STANDARD SPECIFICATIONS FOR THE SUPPLY OF ELECTRONIC ACCESS CONTROL SYSTEM AND RELATED COMPONENTRY AND SOFTWARE

Similar documents
Cardax System Comparison

ARCHITECTURAL AND ENGINEERING SPECIFICATION

Access Control (card access)

CARD ACCESS CONTROL SYSTEM

Patriot Systems Limited

Patriot Systems Limited

PRODUCT CATALOGUE. Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg

Access CONTROL. MANAGEMENT Software

RVRC Training Manual Fast Trace Installer Menu

The system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events.

Architectural and Engineering Specification for a Security Management System. StarNet 2

OpenDevice Events Guide

GMS GRAPHICAL MANAGEMENT SYSTEM

Monitoring Operator Guide. Access Control Manager Software Version

User Manual. Dryer Controller M720

Pro-Watch Software Suite. Architect and Engineering Specifications. January 9, 2002 Revision 3.4

Application Version: 2.0 and above Date Written: 03/09/2010. Copyrights , Global Security Devices, All Rights Reserved

Networked Access Control Panel. Installation Guide

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC

Perimeter Product Overview. Effective protection for your business

Dryer Controller M720

AC2000 Security Hub Security and Event Management System

DVTEL DVR Interface. DigiOp DVR Interface

Challenger10 Administrators Manual

ACCESS CONTROL SOLUTIONS ACTEC SERIES

Integrated Security Solutions

Instruction manual MTL process alarm equipment. October 2016 CSM 725B rev 2 MTL RTK 725B. Configuration Software Manual

Operation Manual Fighter ProVision Software. Version: 0.0 Revision: 1

Paradox Integration Module Settings Guide

C. The system shall be capable of turning luminaires on/off (where supported by the luminaire) as well as full range dimming.

ACTIVE INFRARED BARRIER

Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants

Procidia iware AlarmWorX32. AlarmWorX32 Viewer January 2010

Milestone SMI Intrepid II Perimeter Module 1.1 User s Manual

DATA SHEET BENEFITS CURRENT CHALLENGES SSM INFOTECH S X-FORCE AMS - THE IDEAL SOLUTION

IRIS Touch Firmware Enhancements and Additions from Version to Version

System Galaxy Quick Guide

The EN54 Part 2 & 4 Fire System

CV-350 TCP/IP Access Control System. System Overview

X.90 Access Control System

In installation with more doors, up to 64 central units can be used together, allowing installations of up to 2,048 doors. RECEPTION CAR PARK

725B Configuration Software Manual

Integrated Security Solutions

DATA SHEET ESS-ACS WE INDENTIFY SECURE AND INTEGRATE. IRIZ ID TECHNOLOGIES

Version 1.03 January-2002 USER S MANUAL

2200 and 2200L ALARM CONTROL SYSTEMS

Architect and Engineering Specification

Section PERIMETER SECURITY SYSTEMS

Ademco Vista Alarm Panel

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software

DeltaV Operate. Product Data Sheet DeltaV Operate December 2006 Page 1. Introduction. Benefits

G SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation.

A Beginners Guide to Inner Range Systems

Tech Data Sheet D01662GB0_Esgraf 4.1 and Configuration Server 30/2011 2/(5)

Avigilon Control Center System Integration Guide

AK-CS On Board Guide

Engineering Specification

IRIS Touch 400 & 600 Range Installation Manual. Honeywell Galaxy Range. Version 2.0

RFP Addendum 2 March 31, 2016

Complexity made simple

The EN54 Part 2, 4 and 13 Fire System

Challenger Series Users Manual

Electronic Solutions for Education

Simplex Panel Interface Guide

SiPass Entro Open the door to comprehensive security

HERCULES 6 GRAPHICS SYSTEM

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

The Centron Presidio Monitoring System. Centron. Presidio. Rees Scientific. An ISO 9001:2008 Company

Elite 16D Version 16 Zone Controller Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand

Ref. 1067/024 Ref. 1067/032A Ref. 1067/052A

M800, M800iD Plus, M1000 and M3000. User's Guide

ONYX FirstVision Specification Interactive Firefighters Display

D-Link Central Management System

2000 SERIES DIAGNOSTIC ALARM CONTROL SYSTEM

Galaxy Flex V3. User Guide. Honeywell Security. This user manual is located at

EURO 46 User Manual. For use with EURO 46 (version 9.1 or above) RINS1531-2

CITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858

ATS1250/ door/4-lift DGP. Programming Guide

Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks

CompleteView Alarm Client User Manual. CompleteView Version 4.6.1

Interactive Fire Control Panel IFS7002 four signal loops Instruction Manual

Sentient. Downloader Manual D4854

Euro ONE. RENDER ALARMS Your security, above all else. User Manual. t: f:

HRX Technical Manual. Version 1.2

Access control. SiPass Entro. Open the door to comprehensive security. Answers for infrastructure.

GE Security. Challenger V8 & V9. User Manual

SiPass Entro open the door to comprehensive security

Operations Manual TS400. Test Station for G450/G460 Gas Detector

Different types of Fire Alarm System

EURO User Manual. For use with EURO 76, MSX 162, MSX 280 software: Version 9.1 or above RINS1527-2

Instructions manual. By-alarm. By-alarm Manager software

Table of Contents. Appendix A Special Characters 31

EURO 46 V10 User Manual

Telemetry Communications Device. Installation Guide. Interface for the Emizon managed network. Issue 1: February 2008

FlameGard 5 MSIR HART

C2 Compact Range Installation & Programming Manual

TD flex is an award-winning tailgate detection solution that prevents unauthorized access at: Doors Mantraps Airlocks E-gates Turnstiles

Fratech Multipath-IP STU

Avigilon Control Center 5 System Integration Guide

Transcription:

STANDARD SPECIFICATIONS FOR THE SUPPLY OF ELECTRONIC ACCESS CONTROL SYSTEM AND RELATED COMPONENTRY AND SOFTWARE TO THE AUSTRALIAN NATIONAL UNIVERSITY AS ISSUED BY ANU SECURITY 29 MARCH 2010 1

STATEMENT OF REQUIREMENT 1. BACKGROUND TO THE REQUIREMENT The University existing system is a Cardax access control system. During 2010 it will operate using Smartswipe mag stripe readers. Schneider Electric Buildings Australia PL and Cardax are contracted to changeover the readers to Mifare Plus (128 bit AES encryption) in 1 st Quarter 2011 as part of the campus wide project proceeding during 2010. Project Managers should allow for the changeover cost during the period nominated for the two types of readers in addition to the new installation cost. Note 1: that this University specification requires compliance with Australian standards AS14443-2003 parts 1 to 4 on this component with important additional requirements. Note 2: The access control system will also need to comply with any project tender specifications issued by the University, relevant Australian Standards and codes as applicable. University documents supporting this specification and requiring tender compliance include the ANU General Electrical specification and the ANU Structured Cable specification. The documents are available to consultants and contractors via the Web. Note 3: Commissioning acceptance in any project by ANU Security of any access control system work on behalf of the University will be in accordance with this document and be informed by the pre commissioning information supplied by the Project Coordinator and Project Manager. Project Managers are also advised to ascertain from University clients the level of interfacing between the Cardax system and other security and building systems at the time of project design. 2. REQUIREMENT 2.1 REPLACEMENT OF MAG STRIPE CARD TECHNOLOGY CARDS AND 125 KHZ READERS (STAGE 1). 2.1.1 The ANU uses a mixture of mag stripe and Cardax 125 readers and cards. To allow for the migration the replacement card to be supplied must be able to work as a minimum with Cardax or equivalent high coercivity mag stripe specification readers and Proximity readers as well as be able to be encoded by both types of encoders to the Cardax specification or equivalent. In 2011 the card used will be a dual tech mag stripe and Mifare Plus proximity card. 2.1.2 The card specifications will need to comply with Australian Standards AS14443-2003 parts 1 to 4 for proximity cards used with the Cardax or equivalent System. 2.1.3 The University has specified a minimum requirement of 128 bit AES encryption for the proximity card system chosen Cardax Mifare Plus reads from 1st Qtr 2011. 2.2 REPLACEMENT OF EXISTING HARDWARE WHERE REQUIRED 2

2.2.1 This work is to be carried out in accordance with ANU specifications for access control and appropriate university electrical and site works specifications. 2.2.2 Tenderers will need to consider University advice on our calendar of events and the schedule of works when submitting a project schedule and how the tendered work would be accomplished with minimum or no impact on the functions of the University. 2.2.3 Clear descriptions of how the work would be accomplished within buildings are required from the tenderer in their submission to allow assessment of the tendered project schedule. Areas of possible concern for the tenderer need to also be clearly explained in the compliance statements. 2.3 INSTALLATION OF ACCESS SYSTEM ON PRESENTLY MANUALLY SECURED DOORS ON CAMPUS BUILDINGS THROUGHOUT ACTON CAMPUS. 2.3.1 The University has a number of buildings that are fully or partially locked manually each day. The University is looking for tenderers to provide component project pricing so that the University may decide the effectiveness of pursuing all or part of this stage with a successful tenderer. 2.3.2 The University will also be using stage 3 component pricing submitted in the tender to calculate any installation of access control or hotel keying on doors it may decide are required to have access control in addition to the requirements identified in the RFT material schedules for existing installations as attached. 3. SCOPE OF THE REQUIREMENT 3.1.1 The University requires the tenderer to provide full and detailed costs for the delivery and completion of this project. 3.1.2 The tenderers response will need to provide sufficient information and detail to allow full assessment of the submitted tender. 3.1.3 Tenderers shall confirm the cards, readers and all system equipment related to the system operation to be supplied under a contract arrangement are fully compliant with relevant Australian and International standards, particularly but not exclusively AS14443 parts 1-4 (2003). 3.1.4 The University during 2010 operates Datacard printers (model SP75) with Magnetic stripe encoders and or Proximity encoders included. Tenderers shall confirm the system components tendered for the access control system are capable of interfacing at the software and physical levels with the printers and card hardware system in use at the University or to provide systems of equivalent capability 3.1.5 The University reserves the right to source its computing equipment, printers and card encoders directly and separately to any needs described by this specification. 3

3.2 NEW ACCESS CONTROL INSTALLATION TO DOORS ON CAMPUS 3.2.1 Tenderers shall provide a pricing structure to carry out the installations indicated on the drawings in compliance with the requirements of the tender. 3.2.2 The clear pricing tendered shall allow the University to identify the cost on a per door basis. FUNCTIONAL OVERVIEW OF THE SYSTEM REQUIREMENTS 3.3 FUNCTIONAL OVERVIEW ELECTRONIC ACCESS CONTROL SYSTEM CAMPUS WIDE SYSTEM 3.3.1 The system shall provide a means to control access through nominated doors having electric locking door status monitoring and access control readers. Access rights associated with a presented access token shall be checked for validity based on token, access area, access time and any other access management function defined in this specification; as stored in intelligent field controllers. Access shall be granted or denied, dependant on the access privilege. Access rights shall be programmed in a variety of ways to allow flexibility as defined elsewhere in this specification. 3.3.2 The system shall provide access control in elevators as identified in schedules enabling the access of each cardholder to have access to any combination of floors over specified time periods. The interface to the elevator manufacturer s equipment shall be by either low level interface (relay outputs) or preferably by a high level (data) interface. 3.3.3 The system shall monitor the condition of inputs. The system shall be able to be programmed to apply a variety of conditions to the way in which these inputs are monitored and shall enunciate the condition of such inputs in accordance with such programming. 3.3.4 The system shall provide a fully functional intruder alarm system including entry and exit delays where intruder detection sensors are connected to system inputs. The Intruder Alarm Systems component shall be fully integrated with the Access Control aspects of the system. It shall be possible to set (secure) or unset (unsecure) areas from any access control reader associated with an area, or via Remote Arming Terminals or as required from defined central control locations. 3.3.5 Intercom functionality shall be integrated with a card reader, enabling a card reader user to talk to an operator as and when required, and an operator to talk directly to the card reader user. All intercom communications shall utilise the common Integrated Security system network and communications cabling infrastructure; and be fully integrated with the access control system. 3.3.6 The system shall provide an integrated software facility for the design and production of photo ID cards. 4

