <strong>and</strong> must be unique. Data is appended, changed, or removed based onthese rules:A row <strong>with</strong> a personnel ID that is not in the system will insert a record <strong>with</strong> the datafrom that row. It must also contain data in the first column (name).A row <strong>with</strong> a personnel ID that is in the system will update the record <strong>with</strong> any data inthe included columns. Columns <strong>with</strong> no data will not be changed.A row <strong>with</strong> a personnel ID that is in the system <strong>with</strong> no other data will delete the recordafter a confirmation.


Fields are read in the following order. All fields use the string datatype. Values are written into thedatabase as they are read; any more than 15 fields on a line are ignored. A field <strong>with</strong> no value, anempty string or fields <strong>with</strong> missing values (fewer than 15 values in a row) will be written as anempty string. Values longer than the max size for the field will be truncated. The name field isrequired; a row <strong>with</strong> an empty name is ignored. If there are any errors parsing or inserting thevalues from a file, all changes made for the file are rolled back. If there is an existing person in thedatabase <strong>with</strong> the same name, the row is either ignored or (if the overwrite box is checked) valuesare overwritten.FieldnoField NameMaxsize Details1 personnel ID 64 A string value. Leading <strong>and</strong> trailing spaces are removed.2 name 643 department 2554 email address 2555 address 2556 phone number 647 PIN 8 4 to 8 digits8 notes 2559user defined 1 (Enterprise only -leave this field empty for CAW 255 optionalProfessional)10user defined 2 (Enterprise only -leave this field empty for CAW 255 optionalProfessional)11user defined 3 (Enterprise only -leave this field empty for CAW 255 optionalProfessional)12user defined 4 (Enterprise only -leave this field empty for CAW 255 optionalProfessional)13user defined 5 (Enterprise only -leave this field empty for CAW 255 optionalProfessional)14 CyberKey ID 9optionalThis field is only used to issue a key.15 key name 128 optionalOnly applies to a key added <strong>with</strong> a value in column 14.optional16 card RFID 64This field is only used to issue a card to a person. AnRFID card may not be issued if the person already has aCyberKey.17 card name 64optionalOnly applies to a card added <strong>with</strong> a value in column 16.18 door access number 16optional4 to 16 digits for a door access number.


People <strong>and</strong> Keys Bulk EditThis page allows the selected people from the people list page to be modified in one"bulk"operation. If no filter was applied, every People record in the system will be affected by thechanges. Key expiration, Behavior, Master key mode, <strong>and</strong> Delete are all operation options for abulk edit. Tags may be applied or removed from the selected people using the item chooser.


People TagsPeople tags are used to group keyholders together both for management <strong>and</strong> function.Table Fields:Tag Name - The name assigned to the people tag.People <strong>with</strong> this Tag - The number of people associated <strong>with</strong> the tag.Clicking the link in the "People <strong>with</strong> this Tag" column will open the People page filtered so only thepeople <strong>with</strong> that tag appear. For example, clicking the "7" in the "Airport Staff" row will show the 7people tagged <strong>with</strong> Airport Staff.


Clicking the link in the "Locks <strong>with</strong> Access" will generate a report listing which locks the peoplehave access to via which schedule <strong>and</strong> tag.Operations- Click to add a new people tag.- Creates a printable list of the people tags.Clicking in a row in the list of people tags will display a drop-down menu of options that includes:Properties - Displays the details of the people tag.Show in Matrix - Opens the Access Matrix <strong>with</strong> a filter applied for only the selected tag.Accessible Locks - Generates a report showing the access permissions granted to thetage for locks <strong>and</strong> <strong>Door</strong>s via the Access Matrix.Audit Report - Generates an audit trail report for People associated <strong>with</strong> the tag.Comm Log - Generates a report of key status logged by communicators when a CyberKeyis downloaded for all keys associated <strong>with</strong> this tag.People Tagged - Opens the People window <strong>with</strong> a filter applied to show only the peopleassociated <strong>with</strong> this tag.Delete - Removes the selected people tag record after confirmation.Related Topics:Add People <strong>and</strong> CyberKeysCyberKeysPeopleTag Definition


People Tag PropertiesA tag's name can be changed on this page. The people not currently associated <strong>with</strong> the selectedtag are listed in the "Available People" box. The people that are associated <strong>with</strong> it are in the"Selected People" box. People can be quickly found using the filter.


People <strong>with</strong> this TagPeople that don't belong to the selected tag are listed in the Available People box while everyonewho does belong is listed in the Selected People box. Use the arrows between the two boxes toadd or remove people from the tag. Filters can also be used here. Typing letters in the Keywordsbox will filter people names. A tag may also be chosen that will list people that belong to that tagbut not the currently selected one in Available People. People that belong to both tags appear inSelected People. For example, in the picture below, Martha Keller belongs to both the HumanResources <strong>and</strong> Night tags.


CyberKeysThis section contains information enabling, configuring, <strong>and</strong> manageing CyberKeys.About CyberKeysAdd a PersonCommunicatorsDownloading LocksInformation About CyberKeysLost KeysPeople TagsTagsUpdating Keys


Issue NumbersAn issue number is a unique, 8-digit number generated by CyberAudit-Web <strong>and</strong> linked to the key holder'srecord. With Issue Numbers, the administrator can give the key holder any CyberKey not already in thesystem.When the the CyberKey is presented to a communicator, it will prompt the user for an "ISSUE#". When avalid Issue Number is entered, the CyberKey will be programmed <strong>with</strong> the access privileges granted by theadministrator. During this communication, the CyberKey's ID will replace the Issue Number in the key record.Related Topics:Adding People <strong>and</strong> KeysMissions


Replace KeyThe Replace operation in CyberAudit-Web issues a new key to a person that has the samepermissions <strong>and</strong> settings as their previous key. In addition, it marks the previous key as lost.Without taking further action, if the previous CyberKey is presented to a communicator it will beautomatically disabled.Replace <strong>with</strong> Issue Number - Select this option if an issue number will be used for thereplacement key.Replace <strong>with</strong> entered Serial Number - Select this option to enter a serial number for thereplacement key.Click "Save" to complete the operation. The new CyberKey must be updated at a communicator tocomplete the replacement <strong>and</strong> make the new key operational..


Change Vault Access NumberVault Access Numbers are used in combination <strong>with</strong> a Flex System Keypad/Display <strong>and</strong> Vault tocheck out a CyberKey. To change that number, use the text box in the Change Vault AccessNumber page.


Assigning Master Key AccessFollow these steps to assign master key access to a CyberKey:1. Click on the People & Keysmenu.2. Click on the desired personnel record <strong>and</strong> select Properties from the clickmenu.If the person or key has not yet been added, click here for instructions.3. Click on the Master Key Modelink.4. Click on the Set as master key checkbox.5. Select a schedule of days <strong>and</strong> times during which the master key will operate(Optional).6. Click "Save."


Change Icon Report for CyberKeysA CyberKey gets a change icon when some action or operation in CyberAudit-Web affects thedesired settings in the key. The Change Icon report for a CyberKey shows the category of changethat caused the key to require an update.


Lost KeysThis page enables designating a key as "lost." A "lost" key in CyberAudit-Web is automaticallydisabled when it contacts a communicator. In addition, locks may be programmed to disable thatkey. When the key contacts one of these disabling locks, the key is denied access <strong>and</strong> becomesdisabled for all of its access permissions.Select "This key is Lost (<strong>with</strong> the following disable points)" to toggle the key as lost. If the key isfound again, its "lost" status may be toggled <strong>with</strong> the selection "This key is not Lost." AnyCyberLocks programmed as disable points must be programmed again to remove that key ID fromtheir list.Steps to designate a lost key <strong>and</strong> program disabling points


Designating a Lost Key <strong>with</strong> Disabling PointsWhen a key is lost, it may be designated as lost in CyberAudit-Web. Doing so tellsCyberAudit-Web to disable that key if it docks <strong>with</strong> a communicator.Lost System Key InstructionsMark a Key as Not Lost <strong>and</strong> Reset Disabling Points1. Find the key inthe Keyswindow, clickon its row, <strong>and</strong>choose"Properties."2. Click the LostKey link in theKey or Cardsection of thePropertiespage.


3. Select the This key is Lost option. Check the box to automatically create a Programming Job Number, if desired.Then choose which locks should be set as disabling points. When the key contacts one of these disabling locks, thekey is denied access <strong>and</strong> becomes disabled for all of its access permissions.4. Click Save.5. The disablingpoints will bedisplayed toconfirm theselected lockswill need to beupdated. ClickSave toproceed. Thiswill causechange iconsto appear forthe designatedlocks.


6. The key is now marked as lost <strong>and</strong> is a member of the CyberAudit-Web Lost Keys list. If it is updated at anycommunicator, it will be disabled.7. Update the Programmer Key or Gr<strong>and</strong> Master using the Programming Job associated <strong>with</strong> the lost key.


8. Touch thelocksdesignated asdisablingpoints <strong>with</strong> theProgrammer orGr<strong>and</strong> Master.9. Update the Programmer Key or Gr<strong>and</strong> Master again.


