Download as pdf or txt
Download as pdf or txt
You are on page 1of 317

Study Guide

Level One: ProtegeGX Installer


Study Guide
Copyright © Integrated Control Technology Limited 2003-2018. All rights reserved.
No part of this document may be reproduced, photocopied, or transmitted in any form or by any means
(electronic or mechanical), for any purpose, without the express written permission of Integrated Control
Technology Limited.
The specifications and descriptions of products and services contained in this document were correct at the
time of printing. Integrated Control Technology Limited reserves the right to change specifications or withdraw
products without notice.
Protege® and the Protege® Logo are registered trademarks of Integrated Control Technology Limited. All other
brand or product names are trademarks or registered trademarks of their respective holders.

Publication Date: February 2018

Level One: ProtegeGX Installer Study Guide | February 2018 3


Contents
Module 101: ICT Company Profile ______________________________________________ 9 
About ICT ___________________________________________________________________________ 10 
Review Questions ____________________________________________________________________ 14 

Module 121: ProtegeGX Platform Introduction___________________________________ 15 


Platform Focus _______________________________________________________________________ 16 
Installer Certification __________________________________________________________________ 18 
Review Questions ____________________________________________________________________ 20 

Module 122: ProtegeGX Licensing _____________________________________________ 21 


Licensing Structure ___________________________________________________________________ 22 
Base License ________________________________________________________________________ 23 
Licensed Items and Features___________________________________________________________ 24 
Server License _______________________________________________________________________ 28 
Review Questions ____________________________________________________________________ 29 

Module 123: ProtegeGX System Architecture ___________________________________ 33 


The ProtegeGX Server ________________________________________________________________ 34 
ProtegeGX Client Software ____________________________________________________________ 35 
Network Architecture _________________________________________________________________ 37 
Advantages of a Server-based System __________________________________________________ 40 
ProtegeGX and Small Sites ____________________________________________________________ 41 
Review Questions ____________________________________________________________________ 42 

Module 124: ProtegeGX Hardware Overview ____________________________________ 45 


The Protege DIN Rail Range ___________________________________________________________ 46 
The Protege Module Network __________________________________________________________ 54 
Protege Proximity Readers ____________________________________________________________ 62 
Protege Keypads _____________________________________________________________________ 70 
Accessories _________________________________________________________________________ 72 
Review Questions ____________________________________________________________________ 73 

Module 127: Protege DIN Rail Hardware Configuration ___________________________ 79 


DIN Rail Hardware Setup ______________________________________________________________ 80 
LED Indicators _______________________________________________________________________ 96 
Review Questions ___________________________________________________________________ 101 

Level One: ProtegeGX Installer Study Guide | February 2018 5


Module 130: ProtegeGX Hardware Setup ______________________________________ 105 
Protege Controller Setup _____________________________________________________________ 106 
Configuring an LCD Keypad __________________________________________________________ 108 
Review Questions ___________________________________________________________________ 110 

Module 125: ProtegeGX System Design _______________________________________ 111 


Identifying Requirements _____________________________________________________________ 112 
Understanding Physical Design _______________________________________________________ 114 
Planning the Training System _________________________________________________________ 123 
Review Questions ___________________________________________________________________ 126 

Module 128: ProtegeGX Software Installation __________________________________ 129 


ProtegeGX System Requirements _____________________________________________________ 130 
Installation Procedure ________________________________________________________________ 133 
Review Questions ___________________________________________________________________ 135 

Module 129: ProtegeGX Software Introduction _________________________________ 137 


The ProtegeGX Services _____________________________________________________________ 138 
ProtegeGX User Interface ____________________________________________________________ 144 
Global Settings ______________________________________________________________________ 148 
Review Questions ___________________________________________________________________ 150 

Module 131: Hardware Programming _________________________________________ 153 


Programming the Controller___________________________________________________________ 154 
Status Pages _______________________________________________________________________ 158 
Troubleshooting Hardware____________________________________________________________ 160 
Review Questions ___________________________________________________________________ 167 

Module 132: User Management ______________________________________________ 169 


Users ______________________________________________________________________________ 170 
Schedules __________________________________________________________________________ 174 
Review Questions ___________________________________________________________________ 180 

Module 133: Basic Intruder Detection _________________________________________ 183 


Naming Conventions _________________________________________________________________ 184 
Programming Areas__________________________________________________________________ 185 
Programming Inputs _________________________________________________________________ 189 
Review Questions ___________________________________________________________________ 195 

6 Level One: ProtegeGX Installer Study Guide | February 2018


Module 134: Basic Access Control ____________________________________________ 197 
Doors ______________________________________________________________________________ 198 
Access Levels_______________________________________________________________________ 204 
Door Configuration __________________________________________________________________ 208 
Review Questions ___________________________________________________________________ 213 

Module 135: Configuring Intruder and Access Integration ________________________ 215 


Office Access _______________________________________________________________________ 216 
Warehouse Doors ___________________________________________________________________ 221 
Testing the System __________________________________________________________________ 224 
Review Questions ___________________________________________________________________ 225 

Module 136: System Monitoring ______________________________________________ 227 


Trouble Inputs ______________________________________________________________________ 228 
Offsite Monitoring ___________________________________________________________________ 230 
IP Monitoring _______________________________________________________________________ 233 
Review Questions ___________________________________________________________________ 236 

Module 137: System Commissioning __________________________________________ 239 


System Commissioning Tools _________________________________________________________ 240 
Keypad Testing _____________________________________________________________________ 243 
Protege Databases __________________________________________________________________ 246 
Review Questions ___________________________________________________________________ 250 

Module 138: Programming Walkthrough _______________________________________ 253 


Scenario: Areas _____________________________________________________________________ 254 
Scenario: Door and Schedules ________________________________________________________ 255 
Scenario: Intruder Detection __________________________________________________________ 256 
Scenario: User Requirements and Access Levels ________________________________________ 257 
Testing the System __________________________________________________________________ 262 

Review Questions and Answers ________________________________________________ 273 


Module 101: ICT Company Profile _____________________________________________________ 275 
Module 121: ProtegeGX Platform Introduction __________________________________________ 277 
Module 122: ProtegeGX Licensing _____________________________________________________ 279 
Module 123: ProtegeGX System Architecture ___________________________________________ 283 
Module 124: ProtegeGX Hardware Overview ____________________________________________ 287 
Module 127: ProtegeGX Hardware Configuration ________________________________________ 291 
Module 130: ProtegeGX Hardware Setup _______________________________________________ 295 

Level One: ProtegeGX Installer Study Guide | February 2018 7


Module 125: ProtegeGX System Design ________________________________________________ 297 
Module 128: ProtegeGX Software Installation ___________________________________________ 299 
Module 129: ProtegeGX Software Introduction __________________________________________ 301 
Module 131: Hardware Programming __________________________________________________ 303 
Module 132: User Management _______________________________________________________ 305 
Module 133: Basic Intruder Detection __________________________________________________ 307 
Module 134: Basic Access Control ____________________________________________________ 309 
Module 135: Integrating Intruder Detection and Access Control ___________________________ 311 
Module 136: System Monitoring _______________________________________________________ 313 
Module 137: System Commissioning___________________________________________________ 315 

8 Level One: ProtegeGX Installer Study Guide | February 2018


Module 101:
ICT Company Profile
ICT is a world-leading manufacturer of innovative and superior integrated electronic access control and security
solutions. This module provides an overview of the company and its focus.

Level One: ProtegeGX Installer Study Guide | February 2018 9


About ICT
ICT is a world-leading manufacturer of innovative and superior integrated electronic access control and security
solutions that enable organizations to protect their people, operations and information.
Our flagship platform Protege provides electronic access control, ID credential issuance and management,
alarm monitoring, digital video surveillance and management, real-time digital video content analysis, integration
of biometric technologies, intrusion detection and smart card functionality, plus integration with a multitude of
third-party systems.
ICT also provides a range of proximity card readers, as well as IP reporting, apartment management, and
wireless solutions.

Locations

ICT operates five offices worldwide: New Zealand, the US, Canada, the UK, and Australia.

Distribution

ICT owned offices / master distribution


Distribution / wholesale warehousing

10 Module 101: ICT Company Profile | About ICT


Customers
With thousands of system installations in over 20 countries worldwide, ICT boasts a prestigious customer base
with a large number of high-profile customers and a strong presence in a broad range of vertical markets.

Research and Development


ICT operates an extensive research and development program, with approximately 35% of staff dedicated to
research and development.
 Dedicated Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM) teams
 Embedded software engineering with expertise in a wide variety of architectures and operating systems
 Specialist VoIP and intercom development
 Windows development architects and engineers
 Radio frequency identification team
ICT's research and development center is located in Auckland, New Zealand.

Production
ICT manufactures all its products in a state-of-the-art production facility in Auckland, New Zealand.
 Full surface-mount production facility capable of over 80,000 part placements per hour
 100% testing of all products - no batch testing
 Board manufacture to IPC-A-610 Level 3 standard in an automatic, end-to-end production process
 Quality management system following ISO9000 standards ensures superior product quality, and a high
standard of excellence and safety
 Risk Mitigation and Disaster Recovery Strategy implementation in all locations

Level One: ProtegeGX Installer Study Guide | February 2018 11


Products
ICT's integrated security platforms include:
 ProtegeGX: An enterprise-level integrated access control, intrusion detection, and building automation
solution suitable for any site, from small, single-door systems through to large multinational corporations.
Created with the end user in mind, tailor the interface (through status pages) to build a display that meets
your needs and makes sense to your users. Powerful reporting allows you to quickly find data you're
interested in and schedule reports to be generated/emailed automatically.
 ProtegeWX: A web-based system with a focus on simplicity: simple to install, simple to program, and
simple to manage. Program and monitor your system through an internet browser and/or any web-enabled
device.
 Proximity smart cards: Compatible with all Wiegand data-capable control systems and incorporating
RS-485 communication, ICT's tSec readers allow rapid deployment of secure technology in any
environment.
 ArmorIP reporting platform: This internet monitoring application converts ArmorIP reporting protocols used
by Protege, PostX, PostX Plus, and other third-party products, to Ademco 685 format. The integration
process for a monitoring station is seamless and can be done in a matter of minutes, allowing an immediate
transition to IP reporting without the normal time-consuming custom solutions.
 Intercoms: ICT’s intercom range offers an open standard, non-proprietary solution that can operate as
standalone point-to-point intercom systems, or integrate with your electronic access control system for
added capability and efficiency.

Certifications
Certification standards define the requirements that apply to access control system equipment. ICT has
received official certification for its range of products, including the following:
 UL Certification (UL294, UL1610, UL1635)
 CAN-ULC Certification (S319-05, S304-06, S319, S559)
 Industry Canada ICES-003
 CE Compliance
 C-Tick
 EN50133 Level 3 Specification
 FCC Rules and Regulations CFR 47, Part 15, Class A
 NIST AES256 Bit Encryption Certification
 RCM (EMC and radio communications regulations of the Australian Communications and Media Authority)
We are currently the only certified security vendor to transmit and decode in AES256 encryption from end to
end according to UL.

Solution Providers
ICT has over 4000 trained solution providers throughout the world. Our exam-based training courses and
certification requirements ensure a high level of service and support.
Recertification is required every 12 months. This strict policy ensures that if using an accredited factory-trained
professional, you can expect a solid level of service from a competent engineer.

12 Module 101: ICT Company Profile | About ICT


Integration Partners: DVR/NVR Systems
Protege integrates with a number of third-party DVR/NVR systems to provide event-based solutions. Operators
can control cameras and view live and historical video directly via event association. Simply right-click to view
video in a separate window with full screen and keyboard shortcut control. Link cameras to objects on floor
plans and view video directly from the live floor plan view.

 Exacq  OnSSI  Pelco


 Avigilon  Milestone  Panasonic
 Hikvision  Onvision  DVTel
 Geutebrück  Arkiv
 Mobotix  Axxon

Level One: ProtegeGX Installer Study Guide | February 2018 13


Review Questions
Where is ICT hardware produced?
 China
 New Zealand
 Canada
 Canada and New Zealand
Which certification applies to ICT products?
 UL Certification
 CE Compliance
 NIST AES256 Bit Encryption Certification
 All of the above
Where is research and development carried out?
 China
 Canada
 New Zealand
 New Zealand and Canada

14 Module 101: ICT Company Profile | Review Questions


Module 121:
ProtegeGX Platform Introduction
This module describes the focus of ProtegeGX, who it's designed for, and what's involved in gaining ProtegeGX
certification.

Level One: ProtegeGX Installer Study Guide | February 2018 15


Platform Focus
Before you begin your ICT ProtegeGX training it is important to have a good understanding of what the system
is about, why we made it, and, more importantly, where and how you should use it.

Who is an Electronic Security System For?


It may sound like a stupid question, but all too often integrators lose sight of the end user and what they need. It
can be too easy to try to fit the end user in a box and sell them a system off the shelf.

System Ownership
On average, the installed solution is the responsibility of the integrator for 3 weeks, the operator for 4 years, and
the owner for 12-15 years.

Focus
ProtegeGX was created with the end user in mind. The system is designed around the end user's needs,
providing a truly scalable system from a single-door to an enterprise-class system. Everything is open: the end
user owns the system and their data.

Unified Interface
ProtegeGX is big on integration, incorporating all your security requirements in a single, easy-to-use user
interface.
Monitor and control multiple DVR/NVR platforms and Building Control and Automation systems, integrate
intercoms for a complete access management solution, and convey events between systems through Building
Management System integration.

Custom Operator Interface


ProtegeGX presents the system to the end user in a way that makes sense to them. Build an interface specific
to a facility's needs, embedding event lists, status lists, cameras, and floor plans, and creating breakout
windows for use in multiple-monitor control rooms. ProtegeGX supports up to four monitors per user interface.

Intelligent Event Reporting


One of the most important requirements of a security system is the ability to produce useful event reports. In
some systems this is overlooked, or event reporting is licensed as an additional feature.
ProtegeGX's intelligent grid-view WYSIWYG (What You See Is What You Get) event reporting tool allows for
quick and easy retrieval of data. Results can be filtered and sorted to show only relevant information. Reports
can be automatically generated at scheduled times and sent via email to any operator, and data exported in a
range of formats such as PDF, HTML, XLS, and CSV. Use the built-in reports, or create your own for ultimate
flexibility.
All this is included in the base license.

16 Module 121: ProtegeGX Platform Introduction | Platform Focus


System Capacity
What good is an enterprise-class system if it has limits? The ProtegeGX software has no limits, and servers can
be added as demands change.
 Users: unlimited
 Access levels: unlimited
 Door groups: unlimited
 Doors: unlimited
 Floor plans: unlimited
Approximately 1200 controllers are supported per server, with Microsoft clustering supported to perform hot
standby and regional failover.

ProtegeGX DIN Rail Controller Capacity


The physical hardware of the controller is limited to:
 Users: 5 Million
 Access levels: Unlimited
 Inputs: 5288
 Outputs: 2956
 Doors: 128
 Areas: Unlimited

Level One: ProtegeGX Installer Study Guide | February 2018 17


Installer Certification
It is important to ICT to protect the reputation of its ProtegeGX system. Accordingly, only integrators who are
members of the ICT Dealer Network (IDN) have access to the product.

Becoming a ProtegeGX Partner


To become a ProtegeGX Partner, submit an application to join the ICT Dealer Network (IDN) and purchase a
ProtegeGX Partner Training Pack. Training and certification of at least one technician must be successfully
completed before IDN membership is issued.

Certification Levels
The following three levels of certification are offered:
 ProtegeGX Installer (Level 1): Aimed at installers responsible for small to medium projects, this level
focuses on planning, installing, and configuring a ProtegeGX access control and intruder detection system
 ProtegeGX Integrator (Level 2): Aimed at integrators responsible for installing medium to large projects,
this certification focuses on system integration
 ProtegeGX System Administrator (Level 3): Aimed at integrators responsible for installing enterprise-level
systems, the focus of this certification is high-level system programming

Installer Certification Process


The prerequisite components are all delivered as web-based training modules. The course content may be
completed online, or as part of a facilitated training course.
A bootcamp option for fast-track certification is also available. This one-day accelerated workshop is designed
to drive home the theoretical and practical elements of training before the final exam.

Web-based Training
Web-based training is made up of a number of short modules, allowing you to study at your own pace, in your
own time. Each module is made up of one or more objectives containing slides, videos, exercises and review
questions.
Once you have studied all required objectives, an online module exam must be completed. Module exams are
timed and have a minimum pass rate of between 80-90%, depending on the number of questions. If a module
exam is failed three times, you must undertake a facilitated training course to gain certification.

18 Module 121: ProtegeGX Platform Introduction | Installer Certification


Certification Exam
Once all certificate modules have been completed (either all online, or a mixture of online and facilitated), a
supervised certification exam must be taken (and passed) in order to gain certification. Supervised exams take
place at an ICT-approved facility, with one practice exam available online. A score of 80% or higher is required
to pass.
If you fail a certification exam three times, there is a three-month stand-down period after which you must
complete a facilitated course.
Note that each attempt at a supervised exam incurs a charge.

Training Cost
Pricing varies according to location, but included in the training pack is a range of ProtegeGX hardware,
software, and accessories. The hardware and software may be resold to recover the cost of training, but
alternative hardware must be available for other technicians to use in conjunction with the training program.

Maintaining Certification
The ProtegeGX Installer certificate is valid for one year, with refresher training available online. Prior to expiration
of the certificate, a supervised recertification exam must be undertaken at an ICT-approved facility for it to
remain current. Alternatively, advance to the next certification level by completing the relevant course and
corresponding exam.

Level One: ProtegeGX Installer Study Guide | February 2018 19


Review Questions
Who was the ProtegeGX platform built for?
 The integrator
 The consultant
 The end user
 The distributor
What type of system is the ProtegeGX platform best suited to?
 Single-door systems
 Systems up to 50 doors
 Enterprise-class systems
 All of the above
How many users are supported by the system/controller?
 Unlimited/Unlimited
 Unlimited/2000
 2000/2000
 Unlimited/5 Million
Who can purchase ProtegeGX hardware/software?
 Integrators who have at least one certified ProtegeGX installer
 Integrators who maintain a predefined level of sales
 Integrators who are paid members of the ProtegeGX Installers Group
 All of the above
Where do certification exams take place?
 Web-based, self-paced
 Only at the ICT factory
 Supervised at the integrator's office
 Supervised at an ICT-approved facility

20 Module 121: ProtegeGX Platform Introduction | Review Questions


Module 122:
ProtegeGX Licensing
This module outlines the ProtegeGX licensing structure, including the items and features included in a base
license, and those licensed separately.

Level One: ProtegeGX Installer Study Guide | February 2018 21


Licensing Structure
ProtegeGX uses a modular licensing model that is both flexible and scalable. Purchase the features you need,
then extend your system with additional features as you need them.
License caps help prevent runaway costs. Once a license cap for an item is reached, the total number becomes
unlimited.
 The total number of licensed doors is capped at 1000
 The total number of licensed cameras is capped at 500
 Users and controllers are unlimited, allowing for the unrestricted growth of an enterprise

License Facts
ICT's licensing structure is designed to help small solutions be cost-effective, and enterprise-class solutions
grow with the company. It is not about revenue-grabbing where the larger the system, the higher the premiums.
License caps help prevent such runaway costs.

License Duration
Licenses purchased are valid for 20 years, with training and demo licenses valid for three months.

22 Module 122: ProtegeGX Licensing | Licensing Structure


Base License
The base ProtegeGX Server License includes the following limited items:
 50 Doors
 1 Camera
 1 Concurrent Operator connection
 3 ProtegeGX Web Operators
The base license also includes the following unlimited items:
 DVRs/NVRs
 Sites
 Controllers
 Areas
 Operators
 Users

Included Features
The base license also includes the following features:
 Calendar Actions
 DVR HLIs
 Email on Event
 Email Reports
 Floor Plans
 GX SOAP Interface
 GX Web Interface

Level One: ProtegeGX Installer Study Guide | February 2018 23


Licensed Items and Features
Additional licensable components are also available.

Licensed Item: Doors


The base license includes 50 doors.
The number of licensed doors applies to the server, not the site or controller. This means that eight sites with 10
doors each is a system of 80 doors.
Doors can be purchased in blocks of 50, 10 or as a single item. IP doors are purchased separately.

Licensed Item: Cameras


The base license includes one camera. The number of licensed cameras applies to the server, not the site or
controller. This means that eight sites with five cameras each is a system of 40 cameras. DVRs are not
restricted.
Cameras can be purchased in blocks of 10, or blocks of 50.
The camera license covers the video to ProtegeGX component.
HLI (High Level Interface) is also included in the base license. HLI covers the exchange of events between
ProtegeGX and the DVR.

Licensed Item: Concurrent Operator Connections


The number of operators that can be connected at the same time is a licensed item. One Concurrent Operator
connection is included in the base license.
Installation of client software is not restricted.
Operators are not restricted.

Licensed Item: IP Doors


The number of licensed IP doors (Salto, Sargent and Kaba) applies to the server, not the site or controller. Eight
sites, with two IP doors each, requires 16 IP doors.
IP doors are purchased in blocks of 10, or as a single item.

Licensed Item: Aperio


ProtegeGX integration with Aperio allows for the use of Aperio wireless lock technology within the ProtegeGX
system. Integration is extremely cost-effective as it dramatically reduces installation costs and offers greater
flexibility.
A license is required for each door controlled by an Aperio lock, with licenses available for purchase as single
units, or as blocks of 250, 500 or 1000.

24 Module 122: ProtegeGX Licensing | Licensed Items and Features


Licensed Item: Salto SALLIS
ProtegeGX integrates with Salto SALLIS wireless and offline locking technology.
A wire-free environment eliminates the need to hard-wire buildings. Original doors and locks can be kept in
place, making installation quick, simple, and cost-effective. The ability to retain existing credentials avoids any
expensive migration costs.
A license is required for each door controlled by a Salto SALLIS lock. Licenses can be purchased as single
units, or in blocks of 250, 500 and 1000.

Licensed Item: Cencon


ProtegeGX integration with Cencon effectively combines access control, intrusion detection and ATM security.
Accurate audit trails and transaction logs are viewable from within the ProtegeGX system.
A Cencon integration license is required to link ProtegeGX with Cencon CenTran. One lock license is required
for each lock connected to ProtegeGX.

Licensed Item: Biometric Readers


ProtegeGX integrates with Suprema biometric readers, connected via standard Wiegand interface. For greater
security, a biometric reader can be combined with an access control reader to require dual authentication.
The feature is licensed per biometric reader.

Licensed Item: Wireless IP Detectors


ProtegeGX integrates with Optex Redwall scanners and Inovonics wireless detection units.
A single license is required for each Optex Redwall scanner connected to the system.
There is no licensing requirement for Inovonics units providing you purchase the Inovonics Wireless Receiver
Module from ICT.

Licensed Item: VoIP


ProtegeGX integrates seamlessly with VoIP-compliant intercom systems. A VoIP license enables the ProtegeGX
client to communicate directly with IP intercoms.
This item is licensed per connection point.

Licensed Feature: Elevator HLI


ProtegeGX integrates with KONE, OTIS, Schindler PORT, ThyssenKrupp, and MCE elevator systems.
ProtegeGX provides synchronization between the two databases to reduce data entry and administration time,
with floor access controlled via the ProtegeGX interface.
Each license applies to a single elevator system manufacturer.

Level One: ProtegeGX Installer Study Guide | February 2018 25


Licensed Feature: Apartments
Apartments is a licensed feature enabling access control of apartment suites within condominium complexes.
This software feature is used in conjunction with the EliteSuite range of keypads. Add a maximum of 248 master
keypads per controller in ProtegeGX. Each apartment may have one master keypad with up to three slave
keypads.
One license is required to use the Apartments feature.

Licensed Feature: Active Directory (LDAP) Users


This feature allows you to automatically import users from an Active Directory or LDAP server. Users are
synchronized every 10 minutes.
The feature is licensed once, allowing an unlimited number of Active Directory users.

Licensed Feature: Active Directory (LDAP) Operators


This feature enables operators to use Windows Authentication to log in. Active Directory details are configured
under the operator record. Once defined, the operator can select the Windows Authentication option.
This feature is licensed once. The number of operators that can connect at one time is limited by the Concurrent
Operator Connection license.

Licensed Feature: Muster Reports


This feature provides the ability to create a list of people in a defined area at a particular time. You can create
multiple lists for multiple areas.
The feature is ideal for creating an evacuation list of who is on site when a fire alarm is triggered.
This feature is licensed once.

Licensed Feature: Photo ID


A Photo ID license provides the ability to create and manage users' Photo ID badges from within ProtegeGX.
This feature is licensed once.

Licensed Feature: Time and Attendance


This feature provides the ability to report on employee attendance, including early or late arrivals and departures,
exceeded break times, and total hours worked. Use a single or multiple readers for logging staff movement.
The feature is licensed once.

Licensed Feature: Video Verification


This feature allows for the display of a pop-up window showing live video footage of a user badging at a door to
request access. The operator can compare the video footage with a stored image of the user for verification,
then grant or deny access accordingly.
The feature is licensed once.

26 Module 122: ProtegeGX Licensing | Licensed Items and Features


Licensed Feature: CSV Schedule Import
The ability to import users from a CSV file is included in the base license and is a manual process best suited to
the initial setup of users.
The licensed feature, however, allows you to import on a schedule (every hour, day, week, etc.), enabling
low-level integration with a third-party system. For example, a storage facility may use software that lists all
people permitted access. This feature allows you to import that list on a defined schedule, automatically creating
new users in the ProtegeGX system.
The feature is licensed once.

Level One: ProtegeGX Installer Study Guide | February 2018 27


Server License
A ProtegeGX license is bound to the server. Each time a license request is generated, a complete hardware
profile of the server is taken. Any significant change in the hardware profile requires a new license activation.
System specifications must be met and may be checked when your server is licensed.

If using ProtegeGX in a virtual environment (such as VMware), the MAC address of the virtual machine must be
fixed, otherwise your hardware profile will keep changing.

When to License your Server


Your server license must be updated after the server software is installed, if a software upgrade requires the
ProtegeGX software to be uninstalled, when an additional licensed feature is purchased, or when the server
hardware profile changes (contact ICT to request an additional license activation - the reason for the hardware
change will be logged, and the hardware profile updated).

Licensing Process: Automatic


Licensing your server is simple if you have internet access.
1. Open the ProtegeGX application.
2. If your server has not yet been licensed, you will be prompted to update your license.
3. Go to the License Update tab (About > License > License Update).
4. Click Download License.
5. If your server internet access is via a proxy server, set this up in the Proxy Setup tab.
6. Enter your SSN, site details, and installer details, and click OK.
Once your license has been successfully installed, close and restart the user interface.

Licensing Process: Manual


If you do not have internet access, you must manually license your server.
1. Open the ProtegeGX application and go to the License Update tab.
2. Click Generate License. You will be prompted to save a license request file.
3. Take this license request file to a PC with internet access. Browse to http://www.ict.co/license/
4. Enter your details, then browse to the license request file.
5. You will now be prompted to save a license file.
6. Take this file back to your server and click the browse button on the License Update page.
7. Select the new license file and click OK.
Once licensing is complete, close and restart the user interface.

28 Module 122: ProtegeGX Licensing | Server License


Review Questions
What is the license cap for doors?
 250
 500
 1000
 Doors are unlimited
What is the maximum number of controller licenses you will ever pay for?
 250
 500
 1000
 Controllers are unlimited
What happens when the number of cameras reaches 500?
 No more cameras can be added, the cap has been reached
 Cameras are now unlimited
 Nothing, the camera cap is 1000
 No difference, cameras are not limited anyway
How many camera licenses are included in the base license?
 None
5
1
 Cameras are unlimited
Which of the following features are NOT included in the base license?
 Floor plans
 Elevator HLI (High Level Interface)
 Grid View reports
 CSV bulk user import

Level One: ProtegeGX Installer Study Guide | February 2018 29


How many operators can log in at the same time with a base license?
 As many as you like, operators are unlimited
1
 As many as you like, users are unlimited
 10
To connect 20 PTZ cameras and have them respond to events automatically, what is
required?
 10 camera licenses
 10 camera licenses, DVRs are unlimited
 A base license, 19 camera licenses, DVRs are unlimited
 A base license, 19 camera licenses and a DVR HLI license
Which licensed feature(s) is required to enable operators to log in to the ProtegeGX Client
using their Windows credentials?
 An Active Directory (LDAP) Users license
 An Active Directory (LDAP) Operators license
 A Concurrent Operator Connection license
 All of the above
Which license do I require for a system with 100 IP Doors?
 A base license and 50 Door licenses
 A base license and 100 Door licenses
 A base license and 100 IP Door licenses
 A base license, 100 IP Door licenses and 50 Door licenses
To what is the ProtegeGX license bound?
 The integrator
 The site
 The server
 The ProtegeGX database

30 Module 122: ProtegeGX Licensing | Review Questions


Which of the following circumstances does NOT require a license update?
 Restoring an old ProtegeGX database
 Adding 150 door licenses
 Replacing the server motherboard
 Upgrading Windows on the server
Do you need to have Internet access to update your license?
 No, you can do a manual license update
 Yes, the automatic license update connects to the ICT licensing server via the internet
 Yes, even with a manual license update, you will need internet access somewhere to upload the license
request and download the license file

 No, the proxy server can provide your license update

Level One: ProtegeGX Installer Study Guide | February 2018 31


Module 123:
ProtegeGX System Architecture
Before looking at hardware and software, it is important to understand how the overall ProtegeGX system fits
together. This module provides an overview of the system architecture.

Level One: ProtegeGX Installer Study Guide | February 2018 33


The ProtegeGX Server
The ProtegeGX system is built around a central server and one or more ProtegeGX controllers. The server is
responsible for maintaining the system configuration and monitoring, while the controllers are responsible for the
physical control of the system.

Network Connectivity
While the controllers are designed to run standalone, network connectivity is required between the central server
and the controller(s) to enable configuration and monitoring of the system.

Databases
The ProtegeGX server contains two databases: the ProtegeGX database, containing the configuration for the
entire system, and the ProtegeGX Events database, which stores the events from all controllers and the server.
These events are used for live monitoring of the system, triggering system alarms, and reporting.
Both databases run on Microsoft SQL Server.

34 Module 123: ProtegeGX System Architecture | The ProtegeGX Server


ProtegeGX Client Software
The client software is used for the configuration and monitoring of the ProtegeGX system. The client
communicates with the server using TCP/IP.

The client software only ever communicates with the server, never directly with the controller(s).

Configuration Changes
For configuration changes, the client software makes changes to the ProtegeGX database.

System Monitoring
For system monitoring, the client software requests information from the server, which in turn retrieves events
from the ProtegeGX Events database and directly from the controller(s), as required.

Level One: ProtegeGX Installer Study Guide | February 2018 35


Client Setup
Client software is usually installed on the same machine as the ProtegeGX server. This allows the entire system
(including configuration and monitoring) to run on a single PC.
Client software can also be installed on as many other workstations as desired. Licensing limits only the number
of concurrent connections to the server, not the number of PCs with software installed.

Client

Client Client

Client Server
Client

Client Client

Client

36 Module 123: ProtegeGX System Architecture | ProtegeGX Client Software


Network Architecture
The ProtegeGX server uses TCP/IP on an Ethernet network to communicate with ProtegeGX controllers.

LAN

The server sends configuration changes, control commands, status requests and firmware updates to the
controllers.
The server receives events and status updates from the controllers.

Scalability
The ProtegeGX system was built with scalability in mind and is suitable for single-controller sites, right through
to enterprise-scale systems that span large geographical areas.

Small Sites/Single Controllers


For smaller sites, consider installing the software on a PC used for other functions, or on a laptop permanently
housed in the same cabinet as the controller.

LAN

Level One: ProtegeGX Installer Study Guide | February 2018 37


Larger Sites/Multiple Controllers
For larger sites with multiple controllers, a more powerful server is required. The server could reside on a
high-spec PC, with the client software installed on separate desktop PCs.

LAN

Client Client
Server

Always consult the system requirements in your installation guide prior to specifying your system.

Enterprise-level Solutions
The ProtegeGX system is also designed to cater to the needs of corporate clients, scaling with ease to provide
enterprise-class solutions.

LAN WAN LAN

Client Client Client


Server

The above example shows a larger system running on an existing corporate network infrastructure. The head
office contains the central server, a client PC and several controllers. The branch office has its own client PC
and controller.

Remote Environments
With IP technology constantly improving and internet coverage spreading ever wider, thinking outside the box
not only helps solve tricky problems, but also opens up a multitude of business opportunities.

Client

ADSL

LAN WAN

WiFi

Server

GSM

38 Module 123: ProtegeGX System Architecture | Network Architecture


The above example shows controllers connecting to a central server using an ADSL internet connection, WiFi
access points and GPRS across a cellular network.

Remote Opportunities
Now imagine access control, intruder detection and automation control in locations where these technologies
are available: in buses, trains, boats and other vehicles, at a mobile plant, remote pumping station, plant room
or equipment shed ...
Wherever monitoring or control is required and a network connection is available, there is the potential for a
ProtegeGX system.

Level One: ProtegeGX Installer Study Guide | February 2018 39


Advantages of a Server-based System
ProtegeGX was designed to be easy to operate, simple to integrate, and effortless to extend. It is a
server-based system and as such is not designed to be run on a technician's laptop.

Simplicity
To keep the system simple and manageable for the end user, much of the hardware is hidden. Configuration
changes are made to the system rather than to a specific controller. The system then manages which
controllers need updating, doing this behind the scenes.

Security
Any access control system contains valuable and often sensitive information. This information belongs to the
end user, not the technician installing or maintaining the system. A server-based system ensures information
remains confidential and is not casually stored somewhere on a technician's laptop.

Synchronization
Setups that allow multiple copies of the system configuration are open to synchronization problems. If, say, a
technician makes configuration changes to a site via his laptop one day, then a different technician attends on
another day and forgets to first upload all the controllers, then the changes the first technician made are
overwritten.
A server-based system avoids this problem, as the changes are made immediately and the data remains
synchronized.

40 Module 123: ProtegeGX System Architecture | Advantages of a Server-based System


ProtegeGX and Small Sites
Budget constraints may mean smaller sites don't have a dedicated server on site. In this situation, it is
sometimes assumed ProtegeGX is not suitable. This is not the case. With a simple shift in thinking, this
situation presents a new business opportunity.

Central Configuration for Multiple Sites


The majority of businesses these days have an internet connection. Where there is an internet connection, there
is the ability to connect controllers to a server. A server with multiple client PCs at a central location can control,
configure and monitor multiple controllers at individual client sites.

Client Client

LAN WWW

Server

The Opportunities
Rather than relying on a laptop in the back of a vehicle, integrators can install a server at their office and charge
a monthly fee for configuring and monitoring the system. Packaged into a preventative maintenance package
with a software maintenance agreement (SMA), this not only reduces upfront capital expenditure, but can turn a
one-off sale into a regular client.

Level One: ProtegeGX Installer Study Guide | February 2018 41


Review Questions
Which database are events stored in?
 On the controller only. The server interrogates the controller for reports.
 The ProtegeGX database located on the server.
 The ProtegeGX Events database located on the server
 The Reports database
What does the ProtegeGX database contain?
 Controller configuration only
 Global system configuration only
 The configuration for the entire system
 The configuration and events for the entire system
Can the ProtegeGX Controller run in standalone mode?
 Yes, ProtegeGX is a controller-based system. The server is only used to program the controller.
 Yes, ProtegeGX is a server-based system, but controllers will run stand-alone once configured.
 No, ProtegeGX is a server-based system and must have a network connection between the controller
and server at all times.

 No, the ProtegeGX controller stores its configuration database on the server.
The ProtegeGX Client software...
 can be installed on one PC only if you have a base license
 is installed on the server only if you have a base license
 can be installed on any number of workstations
 is never installed on the server
When making configuration changes...
 The ProtegeGX Client makes changes to the controller directly
 The ProtegeGX Client makes changes to the ProtegeGX database
 The ProtegeGX Client makes changes to the ProtegeGX database and controller
 The ProtegeGX Client is not used

42 Module 123: ProtegeGX System Architecture | Review Questions


What does the ProtegeGX Client software communicate with?
 The server only
 The server for system configuration and reports, and the controller for status updates
 The controller for configuration and reports, and the server for status updates
 None of the above
Which of the following statements is correct?
 Controllers can communicate with the ProtegeGX server using the Internet
 Controllers must be on the same local area network as the ProtegeGX server
 Controllers must be on the same corporate network as the ProtegeGX server
 Controllers cannot communicate with the ProtegeGX server using the Internet
How does the controller communicate with the server?
 Using the RS-485 module network
 Using TCP/IP on an Ethernet network
 Using the RS-232 serial interface
 Using Point to Point Protocol over Ethernet (PPPoE)
What type of site/system was ProtegeGX built for?
 High-end residential sites
 Single-controller commercial sites
 Enterprise-scale systems
 All of the above
Which of the following is NOT a reason for making ProtegeGX a server-based system?
 Storing system configuration on a server allows more data to be stored
 Configuration changes can be easily made to the system, then the system manages which controllers
need to be updated

 It helps to keep system information confidential


 It means there is a single point for all configuration changes

Level One: ProtegeGX Installer Study Guide | February 2018 43


Complete this statement...
Where budget constraints on a small single-controller site mean an onsite server can't be justified...

 ...ProtegeGX is not a suitable solution


 ...the ProtegeGX Controller should be programmed using a technician's laptop
 ...connect the controller to a shared server using the Internet
 ...use an existing PC as the server

44 Module 123: ProtegeGX System Architecture | Review Questions


Module 124:
ProtegeGX Hardware Overview
This module takes a closer look at the range of Protege DIN rail hardware products used to provide flexible
access control, area control and alarm monitoring.

Level One: ProtegeGX Installer Study Guide | February 2018 45


The Protege DIN Rail Range
Removable plug-in terminals and LED indicators on the front panel of hardware modules (showing device state
at a glance) make servicing and diagnosis quick and simple.
In addition to the hardware products, ICT's DIN rail module enclosures allow for higher installation density,
offering more control in less space.

Protege System Controller


The controller is the central processing unit responsible for the control of security, access control and
automation within the ProtegeGX system.

Feature Highlights
 2 x doors (4 x readers)
 8 x multipurpose inputs
 1 x monitored bell output
 2 x Form C relay outputs
 4 x low-current outputs
 32 bit advanced RISC processor, 2 GB total memory
 Encrypted module network using RS-485 communication
 10/100Mbps Ethernet interface
 2 x reader ports, configurable for either Wiegand or RS-485
reader operation

For full details and technical specifications, refer to the ICT website.

46 Module 124: ProtegeGX Hardware Overview | The Protege DIN Rail Range
Protege Single Door Controller/Single Door Controller
with PoE
This is a smaller central processing unit within the ProtegeGX system.

Feature Highlights
 1 x door (2 x readers)
 2 x multipurpose inputs
 1 x Form C relay output
 Optional PoE

For full details and technical specifications, refer to the ICT website.

Protege Module Network Repeater


This module is designed to extend the network capabilities of the ProtegeGX system. The module is added to
the system via the RS-485 or Ethernet and provides optical isolation between up to three branches of the
module network, easing power requirements.

Feature Highlights
 3 x isolated RS-485 connections
 Internal industry-standard 10/100 Ethernet
 Encrypted module network using RS-485 communication
 RS-485 or Ethernet network expansion
 Configurable RS-485 biasing

For full details and technical specifications, refer to the ICT website.

Level One: ProtegeGX Installer Study Guide | February 2018 47


Protege 16 Input Expander
This module extends the number of inputs on a system by 16, enabling monitoring of a wide range of
EOL-capable or open contact sensors for security and building automation purposes.

Feature Highlights
 16 x inputs, each assignable to up to four areas in the system
and processed using different options or features
 Connect any combination of normally closed or normally open
inputs
 Utilizes analog to digital processing with 5x oversampling
 4-state input alarm using resistors to provide short, alarm,
closed and tamper conditions
 High-performance 32 bit processor

For full details and technical specifications, refer to the ICT website.

Protege Half DIN Rail 16 Input Expander


This module extends the Protege system by providing 16 multi-purpose inputs in a compact, two-tier DIN rail
module design.

Feature Highlights
 16 x inputs assignable to up to four areas in the system and
processed using different options or features
 Connect any combination of normally closed or normally open
inputs
 Utilizes analog to digital processing with 5x oversampling
 4-state input alarm using resistors to provide short, alarm, closed
and tamper conditions
 High-performance 32 bit processor

For full details and technical specifications, refer to the ICT website.

