Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Table of Contents
minLevel1
maxLevel7

About This Guide

This guide is intended to be used as a standard guide for the Freedom Access Control System. General Linux knowledge and Freedom Certification Training Knowledge are expected.

...

Login and Log Out

To login to Freedom:

...

  1. Enter the Default Username and the Password.

  2. Click on the LOGIN button.

Note

With certain older browsers pressing the Enter key causes an error message. Make sure to use the mouse to click on the Login button.

...

To create an Administrator Account with full access and delete the default user:

  1. Log in to Freedom using the instructions in Login and Log Out above.

  2. Click on the System navigation tab at the top of the screen.

  3. On the left, click the Administration link.

  4. Click the Admin Users sub link.

  5. In the Actions bar, click on Add Admin User. The following screen is displayed:

    Image Modified
  6. Enter the User ID, Last Name, and First Name.

  7. Enter a Password that is different than the one provided.

  8. Verify the Password.

  9. Beside Business, select All.

  10. Beside Sites, select ALL.

  11. Select Full Access for all of the parameters from Suites to Active Directory.

  12. For Mustering, select the required level.

  13. Select the Language that this full administrator would like to use.

  14. Select the View Suite/User Page Size 10, 25, or 50 to set the default number of suites/users per page this admin user sees when viewing the listing.

  15. Click Save to save the full access admin user.

  16. Click the [Log Out]buttonto log off and test the new user ID.

  17. Log in with the user ID and password that was created in the previous steps.

  18. Verify that you can log in successfully and that your new user has full privileges.

  19. Log out once more and log in using the default user account name.

  20. Click on the System tab, Administration, Admin Users and select the default “freedom” user account.

  21. Change one of its privileges and click Save.

  22. Log out and log in again as your newly created user.

  23. Go to Admin Users again and select the default “freedom” user account.

  24. Click on Delete and OK.

Once the admin user is saved, the user ID field cannot be edited.  This field specifies a unique admin user profile. You can change the other fields after an admin user profile has been saved.

...

To set the system time and date using NTP Settings:

  1. Click on the System navigation tab.

  2. On the left, click the Utilities link.

  3. Click the System Date/Time sub link.The following screen is displayed.

    Image Modified
  4. Select a Time Zone from the dropdown box.

  5. Check the Enable NTP box.

  6. Enter an IP address or a hostname for the NTP Server pool.ntp.orgis a commonly used public NTP server. If no local NTP server is available this hostname can be used.

  7. Click Save.

When changing the time or the date of a Freedom/Enterphone System, the synchronizing of schedules and events are not done until the following day at midnight. For proper scheduling, please restart the Freedom server using the reboot link from the Utilities section.

...

If you are not using an NTP server, you can set the date and time manually.

  1. Click on the System navigation tab.

  2. On the left, click the Utilities link.

  3. Click the System Date/Time sub link.

  4. Select a Time Zone from the dropdown box

  5. Select the date from Set Date.

  6. Select the time from Set Time.

  7. Click Save to save the date and time.

  8. Once the date is set, click the Reboot link at the bottom of the Utilities list.

  9. Click the Reboot button.

Reboot button will be hidden if Freedom portal is accessed from laptop, due to browser resolution size. So use zoom out option on the web browser to reduce the resolution from 100% to 80%.

...

To adjust this lookup behavior:

  1. Click on the System navigation tab.

  2. On the left, click the Manage Card Format link.

  3. To speed up card format search, put the most relevant definition at the top of the list. If the installation is using Indala 36 bit cards for example – put the Indala 36 bit definition above all other 36 bit formats to ensure correct Wiegand data translation. Use the up/down arrows beside each definition to adjust the order of format preferences.

...

In case no suitable definition is available, use the Default Card Format drop down list to select a default format. Please note that card format definition in Freedom is highly customizable. Please feel free to contact Viscount Technical Support (vsicountsupport@identiv.com ) should you require a custom format.

...

The links for Dealer and Installer from the Freedom Administration software can be configured to match the company who sold and installed the MESH system.

  1. Click on the System navigation tab.

  2. On the left, click the Administration link.

  3. Click the System Parameters sub link.

  4. Edit the dealer.ini and installer.ini files using the in-browser editor or save and edit them locally and restore them. 

For more information, please refer to the instructions in the MESH Parameter Files section.

...

Using the Web Based Freedom Bridge Utility

  1. Click on the System navigation tab.

  2. On the left, click the Utilities link.

  3. Click the Bridge Utility sub link.

  4. Click the [Scan Devices] button.This process might take a minute or two.

  5. Click on the MAC address of the device you wish to provision.

    Image Modified
  6. Assign the appropriate IP information to the device or choose DHCP. You may need to contact your system admin for this information. If the DHCP checkbox is checked, the IP, Netmask and Gateway fields are automatically populated once the bridge receives the DHCP information.

  7. To update Bridge Configuration only, click on Save. Note that it might take up to two minutes to save.

  8. To update and add the Bridge to Freedom, check Save & Add Device To Freedom checkbox and click Save.

    Image Modified
  9. Enter the name by which you’d like to refer to the device and click the Save button.

Make sure that the device is not already configured and locked. This is indicated by the Status column on the scan device list. If the device is already configured and locked, it will need to be reset by holding down the reset button of the device for 40 seconds. Once it is reset, it can then be scanned and added to the software.

...

Download BridgeUtil.exe from Freedom Application

  1. Click on the System navigation tab.

  2. On the left, click on the Utilities link.

  3. Click the Download sub link.

  4. Click on the BridgeUtil link and save the executable on the PC.

  5. Locate the BridgeUtil.exe from where it was downloaded. Right click on the executable and select “Run as administrator”

An unknown publisher warning might pop-up. This can be safely ignored by pressing the [Yes] button.

...

The current state (on or off) of all the schedules can be seen on the Schedule tab.

...

Adding a Schedule

  1. Click on the Schedules navigation tab.

  2. In the Actions bar, click on Add Schedule. The following screen is displayed:

  3. Enter a Name and Description.

  4. Select Weekdays OR Special Days.

    1. If you select Weekdays, check the box for each Week Day this schedule applies to and check the box for each Type of Special Day you would like to exclude from this schedule. To add a Special Day, see instructions in the previous section.

    2. If you select Special Days then you wish to apply this schedule ONLY to the Type of special day that you select in the dropdown box.

  5. Enter an ON Time for this schedule.

  6. Enter an OFF Time for this schedule.

  7. Under Effective Dates, check the Always On box if this schedule is to remain in effect at all times or, if not, enter a Start Date and an Expire Date for this schedule.

  8. Click Save.

Special Days (Holidays)

Special days are an optional addition to a schedule. They can be used for holidays or any other day where a schedule needs an explicit or relative period. Special days are added to schedules as a period so they may need to be configured before adding a schedule.

Adding a Special Day

  1. Click on the Schedules navigation tab.

  2. On the left, click the Special Days link.

  3. In the Actions bar, click Add Special Day. The following screen is displayed.

    Image Modified
  4. Enter the Name of the Special Day.

  5. Choose a number for this Type of special day, number between 1 and 12. Special day types allow grouping of different special days. For example, a Type 1 special day labeled First of Every month, could contain the first day of every month. In this case there will need to be 12 special days added, all of them belonging to the Type 1 group.

  6. Select Explicit or Relative. An explicit day is a particular day of the year while a Relative day is a day that will occur every month i.e. the first Monday of every month.