3.3.7 The system shall be OPC Alarms and Events enabled using Microsoft COM and DCOM enabling integration of event data with other third party OPC enabled automation and business systems. 3.3.8 The system shall allow data exchange with other applications using XML protocols for schedule changes, and card record changes. The system shall be capable of carrying out the data exchange on a batch or real time processing basis. 3.3.9 The current operating system used by the system server Microsoft Windows 2003. If SQL Server 2005 is used, the system server shall be Microsoft Windows 2005 Server (enterprise edition). Client terminal software shall be Microsoft Windows XP Professional compatible. If an alternative operating system is offered, full details must be supplied on how the alternative meets the criteria laid out in the RFT. 3.3.10 All system communications must be totally integrated with either existing or new firewalled LAN/WAN networks using the ANU IP numbering scheme. Tenderers must make themselves familiar with the specific requirements for this project. 3.3.11 Connection to Intelligent Field Controllers (IFCs) shall be achieved using Ethernet cabling supporting 10baseT and TCP/IP protocols. The network connection must be on-board the IFC. Interface transceiver units (10BaseT to RS485, RS232 etc) are not acceptable. 3.3.12 Remote IFCs not permanently connected to the network can be connected via a PSTN service, using TCP/IP protocols. 3.3.13 Connection from the remote IFC to the server shall be either via dialup to an Internet Service Provider (ISP) using encrypted TCP/IP; and then via an approved firewall through into the IT environment or via dialup directly to a RAS connection to the Server 3.3.14 All system software upgrades shall be downloadable through the network to the IFC. 3.3.15 All data communication internal to the system on the TCP/IP network between IFC s and between IFC s and the Server shall be encrypted using symmetrical session keys and an industry-standard encryption algorithm to a minimum of 40 Bits (Secure Socket Layer). Session keys shall be changed on a regular basis at intervals no longer than 24 hours. 3.3.16 The system shall report all events to the operator(s) as configured and shall produce and maintain a log of all system events, alarms and operator actions. 3.3.17 The system shall provide a means for an operator to extract information relative to the event log and system configuration and produce this information in the form of printed reports, screen displays or ASCII files. 3.3.18 The system shall provide for a Windows based User Interface with Site Plans and interactive icons representing the location and real-time status of Access Control, and Alarm Monitoring equipment. 3.3.19 The system must provide emergency evacuation reporting. 5

3.3.20 The system shall be designed and manufactured by a reputable company who shall be certified under the ISO 9001:2000 quality procedures. 3.3.21 All equipment shall have the following approvals: FCC Part 15 CE approval BS EN 50130-4 Alarm Systems Electromagnetic Compatibility (Immunity) CE approval BS EN 55022 Emissions 3.3.22 Encoders and readers shall also meet: CE ETS 300 683 Short Range Devices C-Tick AS/NZS 4251 Generic Emission Standard C-Tick RFS29 3.3.23 The system software shall be written in a fully structured, fully validated and commercially available language that provides a strictly controlled development environment. 3.3.24 Comprehensive backup and archiving facilities shall be incorporated as an integral part of the system software. 3.3.25 The system shall include system division suitable for multi-tenanted buildings. Operators shall only be able to access those parts of the system which fall within their division and operator privileges. 3.3.26 IFCs must support peer to peer communications for input and output communications between IFC s. Systems that require the main server for communications between panels are unacceptable. 3.4 SYSTEM REQUIREMENTS 3.4.1 The system described in this specification must have the following capacity as a minimum: Graphical Site Plans 2000 Access Readers 4000 Readers with intercoms 500 Elevators 100 elevators each with up to 75 levels (e) Fully Supervised 4 state Alarm Inputs 30,000 (f) Output relays 20,000 (g) Access Control Zones 4000 (h) Schedules per day 100 (i) Schedule categories 50 (j) Holiday days 30 (k) Operators 500 (l) Concurrent Operator Sessions 20 (m) Cardholders minimum 100,000 preferably 1,000,000 6

(n) Cardholder Issue Levels 15 (o) Cardholder Personal Data Fields 64 3.4.2 The system architecture shall be a tiered system consisting of: Head-end software application operating on a computer server; Intelligent Field Controllers (IFC s) managing the system in a distributed intelligence format; Semi-intelligent subunits (outputs, inputs, readers, etc) which rely on IFC s to function. 3.5 CENTRAL CONTROL AND SYSTEM MANAGEMENT SOFTWARE 3.5.1 The system shall use the Microsoft Windows operating system. The version of Microsoft Windows shall be a currently supported version. 3.5.2 The system database shall be a version of Microsoft SQL Server Enterprise edition. The version of Microsoft SQL Server shall be a currently supported version. 3.5.3 The University will arrange a license for the software directly through their University licensing system. 3.5.4 The system shall be OPC enabled in accordance with the current OPC specification for OPC alarms and events to operate as an OPC server 3.5.5 The tenderer will identify in detail the specification required for a server computer suitable for a system of the size to be used by the University. Due consideration in the site assessment must be given to site activity, database size and manipulation of it, number of operators on the system at any time, changes being made to the database when migrating from the existing system so as to ensure a specification that performs routine functions and activities without noticeable lag or delay for operators. 3.5.6 The University reserves the right to purchase, supply and install the recommended server and client software to the specifications provided by the tenderer in the submission. 3.5.7 The system shall be supplied (and licensed if required) with a minimum of 20 operator workstations simultaneously running. Operator workstations running terminal emulation software will not be accepted. 3.5.8 The system shall support secure web based thin-client architecture to provide operator access to at least the following functions: Cardholder management Event and alarm management The opening and closing of doors defined in an operator s work zone or access group 3.6 OPERATOR FUNCTIONALITY 3.6.1 The web based operator access shall support operator functionality as detailed below: 7

