Saflec Systems Architecture 17.1
Saflec Systems Architecture 17.1
Registration: 2003/009218/07
Saflec Systems
48 Richard Road
Industria North
1709
Introduction:
Saflec is a South African company and all hardware & software development is done at our
offices in Johannesburg. We have designed our system with the installers and end user in mind,
always thinking of ways to make the system more user-friendly and easier to use while keeping
it simple to design and install. Saflec has to date a large list of satisfied clients that are using our
system in all industries, including corporate, mining and government.
1. Detailed Specification
1.1.1. General
The Access Control system shall use a Client Server architecture based around a
modular PC network, utilizing industry standard operating systems, networks and
protocols
The system shall allow the distribution of system functions such as monitoring and
control and graphical user interface etc. across the network to allow maximum
flexibility and performance. The architecture shall include support of various Wide
Area Networks using standard hardware and software to link door controllers into a
single integrated system. The network protocol used shall be industry standard
TCP/IP.
1.1.3. Network
The Server Computer and Operator Workstation hardware shall be capable of
interfacing to an IEEE 802.3 Standard Local Area Network (LAN), and also
capable to operate using IEEE 802.11 Wireless Local Area Network (WLAN).
Server / VMWARE
Intel Core i5 330UM 1.20GHz
4GB of RAM
Graphics card capable of 1280x1024 pixel resolution and 65K colors
12 function-key keyboard
Mouse pointing device
80 GB Hard disk drive
DVD ROM drive
TCP/IP adaptor
UL Listed server computer platform shall be used when UL compliant
system is required.
Tenderer to include as an option, the utilization of Virtual machines (eg.
VMWare) if supported by the solution.
1.2.3. Printers
Printers shall be available for printing either reports or online alarms. Report
printers shall be any Windows compatible printer such as a laser printer. Alarm
printers shall be 132 column printers to allow real time alarms to be printed as
they occur.
1.3. Communications
The ACCESS CONTROL system shall provide communications over a
variety of physical media topologies as follows:
Ethernet
Proprietary Networks
Once a control device is configured and placed in service, the system shall
automatically begin background diagnostic scanning of the device to ensure that
communications are monitored independently of any monitoring scanning.
The system shall perform checks on data integrity of all data acquired from the
device. If an invalid or time out response is received, the data shall be ignored
and the system will record the transaction as an error. Statistics shall be kept and
displayed by the system on errors encountered in communication by means of a
communications barometer. The barometer shall increment for every failed call
and decrement for each successful call. In addition, the system shall alarm
separate marginal and failure conditions based on user-defined limits to advise the
operator of the device and link that has failed. Communications statistics shall be
displayed as standard on the system and shall also be available as part of the
reporting system or custom displays.
Standard services supported by the server computer operating system will include
the following:
Multi-tasking Multi-user support
Real Time and relational databases to integrate connected systems
into unified presentation layer
ACCESS CONTROL Application software
The networking software shall use the industry standard TCP/IP LAN protocol. The
server computer or an alternative network connected computer shall be capable of
acting as a File Server for graphic displays and cardholder photo images. All LAN
connected Operator Workstations shall be able to view custom displays and photo
images from the server computer.
All system peripherals shall be capable of being connected to the server computer
via the LAN.
1.6.1. General
The operator interface provided by the system shall allow for efficient
communication of operational data and abnormal conditions. It shall provide a
consistent framework for viewing of information. The ACCESS CONTROL shall also
have an unlimited number of custom (facility specific) displays created to meet the
needs of the specific facility.
The operator interface shall use a Tool Bar for common operator commands.
The operator shall be able to request display of commonly used displays and
activate system functions via Drop-Down menus
All operator interface input shall be possible using only the pointing device and
QWERTY section of the keyboard. Fast access to common functions shall be
possible using predefined function keys on the keyboard. A Keyboard overlay
shall be available to assist operators with using these function keys.