  7. Enter the Month and Day of the special day if Explicit was selected; select the Day of the Week if Relative was selected.

  8. Click Save.

Assigning a Special day to a Schedule

...

Adding a Door Controlled Area

  1. Click on the Controlled Areas navigation tab.

  2. In the Actions bar, click Add Controlled Area. The following screen is displayed:

    Image Modified
  3. Enter a Name that describes the controlled area.

  4. Enter an optional Description.

  5. Select Door Area as the Area Type.

  6. Select a Reader for the controlled area.

  7. By default, Freedom assigns the input 1 as Door Contact and input 2 as Request to Exit. To choose a custom setting, check Custom and select the desired input mapping.

  8. Click Save.

If no reader is assigned to this controlled area now, it can be assigned later using the Assign Device button. See the Assign a Device to a Controlled Area section for more information. For information on Floor Area referElevator Configuration.

...

The Config tab allows the configuration of the reader that is assigned to the controlled area.

For a Door area:

  1. Select a Card Format for the Reader; set it to Auto to default to the system settings.

  2. For the Door Contact, check the Suprv Ready box to indicate that the bridge input has supervised resistors set.

  3. Set the Door Contact Switch to Normally Open or Normally Closed.

  4. For Request to Exit, check the Suprv Ready box to indicate that the bridge input has supervised resistors set.

  5. Set the Request to Exit Switch to Normally Open or Normally Closed.

  6. Check the Activate Relay to set the lock to trigger when the REX is fired and select a Relay and enter the number of seconds for it to remain active.

  7. For each of the Outputs, enter a Delay time (the number of minutes/seconds the relay will fire) and an Activation Time (the number of minutes/seconds the relay stays open).

  8. Select an Output for this door.

  9. Enter an optional Description.

  10. For each output, enter a Delay time (the number of minutes/seconds until the relay will fire) and an Activation Time (the number of minutes/seconds the relay stays open). Click the Show Accessibility box to enter an Accessibility Delay time and an Accessibility Activation time: this is a separate set of delays and activation times for users with special needs (e.g. wheelchair, crutches) that are used if the Accessibility check box is selected in that user’s setup page. See Chapter Users for more information on setting up a User.

  11. Check the Latch Allowed box to allow the corresponding output to remain open(latched) when it is set to Open state either by the Administrator or through Unlock Schedule.

  12. To add another Output line, click the button beside the first output line.

    Image Modified
  13. Click Save when all outputs are configured.

Unlock Schedule Tab

A Schedule is a given period of time that is applied to a Controlled Areas and Access Groups and is used to schedule device activation and alarms. If a schedule is added to a Controlled Area, then that schedule activates the devices and outputs in that Controlled Area. If a schedule is linked to a Controlled Area, under User or Guest Access Groups, then the schedule enables or disables access to that Controlled Area only to the users that are contained in that User Access Group.

...

In the Unlock Schedule tab on the View/Edit Controlled Area screen:

  1. Select a Schedule for this controlled area.

  2. Select an ON action.

  3. Select an OFF action.

  4. Select the box below each Alert Level that corresponds to the users in this controlled area: Low, Guarded, Elevated, High or Severe.

    Image Modified
  5. To add another Schedule line, click the  button beside the first schedule line.

  6. Click Save.

 For more information regarding alerts, please refer to Alert Levels.

...

In the Door Monitor tab on the View/Edit Controlled Area screen:

...

Door Held Open Alarm

  1. Under Door Held Open Alarm, check the Enable box.

  2. Enter the number of seconds in the Held Open Time box before the alarm will sound.

  3. Select an output in the Output 1 dropdown box; in the Action box, select Activate or Deactivate; in the Duration box, select the number of seconds the alarm will sound.

  4. Repeat Step 3 for Output 2 if necessary.

  5. Select the Schedule from the dropdown box that you would like applied to the action, or select Always On if you need the action to be enabled 24/7; check the Effective Except for this Schedule box to have the alarm sound during all schedules except this one.

  6. Check the General Alarm box if you need this action to generate an alarm in the Events tab.

  7. Check the Ack. Required box to require an acknowledgement from the AMS Server.

  8. Select a Severity level from the dropdown box: Warning, Error, Alert, Critical, or Emergency.

  9. If needed, a customized message can be added in the Instruction field that will be displayed in the log when the Alarm is triggered. The Instruction dropdown menu passes the selected instructions to the AMS Server. To create a new alarm instruction, click the Alarm Instructions link and click Add Alarm Instruction in the Actions bar.

  10. Once done, click save at the bottom of the window

Door Forced Open Alarm

  1. Under Door Forced Open Alarm, check the Enable box.

  2. Select an output in the Output 1 dropdown box; in the Action box, select Activate or Deactivate; in the Duration box, select the number of seconds the alarm will sound.

  3. Repeat Step 2 for Output 2 if necessary.

  4. In the Racing box, enter the number of seconds when the door contact state change is reported before the push button bar signal reaches the system.  If Racing is set to 1, then the DFO will not fire if a REX is detected within one second of the door contact change state.

  5. In the Shunt Window box, enter the number of seconds. This options shunts the alarm when the REX opens the door (no card scan releases the door).

  6. Select the Schedule from the dropdown box that you would like applied to the action or select Always On if you need the action to be enabled 24/7; check the Effective Except for this Schedule box to have the alarm sound during all schedules except this one.

  7. Check the Generate Alarm box if you need this action to generate an alarm in the Events tab.

  8. Check the Ack. Required box to require an acknowledgement from the AMS Server.

  9. Select a Severity level from the dropdown box: Warning, Error, Alert, Critical, or Emergency.

  10. If needed, a customized message can be added in the Instruction field that will be displayed in the log when the Alarm is triggered. The Instruction dropdown menu passes the selected instructions to the AMS Server. To create a new alarm instruction, click the Alarm Instructions link and click Add Alarm Instruction in the Actions bar.

  11. Click Save.

Advanced Tab

The Advanced tab on the Controlled Areas screen contains additional configuration flags:

...

In the Multiple Swipe tab on the View/Edit Controlled Area screen:

  1. Select the Card Swipe Interval: the number of seconds that you count the multiple swipes for this controlled area.

  2. Select a specific User Group if only the identified user group will have access to take action on this reader; select ANY to allow all user groups to have access.

  3. Select a Controlled Area or a Zone Group to activate.

  4. Select Open, Close or LOCKDOWN in the Action dropdown box.

  5. Select a Schedule or select Always On.

  6. Click Save.

...

Floors Tab

The Floors tab allows you to link one Controlled area to floors. Typically the controlled area is an elevator reader area and the linked Floor Controlled Areas are the floors that the reader would provide access to.

In the Floors tab on the View/Edit Controlled Area screen:

  1. Select a Floor Controlled Area from the Linked Floor Area dropdown box to link to this controlled area.
    NOTE: More details on Floor Controlled Areas can be found in Chapter Elevator Configuration.

  2. Enter a Delay time (a pause before the relay fires, default is 0 second) and an Activation Time (the duration that the relay activates, default is 5 seconds).

  3. Click the Show Accessibility box to enter an Accessibility Delay time and an Accessibility Activation time. This is a separate set of delays and activation times for users with special needs (e.g. wheelchair, crutches) that are used if the Accessibility check box is selected in that user’s setup page. See Chapter Users for more information on setting up a User.

