International Electronics, Inc. Hub Manager™ Professional V8 Access Control Software User Manual

Total Page:16

File Type:pdf, Size:1020Kb

International Electronics, Inc. Hub Manager™ Professional V8 Access Control Software User Manual International Electronics, Inc. Hub Manager™ Professional v8 Access Control Software User Manual This equipment is designed to be installed and serviced by security and lock industry professionals. For Support Please Contact: Company Name: ________________________________ Phone: _______________________________________ Hub Manager™ Professional v8 Copyright 2008 Software User Manual \ Help File International Electronics, Inc. 6045011, Rev 8.0, D8 Hub Manager™ Professional v8 IEI Hub Manager Professional v8 I Table of Contents Chapter 1: Using Online Help 1 Using Help ....................................................................................... 1 Chapter 2: Foreword Chapter 3: Installation 1 Installation ....................................................................................... 6 Chapter 4: Overview 1 General Overview....................................................................................... 15 2 Initial Set Up ....................................................................................... 23 3 Menu System ....................................................................................... 28 4 Running the software....................................................................................... 30 5 System Setup Tasklist....................................................................................... 32 6 PDA Software ....................................................................................... 35 7 Uninstall ....................................................................................... 47 Chapter 5: System 1 System Menu ....................................................................................... 50 2 System Manager....................................................................................... 50 3 Login ....................................................................................... 70 4 Logout ....................................................................................... 71 5 Change Login Password....................................................................................... 71 6 Exit ....................................................................................... 72 Chapter 6: Database 1 Database Menu ....................................................................................... 73 2 Operators ....................................................................................... 73 3 Operator Wizard....................................................................................... 76 4 Sites ....................................................................................... 77 Site Wizard ....................................................................................... 82 Serial Connection....................................................................................... 83 PDA Connection....................................................................................... 83 Data Transfer Device....................................................................................... (DTD) Connection 85 SEG LAN/WAN....................................................................................... Connection 106 Dynamic IP....................................................................................... Address 113 Dynamic IP....................................................................................... Address, non-expiring lease 117 Static IP Address....................................................................................... 117 Modem Connection....................................................................................... 127 Managing Stand-Alone....................................................................................... Controllers 129 IEI Hub Manager Professional v8 Contents II 5 Time Zones ....................................................................................... 131 6 Doors ....................................................................................... 134 HC500, Hub+\Max,....................................................................................... Max 2 v1 and Max 2 v2 149 prox.pad plus....................................................................................... IR 150 prox.pad plus,....................................................................................... Max 3 v1 and Max 3 v2 152 LS2\P ....................................................................................... 160 Door Wizard ....................................................................................... 161 7 Access Levels ....................................................................................... 162 8 Access Level Wizard....................................................................................... 169 9 Users ....................................................................................... 172 User Import Wizard....................................................................................... 195 Add User Group....................................................................................... 198 10 Holidays ....................................................................................... 200 Chapter 7: Communications 1 Communications....................................................................................... Menu 204 2 Security Chip ....................................................................................... 204 3 Import Door Settings....................................................................................... 204 4 Import\Export Doors....................................................................................... 205 5 Network Query....................................................................................... 209 6 System Dashboard....................................................................................... 211 Chapter 8: Tools 1 Tools Menu ....................................................................................... 216 2 Log Archiving ....................................................................................... 216 3 Audit Archiving....................................................................................... 217 4 Database Backup/Restore....................................................................................... 218 5 Database Conversion....................................................................................... Utility 220 6 Run COM Port Test....................................................................................... 223 7 Scheduled Log....................................................................................... Import 224 8 Scheduled Log....................................................................................... Import Reminder 225 9 Table Initialization....................................................................................... 226 10 Application Initialization....................................................................................... 227 11 Indexing ....................................................................................... 228 12 Options ....................................................................................... 230 Chapter 9: Reports 1 Reports Menu ....................................................................................... 235 2 Printer Options....................................................................................... 235 3 Log Filter ....................................................................................... 236 4 Time Management....................................................................................... 240 5 Misc. Log Reports....................................................................................... 244 IEI Hub Manager Professional v8 III 6 Assignment Reports....................................................................................... 245 7 Database ....................................................................................... 252 8 Audit ....................................................................................... 254 9 Archive Viewer....................................................................................... 254 10 Generate Data .......................................................................................for External Report Writer 256 11 Scheduled Log....................................................................................... Import Errors 256 Chapter 10: Help 1 Help ....................................................................................... 257 2 Online Support....................................................................................... 257 3 Check for Updates....................................................................................... 257 4 Check for Custom....................................................................................... Updates 259 5 Upgrading Hub....................................................................................... Manager™ Professional 260 6 About ....................................................................................... 261 7 Glossary ....................................................................................... 263 Chapter 11: Obtaining Technical Support 1 Obtaining Technical....................................................................................... Support 265 Chapter 12: Copyright Information 1 Copyright Information......................................................................................
