EBI_Tema 4.0(TemaLine 1.1) overview

Download Report

Transcript EBI_Tema 4.0(TemaLine 1.1) overview

TEMA
Intrusion
Detection
16/07/2015
EBI-TEMA
1
TEMA
Intrusion
Detection
Temaline Intrusion Detection Module
16/07/2015
EBI-TEMA
2
Temaline Intrusion Detection Module
TEMA
Intrusion
Detection
The Module is an option integrated into the Temaline Interface subsystem. It is used for
the configuration, via the Temaline Interface's displays (EBI), of ID (Intrusion Detection)
TemaServers, which are used for the management of the intrusion detection peripheral
devices, i.e. detectors, actuators, and all man-machine interface's peripheral devices.
The option is enabled through the Tema License, not through the EBI License.
16/07/2015
EBI-TEMA
3
TEMA
Intrusion
Detection
EBI TEMA Intrusion Detection Glossary:
Detectors:
Intrusion Digital Outputs:
Intrusions Zones:
Logics:
Mini Terminals:
Operative Notes:
Peripheral Configurator:
Peripheral Operators:
Peripheral Profiles:
Plants:
Typologies:
16/07/2015
Field devices connected to the RTUA10 I/O modules.
Outputs on RTUA10 modules, commandable from the EBI
or by the TemaServer ID via a feedback program or from a
Mini Terminal.
For performing global arming/disarming of all of the detectors
associated with a zone and testing a zone.
A collection of detectors that must be in alarm status,
either simultaneously or not, in order to rise to an alarm for
the logic.
Peripheral devices( keypad, readers, displays) for interfacing with
the Intrusion Detection Module on the LON bus level.
Messages that can be associated with objects, to be displayed
on the Mini Terminal of the Intrusion Detection module.
For configuration of the Intrusion Detection Central Unit (TemaServer ID)
through a Mini Terminal if the EBI is not available.
Operators who have access to the plant management functions via the
Mini Terminals.
Defines the access rights to the management features
that are available via the Mini Terminals.
A collection of detectors, Intrusion Digital I/O modules, Mini Terminals
and zones.
The statuses that an object may assume, the events (alarmconditions) that it
may generate, and the commands that can be run on it.
For detectors and logics, in addition to the default typologies, you can
create customized typologies.
EBI-TEMA
4
TEMA
Intrusion
Detection
Architecture
Central Unit
16/07/2015
EBI-TEMA
5
Architecture
TEMA
Intrusion
Detection
D Detector
LOGIC1
D
D
D
Zone AA
D
D
D
D
D
Central
Unit 2
Zone AB
Central
Unit 1
RTU
A10
RTU
A10
RTU
A10
RTU
A10
D
D
D
D
Zone CC
Zone CA
RTU
A10
LOGIC2
D
RTU
A10
RTU
A10
RTU
A10
D
D
D
D
Mini terminal
Zone BB
Mini terminal
D
Zone BA
Plant C
Plant A
1 Plant per ID Tema Server.
128 Zones as default per system
56 External RTUA10 per Tema Server
240 Input/output per Tema Server
240 Detectors per Logic
128 Logics as default per system
5 Mini Terminals per Tema Server,
but only 2 C02.
16/07/2015
RTU
A10
RTU
A10
RTU
A10
RTU
A10
Central
Unit 3
Mini terminal
Plant B
EBI-TEMA
6
TEMA
Intrusion
Detection
Hardware
16/07/2015
EBI-TEMA
7
TEMA
Intrusion
Detection
Hardware
RTU Q03 (60W)
Q01 and Q04 are not approved yet for ID
16/07/2015
EBI-TEMA
8
TEMA
Intrusion
Detection
Hardware
Inside View. Central Unit. TemaID
ID Tema Server
The central unit is equipped with
anti-removal and anti-open tamper
16/07/2015
EBI-TEMA
9
TEMA
Intrusion
Detection
16/07/2015
Hardware
Central Unit
EBI-TEMA
10
TEMA
Intrusion
Detection
16/07/2015
Central Unit
EBI-TEMA
11
TEMA
Intrusion
Detection
Central Unit
Modem:
The central unit has an RS232 serial line) on a standard J27 connector (9 pole male) and two power
supplies on the J29 screw connector for modem connection (optional). The
modem must be housed inside the central unit; it is suggested to use the
handheld Oltremare modem (see Optional Parts List), which has a +5VDC
power supply.