48 Module 124: ProtegeGX Hardware Overview | The Protege DIN Rail Range
Protege 8 Output Expander
This module extends the number of outputs on a system by eight, featuring high-current Form-C relays to
provide flexible and structured control of lighting and automation systems.

Feature Highlights
 8 x Form-C relay outputs capable of switching resistive loads up
to 7 Amps
 Ideal for connection in an electrical switchroom to control
signage, lighting and building automation
 LED indicators show state of all onboard relays
 High-performance 32 bit processor

For full details and technical specifications, refer to the ICT website.

Protege Half DIN Rail 8 Output Expander


This module extends the Protege system by providing eight Form-C relay outputs in a compact, two-tier DIN rail
module design.

Feature Highlights
 8 x Form-C relay outputs capable of switching resistive loads up to
5 Amps
 Ideal for connection in an electrical switchroom to control signage,
lighting and building automation
 LED indicators show state of all onboard relays
 High-performance 32 bit processor

For full details and technical specifications, refer to the ICT website.

Level One: ProtegeGX Installer Study Guide | February 2018 49


Protege 8 Input/4 Output Expander
This module provides eight multipurpose inputs and four Form C relay outputs for monitoring a wide range of
EOL-capable or open contact sensors for security and building automation.

Feature Highlights
 Connects any combination of normally closed or normally open
inputs, configurable per input
 Utilizes analog to digital processing with 5x oversampling
 4-state input alarm using resistors to provide short, alarm,
closed and tamper conditions
 4 x Form-C relays capable of switching resistive loads up to 7
Amps
 High-performance 32 bit processor

For full details and technical specifications, refer to the ICT website.

Protege 2 Door Reader Expander


This module extends the number of card reader inputs on a system by two (four in Multiple Reader mode), the
number of inputs by eight, and the number of outputs by eight.

Feature Highlights
 2 x reader ports configurable for Wiegand or RS-485 operation
 2 x doors (4 x readers)
 8 x multipurpose inputs
 2 x Form C relay outputs
 6 x low-current outputs
 Provision to control up to 3 x outputs per reader input
 Offline functions including All Users and First 10 Users plus 150
Card Cache

For full details and technical specifications, refer to the ICT website.

50 Module 124: ProtegeGX Hardware Overview | The Protege DIN Rail Range
Protege Half DIN Rail 8 Port F/2F Reader Expander
This module provides sites using legacy, end-of-life Casi-Rusco hardware, and those operating F/2F card
readers, with a seamless migration path to the ProtegeGX Security Management System.

Feature Highlights
 8 x reader ports using the F/2F protocol
 No rewiring of existing readers required
 Unplug existing Casi-Rusco Secure Perfect/Picture Perfect or
GE/Micro5 reader connection and fit to the module
 Monitor door position contacts and Request to Exit devices over
standard F/2F protocol

For full details and technical specifications, refer to the ICT website.

Protege 8A Power Supply


The Protege 8 Amp power supply module is ideal for running security, access control or automation devices
along with a large number of Protege network-powered modules within the same installation.

Feature Highlights
 Mains input plugs directly into module
 12VDC output voltage
 Intelligent charging algorithm monitors battery and AC supply to
ensure continuous power delivery
 2 x Form B relay outputs
 Cabinet tamper switch input for monitoring cabinet security
 Constant monitoring of trouble input signals for Battery
Low/Disconnect and AC failure

Online mode: A module that has successfully registered with a controller operates in online mode. While in
online mode the two outputs function as programmable outputs and can be used to activate bell sirens,
lighting circuits, door locks, relay accessory products, and other automation points.
Offline mode: Until connection with a controller is established, the module's outputs operate in offline mode.
While in offline mode the outputs function as status outputs and can be used to monitor AC and battery status.
For full details and technical specifications, refer to the ICT website.

Level One: ProtegeGX Installer Study Guide | February 2018 51


Protege 4A Power Supply
The Protege 4 Amp power supply module is ideal for running security, access control or automation devices
along with a large number of Protege network-powered modules within the same installation.

Feature Highlights
 Mains input plugs directly into module
 12VDC output voltage, 4 Amps continuous output current
 2 x Form B relay outputs
 Battery backup connection
 Intelligent charging algorithm monitors battery and AC supply to
ensure continuous power delivery
 Cabinet tamper switch input for monitoring cabinet security
 Monitored trouble input signals for Battery Low/Disconnect and
AC failure

Online mode: A module that has successfully registered with a controller operates in online mode. While in
online mode the two outputs function as programmable outputs and can be used to activate bell sirens,
lighting circuits, door locks, relay accessory products, and other automation points.
Offline mode: Until connection with a controller is established, the module's outputs operate in offline mode.
While in offline mode the outputs function as status outputs and can be used to monitor AC and battery status.
For full details and technical specifications, refer to the ICT website.

52 Module 124: ProtegeGX Hardware Overview | The Protege DIN Rail Range
Protege 2A Power Supply
The Protege 2 Amp power supply module is ideal for running security, access control or automation devices
along with a large number of Protege network-powered modules within the same installation.

Feature Highlights
 Mains input plugs directly into module
 12VDC output voltage, 2 Amps continuous output current
 16VAC input ideal for Protege low-cost AC transformers
 Backup battery connection
 Intelligent charging algorithm that monitors battery and AC supply
to ensure continuous power delivery
 2 x Form B relay outputs
 Cabinet tamper switch input for monitoring cabinet security
 Monitored trouble input signals for Battery Low/Disconnect and AC
failure

Online mode: A module that has successfully registered with a controller operates in online mode. While in
online mode the two outputs function as programmable outputs and can be used to activate bell sirens,
lighting circuits, door locks, relay accessory products, and other automation points.
Offline mode: Until connection with a controller is established, the module's outputs operate in offline mode.
While in offline mode the outputs function as status outputs and can be used to monitor AC and battery status.
For full details and technical specifications, refer to the ICT website.

Level One: ProtegeGX Installer Study Guide | February 2018 53


The Protege Module Network
Module Network Communications
Protege modules communicate with the controller using an encrypted high-speed module network, or via
TCP/IP. The controller communicates with the client devices using TCP/IP.

LAN

Touchscreen
Controller

TCP/IP Connection

Encrypted RS485
Module Network

Expander

Expander Expander

The controller communicates with the Protege server using TCP/IP.

LAN

Provided the module network has been wired correctly, communications between the controller and the
connected modules follow a standard process. When the controller powers up it will listen for messages from
the connected modules. The controller only ever listens for messages and responds when needed.

54 Module 124: ProtegeGX Hardware Overview | The Protege Module Network


System Architecture
Systems can be made up of a single controller with multiple expanders connected by the RS-485 module
network. The RS-485 module network is the combination of a wired communication system used for sending
messages between the controller and all modules, and the Protege RS-485 protocol sent over the wires. The
Protege RS-485 protocol is a customized message format that optimizes message size, duration and frequency
to maximize utilization of the network. This ensures messages are sent between the controller and expander
modules with a high level of efficiency. A proprietary encryption layer is added to provide secure
communications, immune to spoofing or replay attacks.

Client

LAN

Controller Expander Expander Expander Expander Expander

Expander Power Supply Expander Power Supply Expander Power Supply

Systems can also be made up of multiple controllers with multiple expanders, with the controllers connecting to
the server via Ethernet (Ethernet standards apply).

Client

LAN

Controller Expander Controller Expander Controller Expander

Expander Power Supply Expander Power Supply Expander Power Supply

Level One: ProtegeGX Installer Study Guide | February 2018 55


Module Network Wiring
The RS-485 module network must be wired in a daisy chain configuration. This allows messages to be sent
and received by all modules in the network without any bounce-back or reflections. Termination resistors are
used at each end of the network to prevent data reflections that can cause data corruptions and interfere with
further communications.

Controller

Star and spur wiring are unacceptable wiring methods for new installations. If wired this way, messages
bounce around the network and become out of phase. Multiple termination resistors cannot be used as it will
overload the network.

The oscilloscope view below shows the results of spur or star wiring (left of diagram).

The waveform on the left is from a network with multiple spurs. Out-of-phase messages bounce throughout the
network and create noise, making it difficult to pick out the highs and lows that make up the data signal. The
waveform on the right is from a network that is wired and terminated correctly. The data signal is clearly visible.

56 Module 124: ProtegeGX Hardware Overview | The Protege Module Network


Cabling
The total length of the module network should not exceed 3000ft (900m).
The recommended module network wiring specifications are:
 Belden 9842 cable, or equivalent
 24 AWG shielded, screened twisted pair, with characteristic impedance of 120 ohm
 CAT5e/CAT6 are also supported for data transmission when using ground in the same cable (to a
maximum length 100m (328ft)

Warning: Unused wires in the cable must not be used to carry power to other devices.

Within an RS-485 module network, data is transmitted differentially on two wires twisted together, referred to as
a twisted pair. Twisted pair cables provide noise immunity and are suited to long-distance networks. The shield
and screen in Belden 9842 provide further immunity to noise by providing a path for any received
electromagnetic interference to get to ground.

Differential data transmission where one line goes high and the other goes low

Module Network Power


The DIN rail range is supplied by a 12V DC power supply connected to the module network. We recommend
using a Protege power supply module, but any clean 12V DC supply is suitable. A small installation can be
powered by a single Protege power supply module, provided the maximum load is not exceeded.

Controller Power Supply

Expander Expander Expander

Level One: ProtegeGX Installer Study Guide | February 2018 57


It is recommended that the power supply used to power the module network is dedicated to this task and not
used to power other devices, especially electrically noisy devices such as locks. Where possible use a separate
power supply for locks.

Controller Expander

Power Supply Power Supply

In larger installations, the module network power supply may need to be split to allow for load sharing between
several supplies. This is done by removing the N+ connection from between split sections.

Power Supply Controller Power Supply Expander

Powered RS-485
Unpowered RS-485

All ancillary devices connected to a module network-powered device, such as keypads, readers or PIRs, also
draw their power from the module network. Take into account all connected devices when calculating power
supply loading. As a guide, power supply loading should be kept below 75%.

1 2 1 2

3 4 3 4

5 6 5 6

7 8 7 8

9 0 9 0

X X

Keypad Power Supply Controller

58 Module 124: ProtegeGX Hardware Overview | The Protege Module Network


Module Registration
When a module powers up it sends a message to the controller stating its module type, serial number, and
module address. Messages are sent periodically until the controller responds. During this time the Status LED
displays a rapid green flash.

Exponential Backoff
The module registration process uses an exponential backoff method: an algorithm used to space out repeated
transmissions of the same block of data to avoid network congestion.
 The first attempt at registration is based on the module's address. The first attempt is 5 seconds after
power-up, plus 200ms times the module's address. This means a module with the address of 8 will first
attempt registration 6.6 seconds after power-up.
 When modules in the network fail to receive a response from the controller, they wait 2 seconds before
retrying, then 4 seconds, then 8 seconds, and so on.
 When the attempts reach 128 seconds apart, the cycle restarts at 2 seconds and continues to loop until the
controller responds.
 When any packet is sent by any module there is always a small randomized delay before it goes out to
avoid any two modules becoming synchronized in their retry timing.
This process will not always be 100% consistent between all modules on the network. Some older modules
may reach 256 seconds between retries before looping back to 2 seconds.
The controller keeps an internal table of all known modules. This table is a record of each module type with its
available addresses. When the controller receives a registration request from a module it compares the
information from the module with data in the table.

Module Reader Output Input Analog


Address Keypads Expanders Expanders Expanders Expanders
1 327B921 214D976B 243A4567 45FA21VD 14FB67D3
2 D43F2941 487DF1E3 F43E5681 675DAF32 65C8F342
3 B567A214 A556EF32 186DB769
4 145EFD78
5
...

 Registration accepted: If the requested address is available, the controller assigns the address and marks
the module as registered and online. If the module has previously registered and the details sent match
what is in the table, the controller marks it as online. The module's Status LED displays a slow green flash
to show online status.

Module Reader
Address Expander Registered Online

1 214D976B

2 487DF1E3
Type: Reader Expander 3 567FA128
S/N: 567FA128
Address: 3

Level One: ProtegeGX Installer Study Guide | February 2018 59


 Registration failure: If there is already an entry in the table for the requested address but the supplied serial
number does not match, the controller rejects the registration. This occurs when two modules of the same
type with the same address are present on the network, or when a module that has been physically
replaced as the controller still has details of the old module in its table. The controller's Fault LED changes
to a constant red and the Status LED flashes four times to indicate a duplicate module. The module also
then remains silent.

Module Reader
Address Expander Registered Online

1 214D976B

2 487DF1E3
Type: Reader Expander 3 186DB769
S/N: 567FA128
Address: 3

 If the requested address is above the limit for a particular module, the controller rejects the registration. The
Fault LED on the module changes to a constant red and the Status LED flashes red three times to
indicate the address is out of range. This occurs on brand-new modules that have not yet been addressed,
or if the module address has been programmed to Not Set.

Type: Reader Expander Controller


S/N: 567FA128
Address: 254

Module Polling
When a module is valid and online it sends a poll to the controller every 250 seconds.
Acknowledge

Controller Module

Poll

Outside the standard poll time, modules send messages to the controller when an input changes state, when a
user logs in at a keypad, when a card is read at a reader, and when a trouble input changes state. The Status
LED displays a single fast red flash when a message is sent.
 Module offline: If a module fails to send any poll messages or status updates and the poll timer expires, the
module is marked as offline by the controller. If power is still supplied to the module and it is not able to
successfully poll the controller within 250 seconds, the module re-enters registration mode.
 Poll sync restart: When a module is restarted or power is cycled between poll messages, the controller
detects this as a loss of poll synchronization. The controller then forces the module to restart and
resynchronize the polling. This forces the module to begin the registration process again.

60 Module 124: ProtegeGX Hardware Overview | The Protege Module Network


 Module restart: A module restart can be generated by a loss of poll synchronization, an automated restart
due to changes to the module programming, or a manual restart of one or more modules. Whether the
restart is automated or manual, programming is downloaded and saved to the module before it restarts.

Defaulting the Controller


Defaulting the controller completely clears the internal module address table. As the module poll times expire,
they run through their poll sync restart and re-register with the controller, which then builds the module address
table again.
Module Reader Output Input Analog
Address Keypads Expanders Expanders Expanders Expanders Registered Online
1
2

3
4
...

As any modules in fault mode (such as 'Address out of Range' or 'Duplicate Module') have been told to remain
silent, they will not attempt to re-register with the controller. The Update All function must be used to get these
modules online.

Level One: ProtegeGX Installer Study Guide | February 2018 61


Protege Proximity Readers
Proximity readers work by constantly emitting a short-range radio frequency (RF) field. When a proximity card
comes within range of this field, an integrated chip inside the card is powered up and transmits a number back
to the reader.

tSec Readers
Protege tSec proximity readers come in three editions with a range of optional features:
The tSec Standard is ideal for most situations, including aluminum-framed doors where larger readers are not
an option.
The the tSec Extra with its full wall plate/lightswitch size is best for replacing existing readers with a larger
footprint.
The tSec Mini, the smallest of the tSec family, is unobtrusive and cost-effective.
Standard Extra Mini

Feature Highlights
 Support for 125kHz and DESFire MIFARE 13.56 cards from
a single reader
 Encrypted RS-485 or standard Wiegand connection
 Environmental rating IP65
 Bi-color LED (blue and green), with independent or single
LED control
 Read range of up to 100mm (3.9in) with proximity ISO cards
 Optional vandal-resistant cover

Choosing Card Technology


To the end user, there is little visible difference between card types - a card is presented at a reader and access
is either granted or denied. Behind the scenes, though, they are quite different. Aside from data transmission
frequency, there are key differences in security and card read range.
Historically, card-based access control systems used cards with a magnetic stripe, which were swiped through
a magnetic card reader to gain access to a door. The disadvantages of this technology included inconvenience,
a high wear rate, and very low security. Not all proximity cards are created equal, though, so it is important to
weigh up the differences before deciding which technology to adopt.

62 Module 124: ProtegeGX Hardware Overview | Protege Proximity Readers


125kHz Cards
RF energy is constantly emitted from the reader so when a card comes within this field of energy it is powered
up and transmits its card number. The reader picks up this transmission, decodes it and sends it over the cable
as data. The data transmitted by the card is not encrypted and is always the same. Data transfer is one way
only. When powered up these cards immediately begin transmitting their card number.
The advantage of these cards is that due to lower power requirements and small amount of data being
transmitted they offer a good read range (around 10cm/3.9in) and short read time, allowing users to present,
swipe, or wave their card in the general direction of the reader to get a successful read. A disadvantage,
though, is that it is possible for an outside individual to create a device that can ‘power up’ one of these cards
from a distance, then read the data being transmitted. With this data the individual can then reproduce the card,
making as many copies as desired, or even create cards in the same series but with different numbers.
While 125kHz cards are still commonly used, the widely publicized security flaws must be given serious
consideration.

RF Energy Emitted
by Reader

Chip
Inside Card

Wire Coil
Inside Card

Data Transmitted
from the Card

13.56MHz Cards
Originally created as a ticketing solution for transport systems, the MIFARE 13.56MHz card addresses the
security weaknesses of 125kHz technology by enabling two-way communication between card and reader.
This allowed the introduction of card encryption and the ability to store data on the card.
Most MIFARE technologies store the card number in one of the storage areas (sectors) on the card. The
additional storage space on the card can be used for a range of applications, such as offline locking systems
(Salto SVN), or the storage of credit for pay-as-you-go systems.
Encrypted
10010100111010010110 Card Data
---
Available
---
Storage Space
---
---
---
---
---
---

Level One: ProtegeGX Installer Study Guide | February 2018 63


A disadvantage of MIFARE cards is that the card-reading process takes slightly longer than with 125kHz cards.
Generally, a MIFARE card cannot be simply swiped or waved at a card reader, but must be presented. The
MIFARE chip also requires more energy than the 125kHz card system, so the card must get further inside the
RF energy field to power up, resulting in a slightly reduced read range of around 7-10cm/2.7-3.9in.
Unlike 125kHz card technology, MIFARE initiates more of a 'conversation' between the reader and the card.
When the card approaches the RF field of the reader, the card and reader begin a secure communication
session using shared encryption keys. Once this is established, the card number is transmitted and the
communication session is closed off. MIFARE cards come in many forms, each with its own advantages and
disadvantages.
RF Energy emitted
by Reader

Mifare Chip
Inside Card

Wire Coil

Encrypted Encrypted Data


Data transmitted transmitted by
by Card Reader

 MIFARE CSN: All MIFARE cards come with a built-in card serial number (CSN). This electronic number is
presented similarly to the 125kHz card system in that it is unencrypted and can be read by a large range of
devices easily purchased on the open market. For instance many smartphones are able to read this
information, making it an even less secure method than most 125kHz card systems. Card serial numbers
are generally used where there is a requirement to read MIFARE cards from a number of different access
control systems, or from third-party cards such as pay-as-you-go. While it offers great flexibility, it is very
insecure.
 MIFARE Classic: The first version of the MIFARE standard, the MIFARE Classic stores the card number on
one of its sectors, then encrypts the communication between the card and reader, theoretically making it
impossible, or at least very difficult, to copy a card. Unfortunately, a security flaw was discovered, which
meant that with the right knowledge and hardware, a card could still be copied, or another card in the series
created.
 ICT Secured MIFARE: ICT's implementation of the MIFARE standard, the ICT Secured MIFARE means
card data is protected with a diversified authentication key and encrypted with an AES256 algorithm,
effectively plugging the known security flaw in the MIFARE standard. These cards are not as secure as
DESFire cards, but still provide high security against cloning. These cards are ideal for most new
installations as they provide a high level of security without great loss of read range or response time.
 MIFARE DESFire: Ideal for high-security sites, MIFARE DESFire technology includes a cryptographic
module on the card to add an additional layer of Triple DES encryption to the card/reader transaction. This
is the highest standard of card security currently available, although it has certain disadvantages. The
additional cryptographic module requires additional energy to operate, meaning it must remain even further
inside the RF field, resulting in a further reduced read range of 1-2cm or 0.4-0.8in.

64 Module 124: ProtegeGX Hardware Overview | Protege Proximity Readers


RF Energy emitted
by Reader

Chip
Inside Card

Wire Coil

Additonal
Cryptographic
Chip
Encrypted Encrypted Data
Data transmitted transmitted by
by Card Reader

As part of implementing DESFire card technology it is critical to educate users so as to minimize frustration.
A DESFire card must be firmly presented to the reader and held in place until access is granted. Waving or
swiping a DESFire card will not result in a successful read. Users should think of the card reader as a
security guard – the user needs to present their card to the reader similarly to how they'd present it to a
security guard to inspect.

Card and Reader Selection


While cards and tags work with any of the tSec range of readers, matching the technology with the best reader
size has an impact on read range. The card and reader make an electronic couple between the wire coils in
each, much like a transformer does. The more closely these coils match in physical size, the better the resulting
couple and the more energy the card receives.
 The greatest read range for tags is achieved with tSec Mini readers.
 The greatest read range for cards is achieved with tSec Extra readers.
 The tSec Standard readers provide a balanced read range for both cards and tags.

Site Codes
All cards are made up of a site code and a card number. The site code is designed to be unique to a particular
site or building, meaning a card from one building cannot allow access to another building, even if the card
number is the same.
As there are many producers of 125kHz cards worldwide and a relatively small number of site codes available, it
is possible, or even likely, that many legitimate versions of the same card exist. With ICT Secured MIFARE and
MIFARE DESFire cards, each site is registered with its own globally unique site code, and each card produced
is recorded in ICT's secure database. This ensures duplicate cards are never created.

Encryption Keys
ICT offers integrators/end users the ability to purchase a reserved set of encryption keys for ICT Secured
MIFARE or MIFARE DESfire sites. This effectively gives the organization its own set of globally-unique site codes
and card numbers. As a further option, the integrator/end user can encode their own cards at their site as they
require them. This is a managed system, ensuring duplicates cannot be made.

Level One: ProtegeGX Installer Study Guide | February 2018 65


Migration
Migration from legacy and insecure low-frequency technology (125KHz) can be achieved in the following ways:
 Use dual technology ICT Secured MIFARE or DESFire Proximity ISO cards that incorporate both high- and
low-frequency card inlays so readers can be changed one by one. New dual technology cards are then
issued to users requiring access to doors with upgraded readers. For instance, readers controlling access
to high-security rooms (such as the server room) could be upgraded to DESFire card technology. Only IT
staff requiring access to the server room would require dual technology cards, allowing them access to both
the low-security 125kHz-technology doors and the high-security DESFire-secured doors.
 Another migration option is to upgrade existing readers to combo readers that can read both card
technologies. This allows for the gradual replacement of users' cards to ICT Secured MIFARE or DESFire
technology cards. Both technologies are accepted by combo readers. Once all users have new cards, the
low-security 125kHz card option can be turned off at the reader. This is also a good option for common
areas of a multi-tenanted building, allowing tenants to choose either technology for their own fitout.

Reader Interfaces: Wiegand


A standard Wiegand interface allows ICT tSec readers to be used on any system supporting standard Wiegand
readers. It also means third-party standard Wiegand readers can be used with the Protege system.
The maximum cable run from reader to expander is 500ft/150m, and the approved cable types are: 22 AWG
alpha 5196 and 5198, and 18 AWG alpha 5386 and 5388.
Although Wiegand is ideal for third-party systems and proximity readers, there are risks:
 Wiegand readers are vulnerable to replay attacks as they always send the same data from each card. If
the cable between the reader and controller can be accessed, the data from a card can be ‘recorded’ then
‘played back’ to the controller when access is required.
 Data transmission is one-way only, meaning the controller is unable to ‘talk’ to the reader – it can only
listen. This means if a card read is only partially received, or is corrupted, the controller has no way to ask
the reader to repeat its message. A bad card read therefore usually results in no feedback to the user trying
to get through a door.

Corrupted Data Sent

Reader Controller

 Twisted pair cabling is not suitable. Twisted pair cables (such as Cat5E) are designed for differential data
transmission and are most commonly used for Ethernet connections where one signal goes high, and the
other goes low.

66 Module 124: ProtegeGX Hardware Overview | Protege Proximity Readers


Wiegand data transmission is not differential, meaning all the 0's are transmitted down one line (D0), and all
the 1's down the other (D1). Using an unshielded cable for Wiegand data transmission makes the
connection susceptible to EMI (electromagnetic interference). The oscilloscope image shows the data sent
(left) and the data received (right). The data received shows effects of EMI, making it difficult to discern the
highs and lows and potentially corrupting the data. This interference can cause data to be lost and card
reads to fail.

Crosstalk: When a single twisted pair is used, the signal running along one line of data can interfere with the
other. Effectively, data meant to go down one line can end up going down both lines. The longer the cable,
the more interference occurs. Again, this interference can cause card read data to be lost and card reads to
fail.

Induced Crosstalk

D0 D0

D1 D1
0 1 0 X X X
Data Sent Data Received

Level One: ProtegeGX Installer Study Guide | February 2018 67


Unwanted capacitance: Another problem is that the tight twist of the single twisted pair wires produces
unwanted capacitance. The built-up charge fills a hole otherwise represented by a bit of data, resulting in
part of the card read missing, and therefore a failed card read. This symptom presents itself as an
intermittent card read failure, usually in the first card read following a period of inactivity.
If a twisted pair cable must be used, it is recommended the data is split over two individual twisted pairs to
reduce the chance of interference.

-
+
D0
L1
D1
BZ

Reader Interfaces: RS-485


ICT also offers its proprietary RS-485 interface on all tSec card reader models. This interface has many
advantages over a Wiegand interface. With only four conductors to connect, wiring is simpler and faster, making
for a more efficient installation. RS-485 relies on differential data transmission, making lower-cost twisted pair
cables ideal. Using the recommended Belden 9842 RS-485 cable, longer cable runs of up to 900m/3000ft can
be achieved.
As RS-485 is a high-speed, bi-directional protocol, encryption is possible all the way from the card to the
controller. Even without encryption, the data transmission between cannot be as easily replayed as it can with
Wiegand. Bidirectional communications allow for direct integration with Protege, making it easier to program
and make configuration changes once a reader is installed. It also results in a simpler firmware update process.

Encrypted Encrypted
Data Session Data Session

Controller
Mifare/DESFire Card Reader

68 Module 124: ProtegeGX Hardware Overview | Protege Proximity Readers


The bidirectional communications allow direct integration with Protege, making it easier to program and make
configuration changes once the reader is installed. This also results in a simpler firmware update process.

Bidirectional
Communications

Controller

Reader

Level One: ProtegeGX Installer Study Guide | February 2018 69


Protege Keypads
Protege Touch Sense LCD Keypad
ICT's latest keypad model provides a sleek, user-friendly human interface to the Protege integrated access
control, security and building automation system.

Feature Highlights
 Securely log in with user codes of 1-8 digits, with support for PIN
code operation
 Intuitive menu function offers scrollable options according to user
security level, with quick-access shortcut keys for the power user
 Dual code and master code provider functions for secure ATM and
banking vault area access with automatic timeout and delayed
opening functions
 Unique reportable duress code for each keypad
 Activation of three reportable panic events (Panic, Medical, Fire)
 Smoke detector reset provided on Clear and Enter keys, selectable
for output or output group
 Available in black and white

For full details and technical specifications, refer to the ICT website.

Protege Alphanumeric LCD Keypad


Feature Highlights
 Securely log in with user codes of 1-8 digits, with support for PIN
code operation
 Intuitive menu function offers scrollable options according to user
security level, with quick-access shortcut keys for the power user
 Dual code and master code provider functions for secure ATM
and banking vault area access with automatic timeout and
delayed opening functions
 Unique reportable duress code for each keypad
 Activation of 3 x reportable panic events: Panic, Medical, Fire
 Smoke detector reset provided on Clear and Enter keys,
selectable for output or output group

For full details and technical specifications, refer to the ICT website.

70 Module 124: ProtegeGX Hardware Overview | Protege Keypads


Protege Touch Screen Keypad
The Protege Touch Screen Keypad eliminates the need for a myriad of keypads, control panels and switches,
offering true integration with any building environment.

Feature Highlights
 12VDC power supply input with power saving mode
 Communication with the Protege controller by Ethernet
 2 x monitored inputs (4 with duplex operation)
 1 x programmable open collector output, suitable for digital or
relay control
 10/100 Ethernet with link/data status indicator
 128MB onboard RAM, 256MB flash storage space

For full details and technical specifications, refer to the ICT website.

Level One: ProtegeGX Installer Study Guide | February 2018 71


Accessories
Protege Temperature and Humidity Sensor
The Protege Temperature and Humidity Sensor operates both in standalone mode and connected to the
Protege system. The sensor draws its power from the RS-485 module network.

Feature Highlights
 Internal temperature sensor -40˚-60˚C (±1˚C), -40-140.0˚F (±2˚F)
 Internal humidity sensor 0-100% (±3%)
 Circuitry for external K-type thermocouple temperature sensor
 Secure encrypted RS-485 module communications
 2 x low-current outputs
 2 x display LED outputs
 2 x 4-20mA or 0-10V analog outputs
 8-30V DC input power supply

For full details and technical specifications, refer to the ICT website.

Protege Mobile App


The Protege Mobile App uses the power of ProtegeGX to enable the easy and convenient monitoring and
control of a building from an iOS or Android smartphone. Provided there is an internet connection, the mobile
app allows users to connect to their ProtegeGX site(s) to check status, arm/disarm, control lights, locks,
signage, heating - even cameras - from anywhere, at any time.

Feature Highlights
 Connect via internet with ProtegeGX sites anytime, anywhere
 Simple setup
 Subscribe to push notifications to receive alerts of system or sensor
activity
 Have instant awareness of system status, and arm/disarm with a
simple tap
 View live IP camera feeds
 Perform advanced functions to search for specific records or
customize layout
 Use your smartphone with Bluetooth/NFC as your access
credential to replace an existing card/tag

For full details and technical specifications, refer to the ICT website.

72 Module 124: ProtegeGX Hardware Overview | Accessories


Review Questions
How many access controlled doors can be directly connected to the Protege controller?
0
1
2
4
How many onboard high-current relay outputs does the Protege controller have?
2
4
7
 500+
How many onboard inputs does the Protege 2 Door Reader Expander have?
7
6
8
4
If installing a system with two doors (each with readers for entry and exit), how many
reader expanders are required?
 Two. Each reader expander has two reader ports onboard.
 One. With reader multiplexing, a single reader expander can support two doors with entry and exit
readers.

 None. The controller supports reader multiplexing, which allows two doors with entry and exit readers
to be controlled onboard.

 One. The controller has two reader ports onboard so a reader expander is required for the other two
readers.

Which of the following offsite reporting paths is/are supported by the controller?
 IP reporting via the Ethernet port
 Contact ID via the built-in dialer
 SIA via the built-in dialer
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 73


Once a module registration has been accepted, what does the Status LED display?
 A rapid green flash
 A slow green flash
 Green, constantly on
 Green, flashing four times
When a module is valid and online, how often does it poll the controller?
 Every 90 seconds
 Every 10 minutes
 Every 250 seconds
 Every 150 seconds
Will the controller accept registration of a module with an address higher than 248?
 Yes, it will automatically take the next available module address
 Yes, but the module will not come online
 No, it will reject the registration
 No, but you can still use the module
If a module has been addressed to replace an existing module, which additional step (if
any) is required to get the module online?

 The controller will allow the new module to come online as it will see that the previous module is
missing.

 The controller must be defaulted to clear the module address table and allow the new module to come
online.

 The controller will initially reject the module as a duplicate. The 'Update All' function must be used to get
the module online.

 The controller will initially reject the module as a duplicate. The module must be power-cycled to get it
online.

What is the maximum distance the Protege module network can run?
 100m
 900m
 1200m
 1500m

74 Module 124: ProtegeGX Hardware Overview | Review Questions


A project requires a run of 300m (1000ft) between the controller and the nearest Ethernet
switch. Which cable type should I use?
 You can't - the maximum cable run between a controller and a switch is 100m (328ft)
 Belden 9842 or 24AWG security cable
 Belden 9842 or CAT5e
 Belden 9842
In a new installation, how many spurs can come off a controller on the RS-485 module
network?
3
4
 250
 None - star or spur wiring is not an acceptable method for new installations
Why are twisted pair cables unsuitable for wiring Wiegand readers?
 Data transmitted through the DATA 1 and DATA 0 channels can be corrupted as it is susceptible to EMI
and unwanted capacitance.

 The cable lengths are not long enough.


 No data will be transmitted through a twisted pair cable.
 Twisted pair cables are suitable for wiring Wiegand readers.
What is the most secure of the card technologies?
 MIFARE/13.56MHz
 125kHz
 MIFARE DESFire
 Magnetic Stripe
What is the major flaw of 125KHz technology?
 Card reads are more likely to fail
 The read range of 125KHz card readers if far shorter than other card reader technologies
 It is possible to create a device that will ‘power up’ a card from a distance, then read the data being
transmitted. From this copy cards can be created

 More power is needed to power up the card

Level One: ProtegeGX Installer Study Guide | February 2018 75


What is the maximum read range of a tSec reader?
 75mm (2.95in)
 55mm (2.16in)
 100mm (3.93in)
 50mm (1.96in)
If an ICT reader is connected to an ICT reader expander, is tamper monitoring possible?
 Yes, ICT readers and expanders can be programmed for intelligent tamper recognition.
 Yes, ICT readers include a tamper switch.
 Yes, ICT reader expanders include a tamper input.
 No, there is no tamper monitoring on ICT readers.
What is the maximum cable run for an ICT reader connected to a Protege 2 door reader
expander using Wiegand?
 75m
 100m
 125m
 150m
How many onboard inputs does the Protege Touch Sense LCD Keypad have?
 None
 1 input (2 using input duplex)
 2 inputs (4 using input duplex)
 4 inputs (8 using input duplex)
How many controllable LEDs does the Protege Touch Sense LCD keypad have?
1
2
3
5

76 Module 124: ProtegeGX Hardware Overview | Review Questions


How many onboard outputs does the Protege Touch Screen keypad have?
1
2
3
4

Level One: ProtegeGX Installer Study Guide | February 2018 77


Module 127:
Protege DIN Rail Hardware Configuration
This module outlines the requirements for configuring the Protege range of DIN rail hardware.

Level One: ProtegeGX Installer Study Guide | February 2018 79


DIN Rail Hardware Setup
The Protege system is an advanced technology security system designed to provide integration with building
automation, apartment complex control and HVAC in one flexible package. Communication is over a proprietary
high-speed protocol across an AES encrypted local area network and an encrypted proprietary RS-485 module
network. Using modular-based hardware design, system installers have the flexibility to accommodate
installations of any size, residential or commercial.
Flexible module network architecture allows for large numbers of modules to be connected to the RS-485
module network. Up to 250 modules can be connected to the Protege system network, in any combination, up
to a distance of 900m (3000ft). Communication beyond this distance requires a RS-485 network extender
(Protege Module Network Repeater).

Mounting
When installing the DIN rail module ensure there is adequate clearance around all sides of the enclosure and
check air flow to the vents of the unit is not restricted. It is recommended to install the unit in a location that will
facilitate easy access for wiring. It is also recommended that the unit is installed in electrical rooms,
communication equipment rooms, closets or in an accessible area of the ceiling.
1. Hook the lower tabs under the bottom edge of the DIN rail.
2. Push the unit against the DIN rail mount and press firmly on the top center until the upper tab clips over the
upper rail.

To reduce the risk of damage caused by debris during the installation, install the cabinet enclosure when the
unit is not installed on the rails.

Removal
To remove the unit from the DIN rail mount:
1. Insert a flat-blade screwdriver into the hole in the white tab at the top center of the controller.
2. Lever the tab up and rotate the unit off the DIN rail mount.

80 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Cabinet Tamper Switch
The power supply modules include an onboard enclosure tamper input which signals to the monitoring station
or remote computer that the enclosure has been opened. The tamper input switch should be mounted onto the
steel bracket provided and connected to the tamper connection terminal and the V- terminal.

V1+ V1+ V1+ V1+ V1+ V1+ V- V- V- V- V- V-

Tamper Switch

NO C NC C TP
Bracket

Level One: ProtegeGX Installer Study Guide | February 2018 81


Power Requirements
Protege DIN rail hardware is supplied by 12VDC power connected to the N+ and N- terminals. It does not
contain internal regulation or isolation. A Protege Power Supply module is recommended for this purpose,
although any clean 12V DC supply is suitable. In this configuration (using a 4 Amp power supply), a maximum
module network load (from all expanders and connected ancillary devices) of 3 Amps can be supplied.
Controller Power Supply

N+ N- NA NB
V1+ V1+ V1+ V1+ V1+ V1+ V- V- V- V- V- V-

To other modules
on network
N+ N- NA NB B- B+ L N

Mains Input
-

Gel Cell Backup Batteries

82 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
When a power supply module is dedicated to module network power, both outputs can be wired in parallel. In this
configuration (using a 4 Amp power supply), a maximum module network load of 4 Amps can be supplied. This includes all
expanders and connected ancillary devices, such as readers and PIRs.
Power Supply (4A)

Controller
N+ N- NA NB V2+ V2+ V2+ V2+ V2+ V2+ V- V- V- V- V- V- V1+ V1+ V1+ V1+ V1+ V1+ V- V- V- V- V- V-

N+ N- NA NB B- B+ L N
To other modules
on network

Gel Cell Backup Battery Mains Input

The total average power supply module loading should be kept below 75% of its rated output. This leaves
adequate available supply for fluctuations caused by peak loading or if a field device becomes faulty. It also
extends the service life of the power supply module.
It is recommended that the power supply used to power the module network is dedicated to the task and not
used to power other devices, especially noisy devices such as locks. In a small installation, this can be achieved
by a single power supply module provided the maximum load of the power supply is not exceeded.
Controller Network Module Network Module

N+ N- NA NB N+ N- NA NB N+ N- NA NB

PSU or
equivalent 12V DC
supply

Level One: ProtegeGX Installer Study Guide | February 2018 83


Each section of the module network must be supplied from only one point. Connections from more than one
12V supply may cause failure or damage to the units supplying power.
Controller Network Module Network Module

N+ N- NA NB N+ N- NA NB N+ N- NA NB

PSU or PSU or
equivalent 12V DC equivalent 12V DC
supply supply

In larger installations, the module network power supply may need to be split to allow for load sharing between
multiple supplies. This is done by removing the N+ connection from between split sections.
Module #3 Module #2 Module #1 Controller
N+ N- NA NB N+ N- NA NB N+ N- NA NB N+ N- NA NB

Power Supply #3 Power Supply #2 Power Supply #1

Warning: When using multiple power supplies it is important to ensure all ground connections (V-) are
connected between all power supplies, and no power connections (V+) are connected between any power
supplies.

84 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Encrypted Module Network
The recommended module network wiring specifications are:
 Belden 9842, or equivalent
 24 AWG twisted pair with characteristic impedance of 120ohm
 Maximum total length of cable is 900m (3000ft) max
 CAT5e/CAT6 are supported for data transmission when using ground in the same cable (to a maximum
length 100m/328ft)
The Protege system incorporates encrypted RS-485 communications technology. Always connect the NA, NB
and N- terminals of the controller to the NA, NB and N- terminals of the expansion devices and keypads. The
N+ and N- must be connected to a 12V power supply source capable of supplying the peak current drawn by
all modules.
Controller Network Module Network Module

N+ N- NA NB N+ N- NA NB N+ N- NA NB

Shielded Cable Shielded Cable

Shield is frame Shields are Shield not


grounded at connected together connected
one point and Isolated

PSU or
equivalent 12V DC
supply

 If shielded cable is used, the shield must be connected at one end only of the cable, ideally to the cabinet
ground, mains supply earth, or copper pipe. Do not connect a shield at both ends.
 Do not connect the shield to a V- connection on the controller
 Do not join the shield and black wires at the reading device
 Do not connect the shield to any shield used for isolated communication
Unused wires in the cable must not be used to carry power to other devices. The 330 ohm EOL (End of Line)
resistor provided must be inserted between the NA and NB terminals of the first and last modules on the
RS-485 network. These are the modules physically located at the ends of the RS-485 network cabling.
First Module on RS-485 Network Last Module on RS-485 Network

N+ N- NA NB N+ N- NA NB

330R 330R

To From
Next Previous
Module Module

Level One: ProtegeGX Installer Study Guide | February 2018 85


Card Reader Connection
Both the Protege System Controller and 2 Door Reader Expander modules have two reader ports, each
independently configurable for either Wiegand or RS-485 reader operation, and allowing the connection of up to
four readers controlling two doors for entry and exit, without the need for additional hardware.
 The card reader must be connected to the controller port using a shielded cable
 The shield connection must be connected at one end only of the cable in the metal enclosure
(frame-grounded)
 Do not connect the shield to a V- connection on the controller
 Do not join the shield and black wires at the reading device
 Do not connect the shield to any shield used for isolated communication

All Protege readers are shipped with single LED mode set as default.