Recommended publications
  • Software User Guide
    Software User Guide • For the safe use of your camera, be sure to read the “Safety Precautions” thoroughly before use. • Types of software installed on your computer varies depending on the method of installation from the Caplio Software CD-ROM. For details, see the “Camera User Guide”. Using These Manuals How to Use the The two manuals included are for your Caplio Software User Guide 500SE. Display examples: 1. Understanding How to Use Your The LCD Monitor Display examples may be Camera different from actual display screens. “Camera User Guide” (Printed manual) Terms: This guide explains the usage and functions In this guide, still images, movies, and sounds of the camera. You will also see how to install are all referred to as “images” or “files”. the provided software on your computer. Symbols: This guide uses the following symbols and conventions: Caution Caution This indicates important notices and restrictions for using this camera. 2. Downloading Images to Your Computer “Software User Guide” Note *This manual (this file) This indicates supplementary explanations and useful This guide explains how to download images tips about camera operations. from the camera to your computer using the provided software. Refer to This indicates page(s) relevant to a particular function. “P. xx” is used to refer you to pages in this manual. Term 3. Displaying Images on Your This indicates terms that are useful for understanding Computer the explanations. The provided software “ImageMixer” allows you to display and edit images on your computer. For details on how to use ImageMixer, click the [?] button on the ImageMixer window and see the displayed manual.
    [Show full text]
  • End-User Computing Security Guidelines Previous Screen Ron Hale Payoff Providing Effective Security in an End-User Computing Environment Is a Challenge
    86-10-10 End-User Computing Security Guidelines Previous screen Ron Hale Payoff Providing effective security in an end-user computing environment is a challenge. First, what is meant by security must be defined, and then the services that are required to meet management's expectations concerning security must be established. This article examines security within the context of an architecture based on quality. Problems Addressed This article examines security within the context of an architecture based on quality. To achieve quality, the elements of continuity, confidentiality, and integrity need to be provided. Confidentiality as it relates to quality can be defined as access control. It includes an authorization process, authentication of users, a management capability, and auditability. This last element, auditability, extends beyond a traditional definition of the term to encompass the ability of management to detect unusual or unauthorized circumstances and actions and to trace events in an historical fashion. Integrity, another element of quality, involves the usual components of validity and accuracy but also includes individual accountability. All information system security implementations need to achieve these components of quality in some fashion. In distributed and end-user computing environments, however, they may be difficult to implement. The Current Security Environment As end-user computing systems have advanced, many of the security and management issues have been addressed. A central administration capability and an effective level of access authorization and authentication generally exist for current systems that are connected to networks. In prior architectures, the network was only a transport mechanism. In many of the systems that are being designed and implemented today, however, the network is the system and provides many of the security services that had been available on the mainframe.