    Image Modified
  4. To link another floor to this controlled area, click the add button +

  5. Click Save.

Assign a Device to a Controlled Area

The following steps allow the user to associate a device to a Door Controlled Area that has not been assigned a device previously.

  1. Click on the Controlled Areas navigation tab and select the Controlled Area that was just created.

  2. In the Actions bar, click Assign Device.

    Image Modified
  3. In the Assign/Replace Door Reader screen, select a Reader for this controlled area.

  4. Select Default or Custom

Default: will assign Input 1 to Door Contact, and Input 2 to REX.

...

To create an alarm instruction:

  1. In the Controlled Areas navigation tab, click the Alarm Instructions link.

  2. In the Actions bar, click Add Alarm Instruction. The following screen is displayed:

    Image Modified
  3. Enter a Description of the alarm instruction.

  4. Enter any Details that pertain to this instruction.

  5. Click Save.

Alarm Resolutions

Alarm resolutions are for the clear step of the alarm response process.

To create an alarm resolution:

  1. In the Controlled Areas tab, click the Alarm Resolutions link.

  2. In the Actions bar, click Add Alarm Resolution. The following screen is displayed:

    Image Modified
  3. Enter a Description of the alarm instruction.

  4. Enter any Details that pertain to the instruction.

  5. Click Save.

Port Triggered Actions

Port triggered actions are output actions, such as alarms, triggered by a conditional input or output event from a device. Port triggered actions are useful for alarm monitoring and requests to exit.

...

Adding a Port Triggered Action

  1. Click on the Controlled Areas navigation tab.

  2. On the left, click the Port Triggered Actions link.

  3. In the Actions bar, click Add Port Trigger. The following screen is displayed:

    Image Modified
  4. Enter a Name for this action.

  5. Select a Port Event from thedropdown listand select the state of the event: For inputs, choose Reset, Set, Error Break, or Error Short.

    For outputs, choose Activate or Non Active.

  6. Choose up to two Condition States for an output port and the condition of that device’s output port.

  7. Combine two conditions with AND or OR from the dropdown list. For example, if Front Reader’s Output Port is Not-Active AND Front Door Trip Input 1 is Active then the Output Action is triggered.

  8. Select an Output Action and select Deactivate, Activate, Buzzer On, Buzzer Off, Latch Active, Unlatch Active or No Action.

  9. Enter the Delay before activation for the output action.

  10. Enter the Activation Time for the output action.

  11. Select a Controlled Area and its associated action: Open, Close, Enable panel, Disable panel, LOCKDOWN or Toggle.

  12. Select a Schedule that defines the time that the Port Triggered Action is going to be used or leave it as Always On.

  13. Generate an Alarm enables or disables logging of this Port Triggered Action in the alarm logs, desktop alarm client and AMS servers.

  14. Choose the Severity of the alarm level: Info, Warning, Error, Critical, Alert, or Emergency, when set to Alarm this will log the action to the Alarm Log. 

  15. If needed, a customized message can be added in the Instruction field that will be displayed in the log when the Alarm is triggered. The Instruction dropdown menu passes the selected instructions to the AMS Server.

  16. Select an Alarm Area.

  17. To lag an NVR camera clip to the port triggered event, select the camera from the NetCam drop-down list. Before Event and After Event specify the time window (in seconds) of the clip relative to the event.

  18. Click Save.

Zone Groups

Zone Group Management and Anti-Passback

Zone Groups allow users to group various Controlled Areas to form a Perimeter Security Zone where Anti-password rules can be applied.

...

Adding Zone Groups

  1. Click on the Controlled Areas navigation tab.

  2. On the left, click the Zone Groups link.

  3. In the Actions bar, click on Add Zone Group.

  4. Enter a Name for the zone group.

  5. Enter an optional Description of the group.

  6. Check the Anti Passback Enabled box to enforce anti-passback for this zone group.

  7. In the Anti Passback Forgiveness dropdown box select from the following options:

Options

Description

Never

User cannot re-enter the perimeter until they pass through an exit reader or enter an area that is outside of the zone group. Otherwise Freedom administrators have to manually reset the user’s anti-passback lock.

Midnight

Anti-passback lock will be forgiven at midnight.

Every 12 hours

This forgives anti-passback locks twice a day: at noon and midnight.

Every 6 hours

This forgives anti-passback locks every 4 hours (e.g. midnight, 6am, noon, 6pm).

Every 2 hours

This forgives anti-passback locks every 2 hours (e.g. midnight, 2am, 4am, etc.)

Every hour

This forgives anti-passback at the top of every hour.

Every 30 minutes

This forgives anti-passback at the top and 30 minutes of the hour.

...

To assign a Controlled Area to a Zone Group:

  1. Click on the Controlled Areas navigation tab.

  2. On the left, click on the Zone Groups link.

  3. Click on the Zone Group to edit.

    Image Modified
  4. In the Controlled Areas drop down box, select all the Areas that are to be included.

  5. Click Save

 Resetting Anti-Passback Manually

Freedom Administrators can manually reset Anti-passback locks by editing the zone group record:

  1. Click on the Controlled Areas navigation tab.

  2. On the left, click on the Zone Groups link.

  3. Click on the Zone Group to edit.

  4. In the Edit Zone Group page, click the [Forgive All] button.

  5. Click Save.

 

Manually Reset a User’s Anti-Passback Lock

Freedom Administrators can manually reset a user’s anti-passback lock via the Users page:

  1. Click on the Muster navigationtab.

  2. Check the box in the Reset column next to the user and click the [Reset] button above it.

    Image Modified

 

Mustering

The Muster tab has two sub links: Muster/Anti Passback and Emer. Mustering. This functionality must be turned on in licensing.

...

To create a custom Mustering Report:

  1. Click on the Muster navigationtab.

  2. On the left, click on the Emer. Mustering link. The following screen appears:

    Image Modified
  3. Select the Zone Group which represents the designated safety zone.

  4. Select Access Groups to report on.

  5. Select User Categories to report on.

  6. Enter an Alarm Message Token to identify when a tagged event is enabled; it will grab the last event date and time as an anchor point to help highlight users who have entered the safety zone before the alarm took place. If there is no alarm required, leave this input blank.

  7. Select the Zone Groups to be excluded in Report and select In, Out, or Both from the State dropdown box for each Controlled Area selected. This feature helps to filter areas from the report that is not relevance to the alarm event.

  8. Click the Add button to add this report to your list of Mustering Reports. These reports will list at the top of the screen and as sub links on the left once they are created.

Access Groups

Access Group Management

...

Adding a User, Floor or Guest Access Group          

  1. Click on the Access navigation tab.

  2. Click on the User Access Groups, Floor Access Groups or Guest Access Groups link.

  3. In the Actions bar, click on Add Access Group. The following screen is displayed:

    Image Modified
  4. Enter a Name and a Description.

  5. Select the Risk Levels during which this group will have access: Low, Guarded, Elevated, High or Severe (the current risk level is always displayed at the top of the Freedom screen)
    For more information on Risk Levels see the Alert Level Managementsection.

  6. Select a Controlled Area for this group.

  7. Select a Schedule for the Controlled Area. If that controlled area is not going to be accessed by that User Access Group, leave the schedule as Always Off.

  8. If you need an additional line for extra Controlled Areas and/or Schedules, click the + button beside the current line. To delete a line, click the button.

  9. Click Save.

Global User Access Groups

...

To create a Global User Access Group:

  1. Click on the Access navigation tab.

  2. Click on the User Access Groups.

  3. Enter a Name and a Description.

  4. Click Global Group check box.

    Image Modified
  5. Click Save to create the Access Group.