86 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Wiegand Reader Connection
This diagram shows the connection of a standard Wiegand reader with the Protege Controller or 2 Door Reader
Expander controlling an access door in entry or exit mode (two doors, two readers).
RED

BLACK
Shielded Cable
1 2
GREEN

3 4 WHITE

5 6 N/R ORANGE

7 8 BROWN Shield not Shield is frame


connected grounded at
BLUE one point
9 0
N/R YELLOW
X
SHIELD
BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA

When operating in multiplex mode the Protege Controller and 2 Door Reader Expander allow for the connection
of four Wiegand reading devices, controlling two doors each with entry/exit readers. The secondary card reader
has all connections wired to the same port as the primary reader, with the DATA 1 connection wired to the
opposite reader connection DATA 1 input.
SHIELD

RED

1 2 BLACK
Shielded Cable
3 4 GREEN

WHITE
5 6
N/R ORANGE
7 8
BROWN
Shield is frame
grounded at
9 0 BLUE one point

X N/R YELLOW

ENTRY
SHIELD

RED

BLACK
Shielded Cable
GREEN

WHITE

N/R ORANGE

BROWN Shield not


connected
BLUE

N/R YELLOW

EXIT
BZ L1 D1/ D0/ BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA NB NA

Level One: ProtegeGX Installer Study Guide | February 2018 87


RS-485 Reader Connection
As two RS-485 readers can be connected to the same RS-485 reader port, the configuration of the green and
orange wires is used to uniquely identify the reader and determine which is the entry reader, and which is the
exit reader.

Location Configuation
Entry Green and orange wires not connected
Exit Green and orange wires connected together

This diagram shows the connection of a standard RS-485 reader with the Protege Controller or 2 Door Reader
Expander connected in entry only mode.
SHIELD

RED

BLACK
Shielded Cable
1 2 GREEN

3 4 WHITE

5 6 N/R ORANGE

BROWN Shield not Shield is frame


7 8
connected grounded at
BLUE one point
9 0
N/R YELLOW
X
VIOLET
BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA

This diagram shows two RS-485 readers connected to provide entry/exit configuration (the exit reader has the
green and orange wires connected together).
SHIELD

RED
1 2
BLACK
Shielded Cable
3 4 GREEN

5 6 WHITE

N/R ORANGE
7 8
BROWN
9 0 Shield is frame
BLUE grounded at
one point
X N/R YELLOW

VIOLET
ENTRY
SHIELD

RED

BLACK
Shielded Cable
GREEN

WHITE

N/R ORANGE

BROWN
Shield not
connected
BLUE

N/R YELLOW

VIOLET

EXIT
BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA

88 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Input Connection
The controller allows for the connection of up to four contacts for monitoring and controlling access control
doors.
N.C. Input Contact

1K 1K

REN Input

Bond Sense

1K 1K
Z4
V-

N.O. Input Contact


Z3

N.C. Input Contact


Z2

1K 1K
V-

REX Input
Z1
V-
V+

Door Contact

1K 1K

N.O. Input Contact

Each input can be used for the door function automatically assigned, or as a general-purpose input. If for
general purpose, ensure the input is not defined in the onboard reader setup.

Input Access Control Function Default Setting


Input 1 Door Contact, Port 1 Door Contact, Port 1
Input 2 REX Input, Port 1 REX Input, Port 1
Input 3 Bond Sense, Port 1 General Purpose Input
Input 4 REN Input, Port 1 General Purpose Input
Input 5 Door Contact, Port 2 Door Contact, Port 2
Input 6 REX Input, Port 2 REX Input, Port 2
Input 7 Bond Sense, Port 2 General Purpose Input
Input 8 REN Input, Port 2 General Purpose Input

When connected, the REX Input can be programmed to operate regardless of the door contact state. The REX
input can also be programmed to recycle the door alarm time to prevent nuisance alarms when the door is held
open to permit longer entry.

Level One: ProtegeGX Installer Study Guide | February 2018 89


Lock Connection
The controller provides a connection for an electric strike lock, with full monitoring of the lock circuit for tamper
and overcurrent/fuse blown conditions. Disable monitoring if not required.

B+
1N4007 Diode

B-
-

NO COM NC NO COM NC
12VDC Electric
Locking Device

The lock output is shared with the bell/siren function. Select another output for the lock control if the bell/siren
function is required.
To use the lock outputs in conjunction with the onboard reader module, the lock output for the door associated
with the reader port must be configured as the desired lock output on the controller. This is not configured by
default.
For a door with an entry and exit reader, the lock output should be connected to the bell, and the Swap Lock
option enabled for the second reader input, to allow the reader LEDs to display the correct status.

Note: The bell output current must not exceed 1.1A or electronic shutdown will be engaged.

The Protege Controller and 2 Door Reader Expander modules provide two lock output relays that can be used
to switch electric locks.
V+

+
V-
NO

1N4007 Diode
C
NC NO

-
12VDC Electric
Locking Device
C
NC
+
-

Power Supply for


Locking Devices
Max 30VDC

 The 1N4007 diode is supplied with the product and must be installed at the electric strike terminals
 Always switch the + leg of the circuit

90 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Electromagnetic spikes can affect normal system operation and, in some cases, damage hardware. You must
use a diode each time a coil, lock, or relay is controlled.

When the lock is de-energized from 24VDC the diode absorbs the 'inductive kick', and all the energy the lock's
coil 'frees' is absorbed by the diode. If there is no diode to absorb the accumulated energy, it goes into the
cable. These high spikes can cause electromagnetic disruptions and may affect the normal operation of the
system. Worse, they may damage equipment not protected by a diode.

Inputs
The Protege16 Input Expander expands the Protege system by 16 inputs that support multiple EOL values. It
also monitors up to 16 trouble inputs used to report conditions such as module communication problems.
The Protege Controller has eight onboard inputs and monitors up to 64 trouble inputs. Trouble inputs will
open or go into alarm when the trouble condition is present, then close or return to normal when the trouble
condition is restored. The controller can monitor and control thousands of additional inputs and trouble inputs
by using expansion modules.
Devices connected to these inputs can be installed to a maximum distance of 300m (1000ft) from the input
expander or controller when using 22 AWG wire. Each input may be individually configured for normally opened
and normally closed configurations, with or without EOL resistors for tamper and short condition monitoring.
When using an input with EOL resistor configuration, the controller generates an alarm condition when the
state of the input changes between open and closed, and generates a tamper alarm condition when a wire fault
(short circuit) or a cut wire (tamper) in the line occurs. Inputs default to require EOL resistor configuration.

Level One: ProtegeGX Installer Study Guide | February 2018 91


Each input can use a different configuration. To program a large number of inputs with the same configuration,
use the multi-select tool in the software.
When using no-resistor configuration, the controller monitors only the opened and closed state of the
connected input device generating the alarm and seal conditions.

EOL resistor options must be configured based on the site requirements. Note these resistor options are
supported on the Protege Controller, but not all resistor options are supported on all Protege field modules.

Value 1 Value 2 Monitored Status


1k 1k Open, Closed, Tamper, Short
2k - Open, Closed
<5k7 - Open, Closed
No Resistors - Open, Closed
2k2 6k8 Open, Closed, Tamper, Short
10k 10k Open, Closed, Tamper, Short
2k2 2k2 Open, Closed, Tamper, Short
4k7 2k2 Open, Closed, Tamper, Short
4k7 4k7 Open, Closed, Tamper, Short
5k6 5k6 Open, Closed, Tamper, Short

92 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
Both the Protege Controller and 2 Door Reader Expander have eight onboard inputs. These inputs are assigned
default functionality if used for access control.

Input Access Control Function Default Setting


Input 1 Door Contact, Port 1 Door Contact, Port 1
Input 2 REX Input, Port 1 REX Input, Port 1
Input 3 Bond Sense, Port 1 General Purpose Input
Input 4 REN Input, Port 1 General Purpose Input
Input 5 Door Contact, Port 2 Door Contact, Port 2
Input 6 REX Input, Port 2 REX Input, Port 2
Input 7 Bond Sense, Port 2 General Purpose Input
Input 8 REN Input, Port 2 General Purpose Input

Any unconfigured inputs may be used as general-purpose inputs. Remember to disable any associated Doors
and Reader Expander programming (applicable to both ProtegeGX and ProtegeWX).

Outputs
The controller has seven onboard outputs that can be used to activate sirens, bells and warning devices, or
control lighting and doors. The first output has a special hardware design for fault conditions so is ideally suited
to driving sirens or warning devices.

+
B+

1k Resistors
B-

-
NO COM NC NO COM NC

12VDC siren
warning device

The + and - terminals of the bell output (CP001:01) are used to power bells, sirens or devices requiring a steady
voltage output. The bell output supplies 12VDC on alarm and supports one 30-watt siren. It uses an
electronically fused circuit and automatically shuts down under fault conditions. If the load on the bell terminals
returns to normal, the controller reinstates power to them on the next transition of the output.
 When the bell output is not used, the relevant trouble input is activated. This can be avoided by connecting
a 1K resistor across the bell output. If the bell is not used for another function and the trouble input is not
programmed, a resistor is not required.
 Connecting a Piezo siren may result in a dull noise being emitted. This is caused by residual current from
the monitoring circuit. To prevent this, connect two 1K resistors in parallel.

Level One: ProtegeGX Installer Study Guide | February 2018 93


The relay outputs (CP001:03 and CP001:04) on the controller are normally open relay outputs. These outputs
can be used to activate larger relays, sounders and lights, etc.

Z4

B+
V-

B-
1K5 OHM

Z3

NO COM NC NO COM NC
Z2
V-
Z1
V-
LED
V+

Warning: The relay outputs can switch to a maximum capacity of 7A. Exceeding this amount will damage the
output.

If readers are not attached to the reader ports, the Reader 1 L1 and BZ outputs and Reader 2 L1 and BZ
outputs can be used as general-purpose outputs. These can be controlled by assigning the RDxxxGreen R1,
RDxxx Beeper R1, RDxxxGreen R2 and RDxxx Beeper R2 outputs of whichever reader module has been
configured as the onboard reader module. These are open drain outputs which switch to the V- reference.
Z4

DO
V-

L1 D1
1K5 OHM
Z3
Z2

BZ
V-

LED
Z1
V-
V+

Warning: The reader outputs can switch to a maximum capacity of 50mA. Exceeding this amount will damage
the output.

Ethernet 10/100 Network Interface


Communication between the Protege system and the controller uses a 10/100 Ethernet network operating the
TCP/IP protocol suite. The IP address of the controller can be configured from an LCD keypad or via the built-in
web interface. The default IP address is set to a static IP address of 192.168.1.2 with a subnet mask of
255.255.255.0. These IP address settings are commonly used for internal networks.

Note: Installing the controller on an active network requires knowledge of the configuration and structure of the
network. Always ask the network/system administrator to provide a fixed IP address that can be assigned to the
controller.

94 Module 127: Protege DIN Rail Hardware Configuration | DIN Rail Hardware Setup
When installing an Ethernet connection the controller should be interfaced using a standard segment (<100m in
length) and should be connected to a suitable Ethernet hub or switch.

Controller

Controller

Temporary direct connections can be used for onsite programming by connecting directly to the computer
Ethernet port.

Controller

Telephone Dialer
The controller provides the ability to communicate alarms and upload information to remote systems using the
onboard 2400bps modem. The telephone line can be connected directly to the controller using the onboard
telephone connection terminals.
T1i R1i T1o R1o

Telco line
tip and ring input

Telco line out

Level One: ProtegeGX Installer Study Guide | February 2018 95


LED Indicators
The expander modules include comprehensive front panel diagnostic indicators that can aid the installer
diagnose faults and conditions. In some cases an indicator may have multiple meanings depending on the
status indicator display at the time

Status Indicator
The Status indicator displays module status of the module.

State Description
Continuous fast flash Module attempting registration with controller
Continuous slow flash Module successfully registered with controller
Single flash Module communications activity

When the Fault and Status indicators are flashing alternately the module is in identification mode, enabling the
installer to easily identify the module in question. Upon module update, or the identification time period expiring,
the module will return to normal operation.

Fault Indicator
The fault indicator is lit any time the module is operating in non-standard mode. If the fault indicator is flashing,
the module requires a firmware update or is in firmware update mode. When the fault indicator is on the Status
indicator will show an error code.

State Description
Continuous slow flash Module is in boot mode awaiting firmware update
Constantly on Module is in error state and will flash an error code with the status indicator

96 Module 127: Protege DIN Rail Hardware Configuration | LED Indicators


Error Code Display
The following applies only if the Fault indicator is constantly on and the Status indicator is flashing red. The
Status indicator flashes red with the error code number.

Flash Error Description


Unknown Error Code: The error code returned by the controller could not be understood by
1
the module. Contact Integrated Control Technology.
Firmware Version: The firmware version on the module is not compatible with the controller. To
2
clear this error, update the module using the module update application.
Address Too High: The module address is above the maximum number of modules available
3 on the controller. To clear this error, change the address to one within the range set on the
controller. Restart the module by disconnecting the power.
Address in Use: The address is already in use by another module. To clear this error, set the
4 address to one currently not occupied by a module. Use the View Network Status command to
list the attached devices, or the Network Update command to refresh the registered device list.
Controller Secured Registration Not Allowed: The controller is not accepting any module
5 registrations. To allow module registrations, use the Network Secure command to change the
secure setting to Not Secured.
Serial Number Fault: The serial number in the device is not valid. Return the unit to the
6
distributor for replacement.
Locked Device: The module or controller is a locked device and cannot communicate on the
7
network. Return the unit to the distributor for replacement.

Power Indicator
The Power indicator is lit whenever the correct module input voltage is applied.

Status Description
On (green) Correct module input voltage applied
Off Incorrect module input voltage applied

Relay Indicators
The Relay indicators show the status of the lock output relays.

Status Description
On (red) Relay output is ON
Off Relay output is OFF

Level One: ProtegeGX Installer Study Guide | February 2018 97


Input Indicators
Whenever an input on the Controller is programmed with an input type and area, the input status is displayed on
the front panel (indicators 1-8) corresponding to the physical input number (Z1-Z8). This allows easy walk test
verification of inputs without the need to view the inputs from the keypad or Protege interface.

State Description
Off Input is not programmed
On (red) Input is in an OPEN state
On (green) Input is in a CLOSED state
Flashing (red) Input is in a TAMPER state
Flashing (green) Input is in a SHORT state

Reader Data Indicators


The R1 and R2 indicators display the status of the data being received by the onboard readers.

State Description
A SHORT flash (<250 milliseconds) will show that data was received but was not in
Short flash (red)
the correct format
A LONG flash (>1 second) indicates that the unit has read the data and the format
Long flash (red)
was correct

Power Supply Module Indicators


V1 Output/V2 Output Indicators
The V1 and V2 output indicators show the status of the 12VDC output.

State Description
On (green) 12VDC output operating OK
Flashing (red) 12VDC output failure

Battery Indicator
The Battery indicator shows the status of the backup battery.

State Description
Flashing (red) Backup battery is disconnected
On (red) Backup battery failed its dynamic battery test
On (green) Last backup battery dynamic test successful

98 Module 127: Protege DIN Rail Hardware Configuration | LED Indicators


Temp Indicator
The Temp indicator shows the status of the unit's core temperature.

State Description
On (red) Core temperature exceeded. Over Temp Shutdown Activated
Flashing (red) Core temperature within 10˚C of Over Temp Shutdown
On (green) Core temperature OK

Core Temperature on Output Load Operation


The table below helps illustrate how the core temperature of the power supply module influences the operation
of the V1 and V2 outputs.

Output Load Current

Output Load Operation Status <70°C 70-80°C >80°C

Outputs Enabled (Mains Power)  


Outputs Supplied by Battery   
Output Over-Current Failure Trouble
Input Activated  
Over-Current Output Shutdown
Activated 

Output Current Indicator


The Output Current indicator shows the status of the output current for both V1+ and V2+.

State Description

Constantly on Output current exceeded. Over Current Shutdown Activated


Continuous flash Output current exceeded maximum, approaching Over Current Shutdown
Constantly on (all indicators) Maximum output current level reached
Constantly on (partial) Indicated output current level reached

Level One: ProtegeGX Installer Study Guide | February 2018 99


Output Current Influence on Output Load Operation
The table below helps illustrate how the total output current drawn from the power supply module influences the
operation of V1 and V2 outputs.

Output Load Current

Output Load Operation Status 0 - 4.0A 4.0 - 5A 5A - Short Circuit

Outputs Enabled (Mains Power)  


Outputs Supplied by Battery  
Output Over-Current Failure Trouble
Input Activated  
Over-Current Output Shutdown
Activated 

Controller Indicators
Ethernet Link Indicator
The Ethernet indicator shows the status of the Ethernet connection.

State Description
On (green) Valid link with a hub, switch or direct connection to a personal computer detected
Flashing (green) Data is being received or transmitted
Off Ethernet cable not connected, no link detected

Modem Indicator
The Modem indicator shows the status of the onboard modem.

State Description
On (green) Modem has control of telephone line
Off Modem is not active

Bell Indicator
The Bell indicator shows the status of the bell output and the over current or circuit fault conditions.

State Description
Off Bell is connected, output is OFF
On (green) Bell is ON
Single flash (green) Bell is ON, the circuit is in over current protection
Two flashes (green) Bell is OFF, the circuit to the siren/bell is cut, damaged or tampered

100 Module 127: Protege DIN Rail Hardware Configuration | LED Indicators
Review Questions
In the configuration shown, what is the maximum continuous load that can be drawn by the
module network?
Power Supply (4A)

Controller
N+ N- NA NB V2+ V2+ V2+ V2+ V2+ V2+ V- V- V- V- V- V- V1+ V1+ V1+ V1+ V1+ V1+ V- V- V- V- V- V-

N+ N- NA NB B- B+ L N
To other modules
on network

Gel Cell Backup Battery Mains Input

 4 Amps
 10 Amps
 3.3 Amps
 3 Amps
To monitor a cabinet tamper switch using a dedicated tamper input, which module is
required?
 Protege Power Supply Module
 Protege System Controller
 Protege 16 Input Expander
 Protege 2 Door Expander
Where and when should a diode be fitted?
 Across the coil when a coil is being controlled
 Across the lock when a lock is being controlled
 Across the relay when a relay is being controlled
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 101


Where does the shield of the cable connected to a reader get connected?
 Frame grounded at one point. Connected to the reader shield.
 Wired to V- at the reader expander. Connected to the reader shield.
 Card reader cable is not shielded.
 Frame grounded at one point. Not connected to the reader shield.
Is the wiring method shown in this diagram acceptable?
Assume the power supply modules indicated in the diagram shown are DIN rail modules. Is this an acceptable
wiring method? If so, what is the maximum recommended average current the controller can draw?
Module #3 Module #2 Module #1 Controller
N+ N- NA NB N+ N- NA NB N+ N- NA NB N+ N- NA NB

Power Supply #3 Power Supply #2 Power Supply #1

 This is an unacceptable wiring method


 Acceptable, 3 Amps
 Acceptable, 9 Amps
 Acceptable, 4 Amps
What does a constant red Fault indicator on a power supply module mean?
 The module is in identification mode
 Module communications activity
 The module is in error state. The Status light will flash an error code.
 The module is in boot mode awaiting firmware
What does a continuous fast green flash of the Status indicator of a power supply module
mean?
 The module is in identification mode
 There is module communications activity
 The module is online
 The module is attempting to register with a controller

102 Module 127: Protege DIN Rail Hardware Configuration | Review Questions
The Bell indicator on a controller is flashing two green flashes. What does this mean?
 The bell output is off. The circuit to the bell is ok.
 The bell output is off. The circuit to the siren/bell is cut, damaged or tampered.
 The bell output is on. The circuit to the bell is ok.
 The bell output is on. The circuit is in overcurrent protection.
What does a flashing green indicator on an input mean?
 The input is in an open state
 The input is in a closed state
 The input is in a tamper state
 The input is in a short state

Level One: ProtegeGX Installer Study Guide | February 2018 103


Module 130:
ProtegeGX Hardware Setup
This module outlines the requirements for setting up a controller and bringing it online.

Level One: ProtegeGX Installer Study Guide | February 2018 105


Protege Controller Setup
To bring a Protege controller online with the ProtegeGX server, the appropriate IP address, subnet mask and
gateway (if applicable) must be assigned. The Protege Controller has a factory-default IP address of
192.168.1.2, which should be changed to suit the IP addressing scheme of the site. The IP address can be
changed using the built-in web interface, or from a keypad.

Assigning the IP Address via the Web Interface


If the current IP address is known, use the web interface to enter the details.
1. With the controller connected to the network, type the IP address into the browser address bar. The default
IP address is 192.168.1.2
2. Enter the user name and password in the login screen. Default user name: admin; default password: admin.
3. In the Controller Configuration screen, enter the required settings and click Save.
4. Click Restart controller to apply the settings.
The controller serial number is displayed. Note this down as it is required to connect later.

Assigning the IP Address from a Keypad


1. Connect the keypad to the module network.
2. Log in using the default installer PIN of 000000. If the default code has been overridden and the new codes
are unknown, force the controller into its default state.
3. Press [MENU] [4] [2] [1] to display the current IP address.
4. Edit the address using the numeric and [LEFT] [RIGHT] keys.
5. Press the [ARM] key to save changes.
6. Press the [ENTER] key to confirm the change.
7. Return to the View/Edit IP menu by pressing [ENTER] or [1]. Press the [UP] key to change the subnet mask
(if required).
8. Press the [UP] key again to display the Gateway address. If your server is not on the same subnet or you
are using an NTP server on another subnet, set to the IP address of your network's router.
Restart the controller for the changes to take effect.

Restarting the Controller


There are three ways to restart the controller:
1. Cycle the power.
2. Use the web interface and click the Restart link.
3. Use the keypad and select [MENU] [4] [2] [2].

106 Module 130: ProtegeGX Hardware Setup | Protege Controller Setup


Setting the Controller to Use a Known IP Address
If the current IP address is unknown, it can be temporarily defaulted to 192.168.111.222. This resets the IP
address for as long as power is applied, but does not save the change permanently. Once the link is removed
and power is cycled to the unit, the previously configured IP address is used again. This means that if the
currently configured IP address is unknown, you may connect to the web interface to view and/or change it.
1. Remove power to the controller by disconnecting the 12V DC input.
 For a 2 Door Controller, connect a wire link between the Reader 1 D0 input and the Reader 1 L1 output,
and power up the controller.
 For a Single Door Controller, connect a wire link between NA of the module network and SA of the
reader network, and between NB of the module network and SB of the reader network. Connect Input
1 to ground.
2. When the controller starts up it will use the following settings:
 IP address: 192.168.111.222
 Gateway: 192.168.111.254
 Net Mask: 255.255.255.0
 DHCP: disabled
3. Enter 192.168.111.222 into the address bar of your web browser, and view/change the IP address as
required.
4. Once finished, remove the wire link and power cycle to complete the process.

Training Exercise
For the purposes of this training, use either of the previous methods to:
 change the Controller IP address to 192.168.1.3
 change the Event Server IP address to 192.168.1.100

Defaulting the Controller


The Protege controller can be set back to factory default as below. This resets all internal data and event
information, but does not reset the IP address.

Defaulting the controller sets the default installer code to 000000 until the new configuration data is downloaded
to the controller.

D1/ D0/
BZ L1
NB NA
READER 2

1. Remove the power by disconnecting the 12V DC input.


2. Connect a wire link between Reader 2 D0 input and Reader 2 L1 output and power up the controller.
3. Once the controller has started and the Status light is flashing, remove the wire link from the Reader 2
connector.
The system is defaulted with all programming and settings returned to factory configuration.

Level One: ProtegeGX Installer Study Guide | February 2018 107


Configuring an LCD Keypad
Accessing the Configuration Menu
Before a Protege keypad can communicate, it must be assigned an address. This, and other settings, are
configured using the device configuration menu:
1. Apply power to the device and when the keypad version information is displayed, press the [X] key, followed
by the [ENTER] key.
2. The configuration menu is displayed.
3. Scroll the available options by pressing the [DOWN] and [UP] keys, and use the [ENTER] key to select the
menu item.

The configuration menu can only be accessed when the device powers up. It cannot be accessed when the
system is operational.

Setting the Keypad Device Address


The address selection sets the address of the Protege keypad. This address must be a unique address in the
system below address 250.

Enter keypad 
address: 001 
 Use the numerical keys 0 to 9 to program the address, and press the [ENTER] key to save the setting
 To exit without making changes, press the [MENU] key

Adjusting the Display Contrast


The Backlight brightness setting adjusts the LCD display.

    Backlight 
  [*******    ] 
 Use the [LEFT] and [RIGHT] keys to adjust the backlight brightness, and press [ENTER] to save the setting
 To exit without making changes, press the [MENU] key

Resetting a Keypad to Factory Default


The default setting resets the keypad to the factory default settings.

Press [ENTER] to 
default keypad. 
 Press [ENTER] to default the keypad
 To exit without defaulting the keypad, press the [MENU] key

108 Module 130: ProtegeGX Hardware Setup | Configuring an LCD Keypad


Displaying Keypad Version Information
The version menu option displays the version and build information of the keypad.

ICT Protege LCD 
Keypad Ver 1.44 
 Press the [MENU] key to exit

Level One: ProtegeGX Installer Study Guide | February 2018 109


Review Questions
How do you default a Protege controller?
 Use the web interface to connect to the controller, then click Restart
 Wire a link between D0 and L1 of Reader port 2, then cycle power
 Turn on DIP switch 4, then cycle the power
 Log in at a keypad, then select [Menu] [4] [2] [2] [Enter]
If the IP address of a Protege controller is unknown, how can you find it?
 Turn DIP switch 3 on, then cycle power to the controller to temporarily set the IP address to
192.168.111.222

 Connect a keypad, press [Menu] [4] [Arm], then scroll down three times
 Use the web interface to browse to the default IP address of 192.168.1.2
 Connect a link from L1 to D0 on reader port 2, then cycle power to the controller to temporarily set the
IP address to 192.168.111.222

What is the default IP address of a Protege controller?


 192.168.1.2
 192.168.1.3
 192.168.111.222
 255.255.255.0
When the IP address of a Protege controller is changed, what additional step(s) must be
taken?
 Perform a module update
 Save the settings
 Cycle power to the controller
 Save the settings, then restart the controller
How is the module address set on a Protege LCD keypad?
 Using DIP switches
 From the keypad setup menu: [X] at version info during power-up
 From the keypad setup menu: [Menu], [4], [Arm] once the system is operational
 Using the module address tool from within the ProtegeGX software

110 Module 130: ProtegeGX Hardware Setup | Review Questions


Module 125:
ProtegeGX System Design
This module covers how to identify the requirements of a system, including physical design and the planning of
our training system.

Level One: ProtegeGX Installer Study Guide | February 2018 111


Identifying Requirements
Well-planned system design results in a smoother and more efficient installation and configuration process. It is
important to get as much advance information as possible on end user requirements. Ask questions to elicit the
information required, and keep the design as simple as possible.

The Five W's of System Design


When designing an access control system, ask:
 Who are the people we are managing?
 What are the people allowed to do?
 Where are the people allowed to go?
 When are they allowed to do these things, or go to these places?
 Why did someone do something or go somewhere?
The first four questions relate to system design, and the last is about monitoring and reporting from the system
once it is up and running. All are important to consider before installing or programming a system.

Determine the Areas to be Managed


 Where are the entry points to the areas?
 How will we control access to these areas?
 Do we need to know when people are exiting the areas as well as entering?
 Do we need intruder detection in the areas?
Answers to these questions allow us to build a list of the physical hardware and areas required.

Determine Schedule Requirements


 Are there people who need to access the building 24/7?
 Are there standard office hours?
 Are there multiple shift times?
 Should managers be given extended access times?
Answers to these questions allow us to create schedules.

Determine User Requirements


Next consider the people to be managed. List the people and group them by function (managers, office staff,
cleaners, etc.). This list, together with the details we already have, provides the information required to create
users and access levels.

112 Module 125: ProtegeGX System Design | Identifying Requirements


Determine Information Requirements
Finally, the 'Why?' question relates to how the end user intends to extract information from the system once it is
up and running. Once you have all this information, collate it in a design document which all parties agree on.
This document will be used throughout the installation and programming phases.

Level One: ProtegeGX Installer Study Guide | February 2018 113


Understanding Physical Design
Cable Selection
Selection of the correct cable types is one of the most important yet commonly overlooked design
considerations. While cheaper cables save money, the cost of resolving issues arising from their use usually
outweighs any benefits.

CCA Cables
While copper-clad aluminum cables are attractive from a cost point of view, there are a number of negative side
effects:
 Higher attenuation (signal strength loss over shorter distance)
 Lower tensile strength (subject to damage if pulled too tightly during installation)
 Poor flexibility
 Temperature rise when carrying higher currents
 Oxidation of exposed aluminum at points of connection
We recommend against the use of CCA cables, especially for module network and reader connection.

RS-485 Module Network Cable Type


RS-485 is a robust network solution, but data transmission can be affected by noise. While Cat5e and Cat6
data cables can be used, they are not designed for use in RS-485 networks.
Cable specifically designed for RS-485 networks, such as Belden 9842, is recommended. This is a shielded,
twisted pair multi-core cable, especially suited to longer network runs and electrically noisy environments.

Wiegand Reader Cable Type


Wiegand readers also rely on data transmission, and can therefore be affected by noise. Cat5e and Cat6 data
cables were not designed to be used for Wiegand readers. It is recommended that a cable specifically designed
for Wiegand readers, such as Alpha 5388c, is used. This is a shielded, non-twisted multi-core cable.

114 Module 125: ProtegeGX System Design | Understanding Physical Design


Reader Cable Distance
The maximum distance between the reader and expander is 150m/500ft if using an 0.8mm or 18 AWG cable,
such as Alpha 5386c or 5388c.
If using a 0.6mm or 22 AWG cable, such as Alpha 5196c or 5198c, the maximum recommended distance is
80m/260ft.

Reader

Max 150m/500ft
18AWG reader cable
Expander

Reader
Max 80m/260ft
22AWG reader cable

Level One: ProtegeGX Installer Study Guide | February 2018 115


Voltage Drop
An important consideration in cable selection, especially for devices with a high power demand such as locks, is
voltage drop. As the distance of a cable increases, so too does its internal resistance, leading to voltage drop.
Consider an average mag lock running at 12 volts that draws around 500mA. If this is connected to a Protege
Power Supply module via 0.5mm security cable, the voltage drop across the cable drops the voltage at the lock
to below 12 volts after just 26m (85ft).

Voltage Drop Calculation


While it is recommended that voltage drop calculations are made with every system design, the following table offers a
general guide.

0.2mm 0.5mm 0.6mm 0.8mm 1mm 2mm


PIR 150m 225m 300m X X X

Keypad 100m

Reader X X 80m 150m X X

Strike / Drop Bolt X 30m 40m 100m 160m 250m

Mortice / Single Mag X 15m 20m 50m 80m 130m

Double Maglock X X 10m 25m 40m 65m

24AWG 23AWG 22AWG 18AWG 16AWG 14AWG


PIR 500ft 750ft 985ft X X X

Keypad 330ft

Reader X X 260ft 500ft X X

Strike / Drop Bolt X 100ft 130ft 330ft 525ft 820ft

Mortice / Single Mag X 50ft 65ft 165ft 260ft 425ft

Double Maglock X X 30ft 80ft 130ft 210ft

116 Module 125: ProtegeGX System Design | Understanding Physical Design


PIR Cable Distance
The maximum distance between an expander and any security detection device is 300m or 985ft.
Power consumption should also be considered. The diagram below sets general guidelines for ICT PIRs.

PIR

300m/985ft
0.6mm/22AWG cable

PIR

150m/500ft
0.2mm/24AWG cable

Lock Cable Distance


Incorrect conductor sizing for lock power can lead to cable degradation, lock malfunction, decreased bond
strength, or power supply overload.
PSU Expander

250m/820ft
2mm/14AWG Strike/dropbolt

30m/100ft
0.5mm/23AWG

130m/425ft Mortice/single mag


2mm/14AWG

15m/50ft
0.5mm/23AWG

65m/210ft
Double mag
2mm/14AWG

10m/30ft
0.6mm/.23AWG

Level One: ProtegeGX Installer Study Guide | February 2018 117


Output Wiring
If a controller or expander loses power for any reason, all relays return to their unpowered state. When designing
a system, consider what will happen to devices controlled by relays in failed condition.
Output terminals are labeled in their unpowered state. Where a terminal is labeled NC or Normally Closed, this
set of contacts will be closed when the output is off.
If a system is specified to control lighting, it is advisable to use the NC or Normally Closed terminals for this
purpose. If the module fails and the output turns off, the lights being controlled will switch on. This is because in
a failed state it is preferable for lights to be stuck on than off. This can sometimes lead to programming
confusion, but provided a smart naming convention is used this can be avoided. As an example, the above
instance could be labeled 'Lighting Control (ON to de-energize)'.

Power Supply Design


Any system is only as good as the power supply behind it. Wherever possible the following should be adhered
to:
 Module network power should be from a dedicated feed
 Lock power should be separated from power for other devices
 Power supply module average load should be kept below 75% of rated capacity
 Batteries should always be connected to the power supply module
Power supply loading calculations must always be carried out to ensure there is enough power to keep the
system running under all conditions.

Device Intelligence
Device intelligence refers to a device's ability (or inability) to continue functioning if connection to the rest of the
system is lost. A fully intelligent solution is one that appears to behave in the same manner regardless of
whether it is connected to the rest of the system or not.

Controller Intelligence
The ProtegeGX Controller is a fully intelligent device. If communications are lost to the server, the controller
continues to function stand-alone as per the last received configuration. Areas can still be armed/disarmed,
access can still be granted or denied, schedules are followed, events will be stored locally, and off-site
monitoring will continue to function if a path to the monitoring station is still available.

Non-intelligent Devices
Devices designed to expand the controller's functionality are often non-intelligent. These devices rely on the
controller for instructions on how to operate and include input expanders, output expanders, reader expanders,
analog expanders, and keypads. These devices have limited or no functionality if they lose their RS-485 module
network connection to the controller.

118 Module 125: ProtegeGX System Design | Understanding Physical Design


Offline Behavior
Input Expanders
When RS-485 communications are lost, input expanders continue to process the states of inputs. It is the
controller, however, that is responsible for carrying out any actions required, such as triggering sirens, or offsite
monitoring. Input expanders do not store events, so if an input opens and closes while the expander is offline, it
will never be logged or actioned. If an input changes state while offline and remains in the new state, it will be
logged and actioned when the expander comes back online.
Because the input state is still processed, LED operation will continue to follow the state of the input while
offline.

Output Expanders
When RS-485 communications are lost, output expanders keep all outputs in the same state they were last in. If
an output was supposed to change state for any reason, it will not happen while the module is offline. When the
module comes back online, the controller updates the expected states of all the outputs.

Reader Expanders
All Protege reader expanders have three programmable modes of operation which they follow if
communications to the controller are lost:
1. No Users (entry is denied for everyone)
2. Any Card (entry is granted to any card that can be read)
3. First 10 Users + Cache (the first 10 programmed users and a number of stored users will be allowed
access)

Offline Operation
No Users
The No Users mode of offline operation should only be used for perimeter and high-security doors. In this mode
of operation, all card and/or PIN access attempts are denied. REX (Request to exit) is granted, and an offline
warning of four short beeps is emitted from any readers attached to the door. If this mode is selected, it is
critical that another means of entry to the area is provided. This could be through an alternative door, via a key
override switch, or an emergency break-glass switch.

Any Card
The Any Card mode of offline operation should be used only for high-volume, internal low-security doors. In this
mode of operation, all card and/or PIN access attempts are granted. All granted events, including REX events,
will generate an offline warning of four short beeps from any readers attached to the door.
In this mode, remember that any card that can be read by the reader will be granted access, and any PIN
entered at a reader in Card or PIN or PIN only mode will be granted access.

Level One: ProtegeGX Installer Study Guide | February 2018 119


First 35 Users + Cache
The First 10 Users + Cache mode of offline operation is recommended for most doors. In this mode of
operation, access is granted to the first 10 programmed users (usually the most important people in the system,
such as the installer and master). Access is also granted to the last 150 users stored in cache (FIFO). All granted
events, including REX events, will generate the offline warning of four short beeps from any readers attached to
the door.

Protege 2 Door Reader Expander


The Protege 2 Door Reader Expander is a non-intelligent device and functions in offline mode as follows:
 In cached mode, the expander grants access to the first 10 users in the database, and to any card with a
facility code matching one of the last 150 facility codes presented
 Events are not stored
 Schedules are not followed
 Unlocked doors lock
 Door alarms, such as DOTL and Forced, are not processed
 If an input used for intruder detection opens and closes, it is not logged or actioned
 If an input used for intruder detection changes state while offline and remains in the new state, it is logged
and actioned when the expander comes back online
Because the input state is still processed, LED operation continues to follow the state of the input while
offline.

Robust Design
Good system design helps avoid situations where expanders are forced into offline mode. If RS-485 standards
are followed and the correct cable used (and protected), the RS-485 module network has an extremely low
failure rate.

PSU Controller ZX16 PX8

ZX16 PX8

RDM2 RDM2

Cable protected by conduit

120 Module 125: ProtegeGX System Design | Understanding Physical Design


Robust design includes keeping expanders in the same cabinet as the controller, and placing the cabinets side
by side (with the RS-485 cable between them well-protected).

PSU Controller ZX16 PX8

RDM2 RDM2

Cabinet 1 Cabinet 2

Cable is at risk of being damaged

When the RS-485 module network leaves the cabinet, it is at risk of being damaged. The above diagram
illustrates how if the cable outside the cabinet is cut, the input expander and output expander in Cabinet 2
cease to function. If the RS-485 module network cable is well run and protected by a cable tray or conduit
(where applicable), it is unlikely to be damaged.
Centrally locating equipment, and running cable out to field devices, is a cost-effective way of providing a robust
solution. Sometimes, though, the RS-485 module network must leave the cabinet, such as when a keypad is
added to the system. If the integrity of the RS-485 module network is critical, an intelligent reader expander with
an isolated secondary module network can be used.

Cabinet

Power
Controller
Supply

Input Reader Keypad


Expander Expander

Primary RS-485 Secondary RS-485


Now if the cable outside the cabinet gets cut, it will affect only the keypad.

Level One: ProtegeGX Installer Study Guide | February 2018 121


Utilizing Ethernet
Another option for making the system more robust is to use Ethernet. Although an Ethernet cable can still be cut
or damaged, it is much less likely to affect the rest of the network.

LAN

PSU Controller
TLCD

ZX16 RDM2

Cabinet
The controller above connects to the network using Ethernet. The RS-485 module network and expanders are
protected inside the cabinet, and a Protege Touch Screen keypad is used for arming/disarming the system. The
Protege Touch Screen keypad protects the RS-485 module network as it is completely isolated.

Multiple Controllers
LAN

Controller 1 Controller 2

Ground Level 1 Level 2 Level 3 Level 4 Level 5


ProtegeGX not only supports the connection of multiple controllers, it is built around such scalability. This
provides yet more options for designing a large, robust solution.

122 Module 125: ProtegeGX System Design | Understanding Physical Design


Planning the Training System
Our training scenario is based on our fictitious client, ACME International. We will be installing an access control
system in their Texas office.
ACME has provided a basic building plan.

Training Scenario
From the plan we can identify three areas:
1. Office
2. Manager's Office
3. Warehouse

Office

Warehouse

Equipment
Manager room

Schedules
Looking at the entry points on the plan, and from our discussions with Acme, we can determine:
 There are two external entry points that will require card and PIN for after-hours entry
 The internal doors will be card-only
 The Office Entry door should unlock and lock automatically, based on office hours
 The Warehouse should remain secure at all times, with access control required on both sides of the doors

Door Type Internal Area Schedule


Office Entry Door Card/PIN entry, REX exit Office Office Hours
Manager's Office Door Card entry, REX exit Manager's Office None
Warehouse Roller Door Card/PIN entry, card exit Warehouse None
Office to Warehouse Door Card entry, card exit Warehouse None

Level One: ProtegeGX Installer Study Guide | February 2018 123


Detectors
For intruder detection, we need PIR detectors for the three areas: Office, Manager's Office, and Warehouse. For
system control, we will install a keypad in the Office.

