Appendix D – Sample Data Configuration

Sample Roles

ARCO includes built-in standard Roles Types that define the most commonly used ways of accessing features. Except for the Administrator role, you can modify or delete all common roles.

Role

Description

Dashboard

Administrator

This role manages the system, and it has access to all functions within the system

This role already exists. It can’t get deleted

Menus: All

Display system monitoring related information, including uptime, service status, etc.…

Card Enrolment

This operator creates users within the system for new employees and assigns credentials and permissions to them

They should see the “users” menu and submenus. They can add, delete, edit user information, but have view-only access on roles

They might be able to view user access logs

Display user-related information (Number of users, user activity, etc.)

Personnel Manager

This operator has all the functions of the “Card Enrolment” user, plus has the ability to define role permissions

Similar to Card Enrolment

Alarm Monitoring

This operator is concerning with responding to alerts within the system

They can view sites, profiles, events, users. They can perform actions on “Alarm” objects (Not added to the system yet). They can perform actions on site-related objects (Open doors, isolated points, etc.)

Display alarm related information, outstanding alerts, actions alerts, Map of alarms, etc.…

Reporting User (e.g. Security Head)

This user might need to generate reports on the system, based on how long it took to activate an alarm, fix a faulty door, unusual access activity, power consumption, temperature, etc.…

They probably need view access to everything within the Site. They can create reports and visualisations.

Customised data showing common report visualisations

Technician

This operator might occasionally use the web interface, and often use a basic interface on their mobile device

They can edit profiles, add a site to the system, move a site to a new profile (usually)

They need to see events and status-related information for a specific site

They cannot action alarms, or view user details (usually)

Display a list of faults in the system on a map

Site/ATM Technician

This user does not use the ARCO Platform interface but has a card and access devices on the keypad

They can perform actions on devices for a specific site that they have been granted access to for the day. Sometimes they will have permission for all sites at any time of day, and in this case, the system will record that the technician accessed the site

Once every few months they might log into the system to change their PIN (Future development)

 

Basic Cardholder

This user does not use ARCO Platform but might be an office worker that needs to access specific doors at their regular place of employment

They will perform the “access” action on doors within the system, by swiping their card at the reader next to the door

Once every few months they might log into the system to change their PIN (Future development)

 

Advanced Cardholder

This user does not use the ARCO Platform, but might be an office worker that needs to access specific doors at their regular place of employment, and might need access to several sites

They will perform the “access” action on doors within the system, by swiping their card at the reader next to the door

Once every few months they might log into the system to change their PIN (Future development)

 

Sample Regular Expressions

Field

Expression

Format Samples

Description

Name

^[a-zA-Z”-‘\s]{1,40}$

John Doe O’Dell

Validates a name. Allows up to 40 uppercase and lowercase characters and a few special characters that are common to some names.

Social Security Number

^\d{3}-\d{2}-\d{4}$

111-11-1111

Validates the format, type, and length of the supplied input field. The input must consist of 3 numeric characters followed by a dash, then 2 numeric characters followed by a dash, and then 4 numeric characters.

Phone Number

^[01]?[- .]?(\([2-9]\d{2}\)|[2-9]\d{2})[- .]?\d{3}[- .]?\d{4}$

(425) 555-0123
425-555-0123
425 555 0123
1-425-555-0123

Validates a phone number. It must consist of 3 numeric characters, optionally enclosed in parentheses, followed by a set of 3 numeric characters and then a set of 4 numeric characters.

E-mail

^(?(“”)(“”.+?””@)|(([0-9a-zA-Z]((\.(?!\.))|[-!#\$%&’\*\+/=\?\^`\{\}\|~\w])*)(?<=[0-9a-zA-Z])@))(?(\[)(\[(\d{1,3}\.){3}\d{1,3}\])|(([0-9a-zA-Z][-\w]*[0-9a-zA-Z]\.)+[a-zA-Z]{2,6}))$

someone@example.com

Validates an e-mail address.