Once a Global Group is added, it will be visible to all sites. Administrators can associate it with any controlled area-schedule pairs that are local to the selected site.
Notice the Icon that highlights the Global Access Group “Employees”.

...

In order to assign cards or key fobs to people, User Accounts must be set-up.  During this process a User is assigned to an Access Group (or multiple Access Groups) which in turn defines their Access Rights.  To set up a User Account do the following:

  1. Click on the Users navigation tab.

  2. In the Actions bar, click on Add User.  The following screen is displayed. 

    Image Modified
  3. Enter the user’s Last Name.

  4. Enter the user’s First Name.

  5. Select Yes or No to Display this user’s name in the Directory if there is an intercom on the panel.

  6. Select this user’s Suite. This is also for Intercom functionality

  7. Enter the MESH Card Number.

  8. Enter the Wiegand Card Number that is assigned to the user or click on the [Read Card] button and present the card to the reader - the Wiegand number will automatically fill in the field. If the number is unknown, a card reader can be set up as an enrolment reader. To set up an enrolment reader, click on Select Enrolment Reader from the left menu and select the appropriate card reader.

  9. Enter a PIN number for the card. This is for Intercom functionality.

  10. Enter the user’s Email address.

  11. Enter the user’s Telephone number.

  12. Select the User Access Groups in the Available box that should be assigned to this user and click the right arrow button to move the group to the Selected box.

  13. Select the Floor Access Groups for this user.

  14. Enter the Date that the user’s access rights will Start.

  15. Select Never, or enter the Date that the access rights of this user will Expire.

  16. Click the Accessibility box if this is a user with special needs (i.e. wheelchair or crutches) that requires the longer Accessibility Delay and Activation times configured in Controlled Areas.

  17. Select Yes to Enable Admin Functions if this user is an administrator – the View/Edit Admin User options will become available.

  18. Click Save.

User Categories

You now have the ability to filter a global database of users by user category. Admin Users can be configured to see specific user categories.

  1. Click on the Users navigation tab.

  2. On the left, click on the User Categories link.

  3. To add a new user category enter a Category ID number and a Category Name and click the add  button.

  4. To remove a User Category click the delete  button.

    Image Modified

Once you have created all of your User Categories you can assign them to your Admin Users in order to filter the users they have access to. Please refer to the Admin Users section to assign the categories.

...

Create a Controlled Area - Type Floor

  1. Click on the Controlled Areas navigation tab.

  2. In the Actions bar, click Add Controlled Area.

  3. Enter a Name and Description for the Controlled Area.

  4. Select Floor Area in the Area Type dropdown box.

    Image Modified
  5. Click Save.

Add All Outputs that Belong to that Floor

This is intended to trigger all of the outputs that a user has access to.  If a user has access to multiple floors, you would select all of the outputs that complete the circuit.

  1. Once the Controlled Area is saved, the Outputs and Unlock Schedule tabs appear.

  2. Select a device Output for this Floor controlled area. You may select and add multiple Floor Areas. Click the plus sign button to add the selected Output(s).

  3. To create an unlock schedule, click on the Unlock Schedule tab. Please see the Unlock Schedules section of the Controlled Areas chapter earlier in this document for more information.

    Image Modified
  4. Click Save.

Link Floor Areas to the Elevator Reader’s Door Area

Create a Door Area and assign it with the elevator reader. Link all the Floor Areas that the reader can provide access to.

  1. Create a new Controlled Area with the elevator reader.

  2. In the new Controlled Area’s Floor tab, select all the associated Floor Areas; specify the desired activation time and click +.

...

Create a Floor Access Group

Create a floor access group to link the controlled area to a floor.  You can have multiple floor access groups added to a single controlled access group.

  1. Click on the Access navigation tab.

  2. On the left, click on the Floor Access Group sub link.

  3. In the Actions bar, click Add Floor Access Group.

  4. Enter a Name and a Description and click Save.

  5. Check the box(es) beside the Risk Level allowed for this floor.

  6. Selected the Controlled Area to link to this floor access group. If you need additional controlled area click the button to add another line.

  7. Click Save.

Assign Groups to the User

Add permissions to a floor access group in the User account.  This grants access to the floor access group relays defined under the floor group created.

  1. Click on the Users navigation tab.

  2. Click on a User.

  3. Scroll down to the Floor Access Group boxes and click on the Available Floor Access Group to move it to Selected. Select all floor access groups for this user.

  4. Click Save.

Example Scenario

The builder has 3 floors with one elevator cab. A reader is installed inside the elevator cab. As the tenant enters the elevator, he/she needs to present a card to access the floor(s) that he/she has rights to.

Controlled Area Configuration

  1. Click on the Controlled Areas navigation tab.

  2. In the Actions bar, click Add Controlled Area.

  3. First we want to create a Door Controlled Area for the Elevator Reader. In this example select the FB5’s Reader 1 and this will be the cab reader.

  4. Since there are 3 floors, you will create 3 Floor Controlled Areas. Name the first one Floor 1 Elevator Control and enter an extra Description line if necessary.

  5. Select Floor Area in the Area Type dropdown box.

  6. Select the FB5’s Reader 1 as its (Entrance) Reader. This Reader 1 will be the cab reader. 

  7. Click Save.

  8. The Outputs and Unlock Schedule grid will appear. In the Outputs tab, select the FB5 Relay that activates Elevator Control Access to Floor 1 (e.g. relay 1).

  9. Click on the Unlock Schedule tab to assign a schedule for this elevator if desired. For more information, please refer to the Unlock Schedule section of Chapter Controlled Areas.

  10. Click Save.

  11. Repeat Steps 2 to 9 to create a Floor 2 Elevator Controlled Area and add the same FB5 Reader in it as its entrance reader. In the Outputs tab, add the FB5 Relay that activates Elevator Control Access to Floor 2 (e.g. relay 2).

  12. Repeat Steps 2 to 9 to create Floor 3 Elevator Controlled Area and add the same entrance reader and Floor 3 relay (e.g. relay 3).

  13. Return to the Door Controlled Area created in Step 3, go to the Floors tab and add the three Floor Controlled Areas to it.

Create a Floor Access Group

Create a floor access group to link the controlled area to a floor.  You can have multiple floor access groups added to a single controlled access group.

  1. Click on the Access navigation tab.

  2. On the left, click on the Floor Access Group sub link.

  3. In the Actions bar, click Add Floor Access Group.

  4. Enter a Name and a Description and click Save.

  5. Check the box(es) beside the Risk Level allowed for this floor.

  6. Selected the Controlled Area to link to this floor access group. If you need additional controlled area click the button to add another line.

  7. Click Save.

Assign Groups to Users

You can assign a User Access Group to give general access to your users or a Floor Access Group to give them access to specific floors.

  1. Click on the Users navigation tab.

  2. Select a Floor 1 user from the list of users.

  3. Scroll down to User Access Group or Floor Access Group. Click on the “Floor 1” Access Group in the Available box to move it to the Selected box.

  4. Repeat Step 3 for all Floor 1 users.

  5. Repeat Step 3 to add the “Floor 2” Access Group to all Floor 2 users and “Floor 3” Access Group to all Floor 3 users.

  6. Click Save.

Operation

As a Floor 1 User presents the access card to the cab reader, the reader LED should light up (access granted) and allow elevator access to Floor 1 (e.g. Floor 1 button lights up).