User Requirements
 The manager is allowed access to the entire building 24/7
 Office staff are allowed access to the office 9am-5pm, Monday-Friday, and to the warehouse only when
warehouse staff are present
 There are two shifts in the warehouse: 6am-2pm, and 10am-6pm
 The warehouse supervisor is allowed access to the warehouse during both shifts
 All warehouse staff are allowed access to the office if there are office staff present

Access Levels
The user requirements above help us define five access levels:
1. Manager
2. Office
3. Warehouse Supervisor
4. Warehouse Shift 1
5. Warehouse Shift 2
We now need to ask Acme for a list of employees, their access levels, and PIN numbers.

Hardware Design
To put our system design into practice, we require the following hardware:
 1 x Protege System Controller (2 doors)
 1 x Protege 2 Door Reader Expander
 1 x Protege Power Supply module (4 Amps)
 1 x tSec Extra reader with keypad, 1 tSec Extra reader without keypad
 1 x tSec Standard reader with keypad, 3 tSec Standard readers without keypad
 1 x Touch Sense LCD Keypad
 3 x PIRs

124 Module 125: ProtegeGX System Design | Planning the Training System
Confirming Power Supply Requirements
Remember to check that the power supply is sufficient to drive the system.

Device Current mA (avg) Quantity Load A (avg)


Protege Controller 120 1 120

Protege 2 Door Reader


80 1 80
Expander
Protege Touch Sense LCD
60 1 60
Keypad
Protege Readers 130 6 780

Protege PIRs 15 3 45

Locks 500 3 1500

Siren 500 1 500

Total Module Network Load 3.085

Level One: ProtegeGX Installer Study Guide | February 2018 125


Review Questions
Where should copper-clad aluminium cables be used?
 For reader connection
 For RS-485 module network connection
 CCA cables should be used wherever possible due to its higher attenuation
 The use of CCA cables should be avoided
If the keypad cable was damaged, causing a short across all conductors, what would
happen?
Cabinet

Power
Controller
Supply

Input Reader Keypad


Expander Expander

Primary RS-485 Secondary RS-485

 The keypad would stop functioning. The RDI2 would stop functioning. Everything else would continue
to function properly.

 The keypad would stop functioning. Everything else would continue to function properly.
 Everything would continue to function properly.
 The Keypad would stop functioning. The RDI2 would go into offline mode. Everything else would
continue to function properly.

What happens to ...?


A lighting circuit is connected to an output on an output expander module that is programmed to turn on at
8pm and off at 5am. The expander goes offline at 4am, then comes back online at 10am. What happens to the
lights after the expander goes offline?

 The lights turn off at 5am.


 The lights turn off at 10am.
 The lights turn off at 4am.
 The lights turn off at 5am the following day.

126 Module 125: ProtegeGX System Design | Review Questions


What happens when ...?
If a door is connected to a reader expander that has been programmed for 'No Users' offline operation and the
module has gone offline, what happens when a user requests exit using a REX button?

 The door is unlocked. The reader does not beep.


 The door is not unlocked. Four short beeps are given at the reader.
 The door is not unlocked. The reader does not beep.
 The door is unlocked. Four short beeps are given at the reader.

Level One: ProtegeGX Installer Study Guide | February 2018 127


Module 128:
ProtegeGX Software Installation
This module provides an overview of the ProtegeGX system architecture, including specific system
requirements, along with the required licensing steps for the ProtegeGX software.

Level One: ProtegeGX Installer Study Guide | February 2018 129


ProtegeGX System Requirements
Architecture
ProtegeGX uses client/server system architecture.

Workstation A Workstation A

ProtegeGX Server

Workstation B Workstation B

Server: Standard Installation


Up to 10 system controllers, each communicating with up to 16 modules:
 Intel® Dual Core Machine 2.8GHz
 4 GB RAM
 40 GB free disk space
 Mouse/keyboard
 Ethernet 10/100MBs

Server: Multiple Controllers


Over 100 controllers operating as multiple sites, or a single site running multiple controllers (each controller may
have any number of modules connected):
 Intel® Quad Core, 2.8GHz or higher
 8 GB RAM
 100 GB free disk space
 Mouse/keyboard
 Dual Ethernet 10/100MBs

130 Module 128: ProtegeGX Software Installation | ProtegeGX System Requirements


Client Workstation
 Intel® Dual Core Machine 3GHz
 4 GB RAM
 40 GB free disk space
 DirectX 10-compatible video card
 Mouse/keyboard
 Ethernet 10/100/1000MBs

DVR Integration
DVR systems have their own requirements. Check with the manufacturer to confirm the environment meets
recommended specifications.

Supported Operating Systems


ProtegeGX is supported on the following operating systems:
 Microsoft Windows 10
 Microsoft Windows 8.1
 Microsoft Windows 7
 Microsoft Windows Server 2012
 Microsoft Windows Server 2008 R2 SP1

SQL Server Editions


 The ProtegeGX application uses a non-proprietary open SQL database engine to store and share
information
 ProtegeGX supports SQL Server 2012 in either Standard, Enterprise, or Express edition

Prerequisites
Before installing ProtegeGX, you must have installed:
 Microsoft .NET Framework v4.0
 Microsoft SQL Server 2012, 2008 R2, 2008, or 2005 (required on server machine only)
Microsoft SQL Server also has its own set of prerequisites:
 Microsoft Windows Installer v4.5
 Microsoft .NET Framework v3.5 SP1
 Microsoft Windows PowerShell v1.0

Level One: ProtegeGX Installer Study Guide | February 2018 131


Administration Permissions
You must have local administrative rights on the workstation(s) you are performing the installation on. This
ensures you have the necessary permissions to create and modify any of the files or folders on the computer, as
well as change any settings.

132 Module 128: ProtegeGX Software Installation | ProtegeGX System Requirements


Installation Procedure
There are several steps required to install ProtegeGX software:
1. Install the ProtegeGX server components on the server. This installs the database, services, and the web
client (unless deselected).
2. Install the ProtegeGX web client on any remote workstations. This installs the user interface for operators.

Initial Site Configuration


The following steps are required to configure the site:
1. Log in.
2. Activate your license.
3. Add a site.
You must also add (and program) a controller, but this comes later in the course.

Log In
Start ProtegeGX and log in as a user with full access to the system. For new installations, this is admin, with the
password blank (remember to update this after initial setup).

Activate Your License


Licensing your server is a simple task if you have internet access. If you don't have internet access, you must
manually license your server, which involves a couple of extra steps. The license should always be applied
directly at the server (and not via a remote client).

Licensing Process: Automatic


1. Open the ProtegeGX application.
2. If your server has not been licensed, you will be prompted to update your license.
3. Go to the License Update tab (About > License > License Update). Click Download License.
4. If your server internet access is via a proxy server, set this up under the Proxy Setup tab.
5. Enter your SSN, site details and Installer details and click OK.

Once the license is successfully installed, close and restart the user interface.

Level One: ProtegeGX Installer Study Guide | February 2018 133


Licensing Process: Manual
1. Open the ProtegeGX application and go to the License Update tab (About > License > License Update).
2. Click Generate License. You will be prompted to save a license request file.
3. Take this license request file to a PC with internet access.
4. Open a web browser to http://www.ict.co.nz/license/ or browse to Support > Software Registration >
GX Registration Form on the ICT website.
5. Enter your details, including SSN, then browse to the license request file.
6. You will be prompted to save a license file.
7. Take this license file back to your server and click the browse button on the License Update page.
8. Select the new license file and click OK.

Once the license is successfully installed, close and restart the user interface.

Add a Site
When you log in after activating your license and restarting the UI, you will be prompted to add a site. Enter a
meaningful name for the site and click OK.

134 Module 128: ProtegeGX Software Installation | Installation Procedure


Review Questions
Which of the following operating systems is NOT supported for server installations?
 Microsoft Windows Vista SP2
 Microsoft Windows Server 2008 R2
 Microsoft Windows 8.1
 Microsoft Windows 7
 All of the above systems are supported
Which database version is recommended?
 SQL Server 2012
 SQL Server 2008
 SQL Server 2008 R2
 SQL Server 2005
What are the minimum CPU and RAM requirements for a ProtegeGX server?
 Intel Atom 1.66GHz, 2GB RAM
 Intel Dual Core 2.8GHz, 4GB RAM
 Intel Dual Quad 2.8GHz, 8GB RAM
 Intel Xeon E5620, 2GB RAM

Level One: ProtegeGX Installer Study Guide | February 2018 135


Module 129:
ProtegeGX Software Introduction
This module describes the services that make up the ProtegeGX server and the functions they perform,
provides an introduction to the user interface, and outlines the global settings that apply to the entire Protege
system, including all sites and all controllers.

Level One: ProtegeGX Installer Study Guide | February 2018 137


The ProtegeGX Services
The ProtegeGX server is made up of six different services:
 Update Service
 Data Service
 Download Service
 DVR Service A
 DVR Service B
 Event Service
Each service performs a different function within the system, so it is important to have a good understanding of
what each service does and, more importantly, when to start/stop them.

ProtegeGX Update Service


The Update Service acts as the supervisor of all other ProtegeGX services. It is also responsible for ensuring the
server license is valid.

Update Service

Data Service

Download DVR Services


Service

Event Service

Stopping the Update Service stops all other ProtegeGX services. The Update Service should only ever be
turned off during software upgrades, or while the configuration database is being restored.

To stop all services, stop the Update Service. The system will then ask if you wish to stop the other critical
ProtegeGX services.

138 Module 129: ProtegeGX Software Introduction | The ProtegeGX Services


ProtegeGX Data Service
The Data Service is responsible for communications between:
 the ProtegeGX services
 the ProtegeGX server and the MS SQL databases
 the ProtegeGX web client and ProtegeGX server

Download Service

Data Service

Controller Event Service Client(s)

Event Database Database

The Data Service must be running for the ProtegeGX server to function. As the central point for all
communication, the Data Service cannot be stopped without adversely affecting the system.

Stopping the Data Service takes all ProtegeGX clients offline and prevents configuration changes and operator
monitoring of the system. Before stopping the Data Service, all clients should be shut down. This ensures all
operators know the system is about to be stopped and the client is logged in correctly once the Data Service is
restarted.
When starting all services, such as after restoring a database or installing a software upgrade, first start the
Data Service. The system then automatically starts the other critical ProtegeGX services, excluding the
Download Service. The Download Service must be started manually once you are sure of the integrity of your
system configuration database. If the ProtegeGX Data Service fails to start, it is most likely due to a corrupt
database, or the restored database being a different version to that of the ProtegeGX server. Any errors
encountered by the service are logged to the Windows Event Viewer.

ProtegeGX Download Service


The Download Service is responsible for all outgoing messages and sends system configuration data, firmware
updates, status requests and control commands from the server to the controller(s).

Download Service Data Service

Client(s)
Controller(s) Configuration - Firmware Updates
Data - Status Requests
- Control Commands

Database

The Download Service can be stopped without adversely affecting the system. Stopping the Download Service
stops all outgoing messages to the controller(s).

Level One: ProtegeGX Installer Study Guide | February 2018 139


The Download Service periodically compares the configuration stored in the controller with the current
configuration in the ProtegeGX database. If they don't match, a new configuration is downloaded to the
controller.

Download Service Data Service

Controller(s)

Event Service

DVRs / NVRs
Event Programming DAT File(s)
Database Database
DVR Services

The Download Service is advised of a successful download by the controller. The controller sends this message
to the Download Service via the Event Service and Data Service.

Download Service

Controller(s)

Event Service Data Service

DVRs / NVRs
DVR Services

When the server successfully sends a new configuration to the controller it writes a file to its local hard disk. This
file contains only the current configuration of the controller.

Download Service

Event Service Data Service

DVR Services

Event Programming DAT File(s)


Database Database

140 Module 129: ProtegeGX Software Introduction | The ProtegeGX Services


If the Event Service is not working, the Download Service will never receive the message from the controller to
say the download was successful, and the DAT file will not be saved. This will result in the Download Service
continuing to attempt a download to the controller.
The Download Service should be stopped when restoring a database and only restarted once you have
checked that the configuration of the newly restored database is correct. The Download Service will then push
out any changes to the controllers. By default, the Download Service uses an outgoing port of 21000 for
configuration and firmware downloads, and an outgoing port of 21001 for status requests and control
messages.

Download Retry
The Download Retry Delay setting (under the Configuration tab of the controller) determines how often the
Download Service compares the configuration in the controller with the configuration in the Protege database.
The default frequency for checking is every 60 seconds. It can then take up to 60 seconds before the server
starts to download any configuration changes. Depending on the controller type, it can take another 5-60
seconds for the change to take effect.
The Download Retry Delay time should be shortened only when configuring a new controller. This will allow
changes to be pushed out more frequently. Once the configuration is complete, the delay should be set back to
the default of 60 seconds. This is especially important for systems with a large number of controllers, or those
using higher-cost data links to communicate with controllers. Using a longer delay and manually triggering a
download when configuration changes are complete means less data is used.

ProtegeGX DVR Services


There are two DVR services responsible for the interaction between ProtegeGX and integrated DVR/NVR
systems.

DVRs / NVRs DVR Services Data Service

The DVR services can be stopped without adversely affecting the system. Stopping these services stops events
and control messages going from the ProtegeGX server to the DVR, and prevents the viewing of video within
the ProtegeGX client.

Ports used by the DVR services vary depending on the make and model of DVR. This is covered in more depth
in higher-level training courses.

Level One: ProtegeGX Installer Study Guide | February 2018 141


ProtegeGX Event Service
The Event Service is responsible for all incoming messages from controllers. It receives events, status updates and other
messages from controllers.

Download Service

Controller(s)
Status
Updates
Event Service Data Service

Client(s)
DVRs / NVRs Events

DVR Services

Event DAT File(s)


Database Database

As the Event Service receives events, it passes them to the Data Service for processing, which in turn writes
them into the Event database and updates any clients requiring real-time information.

The Event Service can be stopped without adversely affecting the system. Stopping the service prevents the
server from receiving all messages from controllers.

Operators actively monitoring the system should be advised prior to stopping the service as they will not receive
any events, alarms or status updates while the service is offline. Stopping the Event Service has no impact on
the monitoring station reporting services already running on the controller, such as Contact ID or ArmorIP.
These continue to report offsite as long as their phone line or network connection remains intact.
The controller stores up to the last 50,000 events that occur offline and transmits them back to the Event Server
when connection is restored.
The Event Service uses a default incoming port of 22000.

142 Module 129: ProtegeGX Software Introduction | The ProtegeGX Services


ProtegeGX Client Communication
The ProtegeGX Client communicates with the Data Service using the Windows Communication Foundation
(WCF) default TCP port of 808, or HTTP port of 8000.
This can be set at the time of installation, but should only be changed if there is another program already
installed on the server which is also utilizing WCF communications on the default port.

TCP 808

HTTP 8000

Data Service
Client(s)

Level One: ProtegeGX Installer Study Guide | February 2018 143


ProtegeGX User Interface
The ProtegeGX user interface (or ProtegeGX web client) is used by operators to:
 program the configuration database
 receive live events and alarms from the server
 receive video from DVR/NVR systems
 send control commands to devices, such as opening doors remotely or controlling cameras
 run reports
Programming changes made using the web client are entered into the ProtegeGX database by the Data
Service. The Download Service then pushes these changes out to the applicable controllers on the next
download cycle.
The ProtegeGX interface is divided into five main areas:
1. Main menu
2. Toolbar
3. Record list
4. Programming window
5. Status bar

Main Menu
The Main Menu provides complete access to all program functions and is designed to help find commands by
organizing them in logical groups.
 Global: Settings that apply to the entire system, such as server and database configuration, operators and
roles, and system-wide display options
 Sites: Items applicable across a site, such as schedules and holidays, controllers, and other site-wide
configuration
 Users: Functions related directly to users, such as user configuration, access levels and card templates
 Events: Functions used to create event filters, define alarms and configure how events and alarms are
handled
 Reports: Takes events and turns them into something useful for operators, such as event reports and user
reports
 Monitoring: Configuration of the items used to monitor the system, including status pages, floor plans and
cameras
 Programming: Functions for configuring items at the edge of the system, such as doors, inputs and
outputs, areas, and elevators
 Groups: Functions for creating and editing groups
 Expanders: Settings for configuring the physical hardware connected to a system
 Automation: Functions relating to automation and intelligent control
 About: Version information, licensing and online help

144 Module 129: ProtegeGX Software Introduction | ProtegeGX User Interface


Toolbar
Each tool on the toolbar retains the same functionality throughout the software.
 Add a new record and Save it to the database. Any changes are sent by the Download Server to the
controller(s) on the next download cycle
 Find: Searches for a particular record within the selected programming menu
 Refresh: Refreshes the record list by reloading the records from the database
 Export: Exports records from the system to be used elsewhere
 Copy: Copies the configuration from another record to the selected record (use to clone)
 Delete: Removes the selected record(s) from the database
 Site: Allows the operator to switch easily between multiple sites
 Controller: Allows the operator to select another controller
 Programming Mode: Visible only in Doors programming, select from a Local inputs/outputs record list, or a
list of system-generated Global records
 Breakout Button: This button (far right of toolbar) opens the current page in another window

Find
Use the Find button to search for a particular record(s).
1. Select the Field to search in, enter the text string (Label) to look for, and click OK. The record list is then
filtered to display only the records that match the text entered.
2. The Find tool can also be used to filter records of a specific type. For example, to find all inputs in a
particular area, select Area from the Field options.
3. From the records shown, choose the required area(s), and click OK.
The record list is filtered to display only the inputs from the selected area.
The Find tool works on records currently displayed. This means that if you filter records using the Find tool, then
run the Find a second time, the action is only performed on the results from the first Find action. To perform a
new search, click the Refresh button to first reset the list.

Refresh
Clicking the Refresh button reloads the records displayed in the record list. Use the Refresh button to clear the
filtered results when using the Find tool, or to update data when another operator has made changes to the
same record.

Level One: ProtegeGX Installer Study Guide | February 2018 145


Export
The Export tool allows the exporting of data for use elsewhere, such as a list of doors to include in a routine
maintenance checksheet, or a list of users to email.
1. Select the Export Type. If no records are selected, this is set to All Records and the entire record list is
exported. If specific records are selected, the Export Type is set to Selected Records and only those items
are exported.
2. Choose the Destination. Use Clipboard if you intend to paste the results into an email or document, or File if
you wish to create a CSV file for use in an Excel spreadsheet or similar.
3. Select the columns you wish to export and click OK. To export everything, select one column then use
CTRL+A to select the rest.

Copy
The Copy tool takes the configuration values from one record and copies them to another. This can be used to
clone the configuration of an existing item.
1. Select the item you wish to copy the configuration values to and click Copy.
2. Choose the existing item to copy data from and click OK.
The settings are updated to match those of the existing record.

Breakout Button
Use the Breakout button to open the current page in another window. You can then navigate to a different page
in the primary window. This is particularly useful when you have two monitors.

Record List
The record list is the panel on the left of the screen and is used to display a list of records within the current
database. For example, when programming inputs, the record list displays a list of all inputs currently
programmed.

Record List Columns


The record list can be sorted, resized and reordered to suit.
 Sort the record list by clicking on a column header. For example, to sort alphabetically by record name,
click the Name column. Click the column header again to sort in reverse order.
 Resize columns by hovering your mouse over the edge of the column header until it forms a double-headed
arrow, then drag the column to the required size. Alternatively, double-click between the column headers to
automatically resize the column to its optimum width.
 Reorder columns by dragging and dropping a column header to a new position in the list.
To quickly see the differences between records, click and hold on a record, then drag up or down the record
list. As your mouse moves over a new record, the details are updated in the programming window.

146 Module 129: ProtegeGX Software Introduction | ProtegeGX User Interface


Selecting Multiple Records
Use the standard Windows shortcuts for selecting multiple records at once. This is useful for deleting or
exporting a large number of records, or for configuring multiple records with the same settings.
 To select a group of consecutive records, click the first record, then hold down SHIFT and click the last
record
 To select a group of non-consecutive records, click the first record, then hold down CTRL and click
additional records
 Press CTRL + A to select all records at once
 Use a combination of these methods to speed up your selection process. For example, use CTRL + A to
select all records, then hold the CTRL key and click on the records you don't want.
Once a group of records is selected, you can perform a group operation such as assigning an area and input
type to a group of inputs.

Programming Window
The programming window is where the system configuration is programmed. Selecting a record from the record
list populates the programming window with the configuration details for that record.
 The tabs in the programming window group similar configuration fields together. The General tab contains
the record name and most commonly configured items
 The up and down arrows collapse/expand groups
 The ellipsis button opens a second window for configuring a related record

Viewing History
The History tab contains a list of every modification to a record, including the date and time, and who made the
modification.
Click the Details button to show the fields that have been modified, and the old/new values. This provides a full
audit trail so previous settings can easily be restored if a programming error is made.

Viewing Usage
The Usage tab shows other records that rely on the record currently displayed.

Viewing Events
The Events tab provides an easy way to find information on a record.
 Click Load Events to display all events for the current record
 Click Run as Report to generate a report of these events that can be printed, exported in multiple formats,
or emailed directly from the application
 Use Copy to Clipboard to paste events into an email or other document

Level One: ProtegeGX Installer Study Guide | February 2018 147


Global Settings
Global settings apply to the entire Protege system, including all sites and all controllers. They define such things
as the user name format, how long event records are stored, and backup settings. They also define email,
display, and sound settings, which are covered in a later module.

Setting the Display Name Format of Users


The User Display Name Auto Format property allows you to automatically populate the Name field of a user,
based on information entered in the First Name and Last Name fields. This name is used throughout the system
to identify the user - in event logs, reports, at keypads, etc. Choose from:
 Short Format: first character of the first name and the full last name (e.g. J Smith)
 Long Format: full first and last names (e.g. John Jacob Smith)

Event Database Capacity


The maximum capacity of your event database varies according to the version of SQL Server you use.
 SQL Server Express 2012 (the version included in the ProtegeGX setup package) has a database limit of
10GB
 SQL Server Express 2008 R2 also has a database limit of 10GB
 The full Standard or Enterprise editions of SQL Server have no such size limitation, however, in reality, you
will still have limitations based on the physical storage capacity of your server and your ability to manage
and back up/restore the database

Deleting Events from the Event Database


If your Event database reaches capacity, you will have problems. To help control database size, set a frequency
for events to be deleted (or purged) from the database. The frequency will vary according to the size and the
nature of the site but, in most cases, selecting 1 year is sufficient.

The Importance of Backups


Regular backups are vital in ensuring the data protection of a site. Failure to enable backups can result in
irrecoverable data loss. Many companies will already have an automated backup procedure in place, so talk to
the IT department to discuss the options. ProtegeGX provides built-in backup functionality.

Your backup plan should always account for hardware failure, fire, or theft of any computer equipment. This
means it is important to have the backup offsite for the purpose of risk mitigation.

148 Module 129: ProtegeGX Software Introduction | Global Settings


Configuring ProtegeGX Backup Settings
 Ensure the option to Backup Main Database Every Night is enabled.
 Enabling Append Day of Week to Backup File Name means a new file is created for each day and is only
overwritten the following week. If the option is disabled, the backup is overwritten each night with the latest
copy.
 The Backup Path defines where the backup files are created. Use an external drive or network location to
ensure the backup is protected in the event of a disk failure.
 Use Backup Now at any time to perform an instant backup. We recommend doing this before performing
an upgrade to protect against damage caused by an installation failure or database upgrade malfunction.

Level One: ProtegeGX Installer Study Guide | February 2018 149


Review Questions
After a configuration change, how long must you wait before the changes take effect?
 ProtegeGX is a server-based system, so changes take effect immediately
 60 seconds
 The changes won't take effect until you connect to the controller and download to it
 Up to the time set in 'Download Retry Delay' under the Controller Configuration tab
After restoring a database and starting the Data Service, which additional step(s) must be
taken?
 Confirm the configuration is correct.
 Confirm the configuration is correct. Start the Download Service.
 Confirm the configuration is correct. Start the Download Service. Default the controller.
 No additional steps are required as the database would not restore if the configuration was incorrect.
Which service is responsible for incoming messages?
 The Update Service
 The Data Service
 The Download Service
 The Event Service
What does the Details button on the History tab do?
 It shows the date/time and operator that modified the record
 Runs a detailed event report on the record
 It shows the old and new values of fields that were modified
 None of the above
What does the Breakout button do?
 Opens the current page in another window
 Switches to the Alarms page
 Exits the software
 Closes the current window

150 Module 129: ProtegeGX Software Introduction | Review Questions


What is the Refresh button used for?
 To clear the filtered results when using the Find tool
 To update data when a second client window has been used to configure something
 To update data when another operator may have made changes to the same record
 All of the above
What is the Events tab in the Programming window used for?
 To load events for the selected record
 To load events for the selected record and run a report on these events
 To show which fields were modified and their old and new values
 To load events for the selected record, run a report on these events or copy the events to the Windows
Clipboard

What is the maximum capacity of a SQL Server 2005 Express or SQL Server 2008
Express database?
 32 million events
 4GB
 Unlimited
 10GB
What must be done to prevent the Event database reaching capacity?
 Periodically delete some events from SQL
 Purchase a larger hard drive
 Enter a timeframe in the 'Purge Events' field in Global settings
 Create an event filter that limits the number of events saved
Where should your database backup be stored?
 Offsite if possible
 In the default location of C:\Program Files\Microsoft SQL
Server\MSSQL10_50.PROTEGEGX\MSSQL\Backup

 On a second internal hard drive


 On a USB thumb drive

Level One: ProtegeGX Installer Study Guide | February 2018 151


Module 131:
Hardware Programming
This module outlines the requirements for programming a controller, configuring a status page to show what is
happening on the system, and steps for troubleshooting hardware connections.

Level One: ProtegeGX Installer Study Guide | February 2018 153


Programming the Controller
Adding a Controller
To add a controller, select Sites | Controllers from the menu and click Add. Select from options:
 Add a controller with default records
 Add an individual controller record
 Add a new controller based on an existing controller. This option effectively clones an existing controller,
including all its records (doors, outputs, etc.)
For this exercise, select the first option.

Use the wizard to add and link all the hardware that may be used. It is much easier to delete unwanted items
than it is to add and link them later.

Acme Hardware Requirements


For our scenario of installing an access control system in the Acme Texas office, the following hardware is
required:
 1 x controller (2 doors)
 1 x 2 door expander
 1 x power supply module (4 Amps)
 1 x tSec Extra reader with keypad, 1 x tSec Extra reader without keypad
 1 x tSec Standard reader with keypad, 3 x tSec Standard readers without keypad
 1 x Touch Sense LCD keypad
 3 x PIRs

154 Module 131: Hardware Programming | Programming the Controller


Adding a Controller with Default Records
Use the wizard to add the following records:
 1 x controller
 8 x inputs
 1 x keypad
 2 x reader expanders
 The controller has two onboard reader ports but must register as a reader expander to use this
functionality. This means one reader expander is required for the controller and one for the 2 door
expander.
 1 power supply module
The number of doors adjusts based on the options selected.
1. Accept the defaults for the remaining options, then click Add Now to create the records.
2. Add the Serial Number and IP Address of the controller, as configured earlier.
3. Set the Download Server, then click Save.
The controller should come online within a few seconds. If not, proceed to Troubleshooting.

Setting the Controller Date/Time


By default, the date/time is set to the current time on the PC. Right-click the controller to adjust the date/time,
then click Set Controller Date Time to save changes. This can be useful for testing the system, as any date and
time can be entered.

Viewing Health Status


The Get Health Status option provides details of the overall status of the system and is useful for identifying
problem areas that need to be addressed.
To view the Health Status, right-click on the controller and choose Get Health Status. The Controller Health
Status window appears, indicating any problems the controller has with its current configuration.
 Controller restarts
 Whether encryption is disabled
 Modules that require an update
 Modules that are offline
 Services that have been programmed but not started
 Programmable functions that have been programmed but not started
 Inputs that have been assigned to an area but not assigned a type
 Items that cannot fit in the controller database
The Health Status is generated by the controller as follows: The Download server sends configuration data to
the controller, the controller checks the new configuration, and ny problems are reported back to the Data
server via the Event server.

Note that a Health Status problem does not necessarily show up immediately after programming.

Level One: ProtegeGX Installer Study Guide | February 2018 155


 The Health Status also shows up issues related to compatibility. For example, if you are using a PCB
controller and attempt to use a feature unique to the DIN controller (such as adding a single door to an
access level, or programing more than 5000 users), the controller reports this back as a Health Status
issue.
 The total number of Health Status items is shown on the status bar. It doesn't update immediately as it
looks across every controller on the system and is only checked periodically. It is designed as a diagnostic
tool and as a last-minute check of the system health before a technician leaves site.

Enabling the Onboard Reader Expander


The reader expanders are currently showing as offline.
By default, the controller does not have its onboard reader expander addressed. To address the controller
onboard reader expander, select the Configuration tab of the controller and set the following two options:
 Register as Reader Expander
 Onboard Reader Lock Outputs
Instruct the controller to set the address of its onboard reader expander to 1. The onboard reader lock
outputs are mapped to outputs 3 and 4 by default.

Downloading Programming Changes


These programming changes need to be downloaded to the controller. The Download Server will discover the
changes next time it checks, which may not be for another 60 seconds. To tell the Download server to check
more often, set the Download Retry Delay in the Configuration tab of the controller (to 1 second, for example).
This tells the Download server to check the controller's configuration every second. The time frequency can be
reduced during initial programming and reset when finished. We can also force the Download server to
download the configuration at any time by right-clicking the controller and selecting Force Download.

Note: The Download service must be restarted before this change will take effect.

Addressing Modules
Right-click the controller and select Auto Address. The Auto-addressing window requests a list of expanders
that are (or have been) connected to the controller. All expanders that have reported to the controller since the
last controller module update or power cycle are listed here.
For each module, the following are listed: the module type, serial number, current firmware version, whether the
module address can be changed by auto-addressing, whether the module is registered with the controller, and
whether the module is currently online.
If the module is from the DIN rail range, use the Auto-addressing function to address it. By default, modules are
shipped from ICT with an address of 254. This is outside the range that the controller will accept, and must
therefore be set by the installer.
Note that the controller and one of the reader expanders are showing the same serial number. This is because
the controller has now been configured to register as Reader Expander 1. Set the address of the reader
expander to 2, and the power supply module (Analog Expander) to 1.
The addresses are shown in red because they have not been updated. Do this by either clicking the Update
button beside each module, or clicking the Update All button. Wait for the modules to come back online, then
click Refresh. Your addresses should now be set.

156 Module 131: Hardware Programming | Programming the Controller


Module Update
If you check the Health Status now, everything should be online.
Encryption will be addressed next. The other messages relate to items requiring module updates. This can be
resolved by right-clicking the controller and selecting Update Modules. This updates all modules connected to
the controller.

A module update is required whenever a programming change is made that requires the hardware to function in
a different manner. The controller advises when this is required by generating a Health Status message.

Enabling Encryption
To enable encryption, click the Configuration tab of the controller and select Initialize Controller Encryption.
The server negotiates a new 256 bit AES encryption key with the controller and, once both are agreed,
encryption is enabled for all messages sent between the controller and the ProtegeGX software. The encryption
key is exchanged using an RSA algorithm, and is stored in both the controller and the ProtegeGX database.

Disabling Encryption
To disable encryption, select Disable Controller Encryption.
This disables encryption at the server end only. The result is that the controller will now ignore all messages
from the server as they are not encrypted. Similarly, the server will not understand any messages sent back
from the controller as they are encrypted with a key the server no longer understands.
To disable encryption on the controller, it must be defaulted. This is a security feature and ensures that the only
way to remove encryption is physically onsite.

Firmware Updates
Always check to ensure you are running the latest software and firmware versions. If the controller is running
older firmware, update it by right-clicking on the controller and clicking Update Firmware. Enter the file name or
click the [...] button to browse to the new firmware file. Select multiple controllers to update, if required. The
software updates them sequentially, and reports the results when complete.

The Protege Controller has enough storage space and CPU power that it can download the new firmware while
continuing to run the system. When the firmware has been downloaded and the integrity verified, the controller
does a quick restart and boots up with the new firmware running.

Level One: ProtegeGX Installer Study Guide | February 2018 157


Status Pages
Now that the hardware is up and running, the best way to see what is happening in the system is via a status
page. Status pages are usually designed by the integrator and are a quick and efficient way of getting an
overview of the Protege system in one place. They are used to display information not just from the Protege
system, but from external systems such as DVRs/NVRs, websites and documents.

Creating a Technician Status Page


Open the Status Page Editor (Monitoring | Setup | Status Page Editor), name the page (e.g. 'Technician'), then
scroll down to select your desired layout (for this exercise, select a 3 x 3 grid). Click OK.
This creates an empty page with a preset layout. The layout can be changed later, so consider this as just a
starting point.

Adding Content to a Status Page


With the layout set up, add content to each of the panels. In the bottom-left panel, set the Type to Event
Windows and the Record to All Events record. Click Save. This adds the event window to the bottom panel of
the status page, displaying a live view of events as they occur.

Status Lists
The next option to look at is status lists. A status list is a list of system items (usually created by the integrator),
providing a real-time display of the defined devices. A status list can contain any number of items, and items of
different types (such as inputs and outputs). Right-clicking a device from a status list opens a menu enabling
manual control of the device (for example, right-clicking a door to lock/unlock, or show a live camera view).

Creating Status Lists


1. Navigate to Monitoring | Setup | Status Lists and change the name of the default status list to All Doors and
Areas.
2. Click Add to open the Select Devices window, set the Device Type to Door and select the controller. (To
quickly select all devices, click an item and press CTRL+A, then check any of the boxes to select them all.)
3. Click OK, then Save.
4. Add a new status list by clicking the Add button on the main toolbar. Name it 'All Inputs'.
5. Change the Device Type to Input, select the controller, then choose all the inputs.
6. Repeat to create status lists for All Outputs and All Trouble Inputs.
You should now have four status lists.

158 Module 131: Hardware Programming | Status Pages


Editing a Status Page
1. Return to the Status Page Editor (Monitoring | Setup | Status Page Editor). Click Cancel to exit the wizard,
then choose the Technician page from the dropdown menu.
2. Set the Columns to 4. In each of the top panels, set the Type to Status List and choose a different list for
each.
3. Set the Rows to 2 in the far-right panel.
4. Adjust the Event Window so it spans all four columns. Save changes.

View the Finished Status Page


1. Navigate to Monitoring | Status Page View and select the Technician page.
2. Click the Breakout button to open the status page in a secondary window, and continue programming in
the main window.

For the rest of this course it is assumed that the status page is displayed in another window.

Level One: ProtegeGX Installer Study Guide | February 2018 159


Troubleshooting Hardware
If the controller is not coming online, follow some basic troubleshooting steps.

Controller Connectivity
The first step is to establish what is between the server and controller. How you go about troubleshooting
depends on whether the controller and server are on the same sub network or not.

Simple Networks
If the server and controller are on the same sub network, troubleshooting the network path is somewhat easier.

Switch

Controller Server
192.168.10.100 192.168.10.201
Devices on the same sub network have only switches or hubs connecting them. This means the server and
controller should be able to communicate directly if they are both physically connected to the network.

Complex Networks
If your network has routers between the controller and server, troubleshooting can be more difficult.

Server

Router Router
Controller 203.86.25.12 203.96.14.26 Server
10.10.1.100 10.12.1.201

Troubleshooting networks such as these is beyond the scope of this course.

Requirements
For the server and controller to communicate, the following are required:
1. The server must have the correct IP address of the controller.
2. The controller must be contactable on ports 21000 and 21001.
3. The controller must have the Event Server IP address set correctly.
4. The Event Server must be contactable on port 22000.
5. The server must have the correct controller serial number to properly identify incoming messages from it.
6. Encryption must either be disabled at both ends or enabled at both ends with the correct encryption key.

160 Module 131: Hardware Programming | Troubleshooting Hardware


Confirm Controller IP Address
For the server to contact the controller, it must have the correct IP address programmed and be able to reach
the address.
Under the controller General tab, highlight and copy (CTRL + C) the IP address, and paste (CTRL + V) it into the
address bar of a web browser on the server. If the controller is reachable, you should be presented with a login
screen.
If you are unable to web browse to the controller, it is likely you have a network problem. If this is the case, skip
to the network troubleshooting section. Otherwise log in to the controller using the default admin login of admin
for a DIN controller. or 000000 for a PCB controller.

Confirm Controller Serial Number


Incoming messages from the controller to the server are identified by the controller serial number. Highlight and
copy the serial number from the controller web page and paste into the Serial Number field in the controller
configuration.

Event Server
To confirm the Event server is functioning and listening on the correct port for incoming events, open the Event
server diagnostic window.
1. Navigate to Sites | Controllers and expand the Diagnostic Windows group.
2. Select Open Event Server Diagnostic Window to confirm the server is listening on the correct port. The
default Event server port is 22000.
Confirm the Event server port is correctly set at the controller (for the DIN controller this is done via web
interface; for PCB controller via Telnet). If the Event server diagnostic window shows messages about an
unknown serial number, events are being received from a controller with the serial number listed. This also
means the Event server is accepting incoming events.
If the Event server diagnostic window contains no text, there is a problem with the configuration of the Event
server. This means the Event server is not accepting incoming events.

Check Computer Name


On the server, open Control Panel | All Control Panel Items | System. Copy the Computer Name, then, in
ProtegeGX, navigate to Global | Event Server and ensure the Computer Name matches the server PC Name.
This usually only changes when you have restored a database from a different PC.
If the name doesn't match, change it. Remember to update the name of the Download server (Global |
Download Server).

Level One: ProtegeGX Installer Study Guide | February 2018 161


Confirm Event Server IP Address
For messages to get from the controller to the server, the Event server IP address must be programmed
correctly.
1. Open a command prompt at the server and type ipconfig, then press [Enter]. If the server has more than
one IP address, select the one on the same sub-network as the controller, in this case, 192.168.10.100.
The Event server will accept events on any IP network interface provided the appropriate port is open
(22000 by default).
2. Now check the Event server IP address is set correctly at the controller. This is configured in the web
interface for the DIN controller or via Telnet for the PCB controller.
Enter the Event server IP address as Event Server 1. If the controller has multiple paths to the server, enter
these as Event Server 2 and Event Server 3. In most cases, the second and third Event server IP addresses
should be left as all zeros, or all 255s.