(e) (f) The web access shall be managed via a web server to provide firewall isolation from the main server. The system shall automatically log and time/date-stamp all events within the system including intruder alarm set/unset events, access control events, operator actions and activity. The central control software shall be demonstrably easy to use, make extensive use of menus and windows and require a minimum of operator training to operate the system proficiently. Systems requiring a program language approach to configure the system will not be accepted. The central control must be capable of receiving simultaneous alarm signals from a number of remote locations, without loss or excessive delay in their presentation to the operator. Any authorised operator should be allowed to acknowledge, view and/or process an alarm from any screen. The central control shall be fitted with a real time clock, the accuracy of which shall be preserved over the period of main power supply failure. Synchronisation between the central control and Ethernet connected IFCs shall be automatic, not requiring operator intervention. Operator selection of processing tasks shall be via menu selections. Authorised Operators shall be able to process alarms, produce reports and modify database records without degrading system performance. 3.7 OPERATIONAL AND MONITORING FACILITIES 3.7.1 The following is the minimum operational and monitoring facilities required. The ability to: (e) (f) (g) (h) Program either a group or individual card readers with access control parameters, without affecting other card readers. Program the access criteria for individual Cardholders or groups of Cardholders. Store at least 64 non-access control data fields for each cardholder. The names of these Personal Data fields shall be user definable. Authorise or de-authorise a Cardholder in the system with the result reflected immediately throughout all readers in the system. Enable a Card Trace against selected Cardholders so that an alarm is raised each and every time that cardholder presents their access card or token. Pre-program holidays so that different access criteria apply compared to normal working days. The system must have a capacity to set at least 30 holiday days. Recognise and manage regional holiday requirements Define as many access zones as there are card readers fitted. 8

(i) (j) (k) (l) Allow or disallow individual Cardholder access to any one, or group of card readers, in real time. Log all system and operator activity to hard disk as they occur. Program alarm response instructions into the system so that these are presented to the Operator when processing an alarm event. Enable an Operator to enter messages against alarm events. 3.7.2 Override (temporarily) a Cardholder s, or group of Cardholder s, preprogrammed access criteria. 3.8 CENTRAL CONTROL 3.8.1 The central control shall display a one-line plain language event message for every activity event (alarm or otherwise) occurring in the system. All activity logged shall be time and date stamped to the nearest second (hh:mm:ss). On having the appropriate operator authorisation it shall be possible to drill down into the properties of each component that makes up that event for future details. The event message shall advise: Time of event Action Successful or unsuccessful If the transaction is unsuccessful, the reasons for the denial. This includes but is not restricted to the following items: (i) (ii) (iii) All card attempts All door alarms All operator activity including log on, log off, alarm response messages and any alteration of system data files (iv) All alarm monitoring activations (v) All communications link failures. 3.8.2 Time schedules for different day types shall be configurable. 3.8.3 Regional holidays shall be configurable to allow for regional variations. 3.8.4 Access group expiry dates shall be able to be created for different dates to the card expiry dates 3.9 SITE PLANS AND SITE PLAN ICONS 3.9.1 It shall be possible to manage and monitor alarms, overrides, the general status of site items and open doors through the Graphical User Interface with the use of interactive real time dynamic site plans and icons. 3.9.2 A minimum of 2,000 graphical site plans must be available. All site plans stored on the Server shall be automatically updated if amended at any of the networked workstations. 3.9.3 External drawings shall be imported into the system from external drawing software. 9

3.9.4 The ability to import at least the following drawing formats shall be supported: BMP WMF JPEG GIF 3.9.5 It shall be possible to assign icons to system functions and place these at any position on a site plan. 3.9.6 Site plans shall be nested allowing a single action (mouse click on a current site plan icon) to move from one site plan to another. 3.9.7 The following functions should, as a minimum, be able to be executed by clicking on Site Plan icons: (e) (f) (g) View the current status of a Door, Input or Output. Monitor and acknowledge an Alarm Open an access controlled door Move from one plan to another plan Activate an Intercom on a reader Override an alarm, access or perimeter fence zone state. Display the properties of the item. 3.9.8 Icon names shall use the item name by default but a short name shall be selectable if available. 3.9.9 The size of the Icons shall be scalable. 3.9.10 A pre-designed set of icons covering basic access control functions shall be provided. 3.9.11 It shall be possible to design and load icons from external software for use in the system. 3.9.12 It shall be possible to design macro buttons to reside on site plans. On activation, macro buttons must be capable of performing multiple overrides for any site items simultaneously. 3.9.13 Macro buttons or icons must display the current state of system activation for the function it is linked to, until a change of state (operator or time reactivation) occurs. 3.10 FIELD HARDWARE 3.10.1 The IFC shall be the main controller in the field. The head-end application shall communicate directly with all IFC s in the system. 3.10.2 Each IFC shall be intelligent in that in the event of failure of power or communications to the central control, for whatever reason, the system shall continue to allow or deny access based on full security criteria. 3.10.3 The IFC shall store on-board all the security and access parameters to operate completely independently from the central control server. 10