...

The Events page refreshes automatically depending on login settings and is divided into a grid. The grid sections contain information about the event that took place. Multiple devices whose states are changed as a result of one event are grouped together to help with readability. Expanding an event will show all the resultant device changes.

 

  1. Click on the Events navigation tab. The following screen is displayed:

    Image Modified
  2. Check the boxes above the grid to display the following options:
    Live Update: check this box to update the table when there is live data or pause it for discussion and/or troubleshooting.
    Local Time: the local monitoring time of the system.
    Category: the final category of what is occurring.
    Event Code: the events that are supposed to occur.
    Current Site Only: the current site; leave unchecked to show data for all sites.
    Access Events Only: only show access related events.  To see all I/O and logic leave this box unchecked.

  3. From the Display dropdown box, select Today, Last 3 days, This week or This month.

  4. Select the number of entries to Show on one page.

  5. You can filter the view by entering Search criteria and/or selecting the Type of event you’d like to view from the dropdown box. Type in the search text and hit Enter.

    Image Modified

 As user is entering search content, Freedom will provide type-ahead hints for the user. If the user prefers using a wildcard search, type ‘*’ to suspend type-ahead and continue to enter search text.

...

You can search events to track access or errors over several days. When searching events, it is possible to filter results by particular devices or events and it is also possible to generate a PDF or a CSV document from your search results.

  1. Click on the Events navigation tab.

  2. On the left, click on the Search Events link. The following screen is displayed: 

    Image Modified

  3. Enter a From and To Date and Times for the data you wish to search.

  4. Enter Search Criteria in the Filters input box.

  5. Click the [Search] button to retrieve result set records.

  6. Result set will be shown on the area below the search criteria. The user may choose to download a copy of the result set in either CSV or PDF format by clicking the corresponding buttons.

Set Audit Data Search Criteria

  1. Click on the System navigation tab.

  2. On the left, click on the Utilities link.

  3. Click on the Audit Data sub link.  The following screen is displayed:

    Image Modified
  4. Enter a From and To Date and Times for the data you wish to search.

  5. Enter a User ID.

  6. In the Change box, enter a specified string from the audit logs to search through the data that has changed.

  7. Select an Action.

  8. In the Original Data box, enter a specified string from the audit logs to search through the original data. For example, you could search for a card number in the original field to find out who previously had this card.

  9. Select a Function.

  10. Click the [Search] button.

Export to a CSV File

You can export Event and User search data to a CSV file by clicking the CSV button.

...

The Freedom System is capable of generating reports of who has entered a particular Controlled Area in a given time frame, and who is currently in a particular area. This controlled area needs to have an Entrance and an Exit reader programmed. A report can also be generated in PDF format or CSV to be imported into a spreadsheet or database application.

  1. Click on the Events navigationtab.

  2. On the left, click on the Reports link.

  3. Click on the Attendance sub link.

  4. Enter a From/To date and time.

  5. Select the Zone Group(s) of interest.

  6. Optionally select User Category of interest.

  7. Optionally provide a Suite number, Card number, First or a Last name.

  8. Select either CSV or PDF report type. The two additional types – CSV summary and PDF Summary reports would show daily card holder attendance summaries. All access transaction details are omitted.

  9. Click the Search button.

    Image Modified


Backup & Restore

Manual Backup and Restore Configuration (Data)

It is recommended that regular backups of the database are made. Backup files should be stored on digital media such as flash drives or CDs and preferably kept in a secure place.  Because the backup files can contain sensitive information they should be protected from unauthorized access.

Manually Backup Data

  1. Click on the System navigation tab.

  2. On the left, click on the Administration link.

  3. Click on the Backup Data sub link.

  4. Find the location to store the file on the local computer.

  5. Click Save

Manually Restore Data

  1. Click on the System navigation tab.

  2. On the left, click on the Administration link.

  3. Click on the Restore Data sub link.

  4. Click the Choose File button. This will display the contents of the local computer.

  5. Find and open the backup file.

  6. Select the type of Restore:

Select Data Only if using a backup file from another unit.

...

Restore Database from Local Automatic Backup

  1. Click on the System navigation tab.

  2. On the left, click on the Administration link.

  3. Click on the Backup Data sub link.

  4. Click the plus (+) sign beside Restore from a system backup. This will display a list of previously saved back up files. These files are sorted by date.

  5. Click the Restore button beside the correct backup file.

  6. Reboot the system using the Reboot link from the Utilities section.

 Manual Backup of History (Event Logs)

...

Because business admin users can’t access the System tab, the backup log instructions are different. Please refer to the Backup of Logs for Business Users section for more information.

Open Log Files  

  1. Decompress the Log file that was saved in the previous sections.

  2. Use either Microsoft Excel or a CSV compatible application to view the CSV file.

 Setting Up Remote Automatic Backups

  1. Click on the System navigation tab.

  2. On the left, click on the Utilities link.

  3. Click on the Remote Backup sub link.

    Image Modified

  4. Select the Backup Method:

  • CIFS/SMB  (Linux System Backup)

  • FTP   

  • SFTP

...

To import data to the database, import a template from the Import Data screen under the System 🡪 Administration 🡪 Utilities tab. When importing data to the database it will be added to existing data. Existing data will not be replaced by this function. Suite, Suite Code, and Business Name have to be unique in the imported data and existing data. User field does not need to be unique, but it will create duplicates if identical names are imported.

...

Obtain a Data Template

  1. Click on the System navigation tab.

  2. On the left, click on the Utilities link.

  3. Click on the Import Data sub link.

  4. At the bottom of the page under To obtain a Data File Template, right click on the template and select “Save Target As...”, ”Save Link As...”, or equivalent option from the pop-up menu that appears.

  5. Select a directory to save the Mesh data backup file in the ”Save as” dialog box.

  6. Name the template with the .xls extension. For example, user-template.xls.

  7. If the “Download complete” dialog box persists after the copy completes, click Close. Follow these steps carefully to append data to the database.

 Setting up a database file to import:

  1. Open the template file using MS Excel, or compatible spreadsheet application. Fill in the data.

  2. Do not delete or change the header cells in the template or the import will fail.

  3. Save the file to the comma separated values (*.csv) format.

  4. Always import the Business file first, followed by the Suites file, then the Users file.

  5. The result page displays the imported lines that generated errors. To correct the errors, create a new data file with the corrected data of those lines only and import the new data file.

  6. In the Users template, leave the User Id column blank.  This field is reserved for the Mesh system.

Importing Data

  1. Select the type of data that is being imported from the Target Data table dropdown menu.

  2. Click Browse.

  3. Find the data file that is being imported; make sure it is in CSV format.

  4. Click the Import button to add the data to the database, if no errors are displayed the importing is complete.

Commercial Database Replication

...

Configuring the Master Server

  1. Configure the firewall to allow incoming connections on port 31415.

  2. Login to the Freedom administration software using the system user.  Call Viscount Support if you need the system password.  

  3. Click on the System navigation tab.

  4. On the left, click on the Administration link.

  5. Click on the System Parameters sub link.

    Image Modified
  6. Click on the siteEngine.ini file to edit it.

  7. Edit the line that reads DBMode=single and change it to DBMode=master

    Image Modified
  8. Click Save.

  9. Select and edit a different System Parameters file called start.ini

  10. Edit the line that reads #sds.service=no and change it to sds.service=yes

    Image Modified
  11. Click Save and Reboot the server.