J27
J29
16/07/2015
EBI-TEMA
12
TEMA
Intrusion
Detection
Central Unit
One, two, or three Fiamm-GS da 42 A/H 12V batteries may be utilized.
You must use the dipswitch on the Control Board to set the
number of batteries inserted, so that periodic battery testing will
be conducted properly.
The “ON” position indicates that the battery is present:
Battery 1 SW 1
Battery 2 SW 2
Battery 3 SW 3
16/07/2015
EBI-TEMA
13
Hardware
TEMA
Intrusion
Detection
Central Unit
LON terminals
{
See next page
Fuses
9 / 2 / 12 / 4 / 3 / 6 / 5
J34 J20 J14 J22 J21 J32
J33
B1 B2 B3
3 Batteries
J20, J14, J22, and J21 are ext. RTUA10s power
J34 is for miniterminal power
J32 and J33 are for the power supply for external
devices associated with the special outputs “Central
Unit Failure” and “Alarms.”
16/07/2015
EBI-TEMA
14
TEMA
Intrusion
Detection
16/07/2015
EBI-TEMA
15
Hardware
TEMA
Intrusion
Detection
Lon Daisy Chain Configuration
Central Unit
Note:
JP3 closed on LON Repeater Board
JP4 open on LON Repeater Board
16/07/2015
EBI-TEMA
16
TEMA
Intrusion
Detection
Hardware
Lon Free-Topology Configuration
Central Unit
Note
JP3 open on LON Repeater Board
JP4 closed on LON Repeater Board
16/07/2015
EBI-TEMA
17
Hardware
TEMA
Intrusion
Detection
Lon Ring Configuration
Central Unit
Note:
JP3 closed on LON Repeater Board
JP5 closed on LON Repeater Board
16/07/2015
EBI-TEMA
18
TEMA
Intrusion
Detection
Hardware
Central Unit
You must use the dipswitch on the Control
Board to set the number of
batteries inserted, so that periodic battery
testing will be conducted properly.
The “ON” position indicates that the battery
is present:
Battery 1 SW 1
Battery 2 SW 2
Battery 3 SW 3
16/07/2015
EBI-TEMA
19
TEMA
Intrusion
Detection
Hardware
Central Unit
16/07/2015
EBI-TEMA
20
TEMA
Intrusion
Detection
Hardware
Central Unit
16/07/2015
EBI-TEMA
21
TEMA
Intrusion
Detection
Hardware
Central Unit
16/07/2015
EBI-TEMA
22
TEMA
Intrusion
Detection
Hardware
Central Unit
16/07/2015
EBI-TEMA
23
TEMA
Intrusion
Detection
Hardware
Central Unit
16/07/2015
EBI-TEMA
24
TEMA
Intrusion
Detection
16/07/2015
Hardware
Central Unit
EBI-TEMA
25
TEMA
Intrusion
Detection
Hardware
Allowed numbers of RTU A10s and Mini Terminals per ID Tema Server
56 External RTUA10 x 4 = 224 + 4 Internal RTUA10 x 4 = Total 240 Input and 240 Output
5 Mini Terminals of which 2 can have a C02 Graphical Display
Total number of external RTU’s (all types) = 58
16/07/2015
EBI-TEMA
26
TEMA
Intrusion
Detection
Hardware
RTU types managed by the Intrusion Detection Module
Not yet approved
Not yet approved
Not yet approved
Not yet approved
Not yet approved
16/07/2015
EBI-TEMA
27
TEMA
Intrusion
Detection
16/07/2015
Hardware
Mini Terminals managed by the Intrusion Detection Module
EBI-TEMA
28
TEMA
Intrusion
Detection
16/07/2015
Mini Terminals with Display
EBI-TEMA
29
TEMA
Intrusion
Detection
RTUA10 connections
16/07/2015
EBI-TEMA
30
TEMA
Intrusion
Detection
16/07/2015
RTUA10 (internal)
EBI-TEMA
31
TEMA
Intrusion
Detection
The internal RTUA10s must be configured as normal RTUA10s.