Systems that rely on the central control PC for access decisions will not be considered. 3.10.4 The IFC shall "concentrate" activity data and immediately transmit it to the central control server computer. 3.10.5 In its standard configuration, each IFC shall be capable of buffering 10,000 events should communications fail with the central control. 3.10.6 All events shall be time-stamped at the IFC at the time of occurrence. 3.10.7 The IFC shall recommence transfer of buffered events to the central control automatically when the communications link is re-established. 3.10.8 The IFC shall be capable of storing at least 30,000 cardholder records with associated access criteria in its standard configuration. 3.10.9 The ratio between stored events and stored cardholders shall be configurable for each IFC to allow site requirements to be configured in accordance with specific site needs (more cardholders or more events per IFC). 3.10.10 The system shall monitor input circuits and enunciate whether the circuit is in Normal, Alarm, Open Circuit Tampered or Short Circuit Tampered as separate conditions. 3.10.11 A configurable range of end of line resistor values shall be supported as a software function to support pre-existing input circuits when required. 3.10.12 The use of any circuits using other than dual 4k7 end of line resistors must be approved by the University project management team. 3.10.13 The IFC shall include tamper protection for the front and the back of the panel. The front panel shall be tamper protected for door open, and the rear of the panel to detect if the panel has been removed from the wall. These shall use optical tamper detection. Mechanical tamper devices are not acceptable. 3.10.14 The IFC shall incorporate a 32-bit processor with at least 4 Megabytes of non-volatile FLASH EEPROM. The IFC shall incorporate boot code in a protected sector of the flash memory. For software upgrades, all system software shall be downloaded from the central server over the network 3.10.15 The IFC shall operate from a separate battery backed 13.6V DC supply. 3.10.16 The IFC shall continue to operate for at least 8 hours in the event of a mains supply failure. 3.10.17 The system shall be capable of automatically detecting and reporting a power failure, low battery and battery not connected. 3.10.18 IFC s shall automatically restart and resume processing following a power failure. 3.10.19 IFC s shall be fitted with "watchdog" hardware and software to provide automatic detection and restart should the processor lock up. 3.10.20 The IFC shall contain its own battery backed real time clock. The battery shall have a minimum life of ten years. The clock shall be synchronised with the central control s clock at least once per hour. The accuracy shall 11

be such that the time difference between IFC s shall not vary more than 0.5 second at any time. 3.10.21 The IFC shall be allocated to a time zone appropriate to the IFC location. 3.10.22 The IFC shall have an on board 10BaseT Ethernet (TCP/IP) connection and driver for communications with the central control. 3.10.23 Should excessive network broadcast traffic occur (resulting from a ping attack or similar), an alarm shall be generated. 3.10.24 All communications between the IFC and the system PC shall be encrypted TCP/IP. Communications shall be on-line and monitored for interruption. 3.10.25 The IFC shall include a least one other RS 232 multi-communications port. 3.10.26 The IFC shall support remote site dial-up. 3.10.27 Remote communication between the IFC s and the remote devices shall use the switched telephone network circuits. 3.10.28 Incoming connection shall be allowable via an ISP service. 3.10.29 Outgoing connections via modems connected to the customer LAN are not permitted, however dial-out directly from the Server is allowed provided the modem is fixed to non-answer mode. 3.10.30 It shall be possible to view the IFC status and configuration for commissioning and diagnostic purposes without the use of the central server software or other proprietary software. This may be achieved by the use of conventional WEB based browser. In high security applications, it must be possible to disable this feature at the IFC. 3.11 SEPARATE ALARM MESSAGE 3.11.1 A separate alarm message, displayed in plain language text, shall be transmitted to the central control for at least the following alarm conditions: (e) (f) (g) (h) (i) (j) (k) (l) Tamper Tamper Return to Normal Unit Stopped Responding Card error Maintenance Warning Alarm Sector State Change User Set User Unset Card Trace Wrong PIN Access Denied Duress 12

(m) Zone Count Maximum (n) (o) (p) (q) (r) (s) (t) Zone Count Minimum Door Open Too Long Forced Door Door not locked Power Failure System Reboot. Intercom 3.11.2 The IFC shall store and operate software modules assigned to it for the purposes of operating subservient hardware and site-associated functionality, including but not limited to: Door modules Elevator modules Alarm management Cardholder records 3.11.3 The IFCs shall communicate with and control the following equipment: (e) (f) Readers with intercoms Card access readers Card access readers with PIN keypads Elevator access equipment Alarm monitoring Input/Output panels and equipment Alarm response equipment 3.11.4 All communications between the IFC s and the remote devices shall be "on-line" at all times (a connection via a modem and line using dial-up shall be considered as being on-line ). 3.11.5 Any failure of a card reader unit and its communications with the IFC shall be raised immediately as a high priority alarm and shall not cause the IFC or other associated hardware to stop working correctly. 3.11.6 The IFC shall communicate with remote devices (card readers, alarm equipment, elevator readers) using a fully encrypted data communications protocol. Unencrypted ASCII text or similar data transmissions are not acceptable. 3.11.7 All communications between the IFCs and the remote devices must be check-digit coded to protect data from manipulation during transmission. 3.11.8 All communications links between the IFCs and the remote devices shall be monitored such that an alarm is raised at the central control if the data being transmitted is corrupted or tampered with in any way. 3.12 ACCESS CONTROL, SECURITY ALARM AND I/O PROGRAMMING 13