URL

^(ht|f)tp(s?)\:\/\/[0-9a-zA-Z]([-.\w]*[0-9a-zA-Z])*(:(0-9)*)*(\/?)([a-zA-Z0-9\-\.\?\,\’\/\\\+&%\$#_]*)?$

http://www.microsoft.com

Validates a URL

ZIP Code

^(\d{5}-\d{4}|\d{5}|\d{9})$|^([a-zA-Z]\d[a-zA-Z] \d[a-zA-Z]\d)$

12345

Validates a ZIP Code. The code must consist of 5 or 9 numeric characters.

Non- negative integer

^\d+$

0
986

Validates that the field contains an integer greater than zero.

Currency (non- negative)

^\d+(\.\d\d)?$

1.00

Validates a positive currency amount. If there is a decimal point, it requires 2 numeric characters after the decimal point. For example, 3.00 is valid, but 3.1 is not.

Currency (positive or negative)

^(-)?\d+(\.\d\d)?$

1.20

Validates for a positive or negative currency amount. If there is a decimal point, it requires 2 numeric characters after the decimal point.

Sample Access Scenarios

Scenario 1 – Access a door with an invalid card

Present a card on a reader that is configured to be on a door and verify that a valid card will not access the door and generate an invalid LED on the reader. Nothing else should happen at the door.

Scenario 2 – Access a door with a valid card

Present a card on a reader that is configured to be on a door and verify that a valid card will access the door. There should be a “valid card” event generated and a valid LED on the reader. When the door is accessed test the following scenarios

  • – Strike time will activate, and if the door is not opened during the shunt time there is an event “ access not taken”
  • – Strike time will activate and if the door is opened and then closed during the shunt time there is an event “ access taken”
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is closed the buzzer will stop.
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is not closed an “Ajar” event is generated and after this when the door is closed the buzzer will stop and then an “Ajar reset” event is generated.

Scenario 3 – Force open a door

If the Door is opened without a valid access card or command, then a Door ‘Forced” event should be generated and the buzzer on the keypad should start. When the Door is closed and the door contact reset then there should be a Door “Forced Reset” event generated.

Scenario 4 – Access a door with egress

Press the egress input to access the door. There should be a “Door Accessed by egress” event generated and a valid LED on the reader. When the door is accessed test the following scenarios

  • – Strike time will activate and if the door is not opened during the shunt time there is an event “ access not taken”
  • – Strike time will activate and if the door is opened and then closed during the shunt time there is an event “ access taken”
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is closed the buzzer will stop.
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is not closed an “Ajar” event is generated and after this when the door is closed the buzzer will stop and then an “Ajar reset” event is generated.

Test 5 – Access a door with a command

Send a command from Arco to Access a door. There should be a “Door Accessed by command” event generated and a valid LED on the reader. When the door is accessed test the following scenarios

  • – Strike time will activate and if the door is not opened during the shunt time there is an event “ access not taken”
  • – Strike time will activate and if the door is opened and then closed during the shunt time there is an event “ access taken”
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is closed the buzzer will stop.
  • – Strike time will activate and if the door is opened and then left open up to the embarrassment time there is an event “access taken” and the buzzer starts on the keypad and then if the door is not closed an “Ajar” event is generated and after this when the door is closed the buzzer will stop and then an “Ajar reset” event is generated.

Scenario 6 – Access a door with a valid card and PIN

Set up a schedule to be Card and PIN. Set a PIN for the user in Arco. Present a card on a reader that is configured to be on a door and verify that the reader accept LED will flash waiting for a PIN. Enter a valid PIN to access the door. There should be a “valid card” event generated and a valid LED on the reader and the Door strike should activate.

Scenario 7 – Access a door with a valid card or PIN

Set up a schedule to be Card or PIN. Set a PIN for the user in Arco. Present a card on a reader that is configured to be on a door and verify access of the door. There should be a “valid card” event generated and a valid LED on the reader and the Door strike should activate. Repeat the test with a PIN instead of a card and same thing should happen.