RTUs have three leds as below:
- Red Led = status for +12V out sensors
• ON = +12V present (internal fuse working)
• OFF = +12V not present (internal fuse not working)
- Green Led = Communication status between RTUA10 and CTU:
• ON = Communication OK
• Blinking = Communication not present
• OFF = Fail status
- Yellow LED: [LonWorks Service LED]
• Off: normal status
• Steady On: Neuron Chip without application and not configured
• Blinking 0.5Hz: Neuron Chip in application status present, but not configured.
Note: the LED also goes on as an indication of activation of the service
PIN via internal button or via EBI “WINK” command
16/07/2015
EBI-TEMA
32
TEMA
Intrusion
Detection
RTUA10 (internal)
J5
J7
J7
J9
J9
J10
J10
J11
J11
J19
J19
J21
J21
J22
J23
J22
O
U
T
P
U
T
S
J14
J15
J16
J17
J25
J26
J27
J28
J23
16/07/2015
L
E
D
S
EBI-TEMA
33
TEMA
Intrusion
Detection
Input 1-8
RTUA10 (internal)
IN: balanced 5-state input (short / normal / alarm / protection / cut)
OUT: digital relay output (with exchange contact, 42 VAC/DC 5 A – 10A /1 sec peak)
Output 1-8
J7
J9
J10
J11
J19
J21
J22
J23
16/07/2015
EBI-TEMA
34
TEMA
Intrusion
Detection
RTUA10 (internal)
IN: balanced 5-state input (short / normal / alarm / protection / cut)
In - output 9-16
OUT: digital transitor output Open collector – 100mA max
J14
J15
J16
J17
J25
J26
J27
J28
16/07/2015
EBI-TEMA
35
TEMA
Intrusion
Detection
RTUA10 (internal)
Standards Detector
16/07/2015
Detector with Input Test/Reset
EBI-TEMA
36
TEMA
Intrusion
Detection
RTUA10 (internal)
Wiring of the sensor simulator used in the training center.
Input 1 and output 1.
1
4
2
J5
5
3
Green
6
1
4
2
Yellow
J7
5
3
6
White
Tamper
Cut
Cut
4
2
Out
Tamper
1
J9
5
3
Brown
6
1
4
2
Simulator
Short
Alm
Nml
16/07/2015
Short
Alarm
Normal
J10
5
3
6
EBI-TEMA
37
Hardware
TEMA
Intrusion
Detection
RTUA10 (external)
The RTUA10 is equipped with anti-removal and anti-open tamper.
Lon Ring Configuration
Lon Free-Topology Configuration
--------------------------------------------------------------------------RTUA10 Module
RTUA10 Module
16/07/2015
EBI-TEMA
38
TEMA
Intrusion
Detection
Hardware
RTUA10 (external)
Inputs
Standards Detectors
16/07/2015
EBI-TEMA
Detectors with Input Test/Reset
39
Hardware
TEMA
Intrusion
Detection
RTUA10 (external)
Outputs
Intern Power
16/07/2015
Extern Power
EBI-TEMA
40
TEMA
Intrusion
Detection
Software components and Installation
16/07/2015
EBI-TEMA
41
TEMA
Intrusion
Detection
Software and Installation
Software components and Installation
Windows 2000 Server or Windows 2000 Professionel
Microsoft.NET Framework 1.1 with SP1(for the Temaline subsystem WEB
modules)
EBI 300.1 with SP1
EBI/TEMA 4.5.4.
ServerClientEBIR300_1_TemaGenUpdate_ver4 (from the EBI homepage)
ctu45407.ID firmware for the Intrusion Detection Tema servers
A EBI license without Access control, but with TEMA Interface.
A Tema license with Intrusion detection enabled.
RTFM
16/07/2015
EBI-TEMA
42
TEMA
Intrusion
Detection
16/07/2015
Software and Installation
EBI-TEMA
43
TEMA
Intrusion
Detection
Software and Installation
Install the software as described
in the EBI_Tema installation guide
and the EBI installation guide.
Install Windows 2000
Install Microsoft.NET Framework 1.1 w / SP1
Install EBI Server 300.1
with SQL Server or MSDE
REBOOT
Install EBI_300.1
SP 1
See next slide
Use Quick Builder to set up
the Station(s), (Operator base
Security
REBOOT
Stop the EBI
Server to
Database only
Install
ServerClientEBIR300_1_TemaGenUpdate_ver4
REBOOT
Check the Station(s)
configuration files(s)
Assign TEMA profiles to
operators and Station(s)
Define TEMA Point server
Install EBI_TEMA
4.5.4.