Windows Firewall
When the controller and server are on the same local network the only place a firewall can be blocking
messages is on the server PC itself. This is called the Windows Firewall.
Server

Switch
Firewall (Events on
Download Controller
port 22000)
Server

Event
Server

1. Open the Windows firewall settings at Control Panel | All Control Panel Items | Windows Firewall. If the
firewall is on, it is shown in green.
2. To eliminate the Windows firewall as a cause of communication problems, turn it off temporarily by clicking
the Turn Windows Firewall on or off link at the left of the screen. Then turn off the firewall for each of the
network locations.
3. If this fixes the issue, you may choose to leave the firewall off. Alternatively, allow the services through the
firewall by clicking the Allow an app through Windows Firewall link. Select Allow another app... to add the
program as an exception.
4. Click Browse, then navigate to the ProtegeGX installation directory. By default, this is C:\Program Files
(x86)\Integrated Control Technology\ProtegeGX.
5. Add the following executables, one by one:
6. GXSV.exe
7. GXSV2.exe
8. GXSV3.exe
9. GXEvtSvr.exe

162 Module 131: Hardware Programming | Troubleshooting Hardware


10. GXDVR1.exe
11. GXDVR2.exe
This allows access through the Windows firewall to all ProtegeGX services.

Multiple Firewalls
On corporate networks there can be multiple firewalls. To ensure these are configured correctly, pass the
ProtegeGX Network Administrators Guide to the appropriate IT staff member. This document is included in the
software installation pack.
Server
Status, control + downloads
on ports 21000 + 21001

Download Firewall Firewall


Events on
Server Controller
port 22000

Event
Server

Encryption
Encryption relies on a shared key that both the sender and receiver of a message know. The message is
encrypted using the key, then decrypted by the receiver using the same key. If the message is intercepted, it will
make no sense to anyone without the encryption key.
LAN

Server Lorem ipsum dolor


sit amet,
Lorem ipsum dolor
sit amet,
Controller
consectetur consectetur
adipiscing elit. adipiscing elit.
Phasellus egestas Phasellus egestas
arcu non nibh arcu non nibh
volutpat volutpat
scelerisque. Morbi scelerisque. Morbi
urna tortor, urna tortor,
finibus eget dui finibus eget dui
ac, feugiat ac, feugiat

Message Encrypted Encrypted Data Message Decrypted

If for some reason the receiver loses the key, it is unable to decrypt incoming messages. In this case, the
message is rejected.
LAN

Server Lorem ipsum dolor


sit amet,
consectetur
Controller
adipiscing elit.
Phasellus egestas
arcu non nibh
volutpat
scelerisque. Morbi
urna tortor,
finibus eget dui
ac, feugiat

Message Encrypted Encrypted Data Message Rejected

Level One: ProtegeGX Installer Study Guide | February 2018 163


If the sender loses the key, the message is sent in plain text. The receiver, expecting to receive encrypted
events, will also reject the message as it may be of a malicious nature.
LAN

Server Lorem ipsum dolor


sit amet,
consectetur
Lorem ipsum dolor
sit amet,
consectetur
Controller
adipiscing elit. adipiscing elit.
Phasellus egestas Phasellus egestas
arcu non nibh arcu non nibh
volutpat volutpat
scelerisque. Morbi scelerisque. Morbi
urna tortor, urna tortor,
finibus eget dui finibus eget dui
ac, feugiat ac, feugiat

Message Sent as Message Rejected


Plain Text

If the sender and receiver have different keys, the message can still not be decrypted by the receiver. This also
results in the receiver rejecting incoming messages.
LAN

Server Lorem ipsum dolor


sit amet,
consectetur
Controller
adipiscing elit.
Phasellus egestas
arcu non nibh
volutpat
scelerisque. Morbi
urna tortor,
finibus eget dui
ac, feugiat

Message Encrypted Encrypted Data Message Rejected

Each time encryption is enabled at the server, a new encryption key is generated. Each controller has a unique
key, independent from all other controllers. If encryption for a controller is disabled then enabled again, the key
is changed. If encryption for a controller is disabled at the server, the controller must be defaulted. It is not
possible to re-enable encryption without first defaulting the controller.
If encryption is disabled at both the sender and receiver, received messages are accepted. The downside with
this scenario is that anyone 'listening' between the sender and receiver can also receive the messages.
LAN

Server Lorem ipsum dolor


sit amet,
Lorem ipsum dolor
sit amet,
Controller
consectetur consectetur
adipiscing elit. adipiscing elit.
Phasellus egestas Phasellus egestas
arcu non nibh arcu non nibh
volutpat volutpat
scelerisque. Morbi scelerisque. Morbi
urna tortor, urna tortor,
finibus eget dui finibus eget dui
ac, feugiat ac, feugiat

Message Sent as Message Received


Plain Text as Plain Text

164 Module 131: Hardware Programming | Troubleshooting Hardware


Encryption Summary
 The server issues a different key each time it negotiates encryption with a controller
 Encryption can be enabled for one controller and disabled for another
 If both server and controller have encryption disabled, communications are possible
 If both server and controller have encryption enabled and the keys match, communications are possible
 If the server has encryption enabled but the controller does not, communications are not possible
 If the server does not have encryption enabled but the controller does, communications are not possible
 If the server and controller both have encryption enabled but the keys do not match, communications are
not possible

Disabling Encryption
Defaulting the controller is the only way to remove the encryption key. This is by design and intended as a
security feature. It means that physical access to the controller must be gained before encryption can be
disabled. If the controller is defaulted, encryption must be disabled at the server before communications can be
established. This is done under the controller's Configuration tab.
The software warns you prior to disabling encryption. Once this happens, the controller must be defaulted to
clear the encryption key.

If unsure of the state of encryption of either the server or controller, disable it at the server then default the
controller. This ensures neither is encrypted and rules this out as a cause of communications problems.
Encryption should then be enabled once communications are established.

Duplicate IP Address or Serial Number


Although the software warns you, it is possible to save two controllers with the same IP or serial number. In this
case, the controller created first takes priority. Confirm you haven't created a controller with a duplicate IP
address or serial number. Check all sites. If you have created a site for templates, these should be left with zero
IP addresses and serial numbers.

If you have two controllers with the same IP address or serial number anywhere on your server, there will be
communication problems with at least one of them.

Confirm Ports
Ensure the ports set on the controller match those configured at the server. The Event server port is set under
Global | Event Server. This is the only place it is configured. The Download and Control ports are set for each
controller under the General tab. Compare these with what is set at the controller. Use the web interface for the
DIN controller, or telnet for the PCB controller.

If you have changed any settings on the controller, save your changes and restart the controller for the changes
to take effect.

To confirm a network path exists from the server to the controller and the correct ports are open, telnet to the
controller on port 21000 (for example: Telnet 192.168.1.2 21000). If the controller can accept the connection, a
clear screen appears with a cursor blinking in the top left corner.
If there is no connection, a message will advise there is still a problem between the server and controller. If you
can web browse to the controller, it is likely a firewall is blocking the connection somewhere.

Level One: ProtegeGX Installer Study Guide | February 2018 165


Finally, to confirm the Event server is able to accept connections, configure a laptop with the same IP settings
as the controller. Remove the Ethernet plug from the controller and plug into your laptop. Try to telnet to the
server IP address on the Event server port (22000 by default): Telnet 192.168.1.100 22000.
If the server is able to accept connections, the clear screen and blinking cursor appear.
If the server is not reachable, a similar message to that shown above is displayed, indicating a firewall is blocking
port 22000 to the server.

ICT Technical Support


If all the above options have been exhausted, contact ICT Technical Support. Ensure the results of all tests are
at hand. If it is possible to get internet access on the server, a remote support session can be initiated.

166 Module 131: Hardware Programming | Troubleshooting Hardware


Review Questions
A module update is required when...
 You change any settings on the expander
 You change any programming
 The controller advises it is required via the Health Status
 All of the above
What does the Controller wizard do?
 Adds a controller
 Adds expanders, inputs, outputs, trouble inputs
 Links all of the associated records
 All of the above
What steps are required to use the controller onboard reader ports?
 None. Door processing is enabled by default
 Assign a reader expander address in the controller Configuration tab and select the lock outputs to use
 Assign a controller address in the reader expander Configuration tab and select the lock outputs to use
 Turn on DIP switch 4
What does it mean if an address is shown in red in the Auto Addressing window?
 The address has been changed but not updated
 The address can't be changed using auto-addressing
 The address is outside the controller's address space
 The address is at factory default of 254
Which of the following will generate a controller Health Status message?
 A low battery on a power supply
 Failure to communicate
 When encryption is disabled
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 167


If controller encryption is accidentally disabled, which additional step must be carried out to
get the controller back online?
 The controller must be defaulted to clear the encryption key
 Controller encryption should be enabled again
 Controller encryption should be initialized again
 Nothing. If encryption is disabled at the server, the controller will continue to communicate
Answer the following...
On a site where encryption between the controller and server is normally enabled, a controller is defaulted. The
controller does not come back online.
Which additional step must be carried out to get the controller back online?

 Encryption must be disabled for the site


 Encryption must be re-initialized on the controller
 Encryption must be disabled for the controller
 A force download is required to push the existing encryption key out to the controller
What is the correct Event server IP address?
Assuming the screenshot below is from the ProtegeGX Server, what should a controller with the IP address
192.168.10.2 have set as its Event server IP address?

 192.168.10.1
 192.168.10.100
 192.168.1.1
 192.168.1.100

168 Module 131: Hardware Programming | Review Questions


Module 132:
User Management
This module takes you through creating users and access levels, and using schedules to control how and when
users gain access.

Level One: ProtegeGX Installer Study Guide | February 2018 169


Users
A user is a person who requires access to a facility controlled by the access control system. The user identifies
themselves to the system using a credential such as an access card, PIN, or biometric profile. Once users area
user added to the system, they can be assigned access to doors, areas, elevator floors and menu groups via
Access Levels.

Training Exercise
The following programming modules guide you through setting up a basic system. Follow the instructions to
create an Acme Engineering site.

Access Levels
Access levels control what users can do, where they can go, and when. They determine the doors, areas,
elevator floors and menu groups a user has access to. The tidiest way to define this access is by using groups.

Creating an Access Level


The first step is to create a new access level for installers with full access to the system.
Navigate to Users | Access Levels and click Add. Enter a name for the access level (for example, 'Installers'),
and click Save.

Door Groups
Doors and Door Groups define which doors a user has access to. By default, ProtegeGX has a door group
called All Doors which allows access to all doors, all the time. When a new door is created it is automatically
assigned to the All Doors group.

Adding a Door Group to an Access Level


1. Select the Door Groups tab and click Add.
2. In the Door Groups window, select the All Doors group and click OK.

Menu Groups
Menu groups control access to keypads. They define what a user can do at a keypad, but not which areas the
user has access to. When we used the Add Controller wizard for the new controller, we created a menu group.
This menu group provides access to all keypad menus. Menu groups must be created for each controller.

Adding a Menu Group to an Access Level


1. Select the Menu Groups tab and click Add.
2. Select the desired menu group and click OK.

170 Module 132: User Management | Users


Arming and Disarming Area Groups
Arming Area Groups and Disarming Area Groups control which areas a user is allowed to arm/disarm.
ProtegeGX has a default area group called All Areas. This allows access to all areas, all the time. When a new
area is created, it is automatically assigned to the All Areas group.
If an access level contains an area group in the Disarming Area Groups tab, it will also allow arming of that area
group. It is assumed that a user who is allowed to disarm an area should also be allowed to arm that area.

Adding a Disarming Area Group to an Access Level


1. Select the Disarming Area Groups tab and click Add.
2. Select the All Areas group and click OK. Click Save to finish creating the access level.

Creating a User
1. Navigate to Users | Users and click Add.
2. Enter a First Name and Last Name for the user. As Global options is set to long format, the name is
populated automatically.
3. Enter a PIN or select the [4] [5] or [6] button to automatically generate a random PIN number of 4, 5 or 6
digits. We'll set the PIN to 000000 to make it easy to remember. This should be changed once we have
finished programming the site.

Adding Cards
Each user can have up to eight cards in ProtegeGX. Cards are entered manually by typing the facility code/card
number into an available field.
There are alternative methods of adding cards which we will look at a little later.

User Expiry
Users can be set to expire by checking the Start and/or End options and setting a date and time. This allows for
cards to be issued and sent out prior to access being enabled, or for stopping a user's access on a certain
date.

Adding an Access Level to a User


1. Select the Access Levels tab and click Add.
2. Select the Installers access level and click OK.
3. Click Save to finish configuring the new user.
Users can have multiple access levels.

Level One: ProtegeGX Installer Study Guide | February 2018 171


Batch Adding Users
The Batch Add Users feature enables you to automatically create a number of user records with an assigned
facility and range of card numbers. Use this feature when you have a large number of cards to add to the
system.
1. Navigate to Sites | Batch Add Users.
2. Enter the Facility Number, the Card Number range (first and last card number to be entered), and the
Access Level to be assigned to the users. Click OK.
The user records are created, ready to enter names and additional user details to.

Deleting Users
It is easy to delete user records that are no longer required. Simply select the record(s) to be deleted and click
Delete. Use multi-select to delete multiple users in one action. Select the first user, hold down the CTRL key to
select specific records or the SHIFT key to select a block of users, then click Delete.
Now delete all the users we created using the Batch Add Users function:
1. To select the entire list of users, click on any user, then press CTRL + A.
2. To deselect the Installer record, hold down the CTRL key and click once on the first user. All other users
(apart from the Installer) should be selected. Click the Delete button on the main toolbar. This should leave
only the Installer user.

Importing Users from a CSV File


It is not unusual to need to load hundreds of users into a system. Entering the data manually is tedious,
time-consuming, and prone to human error. Many organizations have an existing form of data source, such as
an HR system or student enrolment database, which contains all user information. Most systems enable the
easy export of data as a CSV file, or even an Excel spreadsheet.
The Import Users wizard enables user data to be transfered into ProtegeGX, mapping it to the corresponding
fields in ProtegeGX.
1. Navigate to Sites | Import Users to launch the Import Users wizard. Browse to and select the CSV file you
wish to import the users from, then click Next.

For our Acme training system, use the CSV file provided on your USB training card.

2. Select the line to start importing data from. If the CSV file contains a header row, start the import at line 2 so
the header row is not imported.
3. Select the Text Delimiter to use, then click Next.
4. Select a column in the panel on the left, then click the associated field on the right that the data should be
mapped to.
5. Repeat for the remaining columns, selecting Skip to ignore a column. This allows you to import from a CSV
file without having to edit the file first. The data in the top panel is updated as you make your selections,
enabling a preview of how fields are imported.
6. For our Acme training system, map the columns as follows:
 Column 1 = First Name
 Column 2 = Last Name
 Column 3 = Skip (we'll use the Auto Format function instead)
 Column 4 = PIN Number

172 Module 132: User Management | Users


 Column 5 = Facility Number
 Column 6 = Card Number
 Column 7 = Access Level
7. Set the User Display Name option to Long Format. Click Next to continue.
8. If you have not mapped a Facility Number, First Card Number, or Access Level, assign these now. You can
also generate PIN numbers automatically if these have not been mapped. Click Next to continue.
9. Click Finish to start the import process. If the imported users are not displayed, navigate away from the
Users page, then back again.
10. Navigate to Users | Access Levels. The Import function has created all the access levels from the CSV file.
These still need configuring, but time has been saved in creating, naming and assigning them to users.

During the CSV import, access levels that don't already exist will be created, with any existing access levels
remaining intact.

Level One: ProtegeGX Installer Study Guide | February 2018 173


Schedules
Schedules are definitions of timeframes. They can be programmed to:
 have multiple start and stop times
 work on some days, but not others
 span multiple days
 operate differently on holidays
 be qualified by an output state

Uses
Schedules are used to:
 control when a user can gain access to things
 unlock doors automatically
 arm or disarm areas at certain times or days
 turn things on and off at particular times or days
 change how things behave at certain times or days

States
Once a schedule is programmed and active, it will always be in one of two states: valid or invalid. When a
schedule becomes valid, items that are programmed to depend on that schedule will become active. For
instance:
 an access level will only grant access when its operating schedule is valid
 a door will unlock when its unlock schedule becomes valid
 an output will turn on when its activation schedule becomes valid

Validation
When a user tries to gain access to an area, the schedule is checked at that time.
 If the schedule is valid, access is granted
 If the schedule is invalid, access is denied

174 Module 132: User Management | Schedules


Edge Triggering
If something is programmed to change when a schedule changes, it is edge triggered. This means it is
checked and changed only when the schedule changes state.

Edge trigger Edge trigger


ON for valid for invalid

OFF

0:00 06:00 12:00 18:00 0:00

Edge triggering for a schedule programmed with a start time of 06:00 and an end time of 18:00

If a door is programmed to unlock by a schedule, it unlocks only at the point the schedule becomes valid. If at
10am you assign the above schedule to a door's unlock schedule, that door will not unlock until 6:00am the
following morning. This is because the edge trigger that unlocks the door only occurs when the schedule
changes from invalid to valid.

Creating Your First Schedule


Create a schedule for Office Hours, valid 9am-5pm, Monday-Friday.
1. Navigate to Sites | Schedules, click Add and enter a name for the schedule.
2. Check the Monday-Friday boxes for Period 1.
Note how the Graphics View below updates to show green bars for the days and times the schedule is
valid.
3. For Period 1 double-click in the Start Time box and enter 09:00. Note the Graphics View updates
immediately. Try using the up and down keys to observe how the hours change in response.
4. Enter an End Time of 17:00. Note the effect on the Graphics View.
5. Save the schedule. You should see some operator events appear in the All Events window.
At this point the controller has not yet been made aware of the schedule. The Download server will send this
schedule to the controller only once a device or access level on the controller needs to know about it.

Adding an Unlock Schedule to a Door


1. Navigate to Programming | Doors and select ADM Main Entry Door.
2. Set the Unlock Schedule to the newly-created Office Hours schedule. Once the Download server has
pushed out the new configuration, you should see this listed in your All Events window.
As the schedule hasn't gone through a state change, there should not yet be any effect on the state of the
door. Note that DR 1 is locked, and the lock output is off.
3. Navigate to Sites | Controllers, right-click on the controller, and set the controller time to 08:59 on a
weekday.
In the All Events window, you should see the schedule go invalid then, after a minute, go valid. Straight after
this you should hear a relay click and see in the All Events window that the door has been unlocked.
The Status page should now show that DR 1 is unlocked and the lock output is on.

Level One: ProtegeGX Installer Study Guide | February 2018 175


Manually Locking a Door Unlocked by a Schedule
Right-click on DR 1 and select Lock. Note that the door locks and stays locked. The schedule unlocked the
door when it was edge triggered at 9am, but we still have full manual control and can override the unlocking
back to locked.

Always Check Unlock Schedule


1. Navigate to Programming | Doors and select DR 1.
2. Click the Options tab and enable Always Check Unlock Schedule. Click Save and observe what happens.
Once the Download server sends the new configuration to the controller, the door unlocks again.
3. Now try to manually lock the door again. You'll see that the controller almost immediately unlocks the door
again. This is because we have told the controller to always check the schedule state.
4. Clear (disable) the Always Check Unlock Schedule option and save the changes.

Schedule Triggering Summary


 Devices controlled by a schedule are edge triggered by default
 Edge triggering allows full manual control of the devices in-between times
 Edge triggering is processed only at the start and end of a period
 If a device is programmed to follow a schedule, control will not take place until the next 'start' time passes
 If a device is configured to always follow the schedule, the device state will immediately start following the
schedule
 If a device is configured to always follow the schedule, manual control of the device is no longer possible

Holiday Groups
As schedules are commonly used to control access or secure areas, it is a common requirement for a schedule
to behave differently on a holiday. Holidays are defined using Holiday Groups. Create multiple groups to provide
flexibility in how holidays are applied to schedules.

Adding a Holiday Group


1. Navigate to Sites | Holiday Groups, click Add and enter a name for the holiday group, such as 'National
Holidays'.
2. Switch to the Holidays tab, click Add and enter the name Christmas. Enable the Repeat option (since
Christmas occurs on the same day every year).
3. Set the start and finish date to 25 December.

Holidays with Different Dates Each Year


An example of a holiday with a different date each year is Easter. This holiday needs to be programmed for
every occurrence, but can be programmed years in advance by making multiple entries in a group.

176 Module 132: User Management | Schedules


Holidays Spanning Multiple Days
Christmas Day and Boxing Day go hand in hand and can be configured as a single holiday. Set the Start Date
as 25 December (the first day classed as a holiday), and the End Date as 26 December (the last day classed as
a holiday) and name it something like 'Christmas Break'.

Applying a Holiday Group to a Schedule


Once a holiday group (or groups) has been programmed, it can be applied to schedules.
1. Navigate to Sites | Schedules, select the Holiday Groups tab and click Add.
2. Select the group(s) of holidays to apply to this schedule.
This tells the schedule which days are holidays, but not what to do if it is a holiday. For that, a Holiday Mode
must be configured.

Schedules and Holiday Mode


Each period in a schedule can be assigned a different Holiday Mode. Select from:
 Disabled on Holiday: The period will not make the schedule valid on a holiday. In other words, if a door is
programmed to unlock by this schedule, it will not unlock on a holiday if Disabled on Holiday is selected.
This is the default mode of operation for schedules.
 Enabled on Holiday: The period will only ever make the schedule valid on a holiday.
 Ignore Holiday: The period will make the schedule valid regardless of whether the day is a holiday or not.

Default Operation
If you program times and days into a schedule but don't do anything else, the schedule will always operate. For
a holiday to stop a schedule from becoming valid, the following must have been programmed:
 The holiday must be programmed in a holiday group
 That holiday group must be applied to the schedule
 The holiday mode must be programmed as Disabled on Holiday

Multiple Time Spans


Schedules sometimes need to turn on and off more than once, or at different times on different days. There are
eight periods for each schedule to allow for these scenarios.

Different Hours for Weekends


Sometimes premises need to open for shorter hours on a weekend. To set this up, simply add a second period
with shorter hours and select the relevant day.

Level One: ProtegeGX Installer Study Guide | February 2018 177


Shorter Hours on a Holiday
In some installations, especially retail, a schedule must still operate on a holiday but for shorter hours.
Set the Period 1 schedule to be valid 9am-5pm, Monday-Friday, for normal work days. A second holiday
schedule could be made valid for shorter hours (say, 10am-4pm) with the Holiday Mode set to Enabled on
Holiday.

Multiple Periods in a Single Day


Another example is where multiple periods are required in a single day. Consider a movie theater with multiple
session times when doors must be unlocked. Set separate periods as required, for example:
 Period 1: Start Time 09:00, End Time 11:00
 Period 2: Start Time 12:30, End Time 14:30
 Period 3: Start Time 15:00, End Time 17:00
 Period 4: Start Time 18:00, End Time 20:00

Overnight Schedules
Where a schedule is required to operate overnight, enter a start time (e.g. 3pm), but leave the end time as
00:00. This results in the period being valid from 3pm until midnight.
Now program a second period to start at midnight and continue until 3am. The schedule will become valid at
3pm on Monday, and stay valid until 3am the following morning. By extending the days the period is valid, we
create an overnight Monday-Friday shift.
This schedule is now valid from 3pm-3am Monday-Friday.

Overlapping Periods
Where periods overlap, the schedule takes the sum of the periods. Consider the following programming:
 Period 1: Start Time 09:00; End Time 13:00 on Monday and Wednesday
 Period 2: Start Time 12:00; End Time 15:00 on Tuesday and Wednesday
This means that Wednesday has two periods that overlap. The periods are therefore combined to make the
schedule valid from 9am to 3pm on Wednesday.
Because the periods are combined, the edges are at 9am and 3pm - the only times the schedule will change
state.

Qualify Output
Further schedule flexibility comes from the ability to qualify a schedule with the state of an output.
For example, if you enable the Validate Schedule if Qualify Output Off option (under Options tab), the schedule
will only ever become valid if all conditions of the schedule are met AND the output is off.
As an example, consider a schedule programmed to unlock the front door of a retail shop. By configuring the
alarm as the Qualify Output, the front door will unlock at opening time only if the alarm has been unset. If
nobody arrives at work, the door won't unlock.

178 Module 132: User Management | Schedules


Adding the Manager's Schedules
To comply with our system design, we require further schedules. The manager requires access to the building
24/7.
1. Add a new schedule called Manager's Hours.
2. Check each day in Period 1, and set the holiday mode to Ignore Holiday.
This schedule is effectively the same as the built-in schedule Always but provides an easy way to
reconfigure the manager's access at a later date, if requirements change.

Adding the Warehouse Schedules


The Warehouse requires two schedules to cover the two shifts:
1. Add a new schedule called Warehouse Shift 1. Set the schedule to be valid 06:00-14:00, Monday-Friday,
and Disabled on holidays.
2. Add another schedule called Warehouse Shift 2. Set the schedule to be valid 10:00-18:00, Monday-Friday,
and Disabled on holidays.

Level One: ProtegeGX Installer Study Guide | February 2018 179


Review Questions
What are Access Levels used for?
 To control which elevator levels they have access to
 To control what users can do, where they can go and when they can do these things
 To control how a door responds to a user
 To provide a way to rank users
In an Access Level, what are Door Groups used for?
 They define which doors a user has access to
 They allow a number of doors to be unlocked with a single card read
 They are used for scheduling multiple doors to unlock
 They define which area a door belongs to
What happens if the Import Users wizard has an access level mapped that doesn't exist in
the ProtegeGX database?
 The wizard will crash
 The wizard will skip the user
 The wizard will import the user but leave the access level unset
 The wizard will import the user and create a new access level to match
What must you do to ensure a schedule does not operate on a holiday?
 Nothing. By default, the schedule will not operate on a holiday.
 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Disabled on Holiday.

 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Enabled on Holiday.

 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Ignore Holiday.

180 Module 132: User Management | Review Questions


How do you program a schedule to run from 11pm on Monday through to 2am on
Tuesday?
 Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and
check Monday and Tuesday.

 Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and
check Tuesday.

 Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and
check Tuesday.

 Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and
check Monday and Tuesday.

How do you program a schedule to be valid from 9am to 5pm Monday to Friday if the day
is not a holiday?
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Disabled on Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Enabled on Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Ignore Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Program a qualify output for
holidays.

How do you program a schedule to be valid from 9am to 5pm on normal days and 10am to
4pm on holidays?
 Program two periods. Set the holiday mode of the 09:00-17:00 period to Enabled on Holiday and the
10:00-16:00 period to Disabled on Holiday.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to Ignore Holiday and the
10:00-16:00 period to Enabled on Holiday.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to Ignore Holiday and the
10:00-16:00 period to Disabled on Holiday.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to Disabled on Holiday and the
10:00-16:00 period to Enabled on Holiday.

Level One: ProtegeGX Installer Study Guide | February 2018 181


Module 133:
Basic Intruder Detection
Setting up a system for intruder detection requires configuring areas (locations monitored for intrusion), inputs
(connecting motion detectors, door contacts, and other protection devices to the system), and outputs
(controlling devices from the Protege system such as sirens, bells, or warning devices, and lighting and doors).

Level One: ProtegeGX Installer Study Guide | February 2018 183


Naming Conventions
Before programming it is important to decide on a naming convention to use throughout the system. This step
is too commonly forgotten, resulting in systems that are inconsistently programmed and therefore harder to
maintain.
 A user sees the first 16 characters on a keypad, so these characters should be as descriptive as possible
so items are easily identifiable
 Additional information helps in searching for similar devices (such as all PIRs, or all doors, etc.) in order to
quickly configure common properties
 We'll use the following naming convention for the ACME site:

   
Office Entry Dr (Door) TXS CP1:1

1. Use the first 16 characters to describe the item, (Office Area Dr, Managers Dr, etc.). Add spaces where
necessary before adding any additional information so the keypad shows just this description.
2. Next include the connected device type in brackets - (PIR), (REX), etc. - so you can easily locate the same
types of devices to configure common properties.
3. Add a site reference (for example, TXS for items belonging to the Texas office) to quickly identify all
site-related items.
4. Finally, incorporate the hardware address to identify where the device physically connects to the Protege
system.

184 Module 133: Basic Intruder Detection | Naming Conventions


Programming Areas
Areas are logical entities we can bind inputs/doors to, allowing integration between intrusion detection and
access control.
Navigate to Programming | Areas, click Add and name the area, for example: Office TXS

Include spaces in the description to make up the 16 characters so the site identifier does not appear on a
keypad. Note that an area is not physically connected so there is no device type or hardware address to
include.

Set Exit and Entry Delay Outputs


The Exit and Entry Delay Outputs are activated whenever the area starts the exit or entry delay cycle. Using an
audible output like the keypad beeper provides a distinctive warning to users to let them know the area has
begun arming and they need to get out, or that the entry delay period has been triggered and they need to
disarm the area before it generates an alarm.
1. Set the Exit Delay Output to KP1 Beeper.
2. Set the Exit Delay Pulse On Time to 1.
3. Set the Exit Delay Pulse Off Time to 9.
4. Set the Entry Delay Output to KP1 Beeper.

Timings
1. Select the Configuration tab and set the Entry Time to 10 seconds. This allows users entering the area 10
seconds to disarm it before the area generates an alarm.
2. Set the Exit Time to 10 seconds. This allows users 10 seconds to exit the area once the arming of the area
has begun before an alarm is triggered.
3. Set the Alarm 1 Time to 1 minute. This determines how long the bell/siren output for the area remains
activated before timing out.

Note that Entry and Exit times are kept short here for training purposes.

Set the Bell Output


Select the Outputs tab and set the Bell Output to CP001: Bell 0. This determines the output that will be
triggered when the area alarm is activated. In most cases, this is used to connect a siren.

Level One: ProtegeGX Installer Study Guide | February 2018 185


Pulse Times
Pulse times allow an output or group of outputs to be pulsed for the duration of an area state. For example, the
keypad beeper can be used to make short beeps for an exit delay, then a long continuous beep for entry delay.
Pulse times are measured in tenths of a second, or 100ms. A pulse time of 10 equates to 1 second. Setting the
Pulse On to 1 and the Pulse Off to 9, provides a short pulse (such as a short beep or flash) every second.
Setting both the Pulse On and Pulse Off values to 1 provides a rapid pulse on/pulse off.
ON ON ON

OFF OFF
Setting both values to 5 provides a slow, steady pulse on/pulse off.

ON ON ON ON ON ON ON

OFF OFF OFF OFF OFF OFF


 If the Pulse On and Off values are both set to zero (the default setting), the pulse is disabled and the output
will remain on for the duration of the cycle time
 If Pulse On is given a value but Pulse Off is set to zero, the output will pulse (flash or beep) once only, then
remain off

ON ON ON

OFF OFF

Programming Areas: Set Disarmed and Armed Outputs


The Disarmed Output and Armed Output are activated whenever the area completes a disarming or arming
cycle. Using an output like a keypad LED provides a visual indication of the status of an area.
1. Set the Disarmed Output to KP1 Green LED.
The Disarmed Indicator on the keypad shows green when the area is disarmed.
2. Set the Armed Output to KP1 Red LED.
The Armed Indicator on the keypad shows red when the area is armed.
3. Click Save to finish configuring the area.

Health Status
Once the configuration has been downloaded, note the Health Status count on the status bar. Navigate to Sites
| Controllers and open the Health Status window. You should see a message similar to the following:
Area Office (5) has its Tamper Area disarmed.

Remember, the number in brackets is a reference to the server database ID - this may be different on your
server.

186 Module 133: Basic Intruder Detection | Programming Areas


24 Hour Tamper Area
Each area in ProtegeGX is actually made up of two areas:
1. The main area, which monitors devices (such as PIRs) only when armed.
2. The 24 hour (or tamper) area, which monitors for a tamper or short condition on devices (such as PIRs),
24/7.

Whenever a 24-hour area is disarmed, a message is displayed in the controller's Health Status.

Testing the Office Area


Test the area by logging in at the keypad with the Installer code of 000000, then pressing [Enter]. You should
first get a user greeting, then see the office area status.

Office 
is DISARMED 
Note that the green Disarmed LED has not yet turned on. This is because the Area Disarmed function is edge
triggered and hasn't yet been activated. The next time the Area Disarmed function is triggered, the keypad
green LED will turn on.

Arming the Office Area


Press the [Arm] key. Once testing is complete, the area should go into exit delay. The exit delay function will
now be triggered and any output(s) associated with it will be turned on or pulsed. In our case, the keypad
beeper should start making short beeps.

Whenever a key is pressed on the keypad, the system takes control of the beeper output so that the key-press
results in a beep. This takes priority over anything else trying to turn on the beeper output. After approximately 5
seconds, the system releases control of the beeper output and anything trying to turn it on is then allowed
control.

Disarming the Office Area


Once arming has finished, the exit delay function stops, turning off any output(s) associated with it. The display
on the keypad changes and the red Armed LED lights up.

Office 
is ARMED 
The controller Health Status should also now return to normal. This is because the 24-hour portion of the Office
area is armed.
Note that the user remains logged in. This is because we are using the Installer menu group, which allows the
user to stay logged in permanently.
Press the [Disarm] key and observe the red LED turn off and the green LED turn on. Press [X] to log out.

Level One: ProtegeGX Installer Study Guide | February 2018 187


Disarming the 24 Hour Area
The 24-hour or tamper portion of an area can be armed and disarmed at the keypad by any user in an
appropriate menu group.
Log in using the Installer code of 000000. Once the area status is displayed, press the left arrow key.

Office 
24HR Enabled 
You can now use the [Arm] and [Disarm] keys to control just the 24-hour portion of the area.

Programming Additional Areas


Based on ACME's requirements, we now need to create the following additional areas:
 Warehouse
 Manager's Office
Configure the Timings and Bell Output to be the same as for the Office area, but leave the Exit/Entry Delay and
Disarmed/Armed Outputs at the default values (not set). These areas do not have a keypad, so these settings
are not required.

Remember to apply your naming convention consistently.

Updating the Technician Status Page


Now add the new areas to the Technician status page.
1. Navigate to Monitoring | Setup | Status Lists, select the All Doors and Areas status list, and click Add to
open the Select Devices window.
2. Set the Device Type to Area and choose the controller.
3. Check the new areas and click OK. If the status page is already open, you will need to close it and open it
again for the changes to take place. You should now have the three areas in your status list.

Controlling Areas from the Software


Devices shown in a status list can be controlled directly from the software.
1. Right-clicking the Office area displays a control menu. Click the Arm option so the Arm Area control
window is displayed. The Area Status should change to Exit Delay, then you should hear the keypad beeper
pulsing.
2. Once armed, close the window. Note the status update live on the Status page. The Office area is now
shown as armed, and the output states have changed to match the keypad.
3. Navigate to Programming | Areas and right-click on the Office area. Note that the control menu is accessible
from here too.

Right-clicking most devices within the ProtegeGX interface provides some level of control or functionality.

4. Disarm the Open Plan Office area again.

188 Module 133: Basic Intruder Detection | Programming Areas


Programming Inputs
Input Testing
The next step is to program inputs into the areas. To be able to test functionality, wire buttons or switches as
follows:
N.C. Input Contact

1K 1K

REN Input

Bond Sense

1K 1K
Z4
V-

N.O. Input Contact


Z3

N.C. Input Contact


Z2

1K 1K
V-

REX Input
Z1
V-
V+

Door Contact

1K 1K

N.O. Input Contact

1. On the controller, wire inputs 1-8.


2. On the 2 door reader expander, wire inputs 1, 2, 5 and 7.
Green LEDs should now be displayed for each of the inputs you have wired switches to.

Programming Inputs
1. Navigate to Programming | Inputs, select input CP1:1 from the record list and, using the naming convention,
set the Name to Office Entry Dr (Door) TXS CP1:1.
2. Leave the remaining settings under the General tab as they are:
 The Module Address identifies where the device physically connects to the system and allows inputs to
be shifted around at a later date, if required
 The Reporting ID (if defined) overrides the report map for Contact ID and offsite monitoring. If left at 0, it
follows the default report map. Only change this value if you wish to assign the input a specific number
 The Alarm Input Speed determines how long an input must be open before an alarm event is
generated
 The Restore Input Speed determines how long an input must be closed before a restore event is
generated
3. Select the Areas and Input Types tab. Inputs can be assigned to as many as four areas and can perform a
different function in each area independent of the other areas' status. Set the Area to Office TXS.
4. An input type defines how an input operates in an area. Set the Input Type to Delay (so it goes into entry
delay when triggered). There is a range of predefined input types included in the system by default. These
can be modified to suit, or new input types created.

Level One: ProtegeGX Installer Study Guide | February 2018 189


Default Input Types
The four most commonly used input types are:
 Instant: Activates an armed area immediately when the input opens
 Delay: Activates an entry delay when the input opens
 Trouble Silent: Used for system trouble inputs. Generates an alarm without the bell
 24 Hour Alarm: Used for panic inputs. Generates an alarm even when the area is disarmed

Programming Additional Inputs


Based on Acme's requirements, program the names of the additional inputs as follows:

Input Description
CP1:1 Office Entry Dr (Door) TXS
CP1:2 Office Entry Dr (REX) TXS
CP1:3 Office Entry Dr (Bond) TXS
CP1:4 Office (PIR) TXS
CP1:5 Manager's Dr (Door) TXS
CP1:6 Manager's Dr (REX) TXS
CP1:7 Manager's Dr (Bond) TXS
CP1:8 Manager's (PIR) TXS
RD2:1 Warehouse Roller Door (Reed) TXS
RD2:2 Warehouse (PIR) TXS
RD2:3 Spare TXS
RD2:4 Spare TXS
RD2:5 Office to Warehouse Dr (Door) TXS
RD2:6 Spare TXS
RD2:7 Office to Warehouse Dr (Bond) TXS
RD2:8 Spare TXS

Remember to use a consistent naming convention, for example, CP1:2 could be named Office Entry Dr (REX)
TXS CP1:2 to include the input address.
Label all unused inputs as Spare. For easy searching later, add the site name and input address, for example,
Spare TXS RD2:3.

190 Module 133: Basic Intruder Detection | Programming Inputs


Onboard Reader Expander
The Technician status page displays inputs 1-8 for the controller and inputs for RD1 (Reader Expander 1).
The controller has been configured to register as Reader Expander 1, so what happens to the inputs assigned
to Reader Expander 1? If you open inputs 1 and 3 on the controller, both the controller and reader expander
inputs change state.
This means that as far as programming goes you can configure either set of inputs, or even both.
When programming both sets of inputs:
 physical characteristics obey controller input configuration
 response speed follows controller input settings
 EOL resistance follows controller input settings
 input inverted state follows controller input settings
 non-physical characteristics are processed for both sets of inputs
 events are logged for both sets of inputs (if configured)
 alarms in areas are processed for both sets of inputs

Programming Efficiently
Consider again how using a consistent naming convention helps program a system efficiently. This is especially
important for large systems.

Find Tool: Office Area


1. Click the Find button and type Office in the Label field. Click Ok. You should get a list of six inputs.
2. Click on one of the inputs and press CTRL + A to select all.
3. Hold down the CTRL key and click on Office Entry Dr (REX) to deselect it. You should see five inputs
selected.

Note that the Door and Bond inputs are being used to trigger an intruder alarm. Inputs on reader expanders
can be used for alarm inputs as well as for access control. Each function is processed separately.

4. Click on the Areas and Input Types tab.


5. Set the Area to Office TXS, set the Input Type to Delay. Click Save.
You have now programmed all required Office area inputs.

Find Tool: Manager's Area


1. Now use the Find tool again to search the word 'manager'. Select all but the REX input.
2. Set the Area to Manager's Office and the Input Type to Instant. Click Save.

Level One: ProtegeGX Installer Study Guide | February 2018 191


Find Tool: Warehouse Area
1. Use the Find tool again to search the word 'warehouse'. Select the first two inputs.
2. Set the Area to Warehouse and the Input Type to Instant. Click Save.
3. Select the other two inputs. Note they already have the Office area assigned.
4. Set the Second Assigned Area as Warehouse, set the Input Type to Instant and click Save.

Inputs can be assigned to multiple areas and different input types. They are processed independently by each
area.

Find Tool: Input Speed


Now that areas are configured, consider other ways to use the Find tool.
1. Click Find and type (REX) into the label field.
2. Click Ok. You should get a list of two inputs: Office Entry Dr (REX) TXS CP1:2 and Managers Office Door
(REX) TXS CP1:6.
3. Click on one of the inputs, then press CTRL + A to select all.
4. Under the General tab, set the Alarm Input Speed to 50 msec and click Save.

The default speed is 500 msec. This means the input must be activated for half a second before it will trigger.
This can be too slow for a Request to Exit (REX) button.

Find Tool: All Inputs


Other searches you can try include:
 TXS: This will list all inputs belonging to the Texas site
 TXS RD1: This will list all inputs on Reader Expander 1 at the Texas site
This would be useful if, for example, EOL resistance needed to be set for a whole site or an entire expander.

Find Tool: Spare Inputs


To quickly find an available input when adding a new device, use the Find tool and enter the word 'Spare'.

Health Status
Note that the controller's Health Status is now showing 7 issues.
1. Open the Health Status window. The first two messages relate to the new areas added but not yet armed.
The next five messages are displayed because of changes to the inputs that affect operation on a currently
armed area. In this case, it is because the 24-hour portion of the Office area is armed.

This is a security feature to ensure programming of an armed area cannot be changed without
someone being notified.

2. From the Technician status page, disarm the Office 24-hour area. Note that after the 24-hour area is
disarmed, a report event is generated. This means that where offsite monitoring is configured, the
monitoring station will be notified.
The controller's Health Status should now drop to 3 issues.

192 Module 133: Basic Intruder Detection | Programming Inputs


3. From the Technician status page, arm the 24-hour areas for the Office, Warehouse and Manager's Office.
The controller's Health Status should now be clear.

Testing the Areas


1. Navigate to the Technician status page. Right-click the Office area and select Arm. Click Close.
2. Right-click the Warehouse area and select Arm. Click Close.
3. Right-click the Manager's Office area and select Arm. Click Close.
All areas should go through a10-second exit delay, then change to Armed.

Testing the Office Area


1. Open the Office (PIR) TXS CP1:4 input. This has been programmed as a Delay input type so should trigger
an entry delay.
In the All Events window, you should see an event for the input opening, followed by an event for the
keypad beeper being turned on by the Entry function of the Office area.
Once the entry delay has timed out you should see:
 The keypad beeper is turned off by the entry function
 A report is generated (this sends an alarm signal to offsite monitoring when configured)
 The area alarm is activated
 The siren/bell function is activated
 The Bell 0 output is turned on by the bell function
2. Leave the system in alarm for now. After the Alarm 1 Time has expired (1 minute, as programmed in the
area configuration), the siren/bell function will deactivate and the Bell 0 output will be turned off.
3. Close the Office (PIR) TXS CP1:4 input. An 'input closed' event will be generated, then another report is
generated. This is the Zone Restore signal to offsite monitoring.
4. Open and close the Office PIR input, but this time log in at the keypad and disarm the area. Press 000000
[Enter] [Enter] [Disarm].

Event logging in ProtegeGX is very comprehensive and a great resource for troubleshooting.