Scenario 8 – Lock schedule

Set up a schedule to be locked on a Door. When this schedule goes active the door will remain locked. The denied LED will be on the reader, and an event will be generated “Door Locked”. When the schedule becomes inactive the door will go back to normal state and reader LED will go off and event “Door restored” generated. Test while the door is locked that no valid or invalid cards are allowed access to the door. There should be events generated whenever this happens.

Scenario 9 – Unlock schedule

Set up a schedule to be unlocked on a Door. When this schedule goes active the door will remain unlocked. The accept LED will be on the reader, and an event will be generated “Door unlocked”. When the schedule becomes inactive the door will go back to normal state and reader LED will go off and event “Door restored” generated. Test while the door is unlocked that valid cards are allowed access to the door and invalid cards are denied. There should be events generated whenever this happens.

Scenario 10 – Lock schedule and Unlock schedule at the same time

Set up a schedule to be locked on a Door and unlocked on a Door at the same time. When this schedules go active the door will remain locked. The denied LED will be on the reader, and an event will be generated “Door Locked”. When the schedule becomes inactive the door will go back to normal state or the unlocked state depending on the schedule time and reader LED will go off or accept LED on and event “Door restored” or “Door Unlocked” generated. Test while the door is locked that no valid or invalid cards are allowed access to the door. There should be events generated whenever this happens.

Appendix C – Event List Definition

Events

Definition

Access Denied

User does not have access credentials

Access Denied – Antipassback

User did not comply with antipassback conditions (did not log out)

Access Denied – Card Blocked

Card credential blocked

Access Denied – Card Expired

Card credential outside date of validity

Access Denied – Card Not Programmed

Card credential not listed in the system

Access Denied – Egress

Egress is disabled and will not allow access (outside time schedule)

Access Denied – Reader Locked

Credential cant be used because the reader is locked

Access Denied – Suspended

User credential is suspended

Access Download Fail

Unable to synchronize credential information from ARCO

Access Granted

User credential accepted

Access Granted – Antipassback

User credential accepted and complies with antipassback conditions

Access Granted – Duress

Duress is enabled (User in distress)

Access Granted – Egress

Egress button has been pushed and access is allowed

Access Not Taken

User did not enter the door

Access Taken

User entered the door

Activated

Used for indicating that an output is on

Ajar

Door is open for an extended time

Alarm

Alarm signal received

Analog Alarm

Analog alarm signal received

Analog Value

Value received is analog

ARC Path 1 Failed

Connection to Alarm Reporting Center 1 has failed

ARC Path 2 Failed

Connection to Alarm Reporting Center 2 has failed

ARC Path 3 Failed

Connection to Alarm Reporting Center 3 has failed

ARC-1 Offline

Alarm Reporting Center 1 is offline

ARC-2 Offline

Alarm Reporting Center 2 is offline

ARC-3 Offline

Alarm Reporting Center 3 is offline

Arm Pending

Exit timer is running

Armed

System is armed. Alarms will be reported

Arming Failed

System arm failed

Backup Communication Settings

Connection settings are for backup path

Backup Connection

Connection to Arco is not the primary connection

Battery Charger Failed

The battery charger is not functioning

Battery Failed

The battery is not functioning

Battery Fully Charged

Battery charge is at full capacity

Battery Level

Battery charge level

Battery Test Result

Battery status report

Card Swiped

Card used on reader

Configuration Defaulted

Configuration has be changed to default

Configuration Download Fail

Configuration has failed to download

Configuration Downloading

Configuration is downloading

Configuration Updated Successfully

Profile configuration is updated in the controller OK

CPU Temperature

Temperature of the control panel central processing unit

CPU Temperature Fail

Temperature of the CPU exceeds normal (below 10°C or above +70°C)

Custom 1

Custom Role 1

Custom 1 Extend

Access time of Custom Role 1 is extended

Custom 2

Custom Role 2

Custom 2 Extend

Access time of Custom Role 2 is extended

Device Substitution

A device has been tampered and replaced

Disarmed

Area lock is disarmed

Door Contact Trouble

Door contact input is in a trouble condition

Duress

Duress is enabled (User in distress)

Elapsed

 

Entry Timer Active

Entry timer for disarming an area is running.