REBOOT
REBOOT
16/07/2015
EBI-TEMA
44
TEMA
Intrusion
Detection
Software and Installation
Install Microsoft.NET Framework V.1.1 / SP1
1. Check that
these two services
are running
2. Then Install NET Framework 1.1(dotnetfx.exe) and then
install NET Framework SP1 (NDP1.1sp1-KB867460-X86.exe)
Must be a Honeywell Administrator;
automatically done during Tema installation
16/07/2015
EBI-TEMA
45
TEMA
Intrusion
Detection
Software and Installation
Use Quick Builder to set up
the Station(s), (Operator base
Security
Check the Station(s)
configuration files(s)
EBI Station types:
Assign TEMA profiles to
operators and Station(s)
Configure the stations by using Quick Builder.
The station can be:
Static or Rotary
Define TEMA Point server
The stations must be configured for Operator Based Security if you
want to use profiles and visibility for operators ( and you really want that !! ).
Station Based Security = NO Security !!!!
EBI Station setup:
The installation procedure of the Tema Subsystem will automatically set the following:
• Toolbar for station
• Tema shapes path for station
• Station scripting objects ProgId
• One Tema default Area
16/07/2015
EBI-TEMA
46
TEMA
Intrusion
Detection
Software and Installation
Use Quick Builder to set up
the Station(s), (Operator base
Security
Check the Station(s)
configuration files(s)
Assign TEMA profiles to
operators and Station(s)
Define TEMA Point server
16/07/2015
EBI-TEMA
47
TEMA
Intrusion
Detection
Software and Installation
Associating a TEMA Profile to the Station:
Use Quick Builder to set up
the Station(s)
Modify the Station(s)
configuration files(s)
Assign TEMA profiles to
operators and Station(s)
Define TEMA Point server
16/07/2015
EBI-TEMA
48
TEMA
Intrusion
Detection
Software and Installation
Associating a Area Profile, a TEMA Visibility and a TEMA Profile to the Operators:
Area Profile:
A combination of areas
and a time program
Use Quick Builder to set up
the Station(s)
Modify the Station(s)
configuration files(s)
Assign TEMA profiles to
operators and Station(s)
Define TEMA Point server
16/07/2015
EBI-TEMA
49
TEMA
Intrusion
Detection
Software and Installation
Defining a TEMA Type Point Server:
An area with the name TE will be automatically created during the installation.
Use Quick Builder to set up
the Station(s)
Modify the Station(s)
configuration files(s)
Assign TEMA profiles to
operators and Station(s)
Define TEMA Point server
Area(s) for TEMA pointserver
16/07/2015
EBI-TEMA
50
TEMA
Intrusion
Detection
Configuration
of
Tema Intrusion Detection
16/07/2015
EBI-TEMA
51
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
Mandatory
EBI-TEMA
52
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
2.
Configuration sequence:
1.
Use TELNET
to
configure the Tema Servers with installation parameters via the TEMA virtual monitor.
Start Station and configure the following in the shown order:
ID Tema Servers
Detectors
Plants
Logics (if used)
Card Encoding format (if the Mini
Terminal has a reader)
Peripheral Operators (if used)
ID RTU’s
Peripheral Profiles (if used)
Mini Terminals (if used)
Intrusion Digital Output (if used)
Typologies (if you don’t use the default)
Intrusion Zones (if used)
16/07/2015
EBI-TEMA
53
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID TEMA Server configuration
In order to be able to use the Temaline Interface Intrusion Detection
Module, you must first configure one or more ID type (Intrusion Detection)
Tema Server(s), which will then manage the Intrusion Detection system.
16/07/2015
EBI-TEMA
54
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID TEMA Server configuration
After defining
the ID Rtu’s then
ring topology may
be defined.
See next slide
16/07/2015
EBI-TEMA
55
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID TEMA Server configuration
Ring Topology configuration
EBI-TEMA
56
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID TEMA Server configuration
Ring Topology configuration
Normal situation
The Tema Server ID is able to communicate with the RTU components in
both directions of the ring, by periodically changing the direction. This
allows the system to maintain active communications and to perform
verifications of the operational status of the devices (polling activity).