10. The change icons will clear for the disabling points.11. If the key isupdated, thechange iconwill clear onthe "LostKeys" page<strong>and</strong> the keyis disabled.Additional Notes:Locks can be designated as disable points for a maximum of 16 keys.If a key is found again, the key may be removed from a lock's disable list. When all locks arecleared for that key, the key may be used again in the system.Locks <strong>with</strong> that key in their disabling list must be reprogrammed to remove that key.Otherwise, the key will become disabled again when it touches one of those locks.Remove the Locks from the Disabling Lock List


How to Mark a Key as Not Lost <strong>and</strong> Reset Locks from being Disabling Points1. Go to the LostKeys page.2. Find the lost key <strong>and</strong> select Properties.


3. Select the This key is not Lost radio button. And click on the Create Programming Job checkbox. Make note of the number - thisnumber used to clear the key ID from the lock's list of lost keys. Click Save.4. Update a Gr<strong>and</strong>Master orCyberLockProgrammerusing the jobnumber createdin step 3.


5. Update the locks that were set as disabling points. Important - if the key touches a lock that is still set as a disabling point, the kwork in ANY lock until the key is updated again.6. Update the keyagain tosynchronize<strong>with</strong>CyberAudit-Web<strong>and</strong> clear anylock changeicons.


CyberKey Behavior SettingsCheck off Enable Beeper to turn off CyberKey sounds during operation. The key will continue tomake sounds during communications.The Solenoid Hold Time is the length of time that the lock pin is held in the open position beforere-latching. Typically, the minimum setting of 1 second is adequate <strong>and</strong> provides the best batterylife.


Lock to DownloadCyberKeys <strong>with</strong> product ID 105 or greater can download a CyberLock. They may download:None - No locks will be downloaded.All accessible locks <strong>and</strong> CyberPoints - Data from each accessible lock or CyberPoint willdownloaded <strong>and</strong> saved until there is not enough free memory left in the key to hold a full lockdownload (1100 events).A specific lock or CyberPoint - Selected from the list of locks accessible by the key.Note: CyberKeys must have access to locks they are to download.Steps to download a CyberLockDownloading a specific lock is a one-time job. Once the key has downloaded the lock <strong>and</strong> the keyhas been re-configured by a communicator, the instruction to download the lock is cleared. Use aprogramming job to keep a persistent instruction to download a specific set of locks.


How to Issue a CyberKey to a Person1.From the "People List" page, click the row of the person the key will be assigned to <strong>and</strong> choose "Properties."2. There are five options for assigning a CyberKey:No key - The person has no key assigned to them.Issue key by number - An issue number is assigned to this person. The first time the key given to theperson makes contact <strong>with</strong> the database, the issue number must be entered for the key to be updated. Thisallows the administrator to grab any unassigned key <strong>and</strong> give it to a person. After configuration, the issuenumber will be replaced by the key's serial number in the "People Properties" page.Enter key serial number - Manually entering the serial number of the key will allow the person to update thekey the first time <strong>with</strong>out needing an issue number. Use this method only if that specific key is being givento the person.Enter vault access number - A vault access number may be used <strong>with</strong> a Flex System Vault <strong>and</strong> a KeypadDisplay or a Knob <strong>and</strong> Display.Issue RFID Access Card - An RFID access card may be used at a Flex System Vault or a Single Key Vaultin lieu of issuing a CyberKey. Any RFID reader in the system may be used to read the card ID <strong>and</strong> enter itinto the system. When prompted, it will read <strong>and</strong> store any card ID that is not already in the system. Or thecard ID may be entered <strong>manual</strong>ly from the keyboard.


Note: CyberKey issue numbers, vault access numbers, <strong>and</strong> door access numbers must be collectively unique.3. Click Apply


4. Update the Key or check one out from a Vault.Update through issue numberUpdate through <strong>manual</strong>ly entered serialnumber


Lost Keys ListThis page is the list of all CyberKeys that have been marked as "lost" in the system. Keys may bemarked as lost either directly or by using the Replace operation.Table FieldsKey Serial - The ID or serial number of the lost key.Change Status - A change icon indicates the lost key is still "at-large." CyberAudit-Web has noconfirmation that the key has been disabled. CyberAudit-Web knows that a lost key has beendisabled when:A communicator programs the key after it has been marked as lost....or...A CyberLock programmed as a disabling point is downloaded <strong>and</strong> the audit trail containsa "Key disabled" event for that key.Next Expiration - Indicates when the CyberKey will expire. After expiration the key is no longera threat to open locks.Key Type - Indicates whether the lost CyberKey is a Gr<strong>and</strong> Master, a reset key, or a "St<strong>and</strong>ard"CyberKey issued to a key holder.Master Key - A check mark ( ) indicates the lost key is a master key.Last Issued To - The name of the person who had the key when it was designated as lost.Disable Points - The number of CyberLocks that have been designated as disable points.Operations -- Creates a printable list of the lost keys.Clicking in a non-linked section of a Lost Key record will display a drop-down menu of operations:Properties - Displays the editable details of the lost key.Audit Trail - Generates a lock access audit trail logged for the key.Comm Log - Generates a report of key status logged by communicators when a CyberKeyis downloaded.Delete - Removes the lost key record after confirmation.


Steps to designate a lost key <strong>and</strong> program disabling points


Updating a Key by Issue Number1. The issue number appears in the properties page as well as the People List. Any unassigned key may be given toa key holder when using an issue number. The issue number serves as a place holder for CyberAudit-Web untilthe real key ID is presented at the communicator.2. Click on "Launch CyberLink" tostart the software.3. The user must update the keybefore it will gain access to thedesignated locks.


4. When prompted, enter the issuenumber associated <strong>with</strong> theperson's key.6. The change icon is now clearedin the People List <strong>and</strong> the issuenumber has been replaced <strong>with</strong>the key's serial number.


Updating a Key1. The key holder must receive thekey <strong>with</strong> the correct serial number<strong>and</strong> update it before it will gainaccess to the designated locks. Ifusing an IR Encoder or USBStation, Click the "LaunchCyberLink" link to start the software.2. Update the key.3. Once configuration is complete,CyberLink will indicate the updatewas a success. If using anAuthorizer, "KEYREADY" willappear on the keyport display.


4. The change icon is now cleared inthe People List.


View Audit Trail Data for CyberKeysView data beginning ... <strong>and</strong> ending - Only the audit trail data since the beginning date throughthe end date will be shown.When viewing data from CyberKeys, certain data may be added to the audit trail in addition toaccess activity:View battery <strong>and</strong> reset events - Checking this box adds CyberKey system events to the auditreport. These include events about the battery level <strong>and</strong> other CyberKey system level logs.View dates <strong>and</strong> times not rendered to a time zone - By default, CyberAudit-Web attempts torender all times retrieved from CyberKeys <strong>and</strong> CyberLocks to a Time Zone. The accuracy of thisprocess depends on having accurate time zone information either in the database, the key, orboth. In some cases time zone information might not be available. Examples of this include:Times from audit data prior to programming a CyberKey for the first timeTimes from lock audit data where the key is not <strong>and</strong> never was a member of the databaseCyberAudit-Web Professional has always recorded the raw value of dates <strong>and</strong> times from audittrail data as retrieved from CyberKeys <strong>and</strong> CyberLocks. Check this box to view this data <strong>with</strong>outrendering it to a time zone.View repetition count for each event - Audit trail events are recorded by CyberKeys <strong>and</strong>CyberLocks <strong>with</strong> a 2 second resolution. If the same event happens more than once <strong>with</strong>in that 2second window, CyberAudit-Web increments a counter <strong>with</strong>in the same record. This is called a"repetition count." Keys or locks <strong>with</strong> recurring repetition counts may indicate poor contact <strong>and</strong> maybenefit from cleaning.<strong>Inc</strong>lude key communication events - Checking this box adds CyberKey communication eventsto the audit report. This includes CyberKey system events about downloading data <strong>and</strong> loading anew configuration.


Audit Trail Events from CyberKeysCyberLock Events-10EventWrite EventFailedDescriptionFailure to write to memory. Applies to CyberKeys manufactured after October2008.-9 E2 Access Failure to read memory. Applies to CyberKeys manufactured after October 2008.-7 Power restored-6 Software reset-5ScheduledBatteryReading-4 Dead Battery-3 Low Battery-2 CyberPointContact1 Reset2 Multi-keyaccess key 13 Multi-keyaccess key 24 Multi-keyaccess key 35 Multi-keyaccess key 46888Authorized toopenAuthorized toopen (bypassmultikey)Authorized toopen (bypassdelay)Authorized toopen (b)When the key comes up from low or no voltage, the processor starts <strong>and</strong> triggersthis event. Applies to CyberKeys manufactured after October 2008.A reset of the key at the factory during manufacture or service. Lock columncontains voltage data from battery <strong>and</strong> capacitor. Applies to CyberKeysmanufactured after October 2008.The key reads <strong>and</strong> records its battery level daily, after midnight local time. Lockcolumn contains voltage data from battery <strong>and</strong> capacitor. Applies to CyberKeysmanufactured after October 2008.The battery voltage dropped below operating voltage during one of it periodicreads or during a lock opening. If the read was during a lock opening, the keyemitted a single high tone beep followed by a low tone beep once every eightseconds for one minute. Lock column contains voltage data from battery <strong>and</strong>capacitor. Applies to CyberKeys manufactured after October 2008.The key's battery was below its threshold during one of the key's periodic reads orduring a lock opening. If the read was during a lock opening, the key emitted a lowtone beep once every eight seconds for one minute. Lock column contains voltagedata from battery <strong>and</strong> capacitor. Applies to CyberKeys manufactured after October2008.Contact <strong>with</strong> a CyberPoint or contact <strong>with</strong> a lock using a CyberPoint schedule.For keys manufactured after October 2008 this is a non-power related CPU reset.For keys manufactured before that time it is a general reset that applies to all thecategories shown below as event -2 to -20.The first key for multi-key access was accepted by the lock.The second key for multi-key access was accepted by the lock.The third key for multi-key access was accepted by the lock.The fourth key for multi-key access was accepted by the lock.Lock has a multi-key setting bypassed from instruction in schedule.Lock has a delay setting bypassed from instruction in schedule.Lock had no multi-key or delay setting when key was configured. Key wasconfigured to bypass multi-key or delay for this lock.*