Ethernet Offline

Main ethernet connection is not connected

Ethernet Offline (Expansion)

Expansion card ethernet is not connected

Expired

Used to indicate a timer has expired

External Temperature

Temperature around the enclosure

External Temperature Fail

Temperature around the enclosure exceeds normal (below 10°C or above +70°C)

Fault

Device has indicated a fault confition

Firmware Available in Inactive Bank

Controller firmware is available in the secondary memory bank

Firmware Download Failed

Firmware download unsuccessful

Firmware Downloaded Successfully

Firmware download successful

Firmware Downloading

Firmware is in the process of being downloaded

Forced

Used to indicated that a door had been opened without a valid access

Inhibited

Prevent alarm from sending a signal

Input Changed (Test)

 

Invalid Login Attempt

User has attempted to enter a PIN that is not valid

Isolated

Prevent alarms from sending external signals

Latch

An input or device tamper/offline alarm has been latched on

Late to Close

An area has not closed based on the programmed schedule

Listening

Indicates a microphone is in a mode for listening to audio

Locked

This is to indicate the state of a door preventing any access

Logged In

User logged in

Logged In – BLE

User logged in using ARCO Setup

Muted

Indicates a microphone or speaker is disabled from working

Offline

Device Offline

Onboard Temperature

Temperature around the controller

Onboard Temperature Fail

Temperature around the controller exceeds normal (below 10°C or above +70°C)

Open

Indicates that a door is seen as being in the open state

Partial Armed

Area mode whereby certain inputs can be masked for this mode.

PIN Changed

PIN has been changed for a user

Power Failed

Power supply is not functioning

PSTN Line Offline

PSTN line is not connected

Restarted

Controller has restarted

Running

 

SD Card Failure

Failed to read from SD Card

Sealed

State of an input when it is not in alarm

Self Test Failed

The self-test of an input failed.

Shutdown Pending

Controller battery level

Signal Fail

GPRS Signal has failed.

Signal Level

GPRS signal is OK and at level Good, OK, Poor

Speaking

Speaker mode of the listen in is enabled for talkback

Strike Trouble

Door strike contact monitor is in trouble state

Suspect Latch

A device has had too many activations during the current mode

Tamper

Alarm for interference on hardware enclosures

Tamper (Masking)

 

Tamper (Open Circuit)

 

Tamper (Range Reduction)

 

Tamper (Short Circuit)

 

Test Mode

Test mode is activated

Time Changed

Internal system time has been modified

Too Many Invalid Logon Attempts

User has made too many login attempts

Unknown Message

Message is not defined

Unlocked

Door state is unlocked allowing access without presenting a card

Unmasked Alarm

The raw state of an input

User Count

Number of Users

User Database 90%+

User database capacity is more than 90% full

Value

Analog input value

Appendix B – Report Data Fields

Listed below are Data Fields that require definitions.
ARCO Platform supports custom fields, so it is possible your company-specific custom fields are not included.

User Activity

Event ID

Unique Identifier for an event.

Event Name

Name of the event.

Organisation

Provide a mean to partition the system so that a company or the users of that company can only access devices within their scope.

Scope

Permissions of a User based on the Organisation.

Target ID

Unique Identifier for a target.

Target Name

Name of the event.

Time

Time when the activity was performed.

 

Credential Details

Card Number

Value of the card registered to the credential.

Credential ID

Unique Identifier for a credential.

Credential Type

Classification of the credential assigned.