If necessary, each operator can be assigned a user profile that defines their
permissions
All actions initiated by the operator shall be logged in the Event database by
operator identifier. In addition, any control actions to a given point shall only be
allowed if the control level configured in the operator's profile exceeds the level
assigned to the controlled point.
Utilities shall be provided to allow administration of the operator
passwords.
1.6.5. Sign-On/Sign-Off
The operator shall be permitted to sign on to the system if the correct Operator
Identity and the Operator Password have been entered. This password shall be
encrypted. It shall also be possible to have the system authentication integrated
directly into Windows, Windows Group Accounts, or an LDAP Server such that the
operator uses the pre-existing account details to sign on to the ACCESS
CONTROL system. This ensures that operators only need to remember 1 set of
credentials for both their workstation and the ACCESS CONTROL
1.7.1. Reporting
The system shall support a flexible reporting package to allow easy generation
of report data. The reports provided shall include pre-configured standard
reports for common requirements.
Data accessible for Excel reporting shall include alarms, events, and point
parameter values.
Examples:
Schedules shall be capable of recurring on any multiple of weeks (every
1 week, every 2 weeks, every 7 weeks, etc.)
The ACCESS CONTROL time schedule must also provide the ability to override the
normal schedule for holidays or special occasions. The user shall be able to create
multiple different grouping of dates (Calendars) that can be assigned to individual
points as applicable.
Examples:
The cardholder database shall support at least 1,000,000 cardholders. The data
specific to the requirements of different ACCESS CONTROL systems. It shall be
possible to increase or decrease this number of user definable fields. Systems
without the ability to increase the number of user definable fields shall not be
accepted.
1.9.4. Multi-Selection
It shall be possible for multiple cardholders to be selected and a single edit to be
performed on all of these cardholders selected. For example, it shall be possible to
select all cardholders in department “X” and change their address to “Z” in a single
operation
1.9.5. Templates
The ACCESS CONTROL shall define templates in order to add groups of cardholders
with predefined characteristics. A template shall contain all the relevant details for a
particular group of cardholders such as all their user fields and access levels. When
adding a new cardholder to this group using the template, the cardholder shall be
added with the same characteristics as defined in the template.
When cardholders or cards are deleted or expired, or when a card is returned from
use by a cardholder, the system shall automatically download this to the field
controllers so these cards no longer provide access.
The operator shall be able to access a summary display listing all time periods and
their descriptions. From this display the operator shall, if the operator is configured
for the time period’s Organization code, be able to go to a time period detail display
showing the time periods configurable parameters.
Once the changes have been saved the ACCESS CONTROL shall automatically
download the new data before it is enabled in the Access Control System. This shall
allow operators to make a number of changes but only be required to download
once.
1.10.2. Zones
The operator shall be able to access a summary display listing all zones and their
descriptions. From this display the operator shall, if the operator is configured for
the zones assigned Organization, be able to go to a zone detail display showing the
zone configurable parameters.
Zones shall be automatically created when card readers are configured in the
system. Zones are defined by the card readers, which allow entry to the physical
space, which the zone represents. One reader may only be defined as entering one
zone. Each reader will indicate the zone it allows entry to and optionally the zone
from which one has exited
It shall be possible to assign cardholders and cards separate expiry dates, enabling
a card assigned to a cardholder to expire before the cardholder expires. However, it
shall not be possible for the card expiry date to exceed the cardholder expiry date
of the cardholder to which a card is assigned.
accesses a card reader; an event will be listed in the event summary. It shall be
possible to automatically view all the events generated for a particular cardholder
directly from the cardholder displays without having to run a separate report.
Image capture and printing of photo identification badges must be fully integrated
into the ACCESS CONTROL system and must use the same database. Any system,
which uses a separate photo badging system or separate database, will not be
acceptable.
Capture devices must include Video Capture cards, Digital Cameras, scanners and
signature tablets and capture facilities must support the MCI or TWAIN standards
for image capture. Devices may be connected directly via PC boards or through
serial or USB ports. If using a Video Capture card for image capture, a live preview
facility must be provided. Import and export facilities for images shall also be
available.