791011121314Master keyauthorizedProgrammer orCyberPointcontactLock resetattemptedUnprogrammedlock -authorizedNo lock ID -authorizedKey in lockmore than 1minute -orremovedfromlockAccess codefailedProgrammer contact -or- Contact <strong>with</strong> lock using a CyberPoint schedule. Keybeeped 3 times.Subsystem reset keys only.If a key is operating <strong>with</strong>in its key schedule (i.e. not expired) <strong>and</strong> if the key is notdisabled, it is automatically authorized to open a lock that is not programmed.This event should never occur. It indicates that the lock was not set up <strong>with</strong> an ID.It cannot be programmed <strong>and</strong> will not function in a CyberAudit system.Keys in a subsystem may be configured to report all "removed from lock" events.The message text will depend on this settingThis message will occur if:*A lock contains different access codes than expected by the databasebecause it has been moved to or from a different database.The lock has been updated <strong>with</strong> new access codes but the key has not.The lock does not contain the access code that a master key isprogrammed to use.15Keyauthorizationfailed/blockedby lockThe key has been disabled either by:1.2.The lock because the key was designated as "lost" <strong>and</strong> the lock wasdesignated as a disabling point orDisabled when updating <strong>and</strong> removed from the communicator beforeupdating was complete.1617Hardwaremismatch -access deniedOut ofschedule forlockThis event should never occur. It indicates manufacturing difference between lock<strong>and</strong> key.The key found the lock ID in its lock list but the time of contact <strong>with</strong> the lock wasnot during the associated schedule valid operating time.the time frame did not match the current timethe day did not match the current dayit is before the schedule is to beginthe schedule has expired18Key expired orout of scheduleIf it is a master key, it could generate this event if:the key schedule time frame did not match the current timethe key schedule day did not match the current dayit is before the key is to begin operatingthe key has expired


19Access Denied- NoPermissions20 Key disabled21Access countexpendedThe ID of the Lock was not found in the key's lock list.This is a special "out of schedule" condition set by communicatorsto disable aCyberKey when it prompting for a PIN or returning a CyberKey to a Vault.Applies to one-time access <strong>and</strong> fixed-use countdown schedules.Audit Trail Events from CyberLocksCyberKey EventsEvent34 Multi-keyaccess key 135 Multi-keyaccess key 236 Multi-keyaccess key 337 Multi-keyaccess key 4384040403941424344Authorized toopenAuthorized toopen (b)Authorized toopen (bypassmultikey)Authorized toopen (bypassdelay)Master keyauthorizedProgrammer orCyberPointcontactLock resetsuccessfulUnprogrammedlock -authorizedNo lock ID -authorized46 Access denied47KeyauthorizationblockedDescriptionThe first key for multi-key access was accepted by the lock.The second key for multi-key access was accepted by the lock.The third key for multi-key access was accepted by the lock.The fourth key for multi-key access was accepted by the lock.The key was granted access <strong>and</strong> no multi-key or delay lock setting was found.Lock had a multi-key setting which the key bypassed from an instruction in theschedule corresponding to the lockLock had a delay setting which the key bypassed from an instruction in theschedule corresponding to the lockProgrammer contact -or- Contact <strong>with</strong> lock using a CyberPoint schedule. Keybeeped 3 times.System reset keys only - if a reset key grants access but does not successfullyreset the lock, the lock will record a "Master key authorized" event.This event should never occur. It indicates that the lock was not set up <strong>with</strong> an ID.It cannot be programmed <strong>and</strong> will not function in a CyberAudit system.The lock reports this event when it receives a "bad access code." Keys in asubsystem may be set to generate"no access" events in locks they are notpermitted to open. In those cases where access is denied, they send a "badaccess code" to the lock to generate this event.The key has been disabled by the lock because the key was designated as "lost"<strong>and</strong> the lock was designated as a disabling point.***


48257Hardwaremismatch -access deniedNo overlap<strong>with</strong> previouslock downloadThis event should never occur. It indicates manufacturing difference between lock<strong>and</strong> key.This will happen if the lock has rolled over since the last time it was downloaded. Itindicates there is a gap in the data retrieved from the lock.Other audit trail event types:Vault 1 audit trail eventsComm Link audit trail eventsWeb Authorizer audit trail eventsFlex System audit trail eventsLAN Authorizer audit trail eventsAudit trails for <strong>Door</strong>s


CyberKey Communications LogThe Communications Log shows information regarding CyberKey update activity. Each row is arecord of the a communication that shows the key's ID, a timestamp, the battery voltage, what thekey's clock was at the time of download, where it was downloaded, how many audit events wererecorded, the time zone, <strong>and</strong> any communications errors.


Updating CyberKey FirmwareUpdating the firmware is available only for CyberKey Rechargeable <strong>and</strong> CyberKey Plus keys.Note: The key must be downloaded first because the firmware can only be updated if no eventsexist in the key.1. Launch CyberLink.2. If events exist in the key'smemory, download them.Select "Settings..." from the"Options" menu.3. On the end of the URL, add"FW_Upgrade"(case-sensitive).


4. Present the key to the IREncoder.5. When prompted, choose thedesired FW version <strong>and</strong> clickthe "Proceed" button.6. When prompted, remove thekey.Note: Reconfigure the keyonce the update is complete toreload its access. Remember toremove the "FW_Upgrade"from the URL in the settingspage.


RFID Access CardsRFID Access cards can grant access to CyberKey Vaults as well as to <strong>Door</strong>s controlled by FlexSystem hubs .


RFID Access CardsCyberAudit-Web uses RFID Access Cards to gain access to products like the Single CyberKeyVault, <strong>and</strong> RFID readers in the Flex System.A CyberAudit RFID Reader may be used to read the ID of RFID Access Cards to assign the cardsto people.


Supported RFID Access Cards<strong>Videx</strong>® products such as the Single CyberKey Vault <strong>and</strong> the CyberKey Vault 20 FX, <strong>and</strong> the RFIDReader of the CyberLock Flex System read the ID from RFID Access Cards. The following cardsmay be read <strong>and</strong> decoded by <strong>Videx</strong> products:13.56MHz - ISO/IEC 14443 format type A <strong>and</strong> B cards including:MIFARE Classic Type A <strong>and</strong> B.Legic®13.56MHz - ISO 15693 format cards including:I-CODENote: <strong>Videx</strong> RFID readers may not be able to retrieve the ID of RFID Access Cards <strong>with</strong> additionallayers of encryption or operating system dependencies. Examples of this include:MIFARE DESFire <strong>and</strong> MIFARE DESFire EV1FIPS security above 'BASIC CHUID'TWIC security levels 2, 3, 4Any card technology that uses Secure Identity Object (SIO) wrappersUsing CyberLink as an RFID Card Reader


Steps to Assign an RFID Access Card1. From the "People List" page, click the row of the person the RFID Access Card will be assigned to <strong>and</strong> choose "Properties."2. There are four options for key assignments:No key - The person has no key assigned to them.Issue by number - An issue number is assigned to this person. The first time the key given to the personmakes contact <strong>with</strong> the database, the issue number must be entered for the key to be updated. This allowsthe administrator to grab any unassigned key <strong>and</strong> give it to a person. After configuration, the issue numberwill be replaced by the key's serial number in the "People Properties" page.Enter key serial number - Manually entering the serial number of the key will allow the person to updatethe key the first time <strong>with</strong>out needing an issue number. Use this method only if that specific key is beinggiven to the person.Issue Card - An RFID access card may be used at a Single Key Vault in lieu of issuing a CyberKey.Normally CyberLink should be used to read the card ID <strong>and</strong> enter it into the ID field.Choose Issue Card to issue an RFID Access Card.


3. Click Apply4. Scan an unassigned RFID card at any Vault or RFID reader in the system or click the link to enter the ID<strong>manual</strong>ly.


Schedule Access/ExpirationThe Access Section of CyberAudit-Web brings together three components that control access toLocks:Schedules - Time frames whithin which access will be grantedHolidays - Special dates which may be used as exceptions to times when access is normallypermitted by a scheduleAccess Matrix - A graphical grid where the intersection of locks <strong>and</strong> people may be used toassign a schedule <strong>and</strong> thereby grant access to the lock


Schedule PropertiesSchedules should be given a descriptive name <strong>and</strong> can appear as either a letter or "Icon" in theAccess Matrix. Icons may be added or deleted using the link that appears when working <strong>with</strong>icons. Time frames are used by schedules to specify when a key can gain access to locks.


Add or Edit HolidaysEnter the holiday's name <strong>and</strong> date then choose if it is recurring every year or just once. Manyholidays are on the same day every year.