Facility

 

Issue

 

Organisation

Provide a mean to partition the system so that a company or the users of that company can only access devices within their scope.

Profile

 

Status

Displays if the Credential is Active or Blocked. Only Active credentials can access Sites, Areas or Doors.

User ID

Unique Identifier for a user.

Valid From

Date and Time when the credential validity starts.

Valid To

Date and Time when the credential validity ends.

 

User Information

Active Directory

Check mark if a user is linked to an Active Directory.

Extended Time

Check mark if a user is allowed extended login time.

 

State

Device

Type of device.

Device ID

Unique Identifier of the device.

Name

Name of the device.

Organisation

Organisation where the device belongs to.

 

Roles

Bluetooth User

Check mark if the role is a Bluetooth User

Executive

Check mark if the role is an executive.

Organisation

Organisation where the role belongs to.

Permissions

Access granted to the role.

Role ID

Unique Identifier for the role.

Role Name

Name of the role.

Role Type

Access Roles, Operator Roles or Callout Roles based on the user’s function in your organisation.

Scope

Permissions of a role based on the Organisation.

Tags

Metadata for search and reporting parameters.

 

Sites

Address

Location of the site.

Calendar

Name of the calendar configuration used.

Calendar ID

Unique identifier of the calendar configuration.

Gateway ID

Unique identifier of the gateway.

Latitude

Geographic coordinate that specifies the north–south position of a point on the Earth’s surface.

Longitude

Geographic coordinate that specifies the east–west position of a point on the Earth’s surface.

Name

Name of the site.

Profile ID

Unique identifier of the profile.

Site ID

Unique identifier of the site.

 

Audit Logs

Action Type

 

Event Details

Description of the event

Event ID

Unique identifier of the event.

Event Name

Name of the event.

Target ID

Unique identifier of the target.

Target Name

Name of the target.

Time (UTC)

Timestamp relative to the Coordinated Universal Timezone.

Time (Site)

Timestamp relative to the Site location Timezone.

Appendix A – Glossary of Terms

A

Alarm Confirmation Time

Duration of time an alarm signal is received before an alarm message triggered.

Analog 

A continuous signal for which the time-varying feature.

 

B

BLE Access Point

Controls the Bluetooth receiver of the S1000 Control Panel

 

C

Credential

Represents some form of identification.   The most common form will be the byte representation of raw card data, as scanned by a reader when swiping a card or typing a PIN.

Contact ID

Ademco alarm communications protocol.

 

D

Dashboard

Provides graphical and geographical screens provide easy management and data consolidation showing the current and historical status of your system.

Digital

A signal in which the original information is converted into a string of bits before being transmitted.

 

E

Ethernet (TCP)

Transmission Control Protocol cable connection.

Ethernet (UDP)

User Datagram Protocol cable connection.

 

G

GPRS (TCP)

Transmission Control Protocol mobile connection.

GPRS (UDP)

User Datagram Protocol mobile connection.

 

L

Logical ID

The unique identifier assigned to a device connected to the S1000 Smart Controller.

 

N

Navigation Panel

Links to different sections for each module can consistently be found on the left side of the screen.

 

P

PSTN

Public Switched Telephone Network connection.

Pulse Counter

A signal pulses during a specified amount of time.

 

Q

Quick Access

Commands displayed when hovering the mouse pointer over an item or information.

 

R

Role

Control how and what people can access on your system

Role Capabilities

Capability to perform certain ARCO features are assigned to specific Operator Roles.

 

S

Search bar

Enables you to search for specific information in different ARCO Platform interface. The search bar automatically starts searching after typing at least four characters.

Suspect Activation Counter

The number of times an alarm trigger will send before it stops.

SIA

Security Industry Association alarm communications protocol.

Sites

Different locations in your system.

 

W

WiFi (TCP)

Transmission Control Protocol wireless connection.

WiFi (UDP)

User Datagram Protocol wireless connection.