  12. Once the system is rebooted, log back in with the system user and go the System tab.

  13. In the scope pane on the left, click on Utilities.

  14. Click DB Replication. |

    Image Modified
  15. Fill in the text boxes on the screen. 

    1. Host Name: This is the IP address of the master server.

    2. Sync Name: Name for the configuration. Enter something that will identify the master server. This field must be alpha numeric.

    3. Sync Protocol: Select http or https. In order to use https, additional configurations are required to install SSL certificate on the master and slave server.

    4. Sync Port Number: Select the TCP port number that slave servers will be connecting to.  The TCP port number selected must be configured in the firewall to allow incoming connection. The Freedom server is preconfigured to support port 31415, additional configurations on the server are required if other port number is used.

  16. Click the Save button.  The master node configuration will be displayed in the Master Node section. The Delete button of the master node allows users to remove the master configuration from the server. It will be disabled if there are slave nodes attached to the master. The Stop Replication button allows users to stop the database replication process. The Restart Replication button allows users to restart the database replication process. The Refresh Server Cache button allows users to refresh the Freedom server cache to the slave nodes.

    Image Modified

Configuring Slave Server

  1. Login to the Freedom administration software using the system user.  Call Viscount Support if you need the system password  

  2. Click on the System navigation tab.

  3. On the left, click on the Administration link.

  4. Click on the System Parameters sub link.

    Image Modified
  5. Click on the siteEngine.ini file to edit it.

  6. Edit the line that reads DBMode=single and change it to DBMode=slave

    Image Modified
  7. Click Save.

  8. Select and edit a different System Parameters file called start.ini

  9. Edit the line that reads #sds.service=no and change it to Change to sds.service=yes

    Image Modified
  10. Click Save and Reboot the server.

  11. Once the system is rebooted, log back in with the system user and go the System tab.

  12. In the scope pane on the left, click on Utilities.

  13. Click DB Replication.

    Image Modified

  14. Fill in the text boxes on the screen.

    1. Master Node Registration URL: The URL that the slave server will be connecting to for data replication. The URL should be set to the Sync URL configured on the master server.

    2. Sync Name: Name for the configuration. Enter something that will identify the slave server. This field must be alpha numeric.

  15. Click the Attach button. The slave node configuration will be displayed in the Node section. The Detach button allows users to remove the node from the data replication. Detaching a slave node is a two steps process, refer to the Detaching Slave Server section below for details. The Stop Replication button allows users to stop the database replication process. The Restart Replication button allows users to restart the database replication process.

    Image Modified


  16. To verify the slave server is configured properly, login to the master server and go to the System tab. Click on Utilities on the left and select DB Replication.  The client node should be listed.

    Image Modified
  17. To verify that the configuration is good, add a controlled area on the master node and verify that it appears on the slave.

Detaching Slave Server

Detaching a slave server from the master server is a two steps process.

  1. Logon to the slave server with the system user and go the System tab.

  2. In the scope pane on the left, click on Utilities.

  3. Click DB Replication.

    Image Modified
  4. Click the Detach button to detach the node from the master.

  5. Logon to the master server with the system user and go the System tab.

  6. In the scope pane on the left, click on Utilities.

  7. Click DB Replication.

  8. Find the client node and click the Delete button to detach the slave server.

    Image Modified

 Microsoft Active Directory (AD) Integration

...

To configure Active Directory in Freedom:

  1. Login to Freedom with the system account.

  2. Click on the System navigation tab.

  3. On the left, click on the Active Directory link.

    Image Modified


Options

Description

Connection Timeout

The connection timeout in seconds to the active directory.

Audit Data Enabled

When this is enabled all changes made through the active directory integrations will be logged in the Audit logs. Enabling this option will dramatically increase the number of logs. The minimum hard disk space recommended is 500 GB when this feature is enabled.

Web Login Enabled

Groups of administrators can be assigned to an administrator account. That account will link the admin profile to that permission for administration. It is recommended that for these types of accounts you name them differently than your standard user base to support the integration.
To allow the login from this group, you must have the Web Login Enabled box checked.

User Sync Start Time

The start time of the synchronization on users, organizational units, and groups from LDAP connections. Multiple synchronization can be scheduled to run at different time of the day.

User Sync Read Timeout

The timeout in seconds before the query issued by user sync is aborted.

Force Update Enabled

This will force user updates from the active directory structure.

Live Update Enabled

This feature enables an OU, Group, and Access Group attribute check against active directory on every card scan. If disabled it will rely on the data from the scheduled synchronization.

Live Update Read Timeout

The timeout in seconds before the query issued by live update is aborted.

Live Update On Imported LDAP Connection

This setting is only applicable when multiple LDAP connections are configured. When enabled, if the PIN/carddata is already imported to Freedom, Live Update will be first performed on the LDAP connection where the PIN/carddata is imported from in order to speed up the Live Update process.

...

To add a new LDAP connection:

  1. On the Active Directory Configuration page, click the Add LDAP Connection button.

    Image Modified


  2. On the LDAP Connection page, enter the connection information of the LDAP Server. 

    Image Modified

Options

Description

Name

The name of the LDAP connection.

Server URL

The URL of the LDAP server.

Search Base

Using the query structure, this is the search base for all queries.

Domain

The DNS name of the domain that you would like to connect to.

Username (User ID)

This is a user that has permissions to query the active directory domain defined.

Password

Password of the active directory user.

...

Users, when moved in or out of these defined areas, will be added or deleted to the Freedom system.

To Import Users:

  1. On the LDAP Connection page, click the Import Users button.

    Image Modified
  2. Click the AD Users Import/Sync tab.

    Image Modified
  3. On the Import Users page: To import all users, check the Import All Users box. To import users from Groups and OUs, click the entry in the Available box to move it to the Selected box. To search users in nested Active Directory groups, select the Nested Group Search checkbox.

Options

Description

Import All Users From Groups

Imports all users who are part of the selected AD groups.

Import All Users From OUs

Imports all users found in the OU, and all sub OUs.

...

There are two types of fields to map in the User Attributes Mapping tab.  Fields that are automatically mapped and user selected fields.

  1. On the Import Users page, click the User Attributes Mapping tab.

    Image Modified

Automatically Mapped Fields

...

To further refine the import criteria on importing users, you can use create exclusion filters based on the value of the user’s AD attributes.

  1. On the Import Users page, click the AD Users Import Filters tab. 

    Image Modified

  2. There are two ways to specify the user import filter. By selecting the Attribute Exclusion Filter option, you can define filters to exclude certain users from importing to Freedom. Alternatively, you can select the Advanced LDAP Filter option to specify the actual import filter query for importing users to Freedom.

  3. Define Attribute Exclusion Filter

    Image Modified

  4. Define LDAP filter query

    Image Modified

  5. Click Save button to save the configuration.

Understanding Attribute Based Access Control

...

  • Umbrella Company Management: By Company name for contractors, employees, you can grant access to areas between time frames.

  • Business Specific Attributes: Every business have attributes that can drive access to physical areas:

  1. Title

2. Department

3. Training Level

...

Before enrolling cardholders, it is important to configure a few settings:

  1. Application Settings.

  2. Connection Settings.

Application Settings

The Application settings for VeriCert allow administrators to select a USB smartcard reader. Preferences, such as name parsing patterns, may also be found in VeriCert’s application settings.