Adding Holidays1. To add a holiday, click "Holidays" from the "Schedules"drop down menu.2. Click the "New" link.3. Type the name of the holiday <strong>and</strong> choose the appropriatedate.4. Click the "Save" button.


CyberAudit-Web Global SchedulesCyberAudit-Web includes three global schedules which cannot be removed or edited. Thesespecial schedules are called CyberPoint, Full Access, <strong>and</strong> No Access.Using the CyberPoint schedule in the Access Matrix will not allow them to open any of thelocks paired <strong>with</strong> it, but will record whether or not the person contacted the lock. CyberPointschedules are great for security guard rounds. Creating a st<strong>and</strong>ard schedule <strong>and</strong> using theCyberPoint schedule to assign to a security guard enables the guard to use the same key toboth open locks he or she needs to access (such as the lock on the door of the employeeentrance <strong>and</strong> >his or her personal locker) <strong>and</strong> to record that security checkpoints were visitedduring the times they needed to be checked. CyberPoint schedules are valid at all times,including holidays.The Full Access schedule is valid at all times, including holidays.The No Access schedule is never valid. This schedule exists for the purpose of restrictingmaster key access. When this schedule is assigned to a master key, it will prevent the masterkey from accessing those locks to which the schedule is applied.


Set a CyberLock as a CyberPointAssigning a CyberPoint schedule to a cell in the Access Matrix will not allow those keys to openthat lock or locks <strong>with</strong> that tag. Instead, the key will beep 3 times <strong>and</strong> record the fact that theperson contacted the lock. The CyberPoint schedule is great for security guard rounds. Creating ast<strong>and</strong>ard schedule <strong>and</strong> using the CyberPoint schedule to assign to a security guard enables theguard to use the same key to both open locks he or she needs access to (such as the lock on thedoor of the employee entrance <strong>and</strong> his or her personal locker) <strong>and</strong> to record that securitycheckpoints were visited during the times they needed to be checked. CyberPoint schedules arevalid at all times, including holidays.To set a lock as a CyberPoint, choose the common square in the Access Matrix <strong>and</strong> choose theCyberPoint schedule. Then update the key.


Adding SchedulesHolidays are "exceptions to the rule" for the keys. For example, normally this schedule would allowthe key to gain access on Tuesday's from 8:00am to 5:00pm. New Year's Day falls on a Tuesday.If New Year's is added as a holiday <strong>and</strong> the "Holiday" box is un-checked, the key will NOT gainaccess to the lock.Adding Holidays1. To add a schedule, click the "Schedules" menu.2. Click the "New"Link.


3. Type in a descriptive name such as "Day" for the daycrew. The Matrix Symbol is used as an identifier for theschedule in the Matrix. It can be either a letter or anicon.4. Click the "New" button on the right of the "Time Frames" section <strong>and</strong> adjust the start <strong>and</strong> stop times. Uncheck thedays that the keys should not gain access.5. Click the "Save" button.


Schedule Time FramesA schedule time frame specifies the day(s) of the week <strong>and</strong> a time range during which a CyberKeymay access CyberLocks or a person may open a <strong>Door</strong> or a Vault. A schedule can have up toseven time frames. When a key is programmed at a communicator, it is given a list of locks it mayaccess <strong>and</strong> the times it will be permitted to open them. A key will be granted access to a lock if thelock is in one of the key's lock lists <strong>and</strong> the current time of access is during the scheduled timeframes permitted for access. In the same way, a person will be granted access to a <strong>Door</strong> or Vaultduring the time frames of their scheduled access.


Combining SchedulesWhen this page opens, CyberAudit-Web performs a simple check to determine if there are one ormore groups of duplicate schedules in the system. It also checks all schedules to determine if anyhave any full access (24/7) time frames. All groups found are reported on the page.Click Go to remove the duplicates <strong>and</strong> consolidate to one. The oldest or original schedule will bekept <strong>and</strong> will replace each use of duplicates in the Access Matrix.


Matrix SymbolSchedules should be given a descriptive name <strong>and</strong> can appear as either a letter or "Icon" in theAccess Matrix. Icons may be added or deleted using the link that appears when working <strong>with</strong>icons.


Schedule IconsIcons can be added to represent different schedules. The image will be resized if it is larger than23x23 pixels. For a finer grained picture, use a photo editing program to resize the image <strong>and</strong> saveit in PNG, GIF, or JPEG format.Table Fields:Icon - The icon that represents the schedule in the Access Matrix.Built-in - Icons that are pre-loaded <strong>with</strong> the software have a green checkmark in this field.Used By - The schedule associated <strong>with</strong> the icon.Operations:New - Adds a new schedule icon.Delete - Removes the selected icon record after confirmation.


Setting Schedules in the Access Matrix <strong>with</strong> a Bulk OperationThis page enables an administrator to set a schedule for a row or column in the Access Matrix.Schedules may be set for a person against a selected set of locks <strong>and</strong> lock tags. Schedules for alock are set against selected people <strong>and</strong> people tags.The Item Chooser -Item choosers enable selecting the tags or individual items that will be targets of the bulk scheduleoperation. A list filter is available to narrow the view of tags or individual locks for selection.The Filter -This filter limits which cells will be changed by the bulk schedule change operation. When the BulkSchedule Change page opens, it is set to the current filter in the matrix for the affected locks orpeople. Cells not matching this filter are guaranteed to remain uneffected by the bulk schedulechange operation.To use a filter that's not in this list, return to the matrix <strong>and</strong> create a new filter. After the filter isready, initiate the bulk change operation again.


Matrix OptionsDisplay Settings -To manage the total number of CyberLocks <strong>and</strong> people displayed in the matrix per page, adjustthe horizontal <strong>and</strong> vertical limits. Horizontal will change the number of locks. Vertical changes thenumber of people. To display the number of people or locks that belong to each tag, check the boxnext to "Show count of items in each tag."CyberAudit-Web normally attempts hides individual locks <strong>and</strong> people in the matrix. It will do sowhen:a lock or person is a member of one or more tags <strong>and</strong>the lock or person does not have any schedules designated for any of its cells in the accessmatrix.Clear the checkbox for locks <strong>and</strong>/or keys to prevent CyberAudit-Web from hiding the individuals.Column Labels -Some lock names may be too long to display in the allocated space for the column label graphic.Both the length of the label <strong>and</strong> the font size used to generate the graphic may be changed to apreferred setting.Automatic Tag Creation -


CyberAudit-Web Professional can automatically create lock tags <strong>and</strong> people tags to simplify theAccess Matrix. This will ease access control management <strong>with</strong>in the system.


Automatic Tagging gives the most benefit if the matrix has a lot of repetition. In other words, whenthe same group of people have access to the same lock or locks using the same schedule, theywill be grouped together in a single tag.If the results of the automatic tagging are undesireable, restore the database to its previous state.


Reports, Notifications, <strong>and</strong> the Journal of ChangesThe Reports <strong>and</strong> Notifications section serves to building <strong>and</strong> generating reports of activities <strong>and</strong>events, setting email notifications, <strong>and</strong> tracking changes to the system.


ReportsReports are an extremely powerful <strong>and</strong> highly customizable way of organizing data fromCyberAudit-Web.


ReportsPeople, events, dates <strong>and</strong> locks (among other things) included in the report can all bespecified by the administrator. The order in which columns <strong>and</strong> rows appear is customizable.The Reports Listing PageTable FieldsReport Name - Describes what the report is about.<strong>Inc</strong>luded People - The number of selected people.<strong>Inc</strong>luded Locks <strong>and</strong> CyberPoints - The number of selected CyberLocks <strong>and</strong>CyberPoints.<strong>Inc</strong>luded Communicators - The number of unique communicators selected.<strong>Inc</strong>luded <strong>Door</strong>s - The number of unique <strong>Door</strong>s selected.<strong>Inc</strong>luded Events - The number of unique audit trail events selected.OperationsNew - Click to create a new report.- Creates a printable list of the reports.Properties - Displays the details of the report <strong>and</strong> enables editing each report category.View - Executes the report. Displays it in a pop-up window.


Delete - Removes the selected report after confirmation.Related Topics:Example report How to add reportsJournal of ChangesNotificationsPeople


Adding ReportsFollow these steps to add a report.1. Select the "Reports" menu.2. Click the "Add" button.3. Name the report <strong>and</strong> click "Save."


4. The report is configured by choosing what to look at in thesecategories:PeopleLocks <strong>and</strong> CyberPointsCommunicators<strong>Door</strong>sEventsDate FilterData is organized in columns <strong>and</strong> output to the chosen format.


Report PropertiesReports may be customized on the following categories:Report Name - Describes what the report is about. Click (Rename) to set or change thename.<strong>Inc</strong>luded People - Filters output to a selected set of people.<strong>Inc</strong>luded Locks <strong>and</strong> CyberPoints - Filters output to a selected set of CyberLocks <strong>and</strong>CyberPoints.<strong>Inc</strong>luded Communicators - Filters output to a selected set of communicators.<strong>Inc</strong>luded <strong>Door</strong>s - Filters output to a selected set of <strong>Door</strong>s.<strong>Inc</strong>luded Events - Filters output to a selected set of events.Date Filter - Enables selecting days, dates, <strong>and</strong> times of the audit trail events.<strong>Inc</strong>luded Columns - Specifies the report columns <strong>and</strong> their order <strong>and</strong> the sorting rules.