3.12.1 The system shall provide complete flexibility and be capable of programming an unlimited combination of access control, security alarm and I/O parameters subject only to performance and memory limitations within the IFC. 3.12.2 For ease of programming Cardholders shall be grouped into access groups sharing the same access criteria. 3.12.3 It shall be possible to assign an individual cardholder to an access group on a temporary basis with predetermined start and finish times. 3.12.4 During the period of temporary access, the cardholder shall have the rights of the group to which they have been assigned in addition to any permanent access rights they may have been assigned. 3.12.5 The access group property page shall display both permanent and temporary access members with the status of temporary members shown as: Pending (with the start and finish times) Active Expired 3.12.6 Any cardholder or access group in the system shall be able to be programmed to have access to any combination of controlled doors in the system with each period of access for each door controlled to within the nearest minute. 3.12.7 The IFC shall check entry based on ALL of the following criteria: (e) (f) (g) Correct facility code Authorised card in database Correct issue number Authorised door / access zone Authorised time of day Correct PIN (If PIN entry is required) Double entry (anti-passback, anti-tailgating or escort modes). 3.12.8 Anti-passback mode shall be able to be configured in any of the following modes: Disallow second access to an area if a valid exit has not previously been registered and generate an alarm (hard anti-passback). Allow second access to an area if a valid exit has not previously been registered but generate an alarm (soft anti-passback). Exclude specific Access Groups from the rules defined above. 3.12.9 Anti-passback rules shall be able to be reset by either: Automatically after a preset period after valid entry. Automatically at a standard time each day Manually as an over-ride. 14

3.12.10 Must support Global Anti-passback allowing multiple access zones to be linked for the purpose of anti-passback, across multiple IFC devices utilising encrypted peer-to-peer communications. 3.12.11 Anti-tailgate mode shall be able to be configured in any of the following modes: Disallow exit from an area if a valid access has not previously been registered and generate an alarm (hard anti-tailgate). Allow exit from an area if a valid access has not previously been registered but generate an alarm (soft anti-tailgate). Exclude specific Access Groups from the rules defined above. 3.12.12 Anti-tailgate rules shall be able to be reset by either: Automatically after a preset period after valid entry. Automatically at a standard time each day Manually as an over-ride. 3.12.13 Every incorrect PIN attempt shall be notified at the central control as an alarm condition. 3.13 READERS 3.13.1 Each reader shall be capable of automatically switching the access mode at a door at different times of the day, based on control parameters received from the central control. The following access criteria modes are required: Free access Door is unlocked, no card entry required. Secure access Door is locked, a successful card attempt is required for valid entry. Door re-secures after access attempt. Secure + PIN access Door is locked, a successful card and correct PIN number attempt is required for valid entry. Door resecures after access attempt. Override from reader Members of certain access groups shall be able to change the access and PINs mode of the door at certain times. (e) Dual Authorisation Access is granted when two different but legitimate cards are presented within a given time frame. (f) Escort A second card is required to be presented from a cardholder who is nominated in the Escort Access Group. (g) Shared PIN Number The system Operator determines what the PIN number will be and programs this into the system. Access is allowed through the door when the correct 4 digit PIN is pressed followed by the Enter key. 3.14 CARDHOLDER ACCESS 3.14.1 Cardholder access reporting to the central control and logging in the audit trail shall be configurable in two modes: 15

Only when there has been a successful presentation of a valid access card or token AND the door open sensor has detected that the door has actually been opened. Whenever there has been a successful presentation of a valid access card irrespective of if the door has been opened. 3.14.2 Readers with integrated PIN pads shall provide an Entry under Duress facility. 3.14.3 Duress shall be initiated by the cardholder either by the addition of a unique number to their PIN number, or by incrementing the last digit of their PIN number by one. 3.14.4 There must be NO indication of a Duress entry at the reader. 3.14.5 A high priority Duress Alarm shall be displayed at the central operator station. 3.14.6 Zone counting shall be available to provide real-time counting of cardholders in access zones. 3.14.7 The result of the number of cardholders in the zone being outside of the specified range(s) shall generate an event or an alarm. 3.14.8 The minimum and maximum numbers of cardholders in a zone before an event is generated shall be configurable. 3.14.9 It shall be possible to set up a grace time in seconds to allow the zone count to be outside the minimum within the mid range or outside the maximum number of cardholders, without generating an event. 3.14.10 It shall be possible to assign a specific message for each of the below minimum, mid range or above maximum conditions. 3.14.11 It shall be possible to set up the system to prohibit one cardholder being allowed in a zone by: (e) Requiring two valid but different cards to access a zone should the zone count reports zero cardholders in the zone; Requiring one card to access a zone should the zone count report two or more cards in the zone; Requiring one card to exit from a zone should the zone count report three or more cards in the zone; Requiring two valid but different cards to exit from a zone should the zone count report two people present; Prohibiting exit from a zone and generate an alarm if the zone count reports one person present. 3.15 PRE-PROGRAMMED OVERRIDE FUNCTIONALITY (MACRO S OR ALTERNATIVES) 3.15.1 To allow for making changes to the system configuration on demand, it shall be possible to pre-configure the required changes and assign them to a macro command. 16

3.15.2 An operator shall be able to initiate the macro (to carry out the changes) via either a menu item or by a site plan icon. Note the earlier requirement re change of state indication on buttons or icons. 3.15.3 The functionality either via a macro or pre programmed override functionality shall be able to be initiated on a time schedule. 3.15.4 Alternative program functionality (in lieu of macros) is to be clearly described as to its operation and compliance with the specification. 3.16 DOOR CONTROL 3.16.1 Access control for a door shall allow for the following features where specified: Access reader Emergency release switch input Reception control switch input 3.16.2 Egress control for a door shall allow for the following features where specified: Exit reader Push button request to exit Emergency exit break-glass 3.16.3 Push button request to exit as referred to in shall record the exit in the event database. The button shall also break power to the lock to ensure safe exit. 3.16.4 Entry and exit methods referred to in clauses, and shall each record the event in the event database. 3.16.5 The door shall be monitored for both door open/closed and door unlocked/locked using concealed monitor switches appropriate for the door installation. 3.16.6 Where the door is a double door, the inactive door leaf shall also be monitored for door open/closed and door unlocked/locked. The inactive leaf door monitor switches may be connected as part of the active door leaf monitoring. 3.16.7 It shall be possible to configure the door in a way that generates a forced door alarm should the door be unlocked and/or opened without reference to the system. 3.16.8 Should a door be left unlocked or open after a preset time (up to 9999 seconds), an alarm shall be generated reporting the condition. 3.16.9 The door open/unlocked warnings shall provide an audible warning at the door. 3.16.10 It shall be possible to disable the reader audible warning. 3.16.11 It shall be possible to generate the audible warning via a relay connected elsewhere in the system. 17

