Secure Perfect 6.1.1 User Manual
41
Alarm Form Completion
Reference Topics:
Alarm Tab
Set Instruction Tab
Digital Outputs Tab
DO Groups Tab
Schedule Tab
Events Tab
Status Tab
CCTV Tab
Overview
Editing or Modifying Alarm Records on the Alarm Form
Use the
Alarm Form
to modify an alarm record. With the exception of external alarms, you cannot delete
alarm records; alarms are managed by the owner of the alarm record. The alarm owner can be an API,
board, CCTV Interface, digital input, Kalatel camera, Kalatel DVMR, micro, or reader. For an alarm to
display on the Alarm Monitor Form, you can either select the Monitor field on the Alarm Form or schedule
the alarm to be monitored. The alarm will now display if it is set to be monitored and changes to an alarm
condition.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Time Schedules Form or Events
Form, all schedule or event records will display.
To search for, view, or edit existing records, click
Search
. A list of records will display.
Description
When the records are created, the default description is in the format:
mmmm-b-pp
where
mmmm
represents the micro number to which this alarm is associated,
b
represents the board number, and
pp
represents the point or device number.
•
Example:
0001-1-01 Tamper
This tamper alarm is on micro 1, board 1, alarm 1. To change this description, select and enter text over
the existing text and save the record. It is recommended that you keep the
mmmm-b-pp
prefix in each
alarm displayed to aid in locating the alarm points on the physical hardware.
•
Example Failover Alarm:
BCTTOKYO Failover Alarm
A failover alarm is created when backup clients are assigned to the default client computer. The alarm
record displays the default client computer name as part of the description. This failover alarm indicates
the default client as BCTTOKYO. If the description indicates
Region Failover Alarm
, the name of
the Regional Database Server is included in the description.
•
Alarm descriptions coming into Secure Perfect from an API can be ambiguous, and the source of the
alarm point may be unclear. It is recommended that you rename API alarm points to correspond to the
actual physical point, to assist in processing and acknowledging when an alarm displays on the Alarm
Monitor.Facility
A
facility
can be assigned for the alarm from the drop-down list of available facilities for assignment by
this operator.
Содержание v6
Страница 4: ...Secure Perfect 6 1 1 User Manual 2 ...