<strong>Inc</strong>luded PeopleUse this form to select the people <strong>and</strong> their keys to include in the report. When the report iscreated, all People <strong>and</strong> Keys will be included. To filter the list to only selected people <strong>and</strong> tags, click <strong>Inc</strong>lude only the following tags <strong>and</strong> people. People <strong>and</strong> tags may be selected using theitem chooser.Uncheck the Current People Only checkbox to additionally include audit trail data for peoplethat have been removed from the system.


<strong>Inc</strong>luded Locks <strong>and</strong> CyberPointsUse the item chooser in this form to select the CyberLocks, lock tags, <strong>and</strong> CyberPoints toinclude in the report. When the report is created, all items are included. To filter the list to onlyselected ones, click the <strong>Inc</strong>lude only the following radio button.Uncheck the Current Locks Only checkbox to additionally include audit trail data for locks <strong>and</strong>Cyberpoints that have been removed from the system.


<strong>Inc</strong>luded CommunicatorsWhen the All Communicators radio button is selected, CyberAudit-Web does not includecommunicators in its selection criteria <strong>and</strong> therefore no records are filtered out.To filter the report to records for a selected set of communicators use the item chooser in thisform.


<strong>Inc</strong>luded <strong>Door</strong>sTo add <strong>Door</strong>s to the report selection criteria, click on the Selected <strong>Door</strong>s radio button. Thenuse the item chooser in this form to select the <strong>Door</strong>s <strong>and</strong> <strong>Door</strong> Tags desired for the report.


Edit Report EventsEvents refers to the type of activity recorded by the CyberKey, CyberLock, or communicator.Use the form to select the type of events to include in the report. When the report is created,all event types will be included. To filter the list to only selected ones, click the "SpecificEvents" radio button. The two categories of events, Locks <strong>and</strong> Keys, may be selected usingItem Chooser. The selection of event types may be reduced by clicking a radio button on theFilter by Event Source frame.CyberKey <strong>and</strong> CyberLock audit trail eventsVault 1 audit trail eventsComm Link audit trail eventsWeb Authorizer audit trail eventsFlex System audit trail eventsLAN Authorizer audit trail eventsAudit trails for <strong>Door</strong>s


Date FilterA range of selections are available for selecting the days, dates, <strong>and</strong> times of the events toinclude.When the report is created, all event dates <strong>and</strong> times will be included. There are threeinclusive categories available to restrict them.Dates - Dates may be restricted by...A Range of two dates. The report will include dates beginning <strong>with</strong> the first entered date,ending <strong>with</strong> the second entered date, <strong>and</strong> all dates in between. The date range specified isinclusive of the start <strong>and</strong> stop dates. That is, events occuring on those dates will beincluded in the report.A Period of days, weeks, months, or years backward from when the report is executed. Forexample selecting 2 weeks will instruct CyberAudit-Web to calculate 2 weeks ago from thepoint in time the report is requested <strong>and</strong> include all events in that period. Click on <strong>Inc</strong>ludeevents back to the beginning of the day to include events back to the beginning of thecalculated day. For example, if the '2-week' period report is executed on Wednesday, 15October at 11:45 AM, CyberAudit-Web will calculate the start date <strong>and</strong> time at Wednesday,1 October at 11:45 AM. The checkbox selection would move the start to Wednesday, 1October at 12:00 AM.Days of the Week - Any combination of weekdays may be selected to display. Uncheckeddays will be excluded from the report.Time of Day - All times of the day inclusive beginning <strong>with</strong> the Start Time <strong>and</strong> ending <strong>with</strong> theStop Time. A Stop Time of 00:00 or 24:00 is interpreted as the end of the day.


<strong>Inc</strong>luded ColumnsChanging options in this section allows the administrator to specify which columns from eachrecord to include in the report <strong>and</strong> the order in which those columns should be displayed, fromleft to right. Columns should be selected that are appropriate for the criteria selected in theother sections for CyberKeys, CyberLocks, People, <strong>Door</strong>s, <strong>and</strong> Communicators.Use the item chooser to select <strong>and</strong> re-order the columns that will appear in the report.Note: Audit trail events will not fill data in every column. For example a Vault opened using anRFID access card will not include any reference about a CyberKey or a CyberLock.Available columns include:Key Name - The name assigned to the CyberKey.Key Serial - The serial number of the CyberKey.Mission Number - If the event occured while the key was programmed by a missionnumber, it will display in this column.Card Name - The name of the RFID access card.Card RFID - The serial number of the RFID access card.Lock Name - The name of the CyberLock at the time of the audit trail event.Lock Serial - The serial number of the CyberLock.Custom fields for CyberLocks - Any custom fields specified for CyberLocks may beincluded in the report.Downloaded or Configured - Indicates whether a CyberLock was downloaded orprogrammed when this event occured.<strong>Door</strong> Name - The name of the <strong>Door</strong> associated <strong>with</strong> the audit trail event. This item onlyappears when the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong> is enabled.<strong>Door</strong> <strong>and</strong> I/O Serial - The serial number of the <strong>Door</strong> <strong>and</strong> I/O <strong>module</strong>s associated <strong>with</strong> a<strong>Door</strong>.Date - The date <strong>and</strong> time that the event occured.Raw Key Date/Time - Displays the date <strong>and</strong> time as recorded directly from the CyberKeyor CyberLock <strong>with</strong>out rendering it to a time zone.


Download Date- The date <strong>and</strong> time that the event data was downloaded from aCyberKey, CyberLock Programmer, or Communicator.Event - The type of event that occured - what happened.Source - The device that recorded the event; CyberKey, CyberLock, or Communicator.Person - The name of the person who was issued the CyberKey at the time of the audittrail event.People Custom Fields - Any custom fields specified for People may be included in thereport. Custom fields are defined in Global Preferences.Communicator - The name of the communicator associated <strong>with</strong> the audit trail event.Communicator Serial - The serial number of the communicator.Port Number - Authorizer Hubs have ports 1 <strong>and</strong> 2 for accomodating keyports. FlexSystem Hubs support a variety of <strong>module</strong>s among their 8 ports. Audit trail eventsoriginating from these devices will often reference a port.Port Serial - The serial number of the Authorizer keyport or Flex System <strong>module</strong>.Port Name - The name of the Authorizer keyport or Flex System <strong>module</strong>.Group Number - The Flex System group number associated <strong>with</strong> the audit trail record.Audit trail records from <strong>Door</strong>sThe administrator may also specify the order <strong>and</strong> direction (ascending or descending) bywhich the records should be sorted.


Event sorting in reportsThe order of this list determines the order in which the set of returned records is displayed inthe report.To sort records (rows) by a certain column, select that column from the drop-down list in theproper sort position, then select either Ascending or Descending to specify the direction of thesort. To remove unwanted sort directives from the list, select the blank option for theremaining slots. In the example below, the rows of the report will be displayed in reversechronological order. Rows that have the same date will then be sorted alphabetically byperson name.


Report OutputQuick View - Outputs HTML to a web page. Data may then be printed. If the contents ofthe page are selected (using Select All) the contents may be copied <strong>and</strong> pasted into aspreadsheet.Download XML - Outputs XML to a file.Download TSV(Tab Separated Values) - Outputs ASCII text file <strong>with</strong> column names on aheader line followed by the data.


Notifications


Email NotificationsNotifications are reports sent by email. CyberAudit-Web periodically scans for new auditevents to determine if it matches the criteria of one or more Notification reports. Typically thisoccurs once each 1-2 minutes. Email Notifications must reference an available email server inEmail notification setup.There are two types of Notifications:Low Battery - This type of Notification is for the administrator who wants to receive anemail when any person's key battery is low. Battery level is checked when a key isdownloaded <strong>and</strong> if it is at or below the threshold of 2.51 volts since the last check will bereported in the email message.The only field used from this type of report is personnel (only keys assigned to people inthis list will be considered). Other fields from the report are ignored.Notification based on Report Events - The events included in this notification are filteredbased on the report selected. The lock, people, event type <strong>and</strong> time filters of the report areused. Date filters from the report are not used. Events that would be listed in the report aresent as emails.Table FieldsNotification Name - Describes what the Notification is about.Notification Type - Notifications are based either on the events generated from the criteriaof a report or on a low battery level when a CyberKey is downloaded.Based on Report - Both Notification types, Report Events <strong>and</strong> Low Battery, mustreference an existing report to match the criteria or people.OperationsNew - Click to create a new Notification.- Creates a printable list of the Notifications.Properties - Displays the details of the Notification <strong>and</strong> enables editing.Delete - Removes the selected Notification after confirmation.Related Topics:


Audit Trail EventsJournal of ChangesReports


Notification PropertiesNotification Name - Describes what the Notification is about.Notification Type - There are two types of Notifications:Low Battery - When a CyberKey is downloaded, the Notification process checks thebattery voltage against the low battery warning level. If the CyberKey's batteryvoltage is at or below that level, an email is generated.Based on Report Events - When the CyberKey is downloaded, the Notificationprocess checks the audit trail for events that match the criteria of the report. If theevents are found, an email is generated.Report Source - Select the report to reference. If the report doesn't exist yet, enter aname for the new one. When the Notification is saved, CyberAudit-Web will create a newreport by that name.Email settings - To: , From: , <strong>and</strong> Subject: are required.