  1. On the menu bar, click on Settings, and select Application Settings…

  2. From the Enrollment Reader dropdown list, select the USB smartcard reader detected by the software. To detect a newly installed reader, click the Refresh button to update the dropdown list.

    Image Modified
  3. If the smartcard reader has a built-on keypad:

    1. Check Use Reader’s Keypad to Enter PIN to use the smartcard reader’s keypad to enter PIN.

    2. Uncheck Use Reader’s Keypad to Enter PIN to use the Workstation’s keyboard to enter PIN.

  4. From the Printed Name Pattern dropdown list, select the name pattern that will be used to parse the printed name on a PIV credential. The user is able to test the selected pattern by clicking the Test button to test if the pattern can produce the expected result.

  5. Click Save to update Application settings.

Other Application Settings

...

The connection settings denote the Freedom API Server that VeriCert will connect to. VeriCert uses the Freedom API to enroll PIV cardholders and retrieve Access Groups to/from Freedom Access Control System.

  1. On the menu bar, click on Settings, and select Connection Settings…

  2. In the Protocol field, select the Freedom API protocol. Default is HTTP.

    Image Modified
  3. In the Server Address field, enter the IP Address of the Freedom API Server. Default is 192.168.123.101.

  4. In the Port field, enter the port of the Freedom API Server. Default is 9000.

  5. In the Username field, enter a Freedom Admin User’s Username. Default is freedom.

  6. In the Password field, enter a Freedom Admin User’s Password. Default is viscount.

  7. Click on the Test Connection button to ensure that VeriCert can contact the Freedom API using the given settings. A Connection Successful notification will be shown if settings are correct.

    Image Modified
  8. Click Save to update settings.

Enrolling Cardholders

  1. Insert the PIV card into the USB smartcard reader. VeriCert will take a moment to download and verify all required credentials.

    Image Modified
  2. Enter PIN when prompted.

    Image Modified
  3. Once the PIV credential is fully processed, verify the information and click the Next button

    Image Modified
  4. Assign Access Group to the cardholder.

    Image Modified
  5. Click Save Change to send cardholder data to Freedom.

Freedom PIV

Freedom can perform certification validation on PIV credentials during access. There are number of settings that can adjust the validation process such as status proxy update frequency, CRL download frequency, root and intermediate certificate store management, certificate policies, extended key usage extensions and PKI fault options.

...

To add a certificate to the store:

  1. Go to System->PIV->Certificate Manage.

  2. To add a certificate, click the Browse/Choose File button and select the certificate from the file system.

  3. Click the button to add the certificate.

...

 

To remove a certificate:

...

To add a certificate policy constraint to a certificate:

  1. Go to System -> PIV -> Certificate Policies.

  2. Click the tab that represents the certificate type of interest.

    Image Modified
  3. Enter the OID string (e.g. 2.16.840.1.101.3.2.1.48.11), enter the description text (optional) and click the button.

 To remove a Certificate Policy OID:

Click theX button next to the OID.

...

Extended Key Usage Extensions

...

To add an extended key usage extension constraint to a certificate type:

  1. Go to System -> PIV -> Ext. Key Usage.

  2. Click the tab that represent the certificate type of interest.

    Image Modified
  3. Enter the OID string (e.g. 2.16.840.1.101.3.2.1.48.13), enter the description (optional) and click the +  button.

To remove an extended key usage extension constraint:

Click the button next to the OID.

...

PKI Fault Options

During card access, Freedom performs a long list of validations that adhere to FICAM requirements. For institutions that may not issue PIV cards that fulfil all FICAM requirements; administrators can optionally disable certain fault validations. The following are the options that can be disabled:

  1. Invalid CA Signature

  2. Invalid CA notBefore Date

  3. Invalid CA notAfter Date

  4. Invalid Name Chaining

  5. Missing Basic Constraints

  6. Invalid CA False Critical

  7. Invalid CA False not Critical

  8. Invalid Path Length Constraint

  9. keyUsage keyCertSign False

  10. keyUsage Not Critical

  11. keyUsage Critical CRLSign False

  12. Invalid inhibitPolicyMapping

  13. Invalid DN nameConstraints

  14. Invalid SAN nameConstraints

  15. Invalid Missing CRL

  16. Invalid Revoked CA

  17. ICAM Invalid CRL Signature

  18. Invalid CRL Issuer Name

  19. Invalid Old CRL nextUpdate

  20. Invalid CRL notBefore

  21. Invalid CRL Distribution Point

  22. Valid requiredExplicitPolicy

  23. Invalid requiredExplicitPolicy

  24. Valid GeneralizedTime

  25. Invalid GeneralizedTime

  26. Invalid SKID

  27. Invalid AKID

  28. Invalid CRL format

  29. Invalid CRL Signer

  30. Golden PIV-I path

  31. OCSP - Unable to get Issuer Cert Locally

To enabled or disable PKI Fault Options:

  1. Go to System -> PIV -> PKI Fault Options.

  2. Check or Uncheck fault options.

  3. Click Save to update.

    Image Modified

CRL Summary

Freedom downloads CRL information for all cardholders in the database periodically. It provides a summary of the number of revoked certificates under each relevant issuer. See System -> PIV -> CRL Summary:

...

This section covers the steps to sign on to Freedom Admin using PIV cards.

  1. Enroll a PIV cardholder into Freedom by VeriCert.

  2. Go to Users, edit the user profile.

  3. Enable Admin function to the user.

    Image Modified
  4. Enter the logon User ID, password and appropriate privileges.

  5. Click Save.

  6. Add the PIV card's Root Certificate in System -> PIV -> Certificate Manager.

  7. Restart Freedom server (System -> Utilities -> Reboot).

  8. In Windows, make sure “Certificate Propagation Service” is enabled and started.

    Image Modified
  9. Insert PIV card into reader.

  10. In Chrome browser, go to https://<FreedomServerIP>:8443/

  11. Select the PIV Authentication Certificate for the card.

    Image Modified
  12. Enter PIN.

    Image Modified
  13. Once PIN is validated, the browse will log in to Freedom Admin.

Mobile Access

Freedom now provides location based access with mobile devices such as iPhone or Android. Traditionally each controlled area has to be associated with a reader. With this new “Geo Location” based feature, a controlled area can simply be assigned with a GPS co-ordinate or a proximity device such as a Bluetooth Beacon. Freedom first determines the user’s proximity to a door/controlled-area by comparing the location reported by the mobile. Once determined, Freedom then performs the corresponding access control operation. This feature conveniently bypasses the need for readers and access cards; instead a mobile device is used as credential identification.

...

To configure Geographic information:

  1. Select the Controlled Area

  2. Click the Geo Location tab.

  3. For GPS based access, select GPS radio button.

  4. Enter Latitude, Longitude, radius and the unit (e.g. Feet or Meter) which best cover the entrance area.

    Image Modified

  5. Click Enabled to activate Geo Location access for this area.

  6. For Beacon based access, repeat steps 1 – 2 and click Beacon radio button instead.

  7. Select the Unique ID from the Beacon dropdown list. For details on allocating Beacons in Freedom, see next section Configuring Beacon Access.

    Image Modified
  8. Click Enabled to activate Beacon access for the area.

Configuring Beacon Access

To configure Beacons in Freedom:

  1. Go to System.

  2. Click Mobile to expand its sub-menus.

  3. Click Beacon Config.

  4. Enter the following information:

Options

Description

Server

URL for the Beacon Server Portal

API Key

Key to access portal’s API.

API Version

Version of the portal’s API.