    [Show full text]
  • BROADBAND SPECIFICATION GUIDE Everything You Need to Know to Specify a Broadband/RF System
    BROADBAND SPECIFICATION GUIDE Everything You Need to Know to Specify a Broadband/RF System One Jake Brown Road, Old Bridge, NJ 08857 Version 6 • $25.95 U.S.A. 800-523-6049 • Fax: 732-679-4353 www.blondertongue.com Rev: 130211 Broadband Specification Guide Introduction This Broadband Specification Guide has been designed to break down a broadband system into simple building blocks to be used when specifying an RF System for any type of facility. Blonder Tongue Laboratories, Inc. has been in the business of manufacturing equipment for broadband systems for over 60 years. We have taken that knowledge and experience to formulate this Broadband Specification Guide especially for specifiers/architects/engineers using easy-to- understand descriptions accompanied with relevant diagrams. While the information presented in this guide is intended to help you design a RF systems it is not intended to be applicable or suited to every circumstance which might arise during the design or construction phases of such a system. The information and diagrams contained in this guide are the exclusive property of Blonder Tongue Laboratories, Inc., and may be reproduced, published for specifying, designing a RF system, or promoting Blonder Tongue products. No warranty or liability is implied, nor expressed and this guide should not be construed to be a replacement for knowledge and experience provided by a professional RF designer/engineer. Suggestions or feedback? Simply e-mail us at [email protected] with the subject line of “Broadband Specification Guide.” ©2012 Blonder Tongue Laboratories, Inc. All rights reserved. All trademarks are property of their respective owners.
    [Show full text]
  • Student Computer User Agreement
    STUDENT COMPUTER USER AGREEMENT GUIDING PRINCIPLE OF THIS AGREEMENT: Lakeside’s technological resources are dedicated to further the school’s mission and to serve the educational pursuits of its students. Students using Lakeside’s technology services are expected to behave in accordance with the Community Expectations documented in the family handbook. Students are expected to act in ways that show consideration and respect for other people and enhance an open atmosphere of trust, both offline and online. TECHNOLOGY SERVICES The use of Lakeside’s technology services – tech support, network access, email accounts, storage services, software subscriptions and all other school-owned computer resources – is a privilege, not a right. This privilege may be revoked at any time for abusive conduct, or failure to abide by the school’s expectations and/or responsible usage listed below. GENERAL EXPECTATIONS ▪ Lakeside email accounts, software and services, and onsite network access are provided primarily for school-related work. ▪ Any user of Lakeside’s electronic communications resources is expected to respect the person and privacy of others. ▪ The configuration of school-issued computers (operating system, security settings and software applications) may not be altered. ▪ Using the Lakeside computer network to exchange or store pirated software, unlawful information, or other unauthorized copyright-protected material (i.e. music, multimedia) in any file format is strictly prohibited. ▪ Students are expected to maintain the integrity of their computing devices so as not to bring viruses, malware or spyware to school. Unprotected and infected devices are forbidden to connect to the school network and, when detected, will be disconnected from the network until resolved.
    [Show full text]
  • The Management of End User Computing a Research Perspective
    HD2 8 .M414 Oe>NeV THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S. Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Centerfor Information Systems Research Massachusetts Institute of Technology Sloan School of Management 77 Massachusetts Avenue Cambridge, Massachusetts, 02139 THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S . Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Rockart - Flannery 1983 Center for Information Systems Research Sloan School of Management Massachusetts Institute of Technology MAY 3 1 1983 RECe;v£d 1- ABSTRACT Based on interviews with 200 end users and 50 information systems managers concerned with end user computing, end users can be classified into six distinct types. Each of them needs differentiated education, support and control from the Information Systems function. End users exist primarily in staff functions. They develop and use a wide spectrum of computing applications ranging from "operational systems" of the type usually developed by information systems professionals to complex analytical programs. To support a large number of their applications a new computing environment, "the third environment" (in addition to the traditional COBOL and timesharing environments) must be developed by Information Systems (I/S) management. Close attention must also be paid by I/S management to the need to involve "functional support personnel" (end users in each functional area who spend most of their time programming and aiding other end users) in the I/S end user management process. An end user strategy is needed in each organization. In addition, users cite increasing needs for support from I/S management.