Follow these steps to add notifications.Adding Notifications1. Select "Notifications" from the "Reports" menu.2. Click the "Add" button.3. Name the notification <strong>and</strong> select whether it will be based on a or on low battery events. Thenreportenter the email settings <strong>and</strong> click "Save."


Example Report


Journal of Changes


Journal of ChangesThe journal of changes is a record of all changes that have been made to the database. Itincludes...Changes made through the interface.Changes made in the background by the server.Because the number of entries can grow quite large, there are filters to aid in getting only theentriesof interest. Those filters are:Filter on Date only reports changes made on or after the date supplied.Filter on Login (by Person's Name) reports changes made by a specific personnel entry.It includes all logins for the person.


Filter on what was changed permits you to select a specific item or class of items.Categories include:Keys (all types)Locks (<strong>and</strong> Cyberpoints)Access CodesLAN AuthorizersFlex System Hubs <strong>and</strong>ModulesVaultsPeopleReportsSchedulesRFIDCardsTagsLoginsHolidaysProgrammingJobsPortable LinksNote: When searching for names or serial numbers, wildcards should be used.Multiple selections can be made.NotificationsWebAuthorizersStationsFlex SystemPatterns<strong>Door</strong>sFilter on the Type of Action Taken permits you to only consider the operation taken. Themost common being Edit, Add (which includes adding to a group), <strong>and</strong> Delete. FrequentlyAdd will also produce an Edit. Other types of actions include:Logon tracks when a particular login signs onto the system.Logoff detects a user that physically logs out of the system (not logins that timeout).Fix <strong>Inc</strong>onsistency is used for a number of routines that run periodically checking for<strong>and</strong> repairing inconsistent states in the database.


Journal of Changes Report ColumnsThe columns included in the report include:Date - The Date <strong>and</strong> Time that the change took place, the date is rendered to the login'stimezoneChange Category - The type of item changedID of Changed - This a unique identifier for the item that was changed. Sometimes this isa serial number, but for most items this a number generated <strong>and</strong> used internally by thisapplication.Name of Changed - This is the name that has been associated <strong>with</strong> an item. For mostitems this is more familiar <strong>and</strong> useful than the ID.Operation Type - The changes made have been broken up into several catagories:EditAdd - Frequently an add is immediately followed by an edit.Delete - Items that are deleted can no longer be seen by anyone but the top leveladministrator.Add/Remove Visibility - The name <strong>and</strong> title <strong>with</strong> this operation refer to the login thatmade the change, check the details to find the administrators who gained or lostvisibility as a result.Copy & Move - Refers to Access Lists, Schedules, <strong>and</strong> Group Operations. It doesn'tget used for visibility changes, they are reporteed individually under add visibility <strong>and</strong>remove visibility.Logon - Records the time that a user logs into the system.Logoff - Records the time that a user logs out of the system, but doesn't includelogins that timeout.Fix <strong>Inc</strong>onsistency - Produced by routines that run periodically to check for <strong>and</strong> repairinconsistencies in the database. These events are only visibile to the topleveladministrator.


Details - The details button will bring up a page of more detailed information about thechange that was made. Most notably, an edit operation will log the state of the item afterthe changes have been applied.


Management / MaintenanceArticles in this section describe a variety of maintenance <strong>and</strong> utility functions available from theSystem menu.


Date/Time PreferencesDate order, separator, year digits, format <strong>and</strong> time zone are set on this page. The format chosenwill appear in the audit trails.


Log FilesLog Files are used to troubleshoot the system.Table Fields:File Name - The name of the log.Modified Date - The date <strong>and</strong> time the log was last changed.Size - The total space the log takes on the disk.Operations:Download - Saves the log in a specified location. This makes emailing the log easy whentroubleshooting.Open - Opens the log for viewing.Delete - Removes the log from the system after confirmation.Print - Creates a printable list of the log files.


Backup <strong>and</strong> RestoreTo create a new backup click the "Backup Now" link.To restore to a previous time, click on the desired backup <strong>and</strong> choose "Restore."Table Fields:Created On - The date <strong>and</strong> time that the backup was done.Size - The size of the backup file.File Name - The full name of the backup file. Note that the name contains the 'created on' date<strong>and</strong> time.Operations:Restore - Returns the system to the selected backup after confirmation.Delete - Removes the backup file after confirmation.Print - Creates a printable list of the backup files.


Steps to Restore a CyberAudit-Web Professional DatabaseThese steps are used for new systems or when CyberAudit-Web detects no database is present.1.Select "Restore aCyberAudit-Web Professionalbackup."1.Choose a backup (default path: C:\Program Files\<strong>Videx</strong>\CyberAudit-WebProfessional\tomcat\cawpro-backup) <strong>and</strong> click the "Restore" button.1.Log in.


Using Locks <strong>and</strong> KeysThis section contains important information to assist in keeping CyberLocks <strong>and</strong> CyberKeysworking well.


Tips for Using a CyberKeyConduct a training session for CyberKey users. Let them try their key in a lock before it isinstalled.Insert the key straight into the lock, not at an angle.Press the key firmly into the lock until it has been rotated away from the home position.When opening a lock, wait for a solid light on the key prior to turning. The lock should turn onlyif the light is on. You may hear or feel a click, depending on background noise.To prevent undue wear, do not use the key to pull open a door.Periodically inspect the key tip for wear. If it is worn, replace it.When the battery in the key is running low, the key will emit a warning. This is a beep or flashthat happens once every eight seconds, for a period of one minute. The key will repeat thiscycle up to once an hour. It may also do this when it contacts a lock.When changing the battery in a St<strong>and</strong>ard CyberKey, the operation must be completed <strong>with</strong>inone minute. If it is not, the key may need to be updated at a communicator to restart its clock.When updating a key, wait for the display to read "KEYREADY" before removing the key.The default solenoid retention time is one second. Some users may require more time to rotatethe key. Consider increasing this value to two or three seconds. Note: <strong>Inc</strong>reasing the time willreduce the life of the battery.If a lock does not respond immediately to an authorized key, try holding it in the lock for up totwenty seconds to see if the lock will open. The lock may have been in "tamper delay" mode.Normal operation is restored when an authorized key opens it.If a key sirens or flashes when contacting a lock, it does not have authorization to open thatlock. Try updating it at a communicator. If this does not resolve the issue, please contact yoursystem administrator.To ensure good electrical contact between keys <strong>and</strong> locks, it may be necessary to periodicallyclean contaminants from the tip of the key <strong>and</strong> the face of the lock.Clean the contact pins inside the key tip using the cleaning brush (<strong>Videx</strong> part number BRUSH).To clean locks, refer to the CyberLock Contact Cleaning Instructions.


St<strong>and</strong>ard CyberKey Battery Cap RemovalNote: These instructions are for CyberKeys <strong>with</strong> replaceable batteries.Step 1:Use a ball-point pen to depress the upper lobe of one of thelatches which holds the battery cap in place.Step 2:Lift the battery cap up, then toward the latch on the oppositeside.Step 3:After replacing the battery, hook one side of the battery caponto a latch, then snap the opposite end into place over theother latch.


Rechargeable CyberKey LED Flash PatternsEvent Green LED Red LED NoteAccess Granted Steady green OffLED remains on forduration of solenoid holdtime or until key isremoved from lock.Access Denied - ExpiredLong flash - once perOffor out of schedulesecondKey ExpiredKey DisabledOn for 1 second3 flashesAccess Denied - Nopermissions, wrong Off Rapid flashaccess codeBattery OK One flash per 8 seconds OffBattery LowOffRed flash each 8seconds until the batteryis charged or there is nomore power in the batteryBattery Charging OffShort Flash each 1secondBattery ChargedShort flash each 1secondOffDead Battery Off OffCommunications Irregular flash <strong>with</strong> red Irregular flash <strong>with</strong> greenCyberPoint Contact Steady green Quick red flashDownload LockSteady green <strong>with</strong> slightflickerSteady red <strong>with</strong> slightflickerResetting a lock as aSubsystem Reset KeySteady green 3 flashesDelay instruction receivedfrom lock - CyberKey in Steady green 3 flasheslockDelay time has beenserved - CyberKey out oflock1 second green 3 red flashes per secondKey left in LockRapid flashOne flash after eachminuteMulti Key Access Steady GreenThree flashes for eachkey after firstKey Disabled 1 second green 3 red flashes per secondCommunication failed<strong>with</strong> retry1/2 second flash every 4seconds1/2 second flash every 4secondsOccurs if "flash afterexpiration" is set or if thekey touches a disablingpoint.In charger or when idle inStationIn charger or when idle inStationFlashing pattern willcontinue for 3 to 5minutes <strong>with</strong> this event.Also applies to keys setto 'flash' after expiration.With this event, the keywill continue this patternuntil it is reprogrammedor runs out of power.Can occur in a WebStation that cannotconnect toCyberAudit-Web.