The RTU A10 devices used for the ring connection are equipped with an
internal switch which closure can be requested by the TemaServer,
meaning that they are capable of physically opening the ring if a short
circuit is detected.
Therefore, the system is able to detect a cut or short situation in the ring
and, operating on the direction of communications and on the RTUs
switches, can restore the best communication condition.
Ring cut situation
• The Tema Server locates the cut between RTU 2 and RTU 3 and
raises an alarm; if its configuration has been so designed, it will also
run a feedback program.
• The Tema Server continues communicating with the RTUs in the ring,
using both directions, until the cut has been fixed.
16/07/2015
EBI-TEMA
57
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID TEMA Server configuration
Ring Topology configuration
Ring short situation
1.After detecting a short condition, the RTUs open their internal switches.
2.The Tema Server emits an alarm and, if so configured it can
fire one or more feedbacks.
• It sends a command to close the internal switch of the first RTU on
the ring that responds, i.e. it closes it, so as to re-establish
communications in that segment of the ring.
• The Tema Server proceeds closing all of the switches, one by one,
until it closes the short circuited segment; this will cause a new
opening of all of the switches in the ring.
• The Tema Server places the last RTU that has been closed among
the devices to be excluded from the ring.
• The Tema Server proceeds, using both directions of the ring,
closing all of the internal switches, with the exception of those
belonging to the RTUs that delimitate the short circuited segment.
• At this point the Tema Server may perform the binding procedure for
all usable RTUs.
The resumption of normal operation after a short circuit is
performed manually via the re-binding of the TemaServer.
16/07/2015
EBI-TEMA
58
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID TEMA Server configuration
EBI-TEMA
59
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID TEMA Server Upload
Upload the ID Tema Server
Configuration to the Scat DB
in the EBI if the ID Tema
Server configuration has
been done via a
MiniTerminal
Look in the documentation
before you use this
function !!
16/07/2015
EBI-TEMA
60
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Plant configuration
A Plant = one Tema Server.
Available commands for a Plant
16/07/2015
EBI-TEMA
61
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Plant configuration
For Mini Terminal
Operators
duress
Log on
16/07/2015
EBI-TEMA
62
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Plant configuration
EBI-TEMA
63
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Encoding Format definition
Using a card allows an peripheral operator to login to the system, and to
perform some commands (Feed Backs) in response to presenting the card
to a Mini Terminal.
Not yet approved
Not yet approved
Not yet approved
16/07/2015
EBI-TEMA
64
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Encoding Format definition for HID reader
EBI-TEMA
65
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID RTU Configuration
The RTU components are the base modules -readers, displays, keyboardsthat make up the Mini Terminals, and the RTUA10 I/O module as interface
for the intrusion detection Detectors.
16/07/2015
EBI-TEMA
66
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID RTU Configuration
RTU types managed by the Intrusion Detection Module
Not yet approved
Not yet approved
Not yet approved
Not yet approved
Not yet approved
16/07/2015
EBI-TEMA
67
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID RTU Configuration
RTUA10
EBI-TEMA
68
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID RTU Configuration
RTUB19
RTU A07 !!
16/07/2015
EBI-TEMA
69
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID RTU Configuration
RTUC02
EBI-TEMA
70
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Mini Terminal Configuration
The miniterminals are the man-machine interface for the Intrusion Detection
Module on the peripheral level.
Peripheral Operators may use the Mini Terminals for managing the plant and
for performing specific operations. ( Max. 5 MT per Plant(ID TemaServer)) but
only 2 MT with graphic displays.
16/07/2015
EBI-TEMA
71
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Mini Terminal Configuration
The feedback that is
executed by the mini
terminal upon the first
reading of the
card (if this card has
passed all checks).
The feedback that is
executed by the mini
terminal upon the
second reading of
the card (if this card has
passed all checks).
16/07/2015
EBI-TEMA
72
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Intrusion Digital Output Configuration
Intrusion digital outputs allow you to execute commands from the EBI or by
the TemaServer ID via a feedback program.
They are digital output on the RTU A10 (I/O type RTU).
The outputs may be associated to a zone, and in such a case, they will inherit
the zone status (armed/disarmed).
Specifically, the outputs in the Temaline Interface Intrusion Detection Module
are used to manage the testing and reset of detectors, in addition to normal
control, such as sirens, lights ect.