3.16.12 Should a valid request to access a door be generated and access not taken, it shall be possible to ignore the request (not record it as an event) and automatically re-secure the door after a preset time. 3.16.13 When a valid access through a door is undertaken, the door shall immediately re-secure on re-closing. 3.16.14 It shall be possible to create an interlock relationship between a group of doors. Up to 20 doors shall be able to be included in any interlock group. 3.16.15 It must be possible to configure interlock groups via GUI drag and drop functionality, without the requirement to write scripted logic. 3.17 SYSTEM INTEGRATION 3.17.1 The system shall support OPC (OLE for Process Control) Alarms and Events protocol to provide an open interface to allow integration with Building and Facilities Management, and Management Information Systems. 3.17.2 The OPC Interface shall allow third party OPC clients to access the security system s events and field device data. 3.17.3 The system shall provide an XML interface to allow for the import, export, and synchronisation of data in an ongoing basis from other applications directly into the Cardholder database both an on-line real time manner or in a batch oriented approach. A developer's kitset shall be readily available to allow for easy implementation. 3.17.4 The system shall provide an XML interface to allow for updating access control schedules from other applications directly into the system configuration database both an on-line real time manner or in a batch oriented approach. A developer's kitset shall be readily available to allow for easy implementation. 3.17.5 Access via OPC or XML shall be managed as operator events and logged accordingly. 3.17.6 A facility shall be provided in the system to allow for the real-time export of any alarm or event information to 3rd party systems via customisable strings for the purposes of controlling the 3rd party application. 3.17.7 The system shall support accepting events from one or more 3 rd party applications and displaying these and their status in the event and/or alarm windows. rd 3.17.8 Events from 3 party systems shall be managed in the same way as inputs connected directly to the IFC s. 3.18 ACCESS CARDS AND TOKENS 3.18.1 The access token technology for this project shall minimally support Proximity 4Kb cards and the reader technology as specified in association with this specification elsewhere shall match. 3.18.2 All Proximity cards, Vehicle Tags and Personal tokens shall be passive (without internal battery). 18

3.18.3 Access cards shall be of standard credit card size, being no larger than CR-80 and shall be direct printable using a dye-sublimation print process and be capable of accepting an adhesive label printed through such a process. 3.18.4 All cards shall meet Australian (AS14443-2003 parts 1 to 4) and ISO standards for proximity and magnetic stripe encoding. Special mention is made again of the 128 bit AES encryption requirement. 3.18.5 As well as CR80 sized cards, vehicle tokens and key-ring transponders should also be proposed as an alternative in special applications, where available. 3.18.6 The access token data shall include: A unique facility (site) code not used for any other system worldwide. A unique cardholder identification number at least 7 digits long. An issue level for each card number to allow for replacing lost cards without reducing the card database size. Up to 15 levels of issue levels shall be supported. 3.18.7 The access control token shall uniquely identify the cardholder to the access control system. 3.18.8 Access control information shall be stored on or in the access token in a check-summed format. 3.18.9 During transmission of data between a proximity access token and a proximity reader, the data shall be check-summed. 3.18.10 All access control encoding data shall be invisible to the naked eye. 3.18.11 There shall be barriers employed to prevent the deciphering of access control data stored on the card using any readily available equipment. The tenderer shall document the barriers used. 3.18.12 There shall be barriers employed to prevent the copying or altering of access control data stored on the card using any readily available equipment. The tenderer shall document the barriers used. 3.18.13 Additional cards and access tokens shall be available and delivered on site within 24 hours of request. 3.18.14 Cards and access tokens shall be able to be encoded by the supplier and/or the University according to the specifications, made known at the time of order. Cards and tokens supplied with manufacturer determined card numbers will not be acceptable. 3.18.15 It shall be possible to encode cards and tokens to allow operation of a user defined Personal Identification Number (PIN) in association with the card requirement specified in 3.18.14 and the card still be supplied ex stock as defined above. 3.18.16 As an alternative, pricing should be supplied for the supply of encoding software and hardware that enables the University to encode our own cards and/or tokens on site. 19

3.18.17 The system shall provide facility to encode cards or tokens on an individual basis. 3.18.18 The system shall provide facility to encode cards or tokens in batches of user definable quantity. 3.18.19 Proximity card technology is specified: The card number must be a number specifically coded onto the card. It shall not be the card serial number (CSN). 3.18.20 For magnetic stripe technology as specified: The cards shall incorporate a high coercivity (4000 Oersteds) magnetic stripe. The data shall be encoded onto Track 1 of the magnetic stripe. 3.19 CARDHOLDER MANAGEMENT 3.19.1 The cardholder database shall be structured so that the name field is the master field for each record. A background unique identifier may be used as the key field for each record but this must not be required by an operator to identify a cardholder. Use of the card number as the key field is not acceptable. 3.19.2 Each IFC shall cater for the number of cardholders as defined in 3.10.8 and 3.10.9 above. The entire system should cater for at least 900,000 cardholders. 3.19.3 The system must allow at least 15 Issue Levels per card or token to match that specified in above. This must deny access and raise an alarm to the operator when a wrong issue level is presented to a reader. 3.19.4 Cardholders must be able to be issued with more than one access token of different description and different number (i.e. access card and vehicle token) whilst maintaining only one cardholder record in the database. 3.19.5 At least 64 user-definable Personal Data fields shall be provided which may be selectively reported on. 3.20 PERSONAL DATA FIELDS 3.20.1 Personal data fields shall be able to be set up as either: Text User data may be entered. Text List User selects text from a pre-prepared list of text strings. Numeric User must enter numeric data. Default Value The field has a default value assigned. (e) Image The field may only contain an image to the field. 3.20.2 Personal data Fields shall also be able to be configured as: Required field Data must be entered. Unique Values Data must be unique from all other card records. No default Value Default value disabled. 3.20.3 A notes/memo field shall be available, associated with each card record. 20