Testing the Manager's Area


Open the Manager's (PIR) TXS CP1:8 input. Note that the area goes straight into alarm. This is because the
inputs have been configured as Instant input types.
Note also that the controller Bell 0 has activated, but the keypad beeper has not.

Testing the Warehouse Area


Open the Warehouse (PIR) TXS RD2:2 input. The Warehouse area should go straight into alarm and the Bell 0
output should activate again.
Note also that the RD2 Lock 1 output activates for five seconds when you close the Warehouse (PIR) TXS
RD2:2 input. This is because Input 2 on a reader expander is configured by default for REX (Request to Exit).
This is addressed in a later module.

Level One: ProtegeGX Installer Study Guide | February 2018 193


Testing Inputs Assigned to Multiple Areas
1. Arm the Office area again. Wait for the exit delay to expire.
2. Open the Office to Warehouse Door (Door) TXS RD2:5 input. This input is programmed for both the Office
and Warehouse areas. Note that after the input opens, the Warehouse area goes into alarm instantly
whereas the Office area goes through an entry delay first.

Testing Complete
We have now finished testing the configuration of areas.
1. Disarm the Office area.
2. Disarm the Warehouse area.
3. Disarm the Manager's Office area.

194 Module 133: Basic Intruder Detection | Programming Inputs


Review Questions
A short time after creating a new area a Health Status message appears. What is this
likely to be?
 The area is missing an input type
 The controller requires a module update
 The new area has its tamper or 24-hour area disarmed
 The area has no inputs programmed yet
How many characters of the area name programming are shown on the keypad?
 The last 16 characters of the programmed name
 The first 20 characters of the programmed name
 The last 20 characters of the programmed name
 The first 16 characters of the programmed name
Explain the result of the setting shown in this image

 The output will never be activated as the pulse times are both set to 0
 The output will be activated constantly when an entry delay input is triggered
 The output will be activated constantly while the area is arming
 The output will pulse rapidly while the area is arming
How many areas can an input be programmed to?
 One
 Two
 Four
 It depends on whether it is on a reader expander

Level One: ProtegeGX Installer Study Guide | February 2018 195


What does the Input Type setting do?
 It sets how the input operates in the specified area
 It sets how the input operates in all areas
 It sets the Input name displayed in the keypad
 It sets whether input to use for an on-board expander
Which default input type should be used for a PIR covering the keypad at the main entry?
 Instant
 Delay
 Trouble Silent
 24 Hour Alarm

196 Module 133: Basic Intruder Detection | Review Questions


Module 134:
Basic Access Control
This module explains the basics of configuring doors and access levels in ProtegeGX.

Level One: ProtegeGX Installer Study Guide | February 2018 197


Doors
Navigate to Programming | Doors. You'll see that there are four doors already programmed. This is because the
Add Controller wizard added the doors automatically.

Naming Doors
In line with your naming convention, name the four doors as follows:
 TEX Office Controller RD1 DR 1 = Office Entry TXS
 TEX Office Controller RD1 DR 2 = Manager's Office TXS
 TEX Office Controller RD2 DR 1 = Warehouse Roller TXS
 TEX Office Controller RD2 DR 2 = Office to Warehouse TXS
It is advisable to put the Office Entry and Manager's Office on the controller so that if there is a failure of the
RS-485 or reader expander, access can be gained to the control equipment (located in the Manager's Office).

Door Testing
Wire a tSec Extra reader to Port 1 of the controller and a tSec Standard reader to Port 2. In this example, wire
the readers in RS-485 configuration.
RED

BLACK
Shielded Cable
1 2
GREEN

3 4 WHITE

5 6 N/R ORANGE

7 8 BROWN Shield not Shield is frame


connected grounded at
BLUE one point
9 0
N/R YELLOW
X
SHIELD
BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA

Adding Cards from the Event Log


1. Badge the first training tag at the card reader. You should see an event come through similar to the
following:
Read RD1 Raw Data Port (P1) (99:1)
It shows that an unknown card has been read on Port 1. The numbers in the brackets at the end of the
event represent the Facility Code and Card Number.
2. Right-click on the event and select Add Card Number to Existing User. Select the user you wish to add the
card to, then click OK.
3. Once the download is complete, badge the card again. Entry should be granted to the door.

Note that the Lock 1 output turns on, then off again five seconds later.

4. Try badging again, and observe the LED indicators.


 The R1 LED should pulse for one second during card read (correct format data read).
 The RELAY 1 LED should pulse for five seconds.

198 Module 134: Basic Access Control | Doors


Door Processing
Door Sense
Badge your card at the reader, then open the Office Entry Dr (Door) TXS CP1:1 input (using the switch wired
earlier) for a second or two.
This time you see Door Opened and Door Closed events. Inputs 1 and 5 are configured by default as the Door
Sense (Reed switch) inputs for the doors associated with a reader expander. Door processing occurs
independently of any areas the inputs may be associated with as alarm inputs.

REX
1. Open the Office Entry Dr (REX) TXS CP1:2 input. Note that the LED input on the controller changes to red
and the status changes to open, but the lock output does not change state.
2. Close the Office Entry Dr (REX) TXS CP1:2 input. You will see an Unlocked Request To Exit event, followed
by the lock output cycling for 5 seconds:
 REX inputs are inverted by default. This is because many push buttons have only NO (Normally Open)
contacts, which close when the button is pressed.
 Inputs 2 and 6 are configured by default as the REX (Request to Exit) inputs for the doors associated
with a reader expander

Bond Sense and REN


Inputs 3 and 7 are configured as lock Bond Sense inputs for the doors associated with a reader expander. By
default, Bond Sense processing is not enabled.
Inputs 4 and 8 are configured as REN (Request to Enter) inputs for the doors associated with a reader
expander. By default, REN processing is not enabled.

Bond Sense and REN processing must be enabled, if required.

Beeper
The beeper on an ICT reader can be controlled internally by the reader itself, or externally by grounding the
beeper wire. The first beep emitted when a card is read is generated internally by the reader to acknowledge the
card has been read.

Beeps generated internally. Data sent to expander for processing

Level One: ProtegeGX Installer Study Guide | February 2018 199


The second beep (or beeps) is generated by the access control system to advise whether access is granted or
denied. This is achieved by the reader expander grounding the beeper via the BZ output (Wiegand mode), or by
a control message sent via RS-485.

Beeps generated by Reader Expander

Reader Beepers
1. From the Technician status page, right-click the RD1 Beeper R1 output and set a time of 5 seconds.
2. Select Activate Timed.
The reader expander BZ output can be controlled by ProtegeGX just like any other system output.

LEDs
1. From the Technician status page, right-click the RD1 Green R1 output and set a time of 5 seconds.
2. Select Activate Timed.
Reader LEDs can also be controlled by ProtegeGX.

200 Module 134: Basic Access Control | Doors


Reader Single LED Mode

ICT readers wired for Wiegand connection can be configured to operate in either single or dual LED mode.
Readers connected via RS-485 support only single LED mode.
In single LED mode, the green LED control wire (orange) is not connected to the reader expander. The blue LED
control wire (brown) is connected to the L1 output of the reader expander.
 Blue control line grounded: The reader LED strip is green
 Blue control line not grounded: The reader LED strip is blue

ICT readers are shipped set to single LED mode.

Reader Dual LED Mode


In dual LED mode, the green LED control wire (orange) is connected to the L1 output of the reader expander.
The blue LED control wire (brown) is connected to the L2 output of the reader expander.

Level One: ProtegeGX Installer Study Guide | February 2018 201


 Green control line grounded: The reader LED strip is green
 Blue control line grounded: The reader LED strip is blue

Dual LED mode allows two extra states of LED display: No LEDs and Both LEDs.
 Neither LED wire grounded: The reader LED strip is off
 Both control lines grounded: The reader LED strip is cyan

Door Monitoring
1. Open the Office Entry Dr (Door) TXS CP1:1 input (using the switch wired earlier). Note the Door Forced
Open event and status update on the Technician status page.
2. Now close the input.
3. Badge the Installer card and open the Office Entry Dr (Door) TXS CP1:1 input (to simulate the door
opening). Leave the input open this time and observe what happens.
The door opens. After 30 seconds an alert is generated. After 45 seconds a DOTL (Door Open Too Long)
alarm is generated.

202 Module 134: Basic Access Control | Doors


Manager's Door
The Office Entry door is now mostly configured in line with our system design.
1. Badge your card at the Manager's Office reader.
2. Open the Managers Dr (Door) TXS CP1:5 input.
3. Close the Managers Dr (Door) TXS CP1:5 input.
4. Open the Managers Dr (REX) TXS CP1:6 input.
5. Close the Managers Dr (REX) TXS CP1:6 input.
The Manager's Office door should function correctly and need no further configuration.

Configuring Doors
As you can see, basic configuration is completed by the Add Controller wizard. All that is required now is to
configure any additional options required. We'll come back to this later.
Next we'll look at controlling access with Access Levels and Groups.

Level One: ProtegeGX Installer Study Guide | February 2018 203


Access Levels
Access levels control what users can do, where they can go, and when. They determine the doors, areas,
elevator floors and menu groups a user has access to. The tidiest way to define this access is by using groups.

Door Groups
Navigate to Groups | Door Groups. You will see a default door group called All Doors. This is created by the
system and cannot be deleted or changed. Whenever a new door is created it is automatically added to this
door group.

The All Doors door group should be used with caution. As an example, consider a research institute dealing with
dangerous substances. If a door controlling access to a hazardous area is created in the system, anyone
assigned the All Doors door group automatically has access to that door.

For our ACME scenario, it is acceptable for the Installer to have this door group assigned.

Add Door Groups


Add the Manager's Door Group
The All Doors door group could be assigned to the Manager access level but, to follow good practice, we will
create a new door group for the Manager.
1. Click the Add button on the main toolbar and name the new door group Managers TXS. Click Save to
create the group.
2. Click Add to open the Doors selection window. This displays all doors in the system not already in the
group.
3. Select all four doors. Drag each door from the list and drop it into the main window, or select the doors
(CTRL+A to select all) and click OK.
The doors now appear in the list with a schedule beside them. By default, ProtegeGX assigns the
system-created Always schedule to the group.
4. Change the schedule to the Manager's Hours schedule. This provides the same functionality as the Always
schedule, but if requirements later change and the manager no longer has 24/7 access, the schedule can
be simply updated. Click Save.

Add the Office Staff Door Group


1. Create a new door group called Office Staff TXS and add the two office doors.
2. Assign the Office Hours schedule.
Our system design specifies that office staff have access to the warehouse only when warehouse staff are
present. We still need to give them access to the door, but we will configure the rest later.

204 Module 134: Basic Access Control | Access Levels


Add the Warehouse Staff Door Group
1. Create two further door groups for:
 Warehouse Shift 1 TXS
 Warehouse Shift 2 TXS
2. Add the doors required by warehouse staff:
 Office Entry door
 Office to Warehouse door
 Warehouse Roller door
3. Assign the appropriate schedules (Shift 1/Shift 2).
Again, we will configure the office access restriction later ...

Add an Area Group


1. Navigate to Groups | Area Groups. You will see a default area group called All Areas. This is created by the
system and cannot be deleted or changed. Whenever a new area is created it is added to the All Areas
group automatically.

Use the All Areas area group with caution!

2. In the same way we created the Manager's door group, add a new area group called Managers. Add all
three areas. Click Save.

Add Additional Area Groups


Now create an Office area group with just the Office area, and a Warehouse area group with just the Warehouse
area.

Add Menu Groups


Add a Menu Group
The final thing to configure is menu groups. Menu groups control access to keypads. They define what a user
can do at a keypad, but not which areas the user has access to.
1. Navigate to Groups | Menu Groups and add a new menu group called Manager.
2. Select (enable) the following settings:
 Areas (1): Area control
 Events (3): View events
 View (5): View other system information
 Time (6): Set the controller time
 Bypass (7): Bypass inputs
 Force Arming: Force arm the system

Level One: ProtegeGX Installer Study Guide | February 2018 205


Set Menu Group Options
Click the Options tab and select (enable) the User Can Acknowledge Alarm Memory option. This allows the
manager to see any alarm activations at login. Click Save.

Add an Additional Menu Group


1. Add another menu group called Staff.
2. Check the Area (1) setting to allow area control.
3. Under the Options tab, select (enable) the Show User Greeting option to display a time-appropriate greeting
to the user once they have entered their user code. Click Save.
We have now created all the groups we need.

Configure Access Levels


Navigate to Users | Access Levels. There should be six access levels programmed. The Installer access level
was created manually. The others were created by the Import Users wizard but have not yet been configured.

Configure the Manager's Access Level


1. Select the Manager's access level, then click on the Door Groups tab.
2. Click Add to open the Door Groups selection window, select the door group Managers TXS and click Ok.
Click Save.
3. Select the Menu Groups tab, then click Add.
4. Select the Manager menu group and click OK. Click Save.
5. Select the Disarming Area Groups tab, then click Add.
6. Select the Managers area group and click OK. Click Save.

Remember that if a user is allowed to disarm an area, the system automatically allows them to arm the area.

Test the Manager's Access Level


1. Badge Card Number 2 at a reader. Right-click the event and assign the card to manager Brett Lamb. Wait
five seconds, then badge the card again. Access should now be granted.
2. Log in at the keypad using Brett Lamb's code of 9998 (note the areas he has access to). Press the [Menu]
key and scroll up to see the menus he has access to.
3. Navigate to Sites | Controllers and right-click on the controller. Set the time to 02:00 AM, then try badging
the manager's card again.
Note that Brett Lamb is allowed access at 2am. This is because the door group assigned to the access
level is set to use the Manager's Hours schedule, providing 24/7 access.

206 Module 134: Basic Access Control | Access Levels


Configure the Office Access Level
1. Navigate to Users | Access Levels and select the Office access level.
2. Add the Office Staff door group, the Staff menu group, and the Office area group to the Disarming Area
Groups tab.
3. Add the Warehouse area group to the Arming Area Groups tab. Click Save.

Testing the Office Access Level


1. Badge Card Number 3 at a reader. Right-click the event and assign the card to office staff member Calvin
Diaz. Wait a few seconds, then badge the card again. You should be denied entry as office staff are not
allowed access outside office hours.
2. Navigate to Sites | Controllers and right-click on the controller. Set the time to 09:30 AM and try badging
Calvin Diaz's card again. The Office and Warehouse Shift 1 schedules will go valid, then access is granted.
3. Log in at the keypad using Calvin Diaz's code 9779. Note the areas he has access to.
4. Press the [Menu] key and scroll up to see the menus he has access to. Press [Enter].
5. Select the Warehouse area and press [Arm]. Note how the Warehouse area now drops off Calvin's list of
areas. This is because he is allowed to arm only the warehouse area.
Note also that Calvin is automatically logged out. This is because the menu group assigned to him does not
have the Installer Menu Group option checked.

Configure the Warehouse Shift 1 Access Level


Select the Warehouse Shift 1 access level and add the Warehouse Shift 1 door group.

Configure the Warehouse Shift 2 Access Level


Select the Warehouse Shift 2 access level, then add the Warehouse Shift 2 door group.

Configure the Warehouse Supervisor Access Level


1. Select the Warehouse Supervisor access level and add the Warehouse Shift 1 and Warehouse Shift 2 door
groups, and the Staff menu group.
2. Add the Warehouse area to the Disarming Area Groups tab.
3. Add the Office area to the Arming Area Groups tab.

Assign Cards
1. Assign card number 4 to Lois Joseph.
2. Assign card number 5 to Douglas Ross.
3. Assign card number 6 to Gretchen Holmes.

Level One: ProtegeGX Installer Study Guide | February 2018 207


Door Configuration
Door Types
A door type defines how a door operates. This includes passback mode, the reading mode used to gain access
(card, PIN, card or PIN, card and PIN, etc.), and whether operator verification is required to grant access.

Setting a Door Type


1. Navigate to Programming | Doors and set the Door Type of the Office Entry door to PIN Only.
2. Wait for the configuration to download, then try badging Card 1. You should see a 'Denied Entry By Entry
Mode Error' event. This indicates the user tried to gain access to the door using a credential other than that
set as the door type.

Testing the Door Type


1. Enter the Installer PIN 000000 and press [Enter] on the MultiProx reader. This time you should be granted
access, with the Mode logged as 'Keypad Input'.
2. Now set the door type of the Office Entry door to Card and PIN. Wait for the configuration to download,
then try badging the card. Do not enter a PIN. After approximately 10 seconds, you will see a 'PIN Entry
Timed Out' event.
3. Badge the card, then enter 000000 and press [Enter] at the MultiProx reader. This time you should be
granted access.

Setting Additional Door Types


1. Set the door type of the Warehouse Roller door to Card and PIN.
2. Leave the Manager's Office and Office to Warehouse doors as Card Only door types.

DOTL Times
Configure the Pre-Alarm Delay and Door Left Open Alarm (DOTL) times under the door's General tab.
 The Door Pre-Alarm Delay Time defines how long a door can be propped open before a warning is
triggered
 The Door Left Open Alarm Time defines how long a door can be propped open before an alarm is
generated
Both times are measured from the time the door is opened.

208 Module 134: Basic Access Control | Door Configuration


Door Outputs
Configure the outputs under the door's Outputs tab.
 The Lock Output and Lock Output Group determine which output or output group to activate when the
door unlocks
 The Lock Activation Time defines how long the lock controlling access to the door remains open during an
access control event. Setting the time to 0 allows each access control event to toggle between unlock
latched and locked. Note that setting to 0 permanently disables the REX for that door.

The Add Controller wizard has configured this automatically.

The Outputs tab is also where we configure outputs or output groups for:
 Door Pre-Alarm
 Door Left Open Alarm
 Door Forced Open
These can be set to pulse in the same way as area outputs.
By default, the Pre-Alarm and Left Open Alarm are configured to pulse the local reader beeper at different rates.
The Door Forced Open is not configured by default.

Relock on Door Close


1. Badge Card 2 at the Manager's Office door reader
 Open the Managers Dr (Door) TXS CP1:5 input
 Close the Managers Dr (Door) TXS CP1:5 input
Note that the lock output remains on for five seconds regardless of how long the door opens for.
2. Select the Manager's Office door and go to the Options tab.
3. Enable the Relock on Door Close option and save changes. Wait a few seconds, then try simulating
entering the Manager's Office again.
Note that the door now locks as soon as it closes.

Door Options
There are many more door options that can be configured, however these are outside of the scope of this
certification.

Reader Expander Configuration


While some functionality is configured at the door, many options around door processing are carried out at the
reader expander.
1. Navigate to Expanders | Reader Expanders. Note that the Add Controller wizard has automatically created
both reader expanders.
2. Name the reader expanders using your naming convention, for example:
 RD1 = Office Entry | Manager's Office RD1 TXS
 RD2 = Warehouse Roller | Office to Warehouse RD2 TXS
This means the Find tool can search for a particular door, module, or site.

Level One: ProtegeGX Installer Study Guide | February 2018 209


Offline Operation
Offline Operation defines how a reader expander behaves if it loses communications with the controller. RD1 is
configured as the controller onboard reader expander, so offline operation is not relevant. RD2 controls access
to the warehouse, so let's set the offline operation to First 10 Users plus Cache.
For offline operation to work, we must also configure options at the controller.
1. Navigate to Sites | Controllers and select the Configuration tab. The Automatic Offline Time defines the time
of day the controller downloads offline users to the expanders, and is set to midnight by default.
2. Under the Options tab, enable the Enable Automatic Offline Download option. Save your changes.

Reader Multiplexing
A unique feature of ProtegeGX is the ability to configure both an entry and an exit reader using a single reader
port.
SHIELD

RED

1 2 BLACK
Shielded Cable
3 4 GREEN

WHITE
5 6
N/R ORANGE
7 8
BROWN
Shield is frame
grounded at
9 0 BLUE one point

X N/R YELLOW

ENTRY
SHIELD

RED

BLACK
Shielded Cable
GREEN

WHITE

N/R ORANGE

BROWN Shield not


connected
BLUE

N/R YELLOW

EXIT
BZ L1 D1/ D0/ BZ L1 D1/ D0/ Z4 V- Z3 Z2 V- Z1 V- V+
NB NA NB NA

Our system design will make use of this feature for the Warehouse Roller and Office to Warehouse doors.
1. Navigate to Expanders | Reader Expanders and select RD2.
2. Select (enable) Multiple Reader Input Port 1. This enables multiplexing for the Warehouse Roller door.
3. Select (enable) Multiple Reader Input Port 2. This enables multiplexing for the Office to Warehouse door.
Save the changes.

210 Module 134: Basic Access Control | Door Configuration


Reader Configuration
1. Select the Reader 1 tab. The Configuration options define the behavior of the reader port 1.
By default, readers are configured as follows:
 26 bit reading mode
 as entry readers for access control
 with an ARK-501 keypad (supports the MultiProx PIN input)

Reader Options
Reader Options is where reader expander inputs associated with door processing are configured.
1. We are using door sense (reed switches) for doors, so leave the Door Sense Enabled option selected.
2. Select the Bond Sense Input Enabled for both Reader 1 and Reader 2 on RD1, and for Reader 2 on RD2.
This enables bond sense on all doors except the Warehouse Roller door.
3. Disable the REX Enabled option for Reader 1 and Reader 2 on RD2. Both the Warehouse Roller door and
Office to Warehouse door have entry and exit readers and will not use a REX input.

Review the Health Status


Navigate to Sites | Controllers and open the controller's Health Status window. The Health Status should now
show two Health Status warnings:
Reader expander (6) requires a module update
Reader expander (7) requires a module update

Remember, the numbers inside the brackets refer to the database ID, not the physical expander number.

Both reader expanders require a module update as changes have been made to the physical properties of the
hardware (disabled and enabled inputs for door processing).

Performing a Module Update


1. Navigate to Expanders | Reader Expanders. Note that the database IDs match the Health Status warning.
2. Right-click on RD1 and select Update Module.
3. Repeat to perform a module update on RD2. Once complete, the Health Status should be clear.

Module Updates
Note that during a module update there is a short period (a few seconds) when the expander temporarily stops
processing.
Performing an update from the controller updates all modules connected to the system. Performing an update
from the selected module only updates that single module, causing less disruption. A single module update
provides confirmation that the update was successful and the new configuration is now running.

Level One: ProtegeGX Installer Study Guide | February 2018 211


Downloading Changes Before Updating
It is important that any configuration changes are downloaded to the controller before a module update is
performed. If you attempt to update a module that has a download pending, the software will prompt you to
initiate the download first. Click OK to force the download.
Once the download is complete, the module update is actioned.

212 Module 134: Basic Access Control | Door Configuration


Review Questions
If a door was created by the Controller wizard with no additional configuration and is in a
Forced Open state, which input must be open?
 The REN (Request to Enter) input
 The REX (Request to Exit) input
 The Bond Sense (lock state) input
 The Door Sense (Reed) input
Which inputs are configured by default as Bond Sense (lock state) inputs on a reader
expander?
 1 and 5
 2 and 6
 3 and 7
 4 and 8
What does this event mean?
Read RD1 Raw Data Port (P1) (99:1)

 A card has been read that was programmed incorrectly at the factory
 The reader expander has the wrong format programmed
 A new card has been assigned to a user
 An unknown card has been read on Port 1
If a new area is created but is not added to any area groups, who will be able to disarm it?
 Nobody
 The installer
 The manager
 Anyone with the 'All Areas' disarming area group
If a new door is created but not added to any door groups or access levels, who has
access to it?
 The installer
 Anyone with the 'All Doors' door group
 Nobody
 The manager

Level One: ProtegeGX Installer Study Guide | February 2018 213


If a user is automatically logged out of a keypad after a period of time, which option is NOT
checked in their menu group?
 Installer (4)
 Advanced Installer (4, 8)
 Installer Menu Group
 Time (6)
What do Door Types do?
 They define which lock outputs to use
 They set double badge arming
 They define the reading mode used to gain access
 All of the above
For a reader expander to allow a cached user through a door in offline mode, which items
must be configured?
 The controller must have the Enable Automatic Offline Download option checked and the reader
expander offline operation mode must be set to First 10 Users + Cache

 The reader must be programmed for Intelligent offline mode and the user must have the Super Rights
option checked

 The reader must be programmed for Intelligent offline mode and the reader expander offline operation
mode must be set to First 10 Users + Cache

 The controller must have the Enable Automatic Offline Download option checked and the user must
have the Super Rights option checked

Two readers are to be wired to Port 1 of a reader expander. To configure multiplexing,


what must be done?
 The exit reader must have D0 wired to reader port 2 and Multiple Reader Input Port 1 must be checked
 The exit reader must have D0 wired to reader port 2 and Multiple Reader Input Port 2 must be checked
 The exit reader must have D1 wired to reader port 2 and Multiple Reader Input Port 1 must be checked
 The exit reader must have D1 wired to reader port 2 and Multiple Reader Input Port 2 must be checked

214 Module 134: Basic Access Control | Review Questions


Module 135:
Configuring Intruder and Access Integration
In this module, we look at how ProtegeGX integrates both intruder detection and access control within the
system, and we test the areas.

Level One: ProtegeGX Installer Study Guide | February 2018 215


Office Access
1. From the ProtegeGX user interface, set the controller time to 7am on a weekday, arm the Office area (if not
already armed), and lock the Office Entry door (if not already locked).
2. Now we're going to simulate the manager arriving in the morning. Badge Card 2 at the Office Entry reader
and enter the PIN 9998.
3. Open the Office Entry Dr (Door) TXS CP1:1 input to simulate opening the door. Note that the keypad starts
an entry delay.

Door Areas
It makes sense that if a staff member is allowed access, the area should be turned off automatically for them.
We'll do this now.
1. The first step is to assign the area to the door. Navigate to Programming | Doors, select the ADM Reception
Lobby to Office Door and go to the General tab.
2. Set the Area Inside Door to ADM Open Plan Office Area
3. Set the Area Outside Door to ADM Reception Area. Click Save.

Disarm On Entry
1. Navigate to Expanders | Reader Expanders and select RD1.
2. Under the Reader 1 tab, select (enable) the Disarm Area For Door On Access option. Save the changes.
3. Wait a few seconds, then badge Card 2 again. Enter the PIN 9998. This time the Office area will
automatically disarm.
4. Arm the Office area again. Badge Card 4 at the Office Entry reader and enter the PIN 2758. Our user Lois
Joseph has the Warehouse Shift 1 access level assigned. This has the Office Entry door in a door group
and the schedule is valid, however as Lois does not have access to the Office area, she is denied access.
5. Badge Card 2 at the Office Entry reader and enter PIN 9998. Badge Card 4 at the Office Entry reader and
enter PIN 2758. You'll see that Lois is now granted access as the Office area is no longer armed. This
meets our system design requirement that warehouse staff have access to the Office area only when office
staff are present.
6. Set up this functionality for all doors. Under Misc Options, select (enable) the Disarm Area For Door On
Access option on:
 the Reader 2 tab of RD1
 the Reader 1 tab of RD2
 the Reader 2 tab of RD2
Save changes.

Disarm on Entry: Manager's Office


Set the Area Inside Door of the Manager's Office door to Manager's Office.

216 Module 135: Configuring Intruder and Access Integration | Office Access
Disarm on Entry: Warehouse Roller
Set the Area Inside Door of the Warehouse Roller door to Warehouse.

Disarm on Entry: Office to Warehouse Door


Set the Area Inside Door of the Office to Warehouse door to Warehouse.
Set the Area Outside Door of the Office to Warehouse door to Office.

Arming an Area on 2 Reads


1. Badge Card 2 at the Manager's Office door. The area is disarmed.
2. Now badge Card 2 at the Manager's Office door twice in a row. You should get a three-beep
acknowledgment, then the Manager's Office will start to arm again. This is because the reader expander is
configured by default to Arm Area on 2 Reads.

Configure the Manager's Office Outputs


We don't have a keypad to show the status of the manager's office but we have a reader, so we need to set
some outputs for the Manager's area.
1. Select the Manager's Office area and go to the Outputs tab. Set the Exit Delay Output to RD1 Beeper R2.
2. Set Pulse On and Pulse Off times of 1 and 9.
3. Set the Armed Output to RD1 Green R2.
4. Set the Pulse On and Pulse Off times to 5 and 5. Save your changes.
The outputs we have used are the second reader port (R2) on reader expander 1 (RD1). Wait a few
seconds, then try double-badge arming at the Manager's Office door reader. The reader should now beep
during exit delay, then flash the LED while armed.

Configure the Office Entry Door


Badge Card 2 twice at the Office Entry door. As the door is set to Card and PIN mode, we would have to badge
our card and enter our PIN twice to get the 'Arm on 2 Reads' function to work. A better approach is to set the
door mode to Card and PIN if the alarm is armed, and to Card Only if the alarm is disarmed.
To achieve this, create a new schedule that is valid when the Office area is set, then change the door mode
when the schedule is invalid.

Create an Area Armed Schedule


1. Navigate to Sites | Schedules and add a new schedule called Office Area Armed.
2. Select all days in Period 1 and set the holiday mode to Ignore Holiday.
3. Go to the Options tab and enable the Validate Schedule if Qualify Output On option.
4. Set the Qualify Output to KP1 Red LED.
We have created a schedule that will be valid 24/7 regardless of holidays but requires the keypad's red LED
to be ON before the schedule becomes valid. The keypad red LED is turned on when the area is armed.

Level One: ProtegeGX Installer Study Guide | February 2018 217


Create a New Door Type
Now create a new door type that changes depending on the state of the new schedule.
1. Navigate to Programming | Door Types and add a new Door Type called Office Entry.
2. Set the Operating Schedule to Office Area Armed.
3. Set the Secondary Type to Card.
4. Set the Entry Reading Mode to Card and PIN.

Assign the New Door Type


Navigate to Programming | Doors, select the Office Entry door, and choose the new Door Type. Click Save.

Testing the New Door Type


1. Arm the Office area. You will see that as the area is armed, the keypad Red LED turns on, which in turn
makes the Office Area Armed schedule valid.
The door is now in Card and PIN mode.
2. Badge Card 2 and enter the PIN 9998 at the Office Entry door. Brett Lamb is granted access, and the area
is then disarmed. The keypad Red LED turns off which makes the schedule invalid.
This puts the door type into its secondary type: Card only.

Door Type Integration Summary


 We've created a new 24/7 Office Area Armed schedule that is qualified by the Keypad Red LED. This
schedule becomes valid whenever the Office area is armed.
 We've created a new door type that has the above schedule as its Operating Schedule
 We've set the Entry mode to Card and PIN
 We've set the Secondary door type to Card
 We've assigned the new door type to the Office Entry door
This means that now when the Office area is armed, the door type follows its primary settings (Card and PIN),
and when the Office area is disarmed, the door type switches to its secondary type (Card only).

218 Module 135: Configuring Intruder and Access Integration | Office Access
Door Unlocking by Schedule
Earlier we set the Office Entry door to unlock via the Office Hours schedule. Let's test this functionality.
1. Set the controller time to 4:59pm (at 5:00pm, the door will lock).
2. Arm the Office area by double-badging at the Office Entry reader so the building is locked and secure.
But what happens if nobody turns up for work in the morning?
3. Set the controller time to 8:59am. At 9:00am, the door will unlock!
We now need a way to prevent the Office Entry door from unlocking if the Office area is armed. There are
several ways to achieve this, but we'll use the easiest:
4. Navigate to Programming | Doors, select the Office Entry door and go to the Options tab. Enable the
following options:
 Door Lock Follows Inside Area
 Area Disarmed AND Schedule Valid Unlock Door
5. Save changes.
Let's try that test again.
1. Disarm the Office area and set the controller time to 4:59pm (at 5:00pm the door will lock).
2. Arm the Office area by double-badging at the Office Entry reader so the building is locked and secure.
3. Set the controller time to 8:59am. At 9:00am the Office Hours schedule becomes valid, but this time the
door stays locked.
4. Badge Card 2 and enter the PIN 9998. The door is unlocked and the Office area disarmed. Note that the
door stays unlocked.
5. Double-badge Card 2 at the Office Entry reader. The area arms and the door locks.
6. Set the controller time to 8:58am. Badge Card 2 and enter the PIN 9998. Brett Lamb is granted access and
the area is disarmed, but the door locks again. At 9:00am the door unlocks.

Door Unlocking Integration Summary


 We've assigned the Office Hours schedule to the Office Entry door as the Operating Schedule. This means
the door will unlock normally when the Office Hours schedule is valid.
 We assigned the Office area to the Office Entry door as the Area Inside Door.
 We've enabled the Door Lock Follows Inside Area option. This means the door will unlock normally when
the Office area is disarmed.
 We've enabled the Area Disarmed AND Schedule Valid Unlock Door option. This ties the two together to
ensure the door unlocks only when both the Office Hours schedule is valid and the Office area is disarmed.

Output Groups
Now that the access control and intruder functions are integrated, it would be good to get feedback at the
reader as well as at the keypad. This can be achieved using Output Groups.

You can assign any outputs to an output group, but it is recommended you avoid including flashing lights on
readers located outside the building as this can indicate to anyone with access to the reader that there is a
problem with the system.

Level One: ProtegeGX Installer Study Guide | February 2018 219


Armed Output Group
1. Navigate to Groups | Output Groups and add a new output group called Office Area Armed. Add the KP1
Red LED and RD1 Green R1 outputs.
2. Navigate to Programming | Areas, select the Office area and change the Armed Output to <not set>.
3. Set the Armed Output Group to the new Office Area Armed group.
4. Set Pulse On and Pulse Off times of 5 and 5.
5. Rearm the Office area.
Note that even though the outputs are pulsed, the schedule following the keypad Red LED only follows the
edge triggers.

Arming Output Group


1. Navigate to Groups | Output Groups and add a new output group called Office Area Arming.
2. Add the KP1 Beeper and RD1 Beeper outputs.
3. Navigate to Programming | Areas, select the Office area and change the Exit Delay Output to <not set>.
4. Set the Exit Delay Output Group to the new Office Area Arming group.
5. Disarm then re-arm the Office area.
We now have audible warnings while arming, and visual indications at the keypad and reader when armed.

220 Module 135: Configuring Intruder and Access Integration | Office Access
Warehouse Doors
We've fully configured the Office Entry and Manager's Office doors and areas, so let's now look at the
Warehouse ...

Door Testing
1. Wire a tSec reader with keypad and a regular tSec reader in multiplex configuration to Port 1 of the 2 door
reader expander. RS-485 configuration is used here.
2. Wire two tSec Standard readers in multiplex configuration to Port 2 of the 2 door reader expander.
SHIELD

RED
1 2
BLACK
Shielded Cable
3 4
GREEN

5 6 WHITE

N/R ORANGE
7 8
BROWN
9 0 Shield is frame
BLUE grounded at
one point
X N/R YELLOW

VIOLET
ENTRY
SHIELD

RED

BLACK
Shielded Cable
GREEN

WHITE

N/R ORANGE

BROWN
Shield not
connected
BLUE

N/R YELLOW

VIOLET

EXIT
D1/ D0/
C BZ L2 L1 NB NA V- V+

Reader Multiplex Configuration


We set up reader multiplexing in an earlier module, but let's recap.
1. Navigate to Expanders | Reader Expanders and select RD2.
2. Select Multiple Reader Input Port 1 to enable multiplexing for the Warehouse Roller.
3. Select Multiple Reader Input Port 2 to enable multiplexing for the Office to Warehouse Door. Save your
changes.
Reader multiplexing makes ProtegeGX extremely cost-effective for doors with more than one reader.

Level One: ProtegeGX Installer Study Guide | February 2018 221


Testing the Doors
1. Badge Card 2 at the Warehouse Roller door entry reader. Note that an Entry event is generated.
2. Badge Card 2 at the Warehouse Roller door exit reader. Note that an Exit event is generated.
3. Badge Card 2 at the Office to Warehouse entry reader.
4. Badge Card 2 at the Office to Warehouse exit reader.
Basic door configuration has already been completed.
 Double-badge Card 2 at the Office to Warehouse exit reader - the Office area should begin to arm.
 Double-badge Card 2 at the Office to Warehouse entry reader - the Warehouse area should begin to arm.
Basic area integration is also working. With both areas now armed, you should see that warehouse users are
not allowed in the office, and office users are not allowed in the warehouse.

Warehouse Door Type


The Warehouse Roller door type still needs to be configured for Card and PIN access on the outside.
1. Navigate to Programming | Doors, select the Warehouse Roller door and set the Door Type to Card and
PIN. Save your changes.
2. Wait a few seconds and try badging Card 2 at the tSec Extra reader. Card and PIN mode should now be
set.
3. Badge Card 2 at the Warehouse Roller door exit reader. You'll see a 'Denied entry, waiting for PIN' event.
This is because the door type has applied Card and PIN to both the entry and exit doors. What is required
is a door type that has Card and PIN on entry, and Card only on exit.

It is good practice to leave the default door and input types unchanged and create new types if different
functionality is required. This means you have a known reference you can return to if you need to troubleshoot
any problems.

Warehouse Area Indication


Since we wish to be able to arm the warehouse from the reader, we need to set up a schedule to change the
door type when armed. At the same time, we should set up some form of indication, using reader LEDs and
beepers.
1. Create a new output group called Warehouse Area Arming and add outputs RD2 Beeper R1 and RD2
Beeper R2.
2. Create another output group called Warehouse Area Armed and add outputs RD2 Green R1 and RD2
Green R2.
3. Assign the new groups to the Warehouse area. Navigate to Programming | Areas, select the Warehouse
area, click on the Outputs tab and set the Exit Delay Output Group to Warehouse Area Arming.
4. Set the Armed Output Group to Warehouse Area Armed. Save your changes.

222 Module 135: Configuring Intruder and Access Integration | Warehouse Doors
Office Area Indication
Let's also add the Office to Warehouse door beeper and LEDs to the Office output groups.
1. Navigate to Groups | Output Groups, select the Office Area Arming output group, and add the RD2 Beeper
R2 output.
2. Select the Office Area Armed output group and add the RD2 Green R2 output. The Office to Warehouse
readers will now indicate if either area is armed. Users in the unarmed portion will now have an indication as
to why they can't enter the other area.

Warehouse Armed Schedule


Next create a schedule to change the Warehouse Roller door type between Card, and Card and PIN modes.
1. Create a schedule called Warehouse Area Armed and enable each day for Period 1.
2. Set the holiday mode to Ignore Holiday.
3. Under the Options tab, enable the Validate Schedule if Qualify Output On option.
4. Set the Qualify Output to RD2 Green R1.

Warehouse Door Type


1. Create a new door type called Warehouse Entry and set the Operating Schedule to Warehouse Area
Armed.
2. Set the Secondary Door Type to Card. This means that when the warehouse is disarmed the schedule is
invalid and the door type will change to Card Only.
3. Set the Entry Reading Mode to Card and PIN and the Exit Reading Mode to Card Only. Now when the
area is armed the entry reader will require a PIN. The exit reader will never require a PIN.
4. Navigate to Programming | Doors, select the Warehouse Roller door and set the Door Type to Warehouse
Entry.

Level One: ProtegeGX Installer Study Guide | February 2018 223


Testing the System
Now we can test everything. Before we do this, disarm all areas.

Testing the Office Area


1. Arm the Office area. The beepers on the keypad, Office Entry door and Office to Warehouse door should
start beeping. This gives anyone still in the warehouse an audible warning that the Office area is arming.
Once armed, the keypad red LED, and the LEDs on the Office Entry door and the Office to Warehouse door
should be flashing. From outside the office, there is now visual indication that the Office area is armed.
2. Badge Card 6 (warehouse supervisor) at the Office to Warehouse door exit reader (this is the reader on the
warehouse side of the door). The warehouse supervisor should be denied access as the Office area is
armed.
3. Badge Card 6 at the Office to Warehouse door entry reader (this is the reader on the office side of the door).
Access is granted. If the warehouse supervisor gets trapped in the office when it is armed, he/she can still
get out. Note that the Office area stays armed.
4. Badge Card 3 (office worker) at the Warehouse to Office door reader. Access is granted and the area is
disarmed. The Office Entry door also unlocks.
5. Badge Card 6 (warehouse supervisor) at the Warehouse to Office door reader. This time access is granted.
There are now office staff present so access is allowed.

Testing the Warehouse Area


1. Badge Card 6 (warehouse supervisor) at the Warehouse Roller door entry reader. Access should be
granted without requiring a PIN.
2. Double-badge Card 6 at the Warehouse to Office door reader. The beepers on the Warehouse Roller door
and Office to Warehouse door should start beeping. Now anyone in the office will get a warning that the
warehouse area is arming. Once armed, the LEDs on the Warehouse Roller door and the Office to
Warehouse door should be flashing. From outside the warehouse there is now visual indication that the
Warehouse area is armed.
3. Badge Card 3 (office worker) at the Office to Warehouse door reader. Access is denied as the warehouse is
armed.
4. Badge Card 3 at the Warehouse to Office door reader. Access is granted, allowing the office worker to
escape from the warehouse if they get trapped.
5. Badge Card 6 (warehouse supervisor) at the Warehouse Roller door entry reader. This time a PIN is
required. Type 8837 and press Enter. Access is granted and the area is disarmed.
6. Badge Card 3 (office worker) at the Office to Warehouse door reader. Access is granted as there are now
warehouse staff present.
7. Badge Card 3 at the Warehouse Roller door reader. Access is denied as the Office door group does not
include the Warehouse Roller door.

