Area configuration tabs - Security Center 5.12

Security Center Administrator Guide 5.12

Product
Security Center
Content type
Guides > Administrator guides
Version
5.12
Language
English
Last updated
2024-09-13

This section lists the settings found on the configuration pages of areas in the Area view task.

Area - Identity

On the Identity page, you can configure whether or not the area is used for access control, in addition to the standard entity information (name, description, logical ID, and so on).
Access control
When this option is on, the Properties and Advanced tabs are shown, and you can configure the area as a secured area. When this option is off, the area is ignored by the Access Manager role.

Adding a door to the area automatically sets the Access control option to ON and makes it read-only. If you only configure elevators for the area, the option is automatically set to ON, but can still be turned off.

NOTE: This option is only visible when Synergis™ is enabled as a feature in your license.

Area - Properties

On the Properties page, you can define who has access to the area through its perimeter doors.
NOTE: This page is only visible when Synergis is enabled as a feature in your license, and the Access control option on the Identity page of the area is set to ON.
Access rules
Define who has access to the area and when. Each rule can be applied to one or both sides of the doors.
Access rules
Add access rules to grant or deny access to the area to cardholders and cardholder groups based on a schedule.
Cardholders
Add cardholders and cardholder groups to define who has access to the area at all times.
NOTE: Only grant access directly to cardholders for temporary situations or exceptions. If a group of cardholders should be allowed to access the area at all times as a regular setup, define an access rule with the Always schedule.
Doors
Define the Perimeter and Captive doors of the area. Perimeter doors are used to enter and exit an area, and help to control access. Captive doors are doors inside the area. By correctly setting the door sides, people counting and antipassback are properly tracked. A door’s Entrance and Exit sides are relative to the area being configured.
NOTE: Access rules assigned to the area apply to all perimeter doors of the area, even though the access rules are not listed on the Access rules page of the perimeter doors. If each perimeter door must be governed by its own set of rules, configure the access rules on each door.

Area - Advanced

On the Advanced page, you can define the advanced access control behaviors for the area.
NOTE: This page is only visible when Synergis is enabled as a feature in your license, and the Access control option on the Identity page of the area is set to ON. Depending on your license options, some properties might not be visible.
Antipassback
Antipassback is the access restriction placed on a secured area that prevents the same cardholder from entering an area they have not yet exited, and vice versa.
Status
Turn the antipassback feature on or off.
Schedule
Select Always if you want antipassback to be applied at all times.
Type
Type of antipassback to apply.
Soft
Soft antipassback only logs the passback events in the database. It does not restrict the door from being unlocked due to the passback event.
Hard
Hard antipassback logs the passback event in the database and prevents the door from being unlocked due to the passback event.
Presence timeout
Set how many minutes a cardholder’s presence in the area is remembered for the purpose of passback detection (not used for counting people). Past that period, a cardholder who never left the area can re-enter without triggering a passback event. The default value of zero (0) minutes means that a cardholder's presence never times out.
NOTE: When global antipassback is enabled, the presence of a cardholder in an area is forgotten after seven days if no entry or exit from this area is reported for that cardholder during that period. This means that cardholders can re-enter an area that they never left, or leave an area they never entered, without triggering a passback event if no movement was registered for these cardholders on that area for seven days. This applies even if the Presence timeout is set to infinite (=0).
Strict
Turn on this option to generate passback events for both types of access violations: when cardholders try to re-enter an area that they never left, and when cardholders try to exit an area that they never entered. Otherwise, the default is turn it off and antipassback logic is only verified on area entrances, and passback events are only generated when cardholders try to re-enter an area that they never left.
Best Practice: If you choose to enable strict and hard antipassback on an area that is not controlled with turnstiles or similar devices that only allow one person through at a time, grant the Forgive antipassback violation privilege to the operators responsible for monitoring this area.
NOTE: With strict antipassback turned off, you can have Card-In/REX-out perimeter doors, but the Presence timeout parameter must be configured (> 0). With strict antipassback turned on, all perimeter doors must be configured as Card-In/Card-Out, Presence timeout must be set to infinite (= 0), and no REX can be configured.
Max occupancy
The max occupancy feature monitors the number of people in an area, up to a configured limit. Once the limit is reached, the rule will either deny access to additional cardholders (if set to Hard) or trigger events while allowing further access (Soft).
Status
Set it to ON to enable the max occupancy feature. Enabling a Max occupancy limit on an area generates the following events:
  • Max occupancy reached when the area reaches the configured limit. This event sends the area into a warning state.
  • Max occupancy exceeded when additional cardholders enter the area.
  • Below max occupancy when the number of occupants drops below the configured limit.
Type
Select from the following:
  • Hard: When the max occupancy limit is reached, it will deny the next access request on the area's perimeter door.
  • Soft: Will not deny subsequent access requests.
Max occupancy limit
Enter the number of people the area can hold before triggering the limit.
NOTE: Cardholders with the Bypass antipassback rules option active are granted access even if the area's occupancy limit is reached or exceeded.
Interlock
Security Center supports the interlocking of the perimeter doors for an area by allowing only one perimeter door to be open at one time.
Status
Turn the interlock feature on or off. When this feature is on, only one perimeter door of the area can be open at any given time. To open a door, all others must be closed.
Priority
When both the override and lockdown inputs are configured, select which one has priority when both inputs are active.
Override
Select the input that is wired to the override key switch or flip switch. When the switch in on, the interlock feature is disabled.
Lockdown
Select the input that is wired to the lockdown key switch or flip switch. When the switch is on, all perimeter doors remain locked until the switch is back to its normal position.
First-person-in rule
The first-person-in rule is the access restriction placed on a secured area that prevents anyone from entering the area unless a supervisory cardholder is on site. The first-person-in rule can be enforced on door unlock schedules, access rules, or both.
Enforce on door unlock schedules
Set to ON to ignore all door unlock schedules until a supervisor is granted access to the area. The first-person-in rule has no effect on elevator unlock schedules.
Enforce on access rules
Set to ON to ignore access rules until a supervisor is present in the area. You specify when the first-person-in rule applies with a schedule.
Supervisors
List of cardholders who can act as area supervisors.
Exemption list
List of cardholders who continue to follow the access rules even when the first-person-in rule is in effect.
Visitor escort rule
The visitor escort rule is the additional access restriction placed on a secured area that requires visitors to be escorted by a cardholder during their stay. Visitors who have a host are not granted access through access points until both they and their assigned host (cardholder) present their credentials within a certain delay.
NOTE: The hosts are configured in the Visitor management task. The maximum delay granted to the host to present their credential after the visitor has presented theirs is configured individually for each door.
Enforce visitor escort rule
Set to ON to require the host to present their credential after the visitor, if the visitor has a mandatory host assigned.
Duress PIN
The Duress PIN function helps to ensure a cardholder's safety in a situation where they are being coerced into unlocking a door by an intruder. When the option is on, the cardholder can use their duress PIN to unlock the door, which triggers a Duress PIN entered event without alerting the intruder.

Area - Threat levels

On the Threats levels page, you can configure specific actions to be executed by the system when a threat level is activated or deactivated on the area.
NOTE: This page is only visible when the Threat level license option is enabled, and at least one threat level is configured in your system.