Beeper <strong>and</strong> LED Flash Patterns for CyberKey IIThis chart applies to CyberKey II model CK-RXD2. Note that since CyberKey II executes multipleprocesses that light <strong>and</strong> beeper patterns may exhibit minor pattern variations.Action/Event LED Beeper NoteAccess Granted Steady ON NoneLED stays on for theduration of the solenoidhold time.Access Denied Rapid Flash Two-tone alarm Duration ~8 secondsCommunicationsIrregular flashIrregular buzzing <strong>and</strong>beeps, depending onconnection method.CyberPoint Contact Three flashes Three beepsNumber of flashes <strong>and</strong>beeps will be reduced ifcontact <strong>with</strong> theCyberPoint is notmaintained.Download LockResetting a lock as areset keyDelay instructionreceived from CyberLockDelay time servedSteady ON <strong>with</strong> slightflickerQuick LED flash thensteady ON when accessis grantedOne flash then quickflashes while contact<strong>with</strong> the lock ismaintainedRepeating two LEDflashes per secondBuzzing duringdownloadOne beepOne beepRepeating two beeps persecondKey left in lock Rapid flash One beep per minuteMulti-key access, firstkeyMulti-key access,second, third, or fourthkeyTwo quick flashes Two beepsTwo quick flashes One beepIdle - Battery OKOne flash per 10secondsNone


Battery lowOne flash per 10secondsOne beep per 10seconds. Five beepstotal.Battery Charging Two flashes per second NoneBattery ChargedOne flash per twosecondsNone


How to manage Lithium-ion polymer batteries used in RechargeableCyberKeysChargingLithium-ion batteries deliver full power after the initial charge. Nopriming is required. There is no need to charge the battery anylonger on the first charge than on any subsequent charge.CyberKey Rechargeables typically require one to two hours tofully charge.It is not necessary to remove the CyberKey from the chargerimmediately after the battery is fully charged. The chargerautomatically reduces the charge current when the battery is full.Although rechargeable CyberKeys may remain in the charger formany hours or even several days, it is not recommended to leaveit in a charger continuously as this prevents it from dischargingnormally <strong>and</strong> will slowly shorten its life.Lithium-ion batteries do not need to be fully charged beforeremoving from the charger. Partial charging does not harm thebattery. It is best to charge the lithium-ion battery at least once permonth. No additional maintenance is needed.DischargingRechargeable CyberKeys prefer a partial rather than a fulldischarge. Full discharges should be avoided. Several partialdischarges <strong>with</strong> frequent recharges are better. Recharging apartially charged lithium-ion battery does not cause harm becausethere is no "memory effect" so it is OK to charge the battery often.The battery will lose some charge capacity over time due to agingwhether used or not. Over time, the battery will naturally degrade<strong>and</strong> will not hold the same amount of charge as when new. This istrue for all lithium-ion batteries. This slow degradation will not benoticed by most users during the life of the battery if therecommended charge/discharge cycles are followed.StorageIf the CyberKey is to be stored for a period of time, it is best to firstfully charge it <strong>and</strong> then recharge it monthly to prevent it fromdischarging below 50%. If Bluetooth has been enabled on aCyberKey Blue it should be disabled in the key prior to storage.Cool storage temperature is also important. The ideal storagetemperature is 59° F (15° C).HeatThe rechargeable CyberKey should not be charged or left in hightemperatures such as strong sunlight or hot cars. Exposure toheat approaching 129° F (50° C) will shorten the life of the battery.Temperatures above this level may overheat the battery <strong>and</strong>increase the risk of fire.


DisposalLithium-ion batteries should be recycled when their service life isover.LifeThe battery typically delivers 300-500 full charge/dischargecycles. Using a quarter of the battery <strong>and</strong> then recharging it isequivalent to one quarter charge cycle.The lithium-ion battery in rechargeable CyberKeys is NOTfield-replaceable.


CyberLock Cleaning InstructionsWith time, dirt or residue may accumulate on the face of a CyberLock.If foreign material builds up where a CyberKey makes contact <strong>with</strong> thelock, it may cause intermittent performance. Lack of good contactbetween key <strong>and</strong> lock is indicated when an authorized key (<strong>with</strong> a goodbattery) contacts a lock <strong>and</strong> the light on the key does not turn on.CyberLocks manufactured since the start of 2005 have a stainless steelcontact area. They can be identified by their silver color <strong>and</strong> 2 contacts.Please contact your CyberLock vendor for instructions on cleaningother styles of CyberLock.Clean lock face <strong>with</strong> brush.Cleaning Instructions: Use <strong>Videx</strong>'s stainless steel brush (part numberBRUSH) to scrub the nose <strong>and</strong> contact points in small circular motions.Do this for several seconds. Once the face <strong>and</strong> contacts of aCyberLock have been cleaned, they should be bright <strong>and</strong> shiny.Warning: Never scrape the contacts <strong>with</strong> a sharp tool, as this maycause damage. When cleaning a CyberLock, DO NOT use sprays orlubricants!CyberKey CleaningA clean lock face


CyberKey Cleaning InstructionsVisually inspect inside the key tip for foreignmaterial like lint or dirt. If present, use atoothpick or other small tool to remove thematerial. The key tip metal housing can beremoved to better expose the contact pins.Clean the contact pins using the stainless steelbrush (part number BRUSH). If the tip isremoved, make sure to reinstall the insulator <strong>and</strong>tighten the screw. DO NOT overtighten.Warning: Do not use cleaners or other liquidswhen cleaning a CyberKey.Clean pins <strong>with</strong> brush.If these procedures fail to provide satisfactoryresults, please contact your CyberLock vendor.CyberLock CleaningClean pins.


CyberPoint User Tips1.2.3.4.5.6.Conduct a training session forCyberPoint users. Let them inserttheir key in a CyberPoint.Insert key straight into theCyberPoint, not at an angle.Do not twist or turn the key whilethe key is inside the CyberPoint.Wait until the key beeps threetimes. This means that the transferof information is completedbetween the CyberPoint <strong>and</strong> key.For good electrical contact, it mayoccasionally be necessary toclean contaminants from the tip ofthe key <strong>and</strong> the face of theCyberPoint. <strong>Videx</strong> provides astainless steel bristle brush thatworks well for doing this; pleasecontact <strong>Videx</strong> for details.After touching a CyberPoint, thekey may emit a low batterywarning. This is a beep thatsounds once every eight secondsfor one minute. This warningmeans the battery should bereplaced.


Glossary of Terms


GlossaryAccess Code An access code is an encrypted password that is programmed into locks <strong>and</strong> keys.A CyberKey must present one of these Access Codes to the CyberLock in order to gain access.AJAX - A web technology that allows pages to refresh automatically, thus providing up to dateinformation in their contents. Most listing pages in CyberAudit-Web use AJAX to keep themupdated.Audit Trail The audit trail is the activity recorded by the CyberKey <strong>and</strong> the CyberLock. Each AuditTrail record typically contains information about an event that occurred <strong>with</strong>in the lock or key. Italso includes the date <strong>and</strong> time that the event happened. There are also Communicator audittrails. These show activity at the Keyports as well as network communications <strong>and</strong> activities <strong>with</strong>CyberKeys.Configuration File - A special file that contains settings for a Web Authorizer, Vault 20, or FlexSystem Hub. This file is saved to a USB flash drive <strong>and</strong> physically transferred to one of thesecommunicators.Database Identifier A database identifier is information recorded in a CyberKey that indicates thekey is currently a member of a database. This helps prevent accidentally adding the CyberKey to asecond system.Delay A wait period required of keys before a lock will open. The CyberKey keeps track of thetime <strong>and</strong> will beep to let the key holder know when the lock can be opened. Delay cannot becombined <strong>with</strong> multiple-key access. Master keys ignore the delay setting. Also a schedule typemay be created to Ignore multi-key <strong>and</strong> delay settings.Expiration A date <strong>and</strong>/or time after which a CyberKey will stop working. It must then bere-authorized by a communicator. An Expiration can be a fixed date, fixed to a calendar period orbased on a rolling re-authorization time period.Holidays A list of dates that act as additions to the weekly grid in schedules. A day is valid ifeither the appropriate day or the holiday boxes are checked. Each Subsystem can have up to 126holidays. Holidays may be set as one-time or occurring every year.Lock List A list of lock IDs paired <strong>with</strong> a schedule stored in a CyberKeys memory. It controls if<strong>and</strong> when a key may open a given lock. The lock list is programmed into the key <strong>with</strong> eachcommunication. It may also contain additional information such as treating the lock as aCyberPoint.Lost Key A CyberKey can be designated as Lost in a CyberLocks memory. A CyberLock will notallow access to a lost key even if that key contains permission to open the lock. Also see DisablingPoint.Master Key A setting that allows a CyberKey access to all locks which are programmed <strong>with</strong> aspecific access code. A Master key has either full access or a restricted time range. Master keyscan also have a list of locks for which they behave like a st<strong>and</strong>ard user key.