224 Module 135: Configuring Intruder and Access Integration | Testing the System
Review Questions
Which of the following is a good example of where a Qualify Output should be used to
validate a schedule?
 To change a door's entry reading mode when an area is armed
 To keep a door locked on a holiday
 To turn on the keypad red LED when an area is armed
 To unlock a door when an area is disarmed
To enable automatic disarming of an area when access to a door is granted, which of the
following must be configured?
 Area Inside Door (set in door programming) and Disarm Users Area On Valid Card (set in reader
expander programming)

 Reader One Arming Mode (set in reader expander programming) and Disarm Users Area On Valid Card
(set in reader expander programming)

 Area Inside Door (set in door programming) and Disarm Area For Door On Access (set in reader
expander programming)

 Reader One Arming Mode (set in reader expander programming) and Disarm Area For Door On Access
(set in reader expander programming)

If the first door on a reader expander has in and out readers, which of the following
statements is correct?
 D0 of the entry reader must be wired into D0 of reader port 2
 D1 of the entry reader must be wired into D1 of reader port 2
 D0 of the exit reader must be wired into D0 of reader port 2
 D1 of the exit reader must be wired into D1 of reader port 2

Level One: ProtegeGX Installer Study Guide | February 2018 225


Module 136:
System Monitoring
This module explains how trouble inputs are used to monitor the status and condition of the system, and how
offsite monitoring can be achieved.

Level One: ProtegeGX Installer Study Guide | February 2018 227


Trouble Inputs
A trouble input is a logical entity that behaves like a physical input but changes state based on the state of a
system trouble condition, such as AC Fail or Battery Low. In normal condition the trouble input is closed, such
as a PIR not detecting any movement. When a trouble conditions occurs the associated trouble input opens.

Trouble Input Programming


Trouble inputs are programmed much like a physical input, starting with the name.
The Add Controller and Add Expander wizards provide the option to create trouble inputs, but we recommend
formatting these to include at least the site code (for example, Controller Tamper TXS), to allow for easy
identification.

Module Address
Trouble inputs also have a module address, just like physical inputs. These are described for each hardware
module in the corresponding installation manual.

Contact ID Configuration
The Configuration section is used to override the default Contact ID settings. Leave these as is unless you have
a specific requirement for reporting codes.

Areas
Trouble inputs, just like physical inputs, must be programmed to an area and assigned an input type before they
will generate an alarm. Trouble inputs can be assigned up to four areas, and will be processed individually by
each area based on the input type assigned.

Create a Trouble Area


To monitor trouble inputs, we need a new area.
1. Navigate to Programming | Areas, and create a new area called System TXS.
2. Switch to the Configuration tab and set the Entry and Exit delay times to 0 so we will be able to arm
instantly.

228 Module 136: System Monitoring | Trouble Inputs


Adding Trouble Inputs to the System Area
1. Navigate to Programming | Trouble Inputs to see all the trouble inputs added by the Controller wizard.
2. Select all the trouble inputs (CTRL+A), click the Areas and Input Types tab, and set the first area to our new
System area.
3. Set the first Input Type to Trouble Silent.
4. Click Save to update the records.
We've now added all the Trouble Inputs to the system area.

View the Status Page


Note that the Status Page does not include the new system area.

Status List Update


Now we need to add the new system area to our status page.
1. Select the All Doors and Areas status list and click Add to open the Select Devices window.
2. Set the Device Type to Area and choose the controller.
3. Check the new system area and click OK. Save your changes.
If your status page is already open, close it and open it again for the changes to take effect.

Arm the System Area


From the Technician status page, arm the 24-hr portion of the system area. You should see some trouble inputs
create alarms.

Level One: ProtegeGX Installer Study Guide | February 2018 229


Offsite Monitoring
Offsite monitoring can be achieved using either ContactID or SIA over a PSTN phone line, and/or via any of the
supported IP protocols across the internet. Both options are built in to all Protege controllers and do not require
any additional hardware or licenses.

Traditional Analog CID Monitoring


When alarm systems first started reporting to a central monitoring station they often used a third-party alarm
dialer. This device had one or more inputs onboard, which would initiate a phone call to a central monitoring
station. The dialer would use either a series of pulses or beeps, or DTMF tones, to communicate a message to
an alarm receiver at the monitoring station, much like morse code.
Alarm Transmitted

Controller Public Switch Telecom Exchange Public Switch Alarm Receiver


Telephone Network Telephone Network

Kiss Off Sent

As alarm monitoring became more popular, more and more alarm panels came out with onboard dialers, and
the industry started to settle on a number of standards or protocols for the communication of alarms. Contact
ID has become one of the most popular of these protocols and is supported by most modern alarm systems.
Contact ID uses DTMF tones to communicate alarms in the following format:
1234 = Account number (1234)
18 = Message type used to identify the message as Contact ID
1131 = Event qualifier (1) for a new event, followed by the event code for perimeter burglary
01 = Partition or area number (1)
015 = Zone/input number (015)
8 = Checksum
The entire message can be looked at like this:

0800 123 456 1234 18 1131 01 015 8


Phone Number Contact ID String

230 Module 136: System Monitoring | Offsite Monitoring


The controller dials the monitoring station and waits for the handshake tone before transmitting the CID string,
then waits for the kiss-off tone from the receiver. The monitoring station picks up the messages, looks up the
account details on its database, and displays the alarm to the operator.
Alarm Monitoring Software

Public Switch Alarm Server Workstation Monitoring Operator


Telephone Network Receiver

Database

As Contact ID sends groups of numbers representing account, area and zone, the monitoring operator relies on
the database inside the monitoring software being accurate. The information they receive is only ever as good
as that provided by the technician during installation.

Add a Phone Number


For any PSTN-based monitoring service, at least one phone number is required for communication.
1. Navigate to Programming | Phone Numbers and click Add.
2. Enter the Name and primary Phone Number of your monitoring station. Save your changes.

Adding a Secondary (Backup) Phone Number


Most monitoring stations have a secondary number to be used as a backup in case the first fails.
1. Click Add to create another record.
2. Enter the Name and secondary/backup Phone Number of your monitoring station. Save your changes.

Services
Services provide interaction between ProtegeGX and external systems. Services include ContactID, SIA, Report
IP, and many other options for automation and control.

Services run on ProtegeGX controllers, so are not reliant on the ProtegeGX server.

Level One: ProtegeGX Installer Study Guide | February 2018 231


Configure the Contact ID Service
1. Navigate to Programming | Services, select the controller, then click Add to create a new service. Set the
Service Type to ContactID.
2. Set the Service Mode to Start with Controller. This ensures the service is started automatically whenever
power is cycled to the controller. If left at Manual Mode, the service needs to be manually started each time
the controller is reset or restarted.
3. Under the General tab, enter the Client Code (or account no.) from the monitoring station. If the controller
needs to dial a number to gain an outside line, create a separate phone number and select it as the PABX
Number.
4. Set Phone Number 1 to the primary phone number of monitoring station. Phone Number 2 is only
programmed if you require monitoring signals to be sent to two different phone numbers simultaneously.
This is not a backup phone number.
5. Set Phone Backup to the second number defined earlier. This number will be dialed if a connection to the
monitoring station cannot be made on the Phone Number 1. It can also be the number of an alternative
monitoring station.
6. Under the Options tab, enable the reporting options for the signals you wish to be sent by this service.
 Open and Close: Reports all area arming and disarming signals. This is usually only enabled for
commercial premises
 Alarms, Tampers and Restore: Reports the corresponding input state changes
 Bypass: Reports if a user bypasses an input. This is usually only enabled for commercial premises
7. Select the Settings tab.
 The Area Group defines the group of areas the service is responsible for monitoring. By default, it is set
to All Areas. This means signals generated by any area will be reported offsite by the service. Consider a
multi-tenanted building where ContactID services can be set up for each tenant and area groups
configured for each.
 CID Mapping sets a standard predefined monitoring template. The two templates (Standard or Large)
automatically map zone numbers to ProtegeGX inputs.
We'll use Standard Mapping.

Overriding CID Mapping


To override the settings of the report maps, individual Contact ID codes can be programmed at each input.
1. Navigate to Programming | Areas and click on the Configuration tab. Under Setup, program the Client Code
setting to override the account code for each area. If left as FFFF, it will follow the client code programmed
in the service.
2. The Reporting ID is used to identify the area to the monitoring company when a report is generated. If the
Reporting ID is left at 0, it will follow the report map.

Start the Service


Once a service has been configured, it must be started. Right-click the service from the record list and choose
Start Service.

232 Module 136: System Monitoring | Offsite Monitoring


IP Monitoring
As technology improves, and more and more services and functions are performed on computer networks or
the internet, traditional analog systems are being forced into the digital world.

Why IP Monitoring?
Analog technologies such as copper phone lines are becoming more costly to maintain and therefore more
expensive for the end user. Analog alarm dialers are no exception. Many businesses and new residential
subdivisions are moving to fibre to the door. This means no analog phone lines, and VoIP for communications.
The problem with VoIP for alarm dialers is that due to many of the compression techniques used, the
handshake, DTMF, and kiss-off tones are often completely lost in transmission. Sometimes it is the cost of a
traditional phone line that prompts a move to digital.
 Every business call costs money
 If a site sends only open and close messages each day, there is added cost for the calls alone
 If the average site has two alarm activations per month, add a further cost
 If an analog phone line is used only for the alarm, add a line rental charge
All these costs add up! Moving your alarm system to a fully IP solution utilizing an existing internet connection
can save a significant amount per site, per year. This alone justifies the cost of installing an IP alarm panel.
Another key feature is that IP monitoring is essentially always online to the monitoring station, with a regular
default polling time of 90 seconds.
Many alarm dialers test only once every 24 hours, or sometimes only once every five days. Message
transmission is almost instant and a lost connection can be detected in 90 seconds or less. IP monitoring
utilizes existing IT infrastructure and doesn't 'tie up' the internet connection the way an alarm dialer does with a
phone line. IP monitoring uses such a small amount of bandwidth that it can sit on your existing network without
any noticeable effect on other network traffic.

IP Alarm Monitoring
IP alarm monitoring has been developed to achieve the same thing as Contact ID alarm monitoring (transmit an
alarm message to a central monitoring station), only it does so via a network connection across the internet.

Alarm Transmitted

Kiss Off Sent

Level One: ProtegeGX Installer Study Guide | February 2018 233


The ArmorIP protocol takes the Contact ID message and encapsulates it in a TCP/IP message. Additional
information can be added, such as panel name, event time, panel type, serial number, zone or user name, and
much more.

0800 123 456 1234 18 1131 01 015 8


Phone Number Contact ID String

Contact ID Format

203.97.49.55 1234 18 1131 01 015 8


Monitoring IP Address Additional Data Contact ID String

ArmorIP Format

This data is transmitted across the internet to the monitoring station. The message can be received at the
monitoring station either by the existing receiver (provided it is IP-capable), or by the ArmorIP software running
on a server. The ArmorIP software has the added advantage of being able to display all additional data that
comes with the ArmorIP protocol. This means that any changes to names of users, areas and zones on site are
transmitted to the monitoring station as they are seen on site, so there are no mismatches between what the
monitoring station sees and what the people on site are looking at.
The ArmorIP server receives the IP message, sends an acknowledgment, then passes the data to the alarm
receiver (via RS232), using the Ademco 685 protocol. This allows monitoring stations to utilize their existing
software for processing and tracking alarms, and to display alarms directly from ArmorIP, ensuring additional
information received from the site is seen.

Key points
 No copper phone line required = money saved
 Always online
 Instant transmission of alarms
 Uses existing network infrastructure = no additional cost
 Displays additional, accurate information from site

Configure the Report IP Service


1. Navigate to Programming | Services, select the controller, then click Add to create a new service. Set the
Service Type to Report IP and the Service Mode to Start with Controller. This ensures the service is started
automatically whenever power is cycled to the controller. If left in Manual Mode, the service must be
manually started each time the controller is reset or restarted.
2. Select the General tab and enter the Client Code (or account number). This is the code used to identify the
system at the monitoring station and is usually issued by the monitoring company.
3. Connection: Enter the connection details as supplied by the monitoring station.
 IP Address: The IP address of monitoring station
 IP Port Number: The appropriate port number (in conjunction with IP address) of the monitoring station
If the monitoring station has a backup path, enter the Secondary IP Address and the Secondary IP Port
Number to be used if the first IP address fails.
Note: Either the IP address, the port, or both, should be different. If a backup path is not used, leave these
set at 0.

234 Module 136: System Monitoring | IP Monitoring


4. Reporting Protocol: This is usually supplied by the monitoring station. ArmorIP is an ICT proprietary format
and the only IP reporting protocol to be UL-certified.
Wherever possible use ArmorIP (TCP) Encrypted for the most robust and secure monitoring format. If
encryption is used, the monitoring station will supply an Encryption Level and Encryption Key that must also
be entered in the service settings.
5. Backup Service: If a backup service is selected, enable the Service Operates as Backup option in the
Contact ID service, otherwise both services will report each new event.
6. Area Group: This defines which group of areas the service is responsible for monitoring. By default, it is set
to All Areas which means that signals generated by any area are reported offsite by the service.
7. IP Polling: One of the advantages of IP reporting is that it is always 'on'. This is achieved by the sending of
regular poll messages. In most cases, the Poll Time frequency is set to 90 seconds, but the monitoring
station may request a different setting.

IP polling should not be confused with the 24 Hour Test Signal. The 24 Hour Test signal is still required and
is a Contact ID message generated by the system once every 24 hours. The polling messages are handled
by the IP protocol, and don't appear as a test signal at the monitoring station. The IP receiver software
handles the regular polling internally and generates a monitoring poll fail signal locally if a regular poll is not
received within a predefined period.

8. Select the Options tab and enable the reporting options for the signals you wish to be sent by this service:
 Report Open and Report Close: Reports all area arming and disarming signals - usually only enabled
for commercial premises
 Alarms, Tampers and Restore: Reports the corresponding input state changes
 Bypass: Reports if a user bypasses an input - usually only enabled for commercial premises

Start the Service


Once a service has been configured, it must be started. Right-click the service from the record list and choose
Start Service.

Level One: ProtegeGX Installer Study Guide | February 2018 235


Review Questions
How many areas can a trouble input be assigned to?
1
4
 None - Trouble inputs are automatically assigned to the System area
 None- Trouble inputs are automatically assigned to the Trouble area
When do you need to set a Reporting ID for a trouble input?
 Only if you want to use a different Reporting ID from the default reporting map
 Only if you need offsite monitoring for that trouble input
 Always
 Never
When manually adding a trouble input, where can you find the module address to use for a
particular trouble input on an expander?
 You can assign any address as long as it is within the memory profile
 In the installation manual for the expander module
 Trouble inputs don't have a module address
 The server automatically assigns the next free module address
Which of the following statements about offsite monitoring is/are true?
 Contact ID is supported on all ICT controllers with an onboard dialer
 All ICT controllers support IP monitoring onboard
 SIA is supported on all ICT controllers with an onboard dialer
 All of the above
Which of the following things can Contact ID transmit?
 The account number that identifies the site
 The type of event that has occurred
 The area that the event occurred in
 All of the above

236 Module 136: System Monitoring | Review Questions


Which of these configuration examples is/are valid for IP monitoring?

 They are all valid


 A is not valid
 B is not valid
 D is not valid
Which of the following statements is true for ALL IP monitoring protocols?
 No copper phone lines required
 No copper phone lines required, displays additional, accurate information from site
 No copper phone lines required, displays additional, accurate information from site, they are essentially
'always online'

 No copper phone lines required, they are essentially 'always online', alarms are transmitted instantly

Level One: ProtegeGX Installer Study Guide | February 2018 237


Module 137:
System Commissioning
This module introduces the commissioning tools available within the ProtegeGX system, how the keypad can be
used for testing on site, and the procedure for backing up and restoring a database.

Level One: ProtegeGX Installer Study Guide | February 2018 239


System Commissioning Tools
ProtegeGX has a number of built-in features to use when commissioning a system.

Item History
All programmable items in ProtegeGX have a History tab. This shows the audit trail for the currently selected
item, including who made a change to the programming, and when. This is a useful tool for tracing changes
made to an item/feature that has stopped working.
The History tab also shows details of what was changed. Highlight the change and click Details. Both the old
and new values are logged. Where multiple changes were made in a single operation, these are logged as one
change.

The History tab currently logs only the changed values where the field contains a single value. Where there are
multiple values, such as doors in a door group, only the fact that something was modified is logged.

Item Usage
Another useful feature for troubleshooting and commissioning is the Usage tab. This tab shows how a particular
item links to other items, for example, the Usage tab for a door shows which reader expander the door is linked
to and which door groups it belongs to.
 Click on an area's Usage tab to show which inputs are in the area, which doors are associated with the
area, and which area groups the area belongs to
 Click on a schedule's Usage tab to show which items follow that particular schedule
 Click on an access level's Usage tab to show users currently assigned that access level
 Click on an output's Usage tab to show items that can potentially control the output

Loading Events
When testing or troubleshooting an item it is useful to see what it has been doing recently. Any device that can
generate an event has an Events tab.
1. Click the Load Events button on:
 a user, to see what the user has been doing recently
 a door, to see what caused the door to open
 an input, to see when and how often it opened
 an area, to find out when and who armed or disarmed it
 an output, to find out what and when it was turned on or off
The loaded events can then be copied to the Windows clipboard to paste into an email, or save to a text
document to include in commissioning reports.
2. Click the Run as Report button to run the list of events as a report. Reports are covered in more detail
shortly ...

240 Module 137: System Commissioning | System Commissioning Tools


The Export Tool
The Export tool allows for extraction of information to the Windows clipboard or to a CSV format file that can be
opened in Microsoft Excel for inclusion in commissioning documents.
1. Highlight the item(s) you wish to export and click Export.
2. Export Type allows you to select export of all items in the current list, or just selected records. Destination
allows you to choose between the Clipboard or a file.
3. Select the information (columns) you want to export and click OK.
If you've chosen a file, you will be prompted for a file name and location to save the file to. This file can now be
opened in Excel where the data can be formatted and added to the project documentation.

Reports: Event Search


An important function of any access control system is the ability to produce reports on activity. There are several
ways to achieve this, but this qualification focuses on the Event Search function only.
1. Navigate to Events | Event Search and select the Time Period you wish to include events from. Choose from
the available list of common timeframes, or enter specific start and end dates, then click Find. A report is
generated showing all events for the selected period.
2. Use the Next and Previous buttons to navigate through the pages of the report.
3. Use the Print button to open the Print Preview window from where you can print, export or, if an SMTP
server has been configured, email the results. Export format options include: PDF, HTML, MHT, RTF, XLS,
XLSX, CSV, Text, Image, or XPS. Most often, though, you are looking for a particular event, or sequence of
events. This is where the WYSIWYG Grid View reporting tool comes in useful.

Using Grid View


Grid View enables the easy sorting and filtering of report results. Click in any of the empty fields at the top of the
columns and start typing what you are looking for. For instance, type 'gran' into the description field and the
event list will filter to show 'Granted' events.

The results can be further refined by adding additional filters. For example, if we now type the letters 'br' into the
User field, we will see Granted events for Brett Lamb. If the report is printed now, it will include only the filtered
results as shown on screen.

Level One: ProtegeGX Installer Study Guide | February 2018 241


CID Reporting Tool
You'll often need to supply the offsite monitoring station with a Contact ID report map. The Report Map
Generator enables you to produce this report easily from the ProtegeGX system. This is included on the Training
USB card, or can be downloaded from the ICT website.
1. Double-click the Report Map.exe to launch the Report Maps Generator.
2. Enter the Database connection details. Provided you selected the defaults during installation, this is the
name of the server and ProtegeGX (where ProtegeGX is the SQL instance).
3. Click Connect. If connection is successful, a green folder appears and the version of the database is shown
below.
4. Select the Output Directory where the report is to be saved to.
5. Select the Site Name and Controller to produce the report for, then click Generate.
6. Browse to the output folder and open the resulting HTML or CSV file. Print and send this to the monitoring
station.

242 Module 137: System Commissioning | System Commissioning Tools


Keypad Testing
ProtegeGX is a server-based system and as such very little programming is carried out at the keypad. The
controller's IP setting is one of the few things that can be programmed. The keypad is still a valuable tool for
carrying out commissioning onsite.
We will now look more in depth at the Events Menu (3) and Installer Menu (4).

Events Menu
Log in with the installer code. Press [MENU] [3] [1]. This takes you to the Events Review menu which displays all
events stored on the controller, starting with the most recent.
To move backwards through the event review, push the [DOWN] key. To move forwards through the event
review, push the [UP] key. When you reach the most recent event, the keypad shows:

Start of events  
reached.  
Pressing the [DOWN] key at this point takes you back to the last event you viewed. Pressing the [UP] key shows
any new events.
The maximum text length of an event is 64 characters but as the keypad can display only 16 characters per line,
events may be split over 4 lines. By default, lines 1 and 2 are displayed on the keypad.
 Press the [RIGHT] key to display lines 2 and 3
 Press the [RIGHT] key again to scroll to lines 3 and 4
Moving up and down through the events continues to display the same lines, so if you are currently viewing lines
2 and 3 of an event and press the [DOWN] key, lines 2 and 3 of the next event are displayed.
 Use the [LEFT] key to move back up through the lines displayed

Input View Menu


Log in with the installer code. Press [MENU] [4] [1] [1] for the Input View menu which allows you to view the
current state of an input.

Select zone to 
view: 000000‐‐ 
Press [ENTER] to select an input. This number refers to the order the input is stored in at the controller and does
not relate to the server database. Type in a number, or use the [UP] and [DOWN] keys to scroll through the
available inputs.

Pressing [ENTER] while the display shows all 0s displays the first input on the controller (usually Input 1).

The first line displays the first 16 characters of the input name as recorded at the server. The second line shows
the current state.

Office Entry Dr  
is CLOSED 

Level One: ProtegeGX Installer Study Guide | February 2018 243


This display is dynamic and updates in real time as the input changes state.
Press the [UP] and [DOWN] keys to cycle through the inputs. Press the [LOCK] key to switch between input
name and input address.

CP001:01 Zone 
is CLOSED 
Press the [LEFT] key to return to the input number selection screen.

Trouble Input View Menu


Press [MENU] [4] [1] [2] for the Trouble Input View menu, allowing you to view the current state of a trouble
input.

Trouble zone to 
view: 000000‐ 
As with the Input View menu, you'll be prompted to enter a trouble input number. This number refers to the
order the trouble input is stored at the controller and does not relate to the server database. Navigation is
carried out in the same way as for inputs.

Output View Menu


Press [MENU] [4] [1] [3] for the Output View menu, to view the current state of an output.

Select PGM to 
view: 000000 
As with the previous menus, you'll be prompted to enter an output number. Navigation is carried out in the
same way.
Outputs can also be controlled from this menu. Note that the [1] key has the word ON next to it and the [2] key
has OFF next to it. Pressing the [1] key turns the output ON.

CP001: Bell 0 
is ON 
Pressing the [2] key turns the output OFF.

CP001: Bell 0 
is OFF 

Door View Menu


Press [MENU] [4] [1] [4]. This takes you to the Door View menu, allowing you to view the current state of a door.

Select Door to 
view: DR000000 

244 Module 137: System Commissioning | Keypad Testing


As with the previous menus you will be prompted to enter a door number. Navigation is carried out in the same
way.
Doors can also be controlled from this menu. Pressing the [1] key sends an Unlock by menu command to the
door. This unlocks the door for the same period as a card badge or REX input does (5 seconds by default).

Office Entry TXS 
(Closed)(Menu  ) 
After the time expires, the door locks again.

Office Entry TXS 
(Closed)(Locked) 
Note that the [3] key has the word 'LAT' next to it. This is short for LATCH. Pressing the [3] key latch unlocks
the door.

Office Entry TXS 
(Closed)(Latch ) 
The door stays unlocked until another lock command is issued, such as when a schedule changes.
Press the [2] key (OFF) to lock the door again

Office Entry TXS 
(Closed)(Locked) 

Bypassing Inputs
Press [MENU] [BYPASS] to access the Bypass Input menu. Navigate and select inputs in the same way as in
other menus. The display shows the current bypass state of the input.

Office Entry Dr  
is not BYPASSED 
If an input is not bypassed, it will function as normal if the area is armed. To bypass an input, press the [1] key
(ON).

Office Entry Dr  
is BYPASSED 
The next time an area arms, this input will be ignored and will be able to open and close without activating an
alarm.

Note: When the area is next disarmed the bypass will clear automatically.

Pressing the [3] key (Latch) will latch bypass the input. This means the input will be ignored and will be able to
open and close without activating an alarm.

Office Entry Dr  
is BYPASS LATCH 
When the area is next disarmed, a latched bypass will not clear automatically.
Press the [2] key (OFF) to clear a bypass from an input.

Office Entry Dr 
is not BYPASSED 

Level One: ProtegeGX Installer Study Guide | February 2018 245


Protege Databases
The Configuration and Event databases are both Microsoft SQL Server databases.

MS SQL Server Server Client

Configuration Database

Controllers (s)

Event Database

The databases are completely independent from the ProtegeGX server and user interface. This means the
services and software can be completely removed without affecting the Configuration or Events databases.
Similarly, the ProtegeGX databases can be backed up and restored as required. It is even possible to back up a
database from one server and restore it to another. This is very useful when running a test environment or for
pre-programming a system at your office prior to deployment to the client site.

Backing up a Database
The ProtegeGX Configuration database can be backed up automatically and manually from within the
ProtegeGX software. It can also be backed up using Microsoft SQL Server Management Studio. The Event
database can only be backed up using the Management Studio.
1. Open Microsoft SQL Server Management Studio. The first time you connect, specify the server name. If you
accepted the defaults during installation, this will be COMPUTERNAME\PROTEGEGX where
COMPUTERNAME is the name of the PC ProtegeGX is installed on.
2. Click Connect to continue. By default, only the Windows user who performed the original installation (using
the SQLSetup.exe file from the ProtegeGX installation package) has access to the database.
3. Click to expand the Databases node in the Object Explorer. Right-click the ProtegeGX database and select
Tasks | Back Up… If a backup has already been performed, the path is displayed under the destination.
If you don't want to overwrite this file, select it and click Remove.
By default, if you select a backup file that already exists, the new backup is added to this file. It can still be
restored, but care needs to be taken in selecting the correct backup when restoring.

4. Click Add... to enter the name and location of the backup file. Make sure you include the extension .bak in
the file name, then click OK.
5. Click OK to close the Select Backup Destination screen then click OK again to start the backup. Progress is
shown as the backup completes, and once finished a confirmation message is shown.
Backing up the Events database is achieved by following the same process, but selecting the
ProtegeGXEvents database instead.

246 Module 137: System Commissioning | Protege Databases


Restoring a Database
While backups can be performed automatically or manually, and from within the ProtegeGX software or
MSSQL, restoring a database must always be carried out in MSSQL. Before attempting to restore a database:
 Back up your current database so you can return to a known point if something goes wrong
 Stop the ProtegeGX Services - this terminates the connection between the database and ProtegeGX
Services
 Remember that when stopping the ProtegeGX Data Service, the software should also be closed

To Restore a Database:
1. Open Microsoft SQL Server Management Studio.
The first time you connect, specify the server name. If you accepted the defaults during installation, this will
be COMPUTERNAME\ProtegeGX where COMPUTERNAME is the name of the PC ProtegeGX is installed
on.
2. Click Connect to continue.
By default, only the Windows user who performed the original installation (using the SQLSetup.exe file from
the ProtegeGX installation package) has access to the database.
3. Click to expand the Databases node in the Object Explorer then right-click the ProtegeGX database and
select Tasks | Restore | Database…
4. Under the Source for restore, select Device, then click the [...] button.
The Select backup devices window opens.
5. Click Add to browse to the backup file to be restored.
By default, only files with the extension .bak or .tm will be displayed. For this exercise we will restore an
empty database which can be found on your USB training card.
6. Take note of the version number shown in the file name, then click OK.
You'll see the file has been added as a backup path.
7. Click OK.
You should now have the backup file listed under the Backup sets to restore.
8. Select (enable) the Restore check box beside the backup set.
If the file already exists, SQL appends the backup to the same file as an additional backup set when
performing a backup. If multiple backup sets are shown, select the set with the most recent date.
9. Click the Options page and ensure the Restore options are set to Overwrite the existing database.
If you don't select this, the backup set will be added to the end of the existing database, resulting in
corruption of the database.
10. Click OK to start the restore process. Progress is shown as the restore is completed.
11. Once the restore is complete, restart the ProtegeGX Services.
 If the progress wheel doesn't increase, an error message will eventually be displayed. This is usually caused
by an open connection to the database and most often occurs when the ProtegeGX Services haven't been
stopped.
 If the database restored successfully and the database version is the same as the software installed, then
the services can now be restarted.
 If the ProtegeGX Data service fails to start, there is either a database / software version mismatch, or the
restored database is corrupt.
 If the database is corrupt, then your only option is to restore the backup set taken at the beginning of this
exercise.

Level One: ProtegeGX Installer Study Guide | February 2018 247


Database Versions
The software version number is broken into four sections:

3 . 1 . 48 . 14
Major Minor Database Software
Release Release Version Build

The Database version section of the version number is extremely important. If this number changes, the
structure of the database has changed. If this number doesn't match the version of the database set currently
installed, the ProtegeGX Data Service cannot start.

Database Software

49 > 48
48 = 48
48 < 49
It is not possible to restore a newer database to an older software version.
If the version numbers match, the restore should be successful and the Data Service should start.
If the database being restored is older than the software version, the installation setup file must be re-run. This
upgrades the structure of the restored database to match the software and highlights why it is good practice to
record the database version in the backup file name.

Upgrading a Database
If the database needs upgrading, run the Setup.exe file of the currently installed ProtegeGX software. The
software does not need to be uninstalled first as it is only used to upgrade the database structure.
Under Program Maintenance, select the Repair option when prompted, then follow the onscreen instructions.
The installer will cycle through versions one by one until the database is upgraded to the current version of the
software. If you have made any changes to configuration files (such as Windows security settings), these may be
overwritten by the installer and will need to be updated again at the server.

Operator Credentials
The SQL database contains all system configuration, including operator credentials. This means that after a
database has been restored the only valid operator logins are those that were valid at the time of backup.
Having restored the empty database for this exercise, the only valid operator is now admin with no password.

248 Module 137: System Commissioning | Protege Databases


Server Details
Also stored in the configuration database are the details of the Event and Download servers. If you have
restored a database from a different server, the server names will need to be updated.
1. OpenProtegeGX and navigate to Global | Event Server. Ensure the Computer Name matches the name of
the PC it is installed on.
2. Navigate to Global | Download Server. Ensure the Computer Name matches the name of the PC it is
installed on.
3. After updating the Event and Download server details, restart the ProtegeGX Data Service.

Level One: ProtegeGX Installer Study Guide | February 2018 249


Review Questions
What is the Usage tab used for?
 It shows which items are linked to the current item
 It shows when a change was made to the current item
 It shows the events associated with the current item
 It shows which operator made a change to the current item
If an output was on and you need to know what turned it on, what is the best way to find
out?
 Go to the Usage tab of the output
 Use the Find tool
 Run a Usage report
 Use the 'Load Events' function for the output
What is the best way to take information such as a list of inputs from the ProtegeGX
database for use in project documentation?
 Run a report
 Take a screenshot
 Use the Export tool to create a CSV file
 Take a database backup
The ProtegeGX keypad can be used for which of the following?
 Viewing events
 Viewing events and changing the controller IP address
 Viewing events, changing the controller IP address and changing PIN codes
 Viewing events, changing PIN codes and programming users
Which of the following statments are true for the Protege GX Keypad?
 The states of inputs, outputs and doors can be viewed
 The states of inputs, outputs and doors can be viewed and doors can be controlled
 The states of inputs, outputs and doors can be viewed and outputs can be controlled
 All of the above

250 Module 137: System Commissioning | Review Questions


Can a database that has been backed up from one server be restored to another?
 Yes, any Protege GX database will work with any Protege GX server
 No, it can only be restored to the server it was taken from
 Yes, as long as the server is running the same or newer version
 Yes, as long as the server is running the same or older version
How do you upgrade a database after it is restored to a newer server version?
 By running the software installer and choosing the repair option
 It is not possible to restore an older database to a newer Server
 The upgrade process must be completed using SQL Server Management Studio
 The software will upgrade the database next time it is run
If a database has been restored from a different server, which additional step must be
taken to get the server running?
 Restart the PC
 Change the name of the Event server and Download server to match the PC name
 Run the software installer to upgrade the database
 Relicense the server

Level One: ProtegeGX Installer Study Guide | February 2018 251


Module 138:
Programming Walkthrough
In this module, we've set up a new scenario to practise what we've learned so far. This gives an idea of what to
expect in the practical element of the certification exam.

Level One: ProtegeGX Installer Study Guide | February 2018 253


Scenario: Areas
In this scenario, we are installing an access control system in ACME's Melbourne branch.

ACME has provided us with a basic building plan with two areas:
1. Showroom
2. Warehouse

254 Module 138: Programming Walkthrough | Scenario: Areas


Scenario: Door and Schedules
For the purposes of this exercise, we will implement access control for the Showroom and Showroom to
Warehouse doors only.
 The Showroom will have a tSec Extra (with keypad) card reader, set to card and PIN for entry, and a REX
button for exit
 Valid access through the Showroom door should disarm the Showroom area
 The Showroom door should unlock 8am-5pm, Monday-Friday, and 10am-4pm on Saturday. This should
happen only if the Showroom area is disarmed.
 The Showroom to Warehouse door will have a tSec Standard card reader for entry to the Warehouse, and a
REX button for exit
 Valid access through the Showroom to Warehouse door should disarm the Warehouse area

Door Type Internal Area Schedule

Showroom Entry Door Card/PIN entry, REX exit Showroom Opening Hours

Showroom to Warehouse Card entry, REX exit Warehouse None

Level One: ProtegeGX Installer Study Guide | February 2018 255


Scenario: Intruder Detection
The Showroom area will have the Showroom PIR, the Showroom Entry Door Reed, and the Showroom to
Warehouse Door Reed assigned to it. The Warehouse area will have one PIR in each corner, the Showroom to
Warehouse Door Reed, and the Warehouse Roller Door Reed assigned to it. We will also install a keypad in the
Showroom to be used to arm and disarm both areas.

256 Module 138: Programming Walkthrough | Scenario: Intruder Detection


Scenario: User Requirements and Access
Levels
We have five users as follows:

User Role PIN Card


Manny Jah Manager 1111 Card 1
Stu Roman Storeman 2222 Card 2
Whare Hausmann Storeman 3333 Card 3
Sel Ettuyu Sales Rep 4444 Card 4
Ike Cansalla Sales Rep 5555 Card 5

The manager requires 24/7 access to all areas. The warehouse staff need access to both the Warehouse and
the Showroom, but only during opening hours. The sales reps require access to both the Warehouse and the
Showroom during opening hours. They should be able to gain access to the Warehouse only once the area has
been disarmed by warehouse staff.

Tasks
The following tasks outline the basic steps for setting things up according to the scenario requirements. If
needed, use the Step by Step >> link to open a new window with detailed instructions.

1. Restore a Blank Database and Default the Controller


Before you begin, restore a blank database so you can start with a new site with nothing programmed. If you
have not done this already in the previous module, do this now using the backup (.bak) file supplied on your
USB training card.
You must also default the controller.

2. Add a Controller
Using the Add Controller wizard, add a new controller with 8 x inputs, 1 x keypad and 1 x reader expander (only
one is required for access control of two doors).

3. Bring the Controller Online and View Health Status


Enter the serial number and IP address of the controller, set the Download server, clear the Health Status
message advising the controller has been restarted, enable encryption, and update all modules.

4. Create Schedules
Create an Opening Hours schedule and a Showroom Armed schedule. The Showroom Armed schedule will
control the reader mode for the door. Set it to operate 24/7 and to ignore holidays. Program the qualify output
to the RD1 Green LED output.

Level One: ProtegeGX Installer Study Guide | February 2018 257


5. Create Areas
Create Showroom, Warehouse and System areas, and set the exit delays to 10 seconds. Set the bell output for
both intruder areas to CP1:Bell 0. Set the armed outputs to flash appropriate reader LEDs, and set the exit and
entry delay of the Showroom area to use the reader buzzer.

6. Create a Technician Status Page


Create a Technician status page to show all doors, areas, inputs, outputs, trouble inputs, and all events.

7. Configure Inputs
Name the inputs and set them up as required.

Input Description
CP1:1 Showroom (PIR)
CP1:2 Warehouse NW (PIR)
CP1:3 Warehouse NE (PIR)
CP1:4 Warehouse SW (PIR)
CP1:5 Warehouse SE (PIR)
CP1:6 Warehouse Roller (Reed)
CP1:7 -
CP1:8 -
RD1:1 Showroom Door (Reed)
RD1:2 Showroom Door (REX)
RD1:3 Showroom Door (Bond)
RD1:4 -
RD1:5 Showroom to Warehouse Door (Reed)
RD1:6 Showroom to Warehouse Door (REX)
RD1:7 Showroom to Warehouse Door (Bond)
RD1:8 -

Wire them so they are closed, and ensure the EOL values are set to match the wiring. Set the response time of
the REX inputs to 50ms. Set the PIR and Reed inputs to use the Instant type, and assign the inputs to the
appropriate areas.

8. Create New Door Type for Showroom


Create a new Showroom door type and set the operating schedule to the Showroom Door schedule. Set the
secondary mode to Card Only, and set the primary mode to Card and PIN.

258 Module 138: Programming Walkthrough | Scenario: User Requirements and Access Levels
9. Configure Doors
Name both doors for easy identification. Set the Showroom door to use the new Showroom door type and set
the unlock schedule to opening hours. Set the area inside for both doors and the Door Lock follows... and Area
disarmed AND… options for the Showroom door.

10. Set up Auto Disarming


Configure the reader expander so both doors automatically disarm their area on valid access.

11. Create User Menu Groups


Create a menu group to allow Managers access in order to control areas, view events/system information, set
the controller time, bypass inputs, and force arm the system. The menu group should be configured so
managers are shown a greeting when logging in at the keypad and can acknowledge any alarms in the memory.
Add a further menu group to allow Staff access to control areas, also configured to show a greeting when users
log in at the keypad.

12. Create Area Groups


Create area groups containing the relevant areas for Managers, Sales and Warehouse.

13. Create Door Groups


Create door groups containing the relevant doors, and assign schedules based on user access requirements:
 Managers: The managers require 24/7 access to both doors
 Sales: Sales reps require access to both doors, but only during opening hours. They can gain access to the
Warehouse only once warehouse staff have disarmed the area
 Warehouse: Warehouse staff should have access to both doors, and only during opening hours

14. Create Access Levels


Create Access Levels for Managers, Sales and Warehouse. Include the relevant door groups, menu groups, and
arming/disarming area groups for each access level, according to user requirements.

Remember that sales staff can gain access to the Warehouse only once warehouse staff have disarmed the
area. This means that sales reps should not be able to disarm the Warehouse, however they need to be able to
arm it when they leave.

Level One: ProtegeGX Installer Study Guide | February 2018 259


15. Create Users, Assign Access Levels and Add Cards
Create the following users, adding PINs as shown, and assign the relevant access levels based on role.

User Role PIN Card


Manny Jah Manager 1111 Card 1
Stu Roman Storeman 2222 Card 2
Whare Hausmann Storeman 3333 Card 3
Sel Ettuyu Sales Rep 4444 Card 4
Ike Cansalla Sales Rep 5555 Card 5

Add each of the training cards to the corresponding user.

16. Add Power Supply Module and Trouble Inputs


Add the power supply module and relevant trouble inputs as shown.

Input Number Description


AExxx:01 Module Tamper
AExxx:02 Mains Failure
AExxx:03 Low Battery/Battery Failure
AExxx:04 Output Voltage Low
AExxx:05 Output Overcurrent Failure
AExxx:06 Core Temperature Over Temp Failure
AExxx:07 Reserved
AExxx:08 Module Offline

Add the new trouble inputs to the All Trouble Inputs status list and wire the tamper input closed.