16/07/2015
EBI-TEMA
73
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Intrusion Digital Output Configuration
General Purpose Output
or
Test Output
or
Reset Output
0 - contact closed
1 - contact open
Fixed
or
Intermittent (Flashing)
16/07/2015
EBI-TEMA
74
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Typologies Configuration
The statuses that an object may assume, the events that it may generate,
and the commands that can be run on it are called Typologies.
For detectors and logics, in addition to the default typologies, you can
create customized typologies.
16/07/2015
EBI-TEMA
75
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Typologies Configuration
Default:
IDINPUT
and
LOGICS
You must use duplicate to create a new Topology.
Only for Detectors and Logics !!
16/07/2015
EBI-TEMA
76
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
New ID Typologies Configuration
Shows the first 4 characters of
the acronym.
For characterizing the new strings.
Available when the Duplicate
button has been pressed
In the EBI area, Default String column, the statuses from the side of the Supervision Center are displayed. This is the
string that is used for describingthe status of the object in the Point Detail Dispaly;
In the TemaServer area, Default String column, the statuses are displayed inthe same manner as they are displayed on the
Miniterminal that is controlledby the TemaServer.
16/07/2015
EBI-TEMA
77
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Intrusion Zones Configuration
The ID Plant can be divided into zones, which are a collection of detectors.
The zones are generally characterized by a homogeneous management mode,
whether in terms of typology or in terms of functional behavior (such as all
infrared detectors in a room).
Available commands for a zone
16/07/2015
EBI-TEMA
78
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
See next pages
ID Intrusion Zones Configuration
Timeout, in minutes, that will elapse
between the arm command and the
effective change of status for the zone.
This allows the person who has armed
the zone to exit the controlled areas.
From the drop-down list,
select the feedback that will
be executed when the
zone arming starts if an arm
delay has been set for this
zone (see Arm Delay
above).
The maximum duration
of the manual disarm,
expressed in minutes.
Once this
amount of time has
elapsed, the zone will
automatically be
rearmed.
16/07/2015
EBI-TEMA
The time, in
minutes, within
which the manual
disarm must be
performed or
confirmed. This
pertains to the
Semiautomatic e
Confirmable
management
modes.
79
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Intrusion Zones Configuration
EBI-TEMA
80
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Intrusion Zones Configuration
EBI-TEMA
81
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Intrusion Zones Configuration
Enables/disable
automatic test
on the zone, that
is, on all
detectors
associated
with that, before
arming it.
16/07/2015
EBI-TEMA
82
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Intrusion Zones Configuration
Sets the minutes for
overtime for the zone. The
end of the second time
period (End) will be
extended with the minutes
defined
Sets the minutes overtime
for the zone. The end of the
first time period
(Stop) will be extended with
the minutes defined.
The maximum number of
detectors associated with the
zone that may be
simultaneously disabled.
16/07/2015
EBI-TEMA
83
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Detectors Configuration
The detectors, or the intrusion detection field points, allow the
subsystem to acquire the digital values measured by the field
devices. They are controlled by RTU A10 modules which
communicate status changes of the detector to the Tema Server ID
responsible for managing the actions defined for a status change.
The RTUA10 inputs are supervised inputs, so that, besides the alarm,
the system is capable of detecting short circuits, cuts, and tampers
events.
The detectors may be associated to a zone and/or to a logic, and in
such a case, they will inherit the corresponding status from the
zone/Logic (armed/disarmed).
16/07/2015
EBI-TEMA
84
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Detectors Configuration
0 - contact closed
1 - contact open
16/07/2015
EBI-TEMA
85
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Detectors Configuration
Detector types
EBI-TEMA
86
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Detectors Configuration
Enables/disables the test
feature for the detector,
meaning the capability of
performing the active test.
The test consists in setting
the detector to Alarm
status, utilizing the
appropriate Test Output,
then to Normal status, and
then
verifying that the operation
has been correctly
completed.
Enables/disables the
Reset feature for the
detector, meaning the
capability of
returning the detector to
its normal status utilizing
the appropriate Reset
Output. The reset can
occur when the
Acknowledge command
is executed (it
can either be received by
the Supervision Center,
or performed manually at
the
peripheral level).