Master Key Schedule A special schedule that restricts when a Master key will function. It isessentially an on/off schedule for the key that is checked prior to any other operation. Master Keyoperating times may be created uniquely for each key or the key may use one of the existing,pre-defined schedules.Multi-Key Access A CyberLock <strong>with</strong> this setting requires more than one CyberKey to open it.Master keys ignore the multi-key setting. See also the Schedule, Ignore multi-key <strong>and</strong> delaysettings.Password Text that is encrypted <strong>and</strong> provides security for a CyberLock Installation. This text canbe composed of letters, numbers, <strong>and</strong>/or special characters. CyberAudit passwords haveconfigurable strength requirements, including length, case, numeric, special character <strong>and</strong>difference requirements. There are 3 types of passwords, System, Access Code <strong>and</strong> Loginpasswords. The System, Access Code passwords are the basis for the codes used by keys <strong>and</strong>locks but are not used to log in.PIN Personal Identification Number. A PIN can be assigned to a person for use in conjunction <strong>with</strong>a communicator to provide an additional level of security. When required, the correct PIN must beentered before the key is re-authorized.Primary (TopLevel) - The top level administrator node may have multiple logins. The original loginis designated by the word (primary) following its name. This login cannot be deleted.Reset Key A Reset Key is a specially configured CyberKey which removes configurations fromCyberLocks. Resetting a lock restores it to its original (un-programmed) factory configuration.Almost any CyberKey will then open the lock.Scheduletimes.A set of access time frames <strong>and</strong> rules. A st<strong>and</strong>ard schedule includes up to 7 accessTamper Delay A tamper delay is a wait period that a lock may require of keys before it willcommunicate. It may occur when the lock denies entry to a key. For each denied key touch, thisdelay is incremented; it should never exceed 20 seconds. The first good key to touch the lock willserve the delay. After gaining access, it will then cancel it so that subsequent authorized keys areunaffected.User Key A general term describing a st<strong>and</strong>ard CyberKey that has not been programmed as aMaster Key.HardwareAuthorizer A device for updating CyberKeys <strong>and</strong> retrieving logs from CyberKeys. An Authorizercan interact <strong>with</strong> CyberKeys <strong>with</strong>out a real-time connection to CyberAudit-Web. CyberAudit-Webautomatically retrieves <strong>and</strong> sends information to Authorizers as needed. See also: LAN Authorizer<strong>and</strong> Web Authorizer.Brush A stainless steel wire brush used for cleaning CyberLocks <strong>and</strong> CyberKeys for the purposeof restoring <strong>and</strong> maintaining good electrical connection between them.


Control Key A type of CyberKey that is used to install or remove interchangeable core cylinders.It has a special tip that engages the cylinder retention mechanism. Like a regular CyberKey, itmust have permissions to open a lock. This is also called a core key or a change key.CyberKey An electronic key used to open CyberLock cylinders. CyberKeys contain three levels ofintelligence:Encrypted access codes which provide security for an installation.Access privileges for the key holder.Audit trail records of up to 3900 events.CyberKey Recharging Station - A st<strong>and</strong>alone docking station (not connected toCyberAudit?Web) that charges one or more Rechargeable CyberKeys. It connects to a wall outletusing a st<strong>and</strong>ard <strong>Videx</strong> 12V DC, minimum 300mA transformer.CyberLock An electronic version of an existing mechanical lock that provides access control <strong>and</strong>an audit trail for many types of lock hardware. No wiring is required. There are currently over 200designs of CyberLock.CyberLock Programmer A type of a CyberKey that is designed to program information intolocks, download the audit trails from locks or reset locks. It can program up to 1250 locks at a time.It can download 3 to 7 lock audit trails at a time. Unlike a CyberKey, Programmers will not open alock.CyberPoint CyberPoints are electronic tags designed to serve as data checkpoints duringsecurity guard tours. CyberPoints have no editable settings <strong>and</strong> require no programming. When aprogrammed CyberKey touches a CyberPoint, the key beeps three times. CyberPoints may beadded to CyberAudit 2.0 <strong>and</strong> CyberAudit-Web Enterprise so that they can be downloaded forreporting purposes.Gr<strong>and</strong> Master CyberKey A Gr<strong>and</strong> Master CyberKey can program CyberLocks <strong>and</strong> CyberKeys. Itcan be configured to behave like a CyberLock Programmer. See the separate entry for CyberLockProgrammer. It also can be configured to create time limited emergency master keys.Interchangeable Core A type of lock cylinder that can be removed <strong>with</strong>out disassembling thedoor hardware. Used to make mechanical re-keying easier. Interchangeable core CyberLocksnever need to be removed since all CyberLocks can be electronically re-keyed. Cylinders areavailable that are physically compatible the Best <strong>and</strong> Schlage interchangeable cores.Keyport The Keyport provides the user interface for the CyberKey Authorizer. It consists of anumeric keypad, an LED display, <strong>and</strong> a docking receptacle for CyberKeys.Key Retaining Some CyberLocks will not release a key when they are in the open position. Thisensures that users return the lock to the closed position.LAN Authorizer - An Authorizer which connect to the CyberAudit?Web server via either anEthernet network or a modem. It the earlier model of Authorizer. Because it is 10Base-T UDP, it isnot useable over the Internet. It may also have communication difficulty on some networks wheremore advanced or proprietary settings are used on routers <strong>and</strong> switches.


Lock Programming Devices CyberLock Programmer, USB CyberLock Programmer, Gr<strong>and</strong>Master CyberKey, <strong>and</strong> a st<strong>and</strong>ard user key if so configured.Serial Cablex A custom cable that is used to update LAN Authorizer firmware. The LANAuthorizer interface is a telephone jack connector (RJ-11). The PC interface is available in either9-pin or 25-pin serial connectors. Pin-out specifications are available on request.Sounds, KeyAlarm or Siren, single beep, triple beep, short buzz or chatter, long buzz or chatter.USB Station - A communicator which attaches to a computers USB port. It uses the CyberLinkapplication to communicate <strong>with</strong> the CyberAudit?Web server, <strong>and</strong> can also be used as a chargingstation for rechargeable CyberKeys.Web Authorizer - An Authorizer which communicates using secure HTTP to CyberAudit-Web at100MbS, can use DHCP to obtain an IP address, <strong>and</strong> can communicate <strong>with</strong> the CyberAudit?Webserver over the Internet.SoftwareAccess Matrix - The CyberAudit-Web Access Matrix displays the People <strong>and</strong> CyberLocks in thesystem <strong>and</strong> facilitates granting access. It lists People <strong>and</strong> people tags vertically. CyberLocks <strong>and</strong>their tags are listed horizontally.Administrator Administrators are those who may log in to CyberAudit-Web, view audit trails orother administrators activities, or make changes to components in the system.Administrator Permissions Permissions control functions of the CyberAudit-Web available tothat node. Each permission shown corresponds to a function in the program.Communicators Communicators are the devices by which CyberKeys <strong>and</strong> CyberLocks aredownloaded <strong>and</strong> programmed. The categories of Communicators includes Authorizers, PortableLinks, Stations, <strong>and</strong> Vaults.CyberLink A Java client application that enables using an IR Encoder. USB Station, or aCyberKey II <strong>with</strong> CyberAudit-Web. It is also used to set up the networking on Web Stations <strong>and</strong>Single CyberKey Vaults <strong>and</strong> can be used <strong>with</strong> the CyberAudit RFID Reader to capture the ID ofthe cards.Disabling Point A lock that has one or more CyberKey IDs in its lost key list. Keys in the list willbe disabled upon contact. They will cease to work in any lock until reprogrammed as a non-lostkey.Emergency Key A key that has been granted temporary access to all locks in a subsystem by aGr<strong>and</strong> Master key. Temporary access time ranges include 1 to 64 minutes, 1 to 24 hours or 1 to127 days.IR Encoder A custom USB to Infrared adapter made to use <strong>with</strong> CyberKeys. An IR Encoderfunctions <strong>with</strong> the CyberLink software. Unlike an IrDA adapter, the IR Encoder shows up as aremoveable drive on both Windows <strong>and</strong> Mac OSX systems.


Portable Link A remote communication device <strong>with</strong> IrDA port used for downloading <strong>and</strong> updatingCyberKeys <strong>and</strong> CyberLock Programmers. Both Pocket PC based PDAs <strong>and</strong> PCs may beconsidered as Portable Links.Issue Number An issue number is a unique, 8-digit number generated by the system that acts asa temporary placeholder for some item. Items that can be represented by issue numbers includeCyberKeys <strong>and</strong> Portable Links. CyberKey issue numbers are linked to a key holders record. Whenthe key holder places a CyberKey not already in the system into or in front of a communicator,CyberAudit-Web prompts to enter an issue number. When the number has been correctly entered,the CyberKey will be programmed according to the settings associated <strong>with</strong> the issue number. Thekey serial number will take the place of the issue number in the system.Journal of Changes Whenever a CyberAudit-Web administrator makes changes toCyberAudit-Web, it is logged in the system. A journal is available to view either overall or filteredrecords among several categories. It includes what was changed, who changed it, <strong>and</strong> when thechange was made.Key Types, Software User Key, Master key, Reset Key, Lost Key. See individual entries.Physically, these are all st<strong>and</strong>ard CyberKeys.Programmer Job Programmer Jobs are a way by which CyberLocks can be configured,downloaded or reset by CyberAudit-Web. Each job is designated by a Job number which is usedto identify it to a CyberKey Authorizer or Portable Link. Any Programmer can be assigned anyProgramming Job. Since CyberAudit-Web is designed to h<strong>and</strong>le a large number of locks it may beuseful to divide up these tasks <strong>and</strong> delegate them to others, who can deal <strong>with</strong> locks in smallerbatches.Schedule, St<strong>and</strong>ard A set of Access times <strong>and</strong> rules. It includes up to 7 access times. It is themost commonly used type of schedule.Schedule, CyberPoint This type of schedule will not open locks. Instead, the key treats the locklike a CyberPoint. It is commonly used for guard tours.Start Date <strong>and</strong> Stop Date, Key The key will work only between these dates regardless of whatother settings exist in schedules or temporary access.Time Frame A definable time range having start <strong>and</strong> stop times <strong>and</strong> selectable days of the weekplus holidays. Time frames are part of a Schedule.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!