    [Show full text]
  • PDA Users Guide
    130 Family of Seismic Recorders PFC_130 Users Guide (Version 1.2.4.40) Refraction Technology PFC_130 Users Guide 130-PFC-001-K December 18, 2006 Refraction Technology, Inc. 1600 Tenth Street, Suite A Plano, Texas 75074 USA Voice: 214-440-1265 Fax: 972-578-0045 EMAIL: [email protected] FTP: ftp.reftek.com WWW: http://reftek.com ©Copyright 2003-2006 Refraction Technology, Inc. All rights reserved. Printed in USA ii 130-PFC-001-K PFC_130 Users Guide Preface All references to a PDA in this guide refer to any type of device that is compatible with the Palm™ operating system (OS) with RS232 (i.e., Palm IIIe™, Palm IIIxe™, Palm V™, Palm VII™, Palm M105™, Handspring Visor™, TRG Pro™, etc.) REF TEK Support and update notifications As a valued user of REF TEK equipment we would like to provide the best support possible by keeping you up to date with our product updates. If you would like to be notified of any REF TEK product updates please spend a couple of minutes to register with the reftek customer support team. To Register, either send an email to [email protected] giving us your name and REF TEK product you currently have or fill out our online registration form at www.reftek.com/registration Once we register your contact we will only send necessary notifications via email. The same notifications will be shown on our website’s www.reftek.com/support page Thanks, Your REF TEK support team PFC_130 Users Guide 130-PFC-001-K iii Revision History Rev Date Reason for change Affected Pages 0.1 1/12/02 Initial release A 10/04/02 Release of 1.0 130
    [Show full text]
  • (Malicious Software) Installed on Your Computer Without Your Consent to Monitor Or Control Your Computer Use
    Spyware is a type of malware (malicious software) installed on your computer without your consent to monitor or control your computer use. Clues that spyware is on a computer may include a barrage of pop-ups, a browser that takes you to sites you don't want, unexpected toolbars or icons on your computer screen, keys that don't work, random error messages, and sluggish performance when opening programs or saving files. In some cases, there may be no symptoms at all. While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can: Collect information stored on the computer or attached network drives, Collect various types of personal information, such as Internet surfing habits, sites that have been visited Collect user names and passwords stored on your computer as well as those entered from the keyboard. Interfere with user control of the computer Install additional software on the computer Redirect Web browser activity. Change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. The best defense against spyware and other unwanted software is not to download it in the first place. Here are a few helpful tips that can protect you from downloading software you don't want: Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads. Use anti-virus and anti-spyware, as well as a firewall software, and update them all regularly.
    [Show full text]
  • Radio Science Bulletin Staff
    INTERNATIONAL UNION UNION OF RADIO-SCIENTIFIQUE RADIO SCIENCE INTERNATIONALE ISSN 1024-4530 Bulletin Vol. 2017, No. 363 December 2017 Radio Science URSI, c/o Ghent University (INTEC) St.-Pietersnieuwstraat 41, B-9000 Gent (Belgium) Contents Radio Science Bulletin Staff ....................................................................................... 3 URSI Offi cers and Secretariat.................................................................................... 6 Editor’s Comments ..................................................................................................... 8 On Low-Pass, High-Pass, Bandpass, and Stop-Band NGD RF Passive Circuits 10 Recent Developments in Distributed Negative-Group-Delay Circuits .................28 A Zero-Order-Closure Turbulent Flux-Conservation Technique for Blending Refractivity Profi les in the Marine Atmospheric Boundary layer ................... 39 Conformal Antennas for Miniature In-Body Devices: The Quest to Improve Radiation Performance ........................................................................................ 52 In Memoriam: Jean Van Bladel ............................................................................... 65 In Memoriam: Karl Rawer ...................................................................................... 66 In Memoriam: Thomas J. (Tom) Brazil .................................................................. 68 Et Cetera .................................................................................................................... 70
    [Show full text]
  • ICU Medical Mednet™ Software User Guide
    Software User Guide For a list of ICU Medical MedNet compatible devices approved by country, refer to the ICU Medical MedNet Device Compatibility Matrix available through your ICU Medical Technical Support. 430-98350-001 (%, 2017-) Notes: ICU Medical MedNet™ Software User Guide Rx Only 16037-92-01 IMPORTANT Refer to this guide for proper use, warnings, and cautions associated with the installation and upgrade of the ICU Medical MedNet™ Software performed by the ICU Medical Service Team. Please contact your sales representative for any questions associated with installing and configuring the ICU Medical MedNet™ Software. The help files included with the ICU Medical MedNet™ software are provided as reference only. Please read this entire guide before using the ICU Medical MedNet™ Software. Please also read the ICU Medical Release Notes before using the ICU Medical MedNet™ Software. Intended Use The ICU Medical MedNet™ Medication Management Suite (MMS) is intended to facilitate networked communication between MMS compatible computer systems and MMS compatible Infusion pumps. The MMS provides trained healthcare professionals with the capability to send, receive, report, and store information from interfaced external systems, and to configure and edit infusion programming parameters. The MMS is intended to provide a way to automate the programming of infusion parameters, thereby decreasing the amount of manual steps necessary to enter infusion data. All data entry and validation of infusion parameters is performed by a trained healthcare professional
    [Show full text]
  • Die Meilensteine Der Computer-, Elek
    Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden.