16/07/2015
The delay utilized by detector
types Alarm After Reset, With
delayed alarm and
With Pre-Alarm to manage the
emitting of alarms (expressed
in seconds). You
may specify a value between 1
and 3600. Default value is 10.
The delay utilized by detector
type Alarm After Reset to
manage the emitting of
alarms (expressed in seconds).
You may specify a value
between 1 and 3600.
This option will only be
enabled if the option
Enable Test has been
selected on
the Detector Type tab.
EBI-TEMA
This option will only be
enabled if the option Enable
Test has been selected on
the Detector Type tab.
87
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Detectors Configuration
Logic (1 to 4):
Read-only fields that indicate
which logic(s) are associated
with this detector.
Enables/disables the
automatic disabling of the
management of alarm
repetition, based on the
values set in Auto disable
time period
A detector may be associated with
4 logics simultaneously. If the
detector is associated with a logic,
it does not send alarm signals
directly, rather
it refers the signal to the pertinent
logic.
Specifies the number of repetitions that must
occur within the time period
defined in the field Auto Disable Time Period,
before the detector is disarmed.
See example on next slide
16/07/2015
EBI-TEMA
88
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Detectors Configuration
The Auto disabled can only be selected if Alarm repetition has been checked !!
– The Auto disable is selected.
– The Auto Disable Time Period is set to 2.
– The Auto Disable Number of Repetitions is set to 5.
Result:
– If the detector goes into alarm 5 or more times within a period of 2
minutes, the detector will be disarmed. The detector then must be re-armed
using a manual command (via the Mini Terminal or the EBI).
16/07/2015
EBI-TEMA
89
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Detectors Configuration
EBI-TEMA
90
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Logics Configuration
A collection of detectors that must be in alarm status, either
simultaneously or not, in order to rise to an alarm for the logic.
16/07/2015
EBI-TEMA
91
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Logics Configuration
Detectors associated with a logic do not directly generate alarms, they refer them
to the logics in which they are included.
A logic can contain up to 240 detectors.
A given detector can be in more logics.
The figure below illustrates an example of the settings used for which a logic will generate a
logical alarm for the case where two or more detectors (among those inserted into the
Assigned list) go into alarm status within a span of 10 seconds.
16/07/2015
EBI-TEMA
92
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Logics Configuration
EBI-TEMA
93
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Logics Configuration
EBI-TEMA
94
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
Profile
ID Peripheral operators
Level
Supervisor: Highest
Manager:
Operator:
16/07/2015
Lowest
EBI-TEMA
95
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Peripheral Configurator
The Tema ID Peripheral Configurator allows you to configure an
Intrusion Detection Central Unit (TemaServer ID) at the peripheral level,
i.e. a Central Unit that is not connected with the EBI.
16/07/2015
EBI-TEMA
96
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Peripheral Configurator
After having installed the peripheral hardware, this application will allow
you to automate the configuration procedures of the Intrusion Detection
Central Unit, and, in particular:
• identify the MT Display (RTU C02 - Graphical Display) Mini Terminals to
beutilized as operational interfaces for the configuration and
diagnostics of the Central Unit;
• identify all the peripheral devices that make up the Central Unit;
• perform diagnostics (tests) on the devices and generate related
messages;
• create a final report with configuration data for the central unit, in terms
of devices detected and test results.
16/07/2015
EBI-TEMA
97
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
16/07/2015
ID Peripheral Configurator
Sequence of operations
EBI-TEMA
98
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Peripheral Configurator
Startup via Telnet and Configuration of the
Central Unit:
Using Telnet, you will set the commands for the
startup of the “autolearning” procedures and for
the configuration of the central unit.
1. Make sure that the Supervision Center is not
connected.
2. Run Telnet, then set the following commands
in the sequence shown below:
16/07/2015
EBI-TEMA
99
Configuration of Tema Intrusion Detection
TEMA
Intrusion
Detection
ID Peripheral Configurator
Now follow the instructions in the ‘TEMA ID - Peripheral Configurator of the ID Central Unit.pdf’
When finished and the EBI is installed but NOT connected via LAN to Central Unit then do
the following:
1.
Make sure that the EBI is not connected.
2.
Run Telnet, then set the following
commands in the sequence shown below
The TemaServer ID is now in upload status, and it is now possible
to from the EBI Station to perform the upload of the TemaServer ID
database to the EBI.
16/07/2015
EBI-TEMA
100