The ACCESS CONTROL system must provide a tool for the creation of photo
badging card layouts. This must allow the incorporation of standard display creation
facilities such as image import, a variety of fonts and text effects, a variety of tools
for drawing objects and a facility for linking to the cardholder database and any
user fields within this. This tool shall be the same tool as used for the creation of
custom graphics in the ACCESS CONTROL system as described in section 1.6.9 so
as to reduce training and maintenance requirements for the system.
Manage Incoming visitors : Record their data, assign a badge and print a pass
Manage outgoing visitors : Retrieve their badge and store the visit data
Pre-Registering Visitors
Temporary Badge assignment
The visitor management system shall have the ability to capture a visitor’s picture,
and store data of ID documents such as a passport when used with the
appropriate document capture tools like a scanner.
All information about when a visitor arrived and when a visitor departed shall be
recorded in the standard ACCESS CONTROL event summary. For visitors who are
assigned access control cards, it shall support the automatic expiry of their cards
Unlimited doors
All existing integration included
Can use client software for remote administration
MS SQL as database platform
Once-off license
All standard functions included eg: reporting, anti-pass back and zone
control
Multiple companies support
Flexible GUI interface
Multiple site support
Extremely flexible event-based action model.
Every controller can be linked on an RS-485 device network that can have up to 16
controllers. RS-485 is an easy and secure way of connecting multiple controllers
and allows long cable runs.
An entire system can have many device networks which means that the system
can essentially be as large as necessary, limited only by the server and network
capabilities.
One of our larger systems to date consists of more than 200 device networks, 500
controllers and 4000 access points spread across the whole of South Africa, but
centrally managed.
Saflec offers a variety of Ethernet controllers. The entry level 3 series controller
and the new 6 series controllers
1.17.1. The SDC-320 Two Door Ethernet Controller offers the following features:
1.17.2. The SDC-325 Sallis Ethernet 8 Door Controller offers the following
features:
1.17.3. The SDC-520 / 550 controllers have the following functionality. The 5
series were discontinued and replaced by the 6 series controllers.
1.17.5. The SDC-655 Sallis Ethernet 15 Door Controller offers the following
features:
1.17.6. The SEB-710 units can only connect to the SDC-550 / 650 controller by
using the expansion header on the controller. The expansion units offer
the following
1.17.7. The SEB-721 has a built-in remote receiver to be used with most rolling-code
(code hopping) remotes as a longer range option.
4 x digital inputs
2 x relay outputs
Can be used with all 5 series controllers
RS-485 host connection to controller
Compatible with 1,2,3 & 4 button transmitters
Our readers work on 125 KHz frequency and can read any EM4102, Hi-Tag 1 & 2
cards.
We manufacture the readers with the following connection options:
SSR-201, RS-485 reader with addressing
SSR-202, Wiegand reader (can be programmed to send out CLOCK &
DATA output) for 3rd party applications
SSR-250D, RS-485 display reader
SSR-250DKP, RS-485 display with a keypad reader
SSR-221, USB take-on reader (uses power from USB port and no drivers
needed – emulates a USB keyboard)
SSI-301W, RS485 to Wiegand converter. 12Vdc must be supplied to the
RS-485 connector and Wiegand connector
We are willing to consider integrating other 3rd party devices into the software, but
this will be handled on a case-by-case basis.
Our software is integrated to various CCTV platforms. For more details please
contact our office or visit our webpage at www.saflecsystems.co.za
HID Global’s iCLASS SE® platform goes beyond the traditional smart card model
to offer a secure, standards-based and flexible platform that has become the new
benchmark for highly adaptable, interoperable and secure access control solutions.
multiCLASS SE® readers simplify migration from legacy technologies with support
to 125 kHz EM4102 tecgnology.
The Saflec controllers are also fully integrated to the new Secured communications
offered by HID by using OSDP with Secure Channel Protocol. This includes the
option to add their Mobile functionality to the iClass reader leveraging mobile
devices to access doors, parking facilities and gates.
Regards