3.20.4 The notes field shall support word-wrap, insert, delete, cut, copy and paste functions. 3.20.5 It shall be possible to group or filter cardholders for the purposes of editing access, generating reports and assigning operator privileges. 3.20.6 The following information fields shall be displayed on the Cardholder editing window: The date when a cardholder record was created. The date when the record was last modified. The date when the card was last printed. 3.20.7 For ease of programming Cardholders shall be grouped into access groups sharing the same access criteria and default personal data fields. 3.20.8 It shall be possible to enter an automatic expiry date/time for the card. 3.20.9 Automatic expiry or deauthorisation of cards not used for a predetermined period of inactivity of up to 999 days shall be administrator configurable. 3.20.10 It shall be possible to allocate start and end dates and times for an Access Group s access to a particular access zone. 3.20.11 Access shall have start and end dates and time to within one minute. 3.20.12 The system shall be capable of importing and exporting database information, on selected cardholders, from other systems and be capable of exporting that cardholder s data, either with or without controlled alteration or amendment, to other databases. Interface and data formats shall be clearly detailed. 3.20.13 The system shall support the capability to allow bulk changes to card records. It shall be possible to carry out the following changes as a bulk change: (e) Delete selected cardholder records. Change personal data fields Change card details. Change access options Change the system division the records are assigned to. 3.20.14 A bulk change shall be able to be saved and scheduled to run at a later time. 3.20.15 A window shall be provided to show details of created, saved, edited, pending, successful and failed bulk changes. 3.21 PHOTO ID BADGING AND IMAGE MANAGEMENT 3.21.1 The system shall provide a means to: Electronically capture images. Store the images in a server database, Integrate those images into a pre-designed ID card from within the system 21

Produce an integrated and completely finished identification card within the nominated time frame. Preference will be given to systems that provide a Wizard functionality for image and card production 3.21.2 Images are defined as being one or more of the following: Photographic image of the cardholder Signature of the cardholder and/or authorising person A fingerprint of the Cardholder 3.21.3 The system shall have an integrated method of card design within the system software without the requirement of having to import background files from other software programs. The facility to import background images from other sources must also be available. This must include scanned logos and other graphical imagery if desired. 3.21.4 The system offered shall capture images in 24 bit colour and at least 640 x 480 pixel resolution using standard video capture hardware offering a TWAIN or Direct Draw standard interface, or a USB digital camera. 3.21.5 Images must be able to be cropped after capture to optimise the image size within the desirable image area. This movable cropping box must be user-definable as to size. 3.21.6 Images must be capable of being enhanced from within the capture software after they have been captured, by the use of: Variable Contrast and Brightness controls Smoothing and Sharpening controls 3.21.7 The controls must be easy to use from within the system software and once set, they must be capable of applying the same setting on subsequent image captures for future cardholder records. 3.21.8 The image, once captured, must also be capable of being flipped and inverted as required before being printed or stored as per clause 3.21.1. 3.21.9 Up to three images per cardholder must be capable of being captured and stored within the system. Images may be defined as per section 3.21.2 above. 3.21.10 The system shall store images in the JPEG compression format. User definable compression rates shall be easily selectable by the operator permitting, as a minimum; at least three levels of JPEG compression are required. 3.21.11 The system offered shall be capable of importing and exporting image files, for use in either card layout or cardholder images, from at least the following formats: JPEG Windows BMP TGA 22

3.21.12 The card design must be capable of incorporating, storing, printing and displaying bar-code information and must support the following bar-code formats: Code 39 Code 39 with checksum Interleave 2 of 5 (e) (f) Interleave 2 of 5 with USS Interleave 2 of 5 with OPC Telepen 3.21.13 The system must have an integrated card design program. Systems offering a separate card design program where card design images must be created in alternate drawing programs and imported are not acceptable however the system offered must also be capable of using imported images as per clause 3.21.11. 3.21.14 The card layout section of the system must be capable of user-selecting up to 16.7 million colours with a custom colour palette available. 3.21.15 Card design must be accomplished by the use of drag and drop options using a mouse. 3.21.16 The system must be capable of using all of the common word processing fonts and must also be capable of normal text manipulation including, text sizing, left and right justification, centred, bolding, underlining & italicising. 3.21.17 The variable cardholder image files that are selected to incorporate into the card design must be user-definable as to capture and size. The sizing must be fully user-configurable from 25% of full size up to 200% of full size, as a minimum, and must offer automatic aspect ratio adjustment throughout the size range. Maximum resolution in pixels is to be stated in response to this clause. 3.21.18 The system shall be capable of producing hard copy output of images and data using any standard MS-Windows printer. 3.21.19 The system shall produce photo ID cards using a single step hard-card colour MS-Windows compatible printer. Datacard SP 75 is current unit. Systems offering multi-stage production, heat lamination or heat & pressure card production are not acceptable. 3.21.20 The system shall be capable of printing directly onto Hi-Co magnetic stripe cards, Wiegand effect cards and proximity cards without damaging the card technology. 3.21.21 Cards must be capable of either landscape or portrait printing and Barcodes must be capable of either vertical or horizontal orientation on the card when printed. 3.22 OPERATOR MANAGEMENT 3.22.1 The system must provide for at least 500 operator groups. 3.22.2 Operators shall be members of operator groups. 23