    [Show full text]
  • 1 Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner
    Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner a. Creating a Custom Workout III. Creating a Pro or Elite Treadmill Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Incline Profile d. Designing Your Speed Profile IV. Creating a Pro Bike Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Resistance Profile V. Accessing a Custom Workout VI. Beaming a Custom Workout a. Beaming to a Pro or Elite Treadmill b. Beaming to a Pro Bike c. Beaming to a PDA Device VII. Editing a Custom Workout VIII. Deleting a Custom Workout IX. Reviewing a Completed Workout X. Collecting an Existing Workout from a Pro or Elite Treadmill or Pro Bike XI. Appendix A: List of PDAs Compatible with Pro Partner 1 I. Introduction Thank you for choosing Star Trac for your fitness needs. Are you ready to take your clients’ workout to a new level? The Star Trac Pro Partner software program will make your Palm-powered PDA (Personal Digital Assistant) an integral part of your personal training experience when using a Star Trac Pro or Elite Treadmill or Pro Bike. Personalized workouts and tracking client workout data are now all in the palm of your hand! In this manual you will learn how to use the Training Partner application to design custom workouts and track workout information for your clients for a more personal approach. It’s simple! Just follow the steps in this user manual and you’re one step closer to making your personal training more efficient.
    [Show full text]
  • The Strongest Affection and Utmost Zeal Should, I Think, Promote the Studies Concerned with the Most Beautiful Objects
    “The strongest affection and utmost zeal should, I think, promote the studies concerned with the most beautiful objects. This is the discipline which deals with the universe’s divine revolutions, the stars’ motions, sizes, distances, risings and settings…for what is more beautiful than heaven?” —Copernicus: On the Revolutions of the Heavenly Spheres, Andreas Cellarius 1543 [front:] The Copernican System from Andreas Cellarius, plate 5 from Atlas Coelestis seu Harmonica Macrocosmica, 1660. (for more 17th century star maps, visit www.cosmicwindow.com) COSMIC WINDOW TM PERSONAL APPOINTMENT CALENDAR created for KATIE HOLMES December 18, 1978 9:32 PM EST Toledo, Ohio Sun: Sagittarius I Moon: Leo E Rising: Leo E January 2015—December 2015 NOTE: Ephemeris is GMT midnight. New/full moons and sun/moon sign entry times are PACIFIC. Your personal daily activity is for the PACIFIC time zone. (Daylight Savings Time observed) “What you are trying to understand is the meaning of [the] situation as a whole. The reason the position of the planets is important is simply this: if you realize the universe is an organism in the broadest sense of the term, a system of integrated activities, then anything that happens within that system of integrated activity has a place and function within that system. If you want to understand a particular point in time-space within that system, you have to see it in relation to the whole system. The wholeness of the system is constantly working in polyphonic harmony with the life of the individual which has become separated from the whole by becoming itself, a little whole, a little organism.
    [Show full text]