UUID

UUID for the Beacon count.

...

To register a Mobile user in Freedom, these are the general steps:

  1. Create the user and set the Mobile flag to true.

  2. Assign a mobile password for the user.

  3. Freedom server will automatically send the password to the mobile user via email.

  4. Once the password is obtained, the user may log on to the Freedom Mobile App and start enjoying the service.

Configuring email server on Freedom

  1. Go to System -> Mobile.

  2. Click Email Config.

  3. Enter the email server’s address and the sender address of the registration email.

    Image Modified

Configuring registration Email Template

  1. Go to System -> Mobile.

  2. Click menu item Mobile Onboard Email Template.

  3. Enter Mail Subject Text, e.g. Mobile App Registration.

  4. Enter Mail Content that shall contain links to download Mobile App, user password and any information that is valuable to the registration process.

  5. A reserved token USER_PASSWORD can be embedded in the mail content which will then be replaced by the user password assigned during the registration process.

    Image Modified

Managing Enterphone MESH Panels

...

MESH panel settings such as talk time, relay access digit and activation time can be configured. To access these settings;

  1. Click on the System navigationtab.

  2. On the left, click on the Enterphone MESH link.

  3. In the Actions bar, click Add Panel. The following screen is displayed:

    Image Modified
  4. Enter the Panel ID. This ID number can be found in the sitepanel.ini file for this panel. See Mesh Parameter Files for more information.

When panels are working as Global panels, each panel in the Main-Peer network must have a unique Panel ID. The recommended ID’s would be to start from the default 10000 and onwards (e.g. 10000 Front Lobby Panel, 10001 Back Door Panel).

...

In the Enterphone MESH tab on the View/Edit Controlled Area screen:

  1. Select an Enterphone MESH panel from the dropdown box.

    Image Modified
  2. To add a second panel to this controlled area, click the add + button. to

  3. Click Save.

Changing Screen Saver Image File

...

By default, the screensaver activates after 60 seconds of inactivity. This number can be changed from the file sitePanel.ini.

  1. Click on the System navigationtab.

  2. On the left, click on the Administration link.

  3. Click on the System Parameters sub link.

  4. Click on the sitePanel.ini file.

    Image Modified
  5. Edit the line screensaverTimeOut=60; change 60 to any other value. Do not edit any other value.

  6. Check the Reboot after save box. This will do a full restart of the panel after you save the file.

  7. Click Save.

Calibrate MESH Screen

MESH parameter files are used to configure the software on both the server and the panel.

...

sitePanel.ini

To Edit a Parameter file

  1. Click on the Administration link from the System navigation tab.

  2. Click on the System Parameters sub link.

  3. Click on the file you would like to edit.

  4. Make any changes necessary to the text presented in the text area.

  5. If you would like a backup of the existing file, choose Write Backup.

  6. Check the Reboot after save box if a reboot is required. Keep in mind that for the changes to take effect a full system reboot is required.

  7. Click Save.

To Backup Parameter Files

  1. Click on the Administration link from the System navigation tab.

  2. Click on the System Parameters link.

  3. Select the file you would like to back up.

  4. To back up, click the Download link next to the file.

  5. Select a location to back up the file.

  6. Name the file with the extension *.ini.

  7. Click Save.

Main and Peer Configuration (Sync MESH Units)

...

Follow the instructions below on any unit that needs to be configured as a peer. No configuration is necessary on the main units.

  1. Open the siteEngine.ini using the instructions from System Parameters.

  2. Locate the line MainPeers=

  3. Add the IP address of the main server. For example, MainPeers=192.168.123.101

  4. Locate the line SystemName=

  5. Add an appropriate name for the peer. For example, SystemName=FrontPanel

  6. Save the siteEngine.ini

  7. Restart the MESH peer system

Once the configuration is done, connect to the Main server and log in. At this point there should be a button labeled with the names of Peer devices along the top of the Administration System’s interface. If there are any changes that need to be made to non-common data, these buttons can be used to connect to the Peer devices. If the button is absent from the Main Server or Panel, check over the configuration that was made up to this point then log out and log back in.

...

Once the connection is established between a peer and a main, there may be some data inconsistencies. To clear all the data on the peer and copy everything from the main a Copy Common Data needs to be done.

  1. Click on the System navigation tab.

  2. On the left, click on the Administration link.

  3. Click on the Copy Common Data sub link.

  4. From the list of Available Servers, select the main server.

  5. Click Copy

This step could take a long time if the database is large.

...

Business admin users are restricted on what they can add or view. Also, business admin users do not have access to the System tab and are therefore unable to manage the system or view any system related information.  In addition, business admin users cannot add or delete suites, controlled areas or schedules.  They can add user access groups and link them only to the controlled areas that are associated with that business. Any of the activity logs that are related to other businesses are not viewable by that business admin user.  A single business can have more than one controlled area. Also, a single business admin user can belong to more than one business.

Create Business Users

  1. Add a Business using the instructions in the Businesses section of Chapter Suites.

  2. Add a new admin user using the instructions in the section: Site Administrator Management.

  3. From the Add Admin User screen, select the business name from the Business list.

Tip

To select more than one business for that business admin user hold down CTRL on the PC  (⌘ key on a Macintosh) and select additional businesses.

...

Because business admin users can’t access the System tab, the backup log instructions are different.

  1. Click on the Events navigation tab.

  2. Select a range of dates in the From and To Dates. Note that the maximum number of days is 31.

  3. Click Search

    Image Modified
  4. Download the search result in CSV Format.

Alarm Management System (AMS) Lite

...

You can also select video to be exported, and move it to the next screen in a two screen scenario:

...

  1. Select the video video that you would like to export.  This video feed will then be marked around it as red (see photo above as an example).

  2. Select an area in the freedom Exported Video 4x4 that you would like the video to be displayed.

  3. The video now appears in that area.

Once a configuration is setup, it may be saved to be recalled.  All video saves are available across all systems.

Navigation Overview: Save Video Export View

  1. Export Video

  2. Create a name and enter it into the system:

  3. Select Save

    Image Modified

Navigation Overview: Event Video

...

To add a map of a floor plan or other system (any web file format supported):

  1. In the Controlled Areas navigation tab, click on the Maps link. The following screen is displayed:

    Image Modified
  2. Current maps are listed on the left and the controlled areas are listed on the right. Click on a map to view it; click on the  edit button to change the file associated with this map.

    Image Modified
  3. To add a new map, click on the +Add Map button. The following screen is displayed:

    Image Modified
  4. Enter Name and a Description for the map.

  5. Click the [Choose file] button beside Map Image to import the map file image.

  6. Click the [SAVE] button.

Place Controlled Area Icon On Map

...

To configure controlled area maps:

  1. Click on the Controlled Areas navigation tab.

  2. On the left, click on the Maps link. The following screen appears:

    Image Modified
  3. Drag and drop controlled areas onto the point.

Place Video Icon On Map

To setup the video portion of the system with video you must login as the system administrator account and ensure that the video is enabled.  If the video is not enabled, after turning this setting on, then you may need to check your server activation and ensure you have NVR Video licensing enabled.

...

To change a controlled area map icon:

  1. In the Controlled Areas navigation tab, click on the Icons link. The following screen is displayed:

    Image Modified
  2. Click the [Choose file] button beside the icon to change and navigate to the new icon image and click Open.

  3. The selected file name is displayed. Click the [Update] button to replace the icon image with this new image.

...