17. Add Trouble Inputs to the System Area


Add the trouble inputs to the System area, setting the input type to Silent.

18. Create a Report IP Service


Add a Report IP service. For the purposes of this exercise, use the following details:
 Client code: 1234
 IP address: 123.45.67.89
 IP port: 9467
 Reporting protocol: ArmorIP (TCP) Encrypted

260 Module 138: Programming Walkthrough | Scenario: User Requirements and Access Levels
19. Address Health Status
View and address any Health Status issues.

20. Set Controller Time


Ensure the Controller Date Time is set to the current date/time.

Level One: ProtegeGX Installer Study Guide | February 2018 261


Testing the System
Our last, and perhaps most important, task is testing the system. The following steps provide a good indication
of how your final practical assessment will be marked. Each item represents one mark.
Using the software, arm the Showroom area.

 Did the area arm?


 Did the tSec Extra reader on Reader Expander 1 Port 1 (the Showroom Entry door) start beeping?
 Was the exit delay 10 seconds?
 Was the beeping made up of a short beep every second?
 Did the reader LED start flashing once the area armed?
Badge Card 1 (Manny Jah) at the Showroom Entry door (the tSec Extra reader on Reader Expander 1 Port 1).
Enter the PIN 1111, if required.

 Was a PIN required?


 Was the PIN 1111 accepted and access granted?
 Did the Showroom area disarm?
If the showroom area failed to disarm, manually disarm it now using the software.
Badge Card 1 (Manny Jah) at the Showroom Entry door again.

 Was access granted without requiring a PIN?


Badge Card 1 at the Showroom Entry door twice.

 Did the Showroom area begin to arm?


If the showroom area failed to arm, manually arm it now using the software.
Set the controller time to 7:50am on a Monday. Badge Card 3 (Whare Hausmann) at the Showroom Entry door.

 Was access denied?


Badge Card 5 (Ike Cansalla) at the Showroom Entry door.

 Was access denied?


Set the controller time to 7:59am on a Monday.

 After 60 seconds or less did the Office Hours schedule become valid?
 Did the Showroom door remain locked?
Badge Card 5 (Ike Cansalla) at the Showroom Entry door and enter PIN 5555.

 Was access granted?


 Did the Showroom door unlock and remain unlocked?
Badge Card 5 at the Showroom to Warehouse door.

 Was access denied?

262 Module 138: Programming Walkthrough | Testing the System


Badge Card 3 (Whare Hausmann) at the Showroom to Warehouse door.

 Was access granted?


Badge Card 5 (Ike Cansalla) at the Showroom to Warehouse door again.

 Was access now granted?


Set the controller time to 4:59pm on a Monday.

 After 60 seconds or less, did the Showroom door lock again?


Using the software, arm the Warehouse area.

 Did the area arm?


 Did the tSec Standard reader on Reader Expander 1 Port 2 (the Showroom to Warehouse door) start
beeping?

 Did the reader LED start flashing once the area armed?
Set the controller time to 3:59pm on a Saturday.

 After 60 seconds or less, did the Showroom door lock?


Badge Card 5 (Ike Cansalla) at the Showroom to Warehouse door.

 Was access denied?


Badge Card 1 (Manny Jah) at the Showroom to Warehouse door.

 Was access granted?


Using the software, ensure that the Showroom, Warehouse and System areas are armed. Open input CP1:1.

 Did a Report in Showroom … event get produced?


 Did the Bell output activate?
Open the tamper input on the power supply module.

 Did a Report in System … event get produced?

Level One: ProtegeGX Installer Study Guide | February 2018 263


Next Steps
If you answered yes to 90% or more of these questions, you are ready to sit the final assessment. If not,
continue practising until you are.

1. Restoring a Blank Database and Defaulting the Controller


1. Ensure the ProtegeGX Services are stopped.
2. From the Windows Start menu, choose Control Panel | Administrative Tools | Services. Scroll down to
locate the services, right-click and choose Stop.
3. Open Microsoft SQL Server Management Studio. The first time you connect, specify the server name. If you
accepted the defaults during installation, this is COMPUTERNAME\PROTEGEGX where COMPUTERNAME
is the name of the PC that ProtegeGX is installed on. Click Connect to continue.
4. Click to expand the Databases node in the Object Explorer. Right-click the ProtegeGX database and select
Tasks | Restore | Database…
5. Under the Source for restore, select From Device, then click the [...] button. The Specify Backup window
opens.
6. Click Add to browse to the backup file to be restored. Browse to the backup file on your USB training card
and click OK. You'll see the file has been added as a backup path. Click OK.
7. Select (enable) the Restore checkbox beside the backup set.
8. Click the Options page and ensure the Restore options are set to Overwrite the existing database.
9. Click OK to start the restore process.
10. Restart the ProtegeGX Services.
11. Remove the power to the controller by disconnecting the 12V DC input. Connect a wire link between
Reader 2 D0 input and Reader 2 L1 output.
12. Power up the controller. Once the controller has started and the Status light is flashing, remove the wire link
from the Reader 2 connector.

2. Adding a Controller
Navigate to Sites | Controllers, click Add and choose the option Add a controller with default records. Include
the following hardware records:
 1 x controller
 8 x controller inputs
 1 x keypad
 1 x reader expander
Click Add Now.

264 Module 138: Programming Walkthrough | Testing the System


3. Bringing the Controller Online and Viewing Health Status
1. Add the Serial Number and IP Address of the controller.
2. Set the Download Server, then click Save. The controller should come online within a few seconds.
3. Right-click on the controller and choose Get Health Status. Clear the message advising the controller has
been restarted.
4. Select the Configuration tab and click Initialize Controller Encryption.
5. Right-click the controller and select Update Modules.

4. Creating Schedules
1. Navigate to Sites | Schedules and click Add.
2. Create the Opening Hours schedule and define the period the schedule applies to (8am-5pm
Monday-Friday, and 10am-4pm on Saturday).
3. Create the Manager's Hours schedule, setting the time period to 24/7 and the holiday mode to Ignore
Holiday.
4. Create an additional schedule Showroom Armed, setting the time period to 24/7 and the holiday mode to
Ignore Holiday.
5. Go to the Options tab and select (enable) the Validate Schedule if Qualify Output On option.
6. Set the Qualify Output to RD1 Green R1.

5. Creating Areas
1. Navigate to Programming | Areas and click Add to create the Showroom area. Select the Configuration tab:
Set the Entry Time to 10 seconds, the Exit Time to 10 seconds, and the Alarm 1 Time to 1 minute.
2. Select the Outputs tab.
 Set the Bell Output to CP001: Bell 0
 Set the Exit Delay Output to RD1 Beeper R1
 Set the Exit Delay Pulse On Time to 1
 Set the Exit Delay Pulse Off Time to 9
 Set the Entry Delay Output to RD1 Beeper R1
 Set the Disarmed Output to <not set>
 Set the Armed Output to RD1 Red R1
 Set the Armed Pulse On and Armed Pulse Off Times to 5
3. Repeat these steps to create the Warehouse area, but using RD1 Beeper R2 and RD1 Red R2.
4. Create a System area, setting the Entry and Exit delay times to 0.

Level One: ProtegeGX Installer Study Guide | February 2018 265


6.Creating a Technician Status Page
1. Navigate to Monitoring | Setup | Status Lists and change the name of the default status list to All Doors and
Areas.
2. Click Add to open the Select Devices window, set the Device Type to Door, and choose the controller.
3. Select all doors, then click OK.
4. Repeat steps 2-3 above to add all areas to the status list.
5. Add a new status list by clicking the Add button on the main toolbar and name it All Inputs.
6. Set the Device Type to Input, select the controller, then select all the inputs and click OK.
7. Repeat to create additional status lists for All Outputs and All Trouble Inputs.
You should now have four status lists:
8. Open the Status Page Editor: Monitoring | Setup | Status Page Editor, name the page Technician, then
scroll down and select the layout as shown:
9. Click OK. This creates an empty page with a preset layout. The layout can be changed later, so this is just a
starting point.
10. Set the Columns to 4. In each of the top panels, set the Type to Status List and choose a different list for
each. Make sure you set the Rows to 2 in the far-right panel.
11. In the bottom-left panel, set the Type to Event Windows and choose the All Events record.
12. Adjust Columns so it spans all four columns. Save the page.

266 Module 138: Programming Walkthrough | Testing the System


7. Configuring Inputs
Rename the inputs based on their function. Remember to use a consistent naming convention (i.e. CP1:1
named Showroom (PIR) MEL CP1:1).

Input Description
CP1:1 Showroom (PIR)
CP1:2 Warehouse NW (PIR)
CP1:3 Warehouse NE (PIR)
CP1:4 Warehouse SW (PIR)
CP1:5 Warehouse SE (PIR)
CP1:6 Warehouse Roller (Reed)
CP1:7 -
CP1:8 -
RD1:1 Showroom Door (Reed)
RD1:2 Showroom Door (REX)
RD1:3 Showroom Door (Bond)
RD1:4 -
RD1:5 Showroom to Warehouse Door (Reed)
RD1:6 Showroom to Warehouse Door (REX)
RD1:7 Showroom to Warehouse Door (Bond)
RD1:8 -

1. Wire the inputs so they are closed.


2. Select all inputs (CTRL + A) and set the Input End of Line (EOL) values under the Options tab to match the
wiring of your inputs.
3. Use the Find tool to locate the REX inputs. Set the Alarm Input Speed and Restore Input Speed to 50 msec.
4. Use the Find tool to locate the PIR inputs. Set the Input Type to Instant.
5. Use the Find tool to locate the Reed inputs. Set the Input Type to Instant.
6. Use the Find tool to locate Showroom-related inputs. Select the Showroom PIR and Showroom Door Reed,
then click the Areas and Input Types tab. Set the First Assigned Area to Showroom.
7. Use the Find tool again to locate Warehouse-related inputs. Select the first five inputs (the four Warehouse
PIRs and the Warehouse Roller Reed) and set the First Assigned Area to Warehouse. Select the Showroom
to Warehouse Door Reed input. Set the First Assigned Area to Showroom. Set the Second Assigned Area
to Warehouse and the Input Type to Instant.

8. Creating a New Door Type


1. Navigate to Programming | Door Types and add a new door type called Showroom.
2. Set the Operating Schedule to Showroom Armed, set the Secondary Type to Card and the Entry Reading
Mode to Card and PIN.

Level One: ProtegeGX Installer Study Guide | February 2018 267


9. Configuring Doors
1. Navigate to Programming | Doors and, using our naming conventions, rename DR1 Showroom Entry MEL.
2. Set the Door Type to Showroom, the Area Inside Door to Showroom, and the Unlock Schedule to
Opening Hours.
3. Select the Options tab and enable the options Door Lock Follows Inside Area and Area Disarmed AND
Schedule Valid Unlock Door.
4. Rename DR2 Showroom to Warehouse MEL, and set the Area Inside Door to Warehouse.

10. Setting up Auto Disarming


1. Navigate to Expanders | Reader Expanders, select RD1. Go to the Reader One tab and enable the Disarm
Area For Door On Access option.
2. Repeat for the Reader Two tab. Save the changes.

11. Creating User Menu Groups


1. Navigate to Groups | Menu Groups and add a new menu group called Manager.
2. Enable the following Settings:
 Areas (1): Area Control
 Events (3): View Events
 View (5): View other system information
 Time (6): Set the Controller time
 Bypass (7): Bypass Inputs
 Force Arming: Force arm the system
3. Click the Options tab and enable the following:
 Show User Greeting
 User Can Acknowledge Alarm Memory
 Show User Alarm Memory on Logon
4. Add another menu group called Staff. Check the Area (1) setting to allow area control. Under the Options
tab select (enable) the Show User Greeting option

12. Creating Area Groups


1. Navigate to Groups | Area Groups, add a new area group called Managers and add the Showroom and the
Warehouse areas.
2. Now create a Sales area group with the Showroom area, and a Warehouse area group with both the
Showroom and the Warehouse area.

268 Module 138: Programming Walkthrough | Testing the System


13. Creating Door Groups
1. Navigate to Groups | Door Groups, click the Add button and create a new door group Managers MEL.
2. Click Add to open the Doors selection window. Select both doors and click OK.
3. Change the schedule to the Managers Hours.
4. Create a new door group called Sales Staff MEL and add the Showroom and Showroom to Warehouse
doors. Assign the Opening Hours schedule.
5. Create another door group for Warehouse Staff MEL and add the Showroom and Showroom to Warehouse
doors. Assign the Opening Hours schedule.

14. Creating Access Levels


1. Navigate to Users | Access Levels and create a Managers access level.
 Select the Door Groups tab and add the Managers door group with the schedule set to Managers
Hours
 Select the Menu Groups tab and add the Managers menu group
 Select the Disarming Area Groups tab and add the Managers area group with the schedule set to
Managers Hours
 Select the Arming Area Groups tab and add the Managers area group
2. Create a Sales access level.
 Select the Door Groups tab and add the Sales Staff door group with the schedule set to Opening Hours
 Select the Menu Groups tab and add the Staff menu group
 Select the Disarming Area Groups tab and add the Sales area group with the schedule set to Opening
Hours
 Select the Arming Area Groups tab and add the Sales and Warehouse area groups
3. Create a Warehouse access level.
 Select the Door Groups tab and add the Warehouse Staff door group with the schedule set to Opening
Hours
 Select the Menu Groups tab and add the Staff menu group
 Select the Disarming Area Groups tab and add the Warehouse area group with the schedule set to
Opening Hours
 Select the Arming Area Groups tab and add the Warehouse area group

Level One: ProtegeGX Installer Study Guide | February 2018 269


15. Creating Users, Assigning Access Levels, and Adding Cards
1. Navigate to Users | Users and create a new user, Manny Jah, with the PIN 1111.
2. Select the Access Levels tab, add the Manager access level and click OK.
3. Create additional users, adding PINs and assigning access levels as follows:

User Role PIN Card Access Level


Manny Jah Manager 1111 Card 1 Managers
Stu Roman Storeman 2222 Card 2 Warehouse
Whare Hausmann Storeman 3333 Card 3 Warehouse
Sel Ettuyu Sales Rep 4444 Card 4 Sales
Ike Cansalla Sales Rep 5555 Card 5 Sales

Badge the first training tag at the reader. You should see an event come through in the event window similar to
the following:
Read RD1 Raw Data Port (P1) (99:1)
Right-click the event and select Add Card Number to Existing User. Select the user you wish to add the card to
(Manny Jah), then click OK.
Repeat to add the remaining cards to the other users.

16. Adding the Power Supply Module and Trouble Inputs


1. Navigate to Expanders | Analog Expanders and add a new analog expander named MEL PSU1. Ensure the
Physical Address is set at 1.
2. Navigate to Programming | Trouble Inputs and add a new trouble input named MEL PSU Tamper. Set the
Module Type to Analog (AE), the Module Address to 1, and the Module Input to 1.
3. Add the remaining trouble inputs from the table as shown (excluding 07), adjusting the name and setting the
module input number accordingly. For instance, MEL PSU Mains Failure should be Module Input 2.

Input Number Description


AExxx:01 Module Tamper
AExxx:02 Mains Failure
AExxx:03 Low Battery/Battery Failure
AExxx:04 Output Voltage Low
AExxx:05 Output Overcurrent Failure
AExxx:06 Core Temperature Over Temp Failure
AExxx:07 Reserved
AExxx:08 Module Offline

270 Module 138: Programming Walkthrough | Testing the System


Add the new trouble inputs to the All Trouble Inputs Status List. Navigate to Monitoring | Setup | Status Lists
and select All Trouble Inputs. Click Add to open the Select Devices window, set the Device Type to Trouble
Zone and choose the controller.
Select the power supply module trouble inputs and click OK.
Wire the tamper input closed.

17. Adding Trouble Inputs to the System Area


1. Select all the trouble inputs, then click the Areas and Input Types tab. Set the first Area to the System area
and the first Input Type to Trouble Silent.
2. Click Save to update the records.

18. Creating a Report IP Service


1. Navigate to Programming | Services. Select the controller, then click Add to create a new service. Set the
Service Type to Report IP and the Service Mode to Start with Controller.
2. Select the General tab and enter the Client Code (or account number). This is the code used to identify the
system at the monitoring station and is usually issued by the monitoring company. For the purposes of this
exercise, use 1234.
3. Enter the IP Address and IP Port Number of the monitoring station. As we don't have 'real' connection
details, use IP address 123.45.67.89 and port 9467 for this exercise.
4. Set the Reporting Protocol to ArmorIP (TCP) Encrypted.
5. Select the Options tab and enable the reporting options for the signals to be sent by the service. For the
purpose of this exercise, select Alarms, Tampers and Restore, to report the corresponding input state
changes.
6. Right-click the service from the record list and click on Start Service.

19. Addressing Health Status


1. Navigate to Sites | Controllers, right-click on the controller, and choose Get Health Status. The controller
Health Status window appears, indicating any areas that need addressing.
2. Right-click the Showroom area from your Technician status page and choose Arm 24. Repeat for the
Warehouse and System areas.
3. Navigate to Expanders | Reader Expanders, right-click RD1, and choose Update Module.
Once the module has finished updating, view the Health Status again. You should receive a message
advising there are no known issues with the controller.

20. Setting the Controller Time


Navigate to Sites | Controllers. Right-click the controller and choose Set Controller Date Time.

Level One: ProtegeGX Installer Study Guide | February 2018 271


Review Questions and Answers

In This Section
Module 101: ICT Company Profile................................................................................................ 275
Module 121: ProtegeGX Platform Introduction ............................................................................. 277
Module 122: ProtegeGX Licensing ............................................................................................... 279
Module 123: ProtegeGX System Architecture .............................................................................. 283
Module 124: ProtegeGX Hardware Overview ............................................................................... 287
Module 127: ProtegeGX Hardware Configuration ......................................................................... 291
Module 130: ProtegeGX Hardware Setup .................................................................................... 295
Module 125: ProtegeGX System Design ...................................................................................... 297
Module 128: ProtegeGX Software Installation............................................................................... 299
Module 129: ProtegeGX Software Introduction ............................................................................ 301
Module 131: Hardware Programming .......................................................................................... 303
Module 132: User Management ................................................................................................... 305
Module 133: Basic Intruder Detection .......................................................................................... 307
Module 134: Basic Access Control .............................................................................................. 309
Module 135: Integrating Intruder Detection and Access Control ................................................... 311
Module 136: System Monitoring................................................................................................... 313
Module 137: System Commissioning ........................................................................................... 315

Level One: ProtegeGX Installer Study Guide | February 2018 273


Module 101: ICT Company Profile
Where is ICT hardware manufactured?
 China
 New Zealand
 Canada
 Canada and New Zealand
Which certification applies to ICT products?
 UL Certification
 CE Compliance
 NIST AES256 Bit Encryption Certification
 All of the above
Where is research and development carried out?
 China
 Canada
 New Zealand
 New Zealand and Canada

Level One: ProtegeGX Installer Study Guide | February 2018 275


Module 121: ProtegeGX Platform
Introduction
Who was the ProtegeGX platform built for?
 The integrator
 The consultant
 The end user
 The distributor
What type of system is the ProtegeGX platform best suited to?
 Single-door systems
 Systems of up to 50 doors
 Enterprise-class systems
 All of the above
Complete this statement:
WYSIWYG event reports are ...

 A) Exportable in multiple formats


 B) A licensable feature
 C) An intuitive way of finding the data you want
 D) A and C
How many users are supported by the system/controller?
 Unlimited/Unlimited
 Unlimited/2000
 2000/2000
 Unlimited/5 million
Who can purchase ProtegeGX hardware/software?
 Integrators who have at least one certified ProtegeGX installer
 Integrators who maintain a predefined level of sales
 Integrators who are paid members of the ProtegeGX Installers Group
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 277


Where do certification exams take place?
 Web-based, self-paced
 Only at the ICT factory
 Supervised at the integrator's office
 Supervised at an ICT-approved facility

278 Review Questions and Answers | Module 121: ProtegeGX Platform Introduction
Module 122: ProtegeGX Licensing
What is the license cap for doors?
 250
 500
 1000
 Doors are unlimited
What is the maximum number of controller licenses you will ever pay for?
 250
 500
 1000
 Controllers are unlimited
What happens when the number of cameras reaches 500?
 No more cameras can be added; the cap has been reached
 Cameras are now unlimited
 Nothing, the camera cap is 1000
 No difference, cameras are not limited anyway
How many camera licenses are included in the base license?
 None
5
1
 Cameras are unlimited
Which of the following features are NOT included in the base license?
 Floor plans
 DVR HLI (High Level Interface)
 Grid View reports
 CSV bulk user import

Level One: ProtegeGX Installer Study Guide | February 2018 279


How many operators can log in at the same time with a base license?
 As many as you like, operators are unlimited
1
 As many as you like, users are unlimited
 10
To connect 20 PTZ cameras and have them respond to events automatically, what is
required?
 10 camera licenses
 10 camera licenses, DVRs are unlimited
 A base license, 19 camera licenses, DVRs are unlimited
 A base license, 19 camera licenses and a DVR HLI license
Which licensed feature is required to enable operators to log in to the ProtegeGX Client
using their Windows credentials?
 An Active Directory (LDAP) User's License
 An Active Directory (LDAP) Operator's License
 A Concurrent Operator Connection License
 All of the above
Which license do I require for a system with 100 IP doors?
 A base license and 50 door licenses
 A base license and 100 door licenses
 A base license and 100 IP door licenses
 A base license, 100 IP door licenses and 50 door licenses
To what is the ProtegeGX license bound?
 The integrator
 The site
 The server
 The ProtegeGX database

280 Review Questions and Answers | Module 122: ProtegeGX Licensing


Which of the following circumstances does NOT require a license update?
 Restoring an old ProtegeGX database
 Adding 150 door licenses
 Replacing the server motherboard
 Upgrading Windows on the server
Do you need to have Internet access to update your license?
 No, you can do a manual license update
 Yes, the automatic license update connects to the ICT licensing server via the internet
 Yes, even with a manual license update you need internet access somewhere to upload the license
request and download the license file

 No, the proxy server can provide your license update

Level One: ProtegeGX Installer Study Guide | February 2018 281


Module 123: ProtegeGX System Architecture
Which database are events stored in?
 On the controller only. The server interrogates the controller for reports.
 The ProtegeGX database located on the server.
 The ProtegeGX Events database located on the server
 The Reports database
What does the ProtegeGX database contain?
 Controller configuration only
 Global system configuration only
 The configuration for the entire system
 The configuration and events for the entire system
Can the ProtegeGX controller run in standalone mode?
 Yes, ProtegeGX is a controller-based system. The server is only used to program the controller.
 Yes, ProtegeGX is a server-based system but controllers will run standalone once configured.
 No, ProtegeGX is a server-based system and must have a network connection between the controller
and server at all times.

 No, the ProtegeGX controller stores its configuration database on the server.
The ProtegeGX Client software ...
 can be installed on one PC only if you have a base license
 is installed on the server only if you have a base license
 can be installed on any number of workstations
 is never installed on the server
When making configuration changes ...
 The ProtegeGX Client makes changes to the controller directly
 The ProtegeGX Client makes changes to the ProtegeGX database
 The ProtegeGX Client makes changes to the ProtegeGX database and controller
 The ProtegeGX Client is not used

Level One: ProtegeGX Installer Study Guide | February 2018 283


What does the ProtegeGX Client software communicate with?
 The server only
 The server for system configuration and reports, and the controller for status updates
 The controller for configuration and reports, and the server for status updates
 None of the above
Which of the following statements is correct?
 Controllers can communicate with the ProtegeGX server using the Internet
 Controllers must be on the same local area network as the ProtegeGX server
 Controllers must be on the same corporate network as the ProtegeGX server
 Controllers cannot communicate with the ProtegeGX server using the Internet
How does the controller communicate with the server?
 Using the RS-485 module network
 Using TCP/IP on an Ethernet network
 Using the RS-232 serial interface
 Using Point to Point Protocol over Ethernet (PPPoE)
What sort of sites/systems was ProtegeGX built for?
 High-end residential sites
 Single-controller commercial sites
 Enterprise-scale systems
 All of the above
Which of the following is NOT a reason for making ProtegeGX a server-based system?
 Storing system configuration on a server allows more data to be stored
 Configuration changes can be easily made to the system, then the system manages which controllers
need to be updated

 It helps to keep system information confidential


 It means there is a single point for all configuration changes

284 Review Questions and Answers | Module 123: ProtegeGX System Architecture
Complete this statement...
Where budget constraints on a small single-controller site mean an onsite server can't be justified ...

 ...ProtegeGX is not a suitable solution


 ...the ProtegeGX controller should be programmed using a technician's laptop
 ...connect the controller to a shared server using the Internet
 ...use an existing PC as the server

Level One: ProtegeGX Installer Study Guide | February 2018 285


Module 124: ProtegeGX Hardware Overview
How many access controlled doors can be directly connected to the Protege controller?
0
1
2
4
How many onboard high-current relay outputs does the Protege controller have?
2
4
7
 500+
How many onboard inputs does the Protege 2 door reader expander have?
7
6
8
4
If installing a system with two doors (each with readers for entry and exit), how many
reader expanders are required?
 Two. Each reader expander has two reader ports onboard.
 One. With reader multiplexing, a single reader expander can support two doors with entry and exit
readers.

 None. The controller supports reader multiplexing, which allows two doors with entry and exit readers
to be controlled onboard.

 One. The controller has two reader ports onboard so a reader expander is required for the other two
readers.

Which of the following offsite reporting paths is/are supported by the controller?
 IP reporting via the Ethernet port
 Contact ID via the built-in dialer
 SIA via the built-in dialer
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 287


What is the maximum distance the Protege module network can run?
 100m
 900m
 1200m
 1500m
A project requires a run of 300m (1000ft) between the controller and the nearest Ethernet
switch. Which cable type should I use?
 This is not possible - the maximum cable run between a controller and a switch is 100m (328ft)
 Belden 9842 or 24 AWG security cable
 Belden 9842 or CAT5e cable
 Belden 9842 cable
In a new installation, how many spurs can come off a controller on the RS-485 module
network?
3
4
 250
 None - star or spur wiring is not an acceptable method for new installations
Can multiple power supplies be connected to the Protege module network?
 No, the module network must be powered at only one location
 Yes, as long as the N+ connection is removed between the split sections
 Yes, as long as they are all in the same cabinet
 Yes, as long as they are all in different cabinets
If a door needs to operate in card and PIN mode, which reader should be used?
 The Nano Prox reader
 The Multi Prox reader
 The Vario reader
 The Vario PIN reader

288 Review Questions and Answers | Module 124: ProtegeGX Hardware Overview
If an ICT reader is connected to an ICT reader expander, is tamper monitoring possible?
 Yes, ICT readers and expanders can be programmed for intelligent tamper recognition.
 Yes, ICT readers include a tamper switch.
 Yes, ICT reader expanders include a tamper input.
 No, there is no tamper monitoring on ICT readers.
What is the maximum cable run for an ICT reader connected to a Protege 2 Door Reader
Expander?
 75m
 100m
 125m
 150m
How many onboard controllable outputs does the Protege Alphanumeric LCD keypad
have?
 None
 1 low-current output
 1 low-current output and two controllable LEDs
 1 low-current output, two controllable LEDs and a controllable buzzer
How many inputs does a Protege Alphanumeric LCD keypad have on board?
 None
 1 input (2 using zone duplex)
 2 inputs (4 using zone duplex)
 4 inputs (8 using zone duplex)

Level One: ProtegeGX Installer Study Guide | February 2018 289


Module 127: ProtegeGX Hardware
Configuration
In the configuration shown, what is the maximum continuous load that can be drawn by the
module network?
Power Supply (4A)

Controller
N+ N- NA NB V2+ V2+ V2+ V2+ V2+ V2+ V- V- V- V- V- V- V1+ V1+ V1+ V1+ V1+ V1+ V- V- V- V- V- V-

N+ N- NA NB B- B+ L N
To other modules
on network

Gel Cell Backup Battery Mains Input

 4 Amps
 10 Amps
 3.3 Amps
 3 Amps
To monitor a cabinet tamper switch using a dedicated tamper input, which module is
required?
 A Protege Power Supply module
 Protege System Controller
 Protege 16 Input Expander module
 Protege 2 Door Expander
Where and when should a diode be fitted?
 Across the coil when a coil is being controlled
 Across the lock when a lock is being controlled
 Across the relay when a relay is being controlled
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 291


Where does the shield of the cable connected to a reader get connected?
 Frame grounded at one point, connected to the reader shield
 Wired to V- at the reader expander, connected to the reader shield
 Card reader cable is not shielded
 Frame grounded at one point, not connected to the reader shield
Is the wiring method shown in this diagram acceptable?
Assume the power supplies indicated in the diagram shown are Protege power supply modules. Is this an
acceptable wiring method? If so what is the maximum recommended average current the controller can draw?
Module #3 Module #2 Module #1 Controller
N+ N- NA NB N+ N- NA NB N+ N- NA NB N+ N- NA NB

Power Supply #3 Power Supply #2 Power Supply #1

 This is an unacceptable wiring method


 Acceptable, 3 Amps
 Acceptable, 9 Amps
 Acceptable, 4 Amps
What does a constant red Fault indicator mean?
 The module is in identification mode
 Module communications activity
 The module is in error state - the status light will flash an error code
 The module is in boot mode awaiting firmware
What does a continuous fast green flash of the Status indicator on a power supply module
mean?
 The module is in identification mode
 There is module communications activity
 The module is online
 The module is attempting to register with a controller

292 Review Questions and Answers | Module 127: ProtegeGX Hardware Configuration
The Bell indicator on a controller is flashing two green flashes. What does this mean?
 The bell output is off. The circuit to the bell is ok.
 The bell output is off. The circuit to the siren/bell is cut, damaged or tampered
 The bell output is on. The circuit to the bell is ok.
 The bell output is on. The circuit is in overcurrent protection.
What does a flashing green indicator on an input mean?
 The input is in an open state
 The input is in a closed state
 The input is in a tamper state
 The input is in a short state

Level One: ProtegeGX Installer Study Guide | February 2018 293


Module 130: ProtegeGX Hardware Setup
How do you default a Protege controller?
 Use the web interface to connect to the controller, then click Restart
 Wire a link between D0 and L1 of reader port 2, then cycle power
 Turn on DIP switch 4, then cycle the power
 Log in at a keypad, then select [Menu] [4] [2] [2] [Enter]
If the IP address of a controller is unknown, how can you find it?
 Turn on DIP switch 3, then cycle power to the controller to temporarily set the IP address to
192.168.111.222

 Connect a keypad, press [Menu] [4] [Arm], then scroll down three times
 Use the web interface to browse to the default IP address of 192.168.1.2
 Connect a link from L1 to D0 on reader port 2, then cycle power to the controller to temporarily set the
IP address to 192.168.111.222

What is the default IP address of a Protege controller?


 192.168.1.2
 192.168.1.3
 192.168.111.222
 255.255.255.0
When the IP address of a controller is changed, which additional step must be taken?
 Perform a module update
 Save the settings
 Cycle power to the controller
 Save the settings, then restart the controller
How is the module address set on a Protege LCD keypad?
 Using DIP switches
 From the keypad setup menu: [X] at Version Info during power-up
 From the keypad setup menu: [Menu], [4], [Arm] once the system is operational
 Using the Module Address tool from within the ProtegeGX software

Level One: ProtegeGX Installer Study Guide | February 2018 295


Module 125: ProtegeGX System Design
Where should copper-clad aluminium cables be used?
 For reader connection
 For RS-485 module network connection
 CCA cables should be used wherever possible due to their higher attenuation properties
 The use of CCA cables should be avoided
If the keypad cable was damaged, causing a short across all conductors, what would
happen?
Cabinet

Power
Controller
Supply

Input Reader Keypad


Expander Expander

Primary RS-485 Secondary RS-485

 The keypad would stop functioning. The RDI2 would stop functioning. Everything else would continue
to function properly.

 The keypad would stop functioning. Everything else would continue to function properly.
 Everything would continue to function properly.
 The keypad would stop functioning. The RDI2 would go into offline mode. Everything else would
continue to function properly.

What happens when ...?


A lighting circuit is connected to an output on a Protege 8 output expander module programmed to turn on at
8pm and off at 5am. The expander goes offline at 4am, then comes back online at 10am. What happens to the
lights after the expander goes offline?

 The lights turn off at 5am.


 The lights turn off at 10am.
 The lights turn off at 4am.
 The lights turn off at 5am the following day.

Level One: ProtegeGX Installer Study Guide | February 2018 297


What happens when...?
If a door is connected to a Protege 2 door expander module programmed for No Users offline operation and the
module goes offline, what happens when a user requests exit using a REX button?

 The door is unlocked. The reader does not beep.


 The door is not unlocked. Four short beeps are given at the reader.
 The door is not unlocked. The reader does not beep.
 The door is unlocked. Four short beeps are given at the reader.

298 Review Questions and Answers | Module 125: ProtegeGX System Design
Module 128: ProtegeGX Software
Installation
Which of the following operating systems is NOT supported for server installations?
 Microsoft Windows XP SP3
 Microsoft Windows Vista SP2
 Microsoft Windows Server 2008 R2
 All of the above systems are supported
Which database version is recommended?
 SQL Server 2008 R2
 MySQL Server Enterprise Edition
 MySQL Server Express Edition
 SQL Server 2005
What are the minimum CPU and RAM requirements for a ProtegeGX server?
 Intel Atom 1.66GHz, 2GB RAM
 Intel Dual Core 2.8GHz, 4GB RAM
 Intel Dual Quad 2.8GHz, 8GB RAM
 Intel Xeon E5620, 2GB RAM

Level One: ProtegeGX Installer Study Guide | February 2018 299


Module 129: ProtegeGX Software
Introduction
After a configuration change, how long must you wait before the changes take effect?
 ProtegeGX is a server-based system so changes take effect immediately
 60 seconds
 The changes won't take effect until you connect to the controller and download to it
 Up to the time set in Download Retry Delay under the controller's Configuration tab
After restoring a database and starting the Data Service what additional step(s) must be
taken?
 Confirm your configuration is correct.
 Confirm your configuration is correct. Start the Download Service.
 Confirm your configuration is correct. Start the Download Service. Default your controller.
 No additional steps are required as the database would not restore if the configuration was incorrect.
Which service is responsible for incoming messages?
 The Update Service
 The Data Service
 The Download Service
 The Event Service
What does the Details button on the History tab do?
 It shows the date/time and operator that modified the record
 It runs a detailed event report on the record
 It shows the old and new values of fields that were modified
 None of the above
What does the Breakout button do?
 Opens the current page in another window
 Switches to the Alarms page
 Exits the software
 Closes the current window

Level One: ProtegeGX Installer Study Guide | February 2018 301


What is the Refresh button used for?
 To clear the filtered results when using the Find tool
 To update data when a second client window has been used to configure something
 To update data when another operator may have made changes to the same record
 All of the above
What is the Events tab in the Programming window used for?
 To load events for the selected record
 To load events for the selected record and run a report on these events
 To show which fields were modified and their old and new values
 To load events for the selected record, run a report on these events or copy the events to the Windows
Clipboard

What is the maximum capacity of SQL Server 2005 Express or SQL Server 2008 Express
database?
 32 million events
 4GB
 Unlimited
 10GB
How do you prevent the SQL Express event database from reaching its capacity?
 Periodically delete some events from SQL
 Purchase a larger hard drive
 Enter a timeframe in the Purge Events field in Global settings
 Create an event filter that limits the number of events saved
Where should your database backup be stored?
 Offsite if possible
 In the default location of C:\Program Files\Microsoft SQL
Server\MSSQL10_50.PROTEGEGX\MSSQL\Backup

 On a second internal hard drive


 On a USB thumb drive

302 Review Questions and Answers | Module 129: ProtegeGX Software Introduction
Module 131: Hardware Programming
A module update is required when...
 You change any settings on the expander
 You change any programming
 The controller advises it is required via the Health Status
 All of the above
What does the Add Controller wizard do?
 Adds a controller
 Adds expanders, inputs, outputs, trouble inputs
 Links all of the associated records
 All of the above
What steps are required to use the Controller onboard reader ports?
 None. Door processing is enabled by default
 Assign a reader expander address in the controller Configuration tab and select the lock outputs to use
 Assign a controller address in the reader expander Configuration tab and select the lock outputs to use
 Turn on DIP switch 4
What does it mean if an address is shown in red in the Auto-Addressing window?
 The address has been changed but not updated
 The address can't be changed using auto-addressing
 The address is outside the controller's address space
 The address is at factory default of 254
Which of the following will generate a controller Health Status message?
 A low battery on a power supply
 Failure to communicate
 When encryption is disabled
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 303


If controller encryption is accidentally disabled, which additional step must be carried out to
get the controller back online?
 The controller must be defaulted to clear the encryption key
 Controller encryption should be enabled again
 Controller encryption should be initialized again
 Nothing. If encryption is disabled at the server, the controller will continue to communicate
Answer the following...
On a site where encryption between the controller and server is normally enabled, a controller is defaulted. The
controller does not come back online.
Which additional step must be carried out to get the controller back online?

 Encryption must be disabled for the site


 Encryption must be re-initialized on the controller
 Encryption must be disabled for the controller
 A Force Download is required to push the existing encryption key out to the controller
What is the correct Event server IP address?
Assuming the screenshot below is from the ProtegeGX server, what should a controller with the IP address
192.168.10.2 have set as its Event server IP address?

 192.168.10.1
 192.168.10.100
 192.168.1.1
 192.168.1.100

304 Review Questions and Answers | Module 131: Hardware Programming


Module 132: User Management
What are Access Levels used for?
 To control which elevator levels they have access to
 To control what users can do, where they can go and when they can do these things
 To control how a door responds to a user
 To provide a way to rank users
In Access Levels, what are Door Groups used for?
 They define which doors a user has access to
 They allow a number of doors to be unlocked with a single card read
 They are used for scheduling multiple doors to unlock
 They define which area a door belongs to
What happens if the Import Users wizard has an access level mapped that doesn't exist in
the ProtegeGX database?
 The wizard will crash
 The wizard will skip the user
 The wizard will import the user but leave the access level unset
 The wizard will import the user and create a new access level to match
What must you do to ensure a schedule does not operate on a holiday?
 Nothing. By default, the schedule will not operate on a holiday.
 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Disabled on Holiday.

 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Enabled on Holiday.

 Program the holiday into a holiday group. Apply that holiday group to the schedule. Program the holiday
mode of the applicable periods to Ignore Holiday.

Level One: ProtegeGX Installer Study Guide | February 2018 305


How do you program a schedule to run from 11pm on Monday through to 2am on
Tuesday?
 Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and
check Monday and Tuesday.

 Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and
check Tuesday.

 Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and
check Tuesday.

 Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and
check Monday and Tuesday.

How do you program a schedule to be valid from 9am to 5pm Monday to Friday if the day
is not a holiday?
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Disabled on Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Enabled on Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Select Ignore Holiday.
 Program period 1 from 09:00 to 17:00 and check Monday-Friday. Program a Qualify Output for
holidays.

How do you program a schedule to be valid from 9am to 5pm on normal days and 10am to
4pm on holidays?
 Program two periods. Set the holiday mode of the 09:00-17:00 period to 'Enabled on Holiday' and the
10:00-16:00 period to 'Disabled on Holiday'.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to 'Ignore Holiday' and the
10:00-16:00 period to 'Enabled on Holiday'.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to 'Ignore Holiday' and the
10:00-16:00 period to 'Disabled on Holiday'.

 Program two periods. Set the holiday mode of the 09:00-17:00 period to 'Disabled on Holiday' and the
10:00-16:00 period to 'Enabled on Holiday'.

306 Review Questions and Answers | Module 132: User Management


Module 133: Basic Intruder Detection
A short time after creating a new area a Health Status message appears on the controller.
What is this likely to be?
 The area is missing an input type
 The controller requires a module update
 The new area has its Tamper or 24 hour area disarmed
 The area has no inputs programmed yet
How many characters of the area name programming are shown on the keypad?
 The last 16 characters of the programmed name
 The first 20 characters of the programmed name
 The last 20 characters of the programmed name
 The first 16 characters of the programmed name
Explain the result of the setting shown in this image.

 The output will never be activated as the pulse times are both set to 0
 The output will be activated constantly when an entry delay input is triggered
 The output will be activated constantly while the area is arming
 The output will pulse rapidly while the area is arming
How many areas can an input be programmed to?
 One
 Two
 Four
 It depends on whether it is on a reader expander

Level One: ProtegeGX Installer Study Guide | February 2018 307


What does the Input Type setting do?
 It sets how the input operates in the specified area
 It sets how the input operates in all areas
 It sets the input name displayed in the keypad
 It sets whether the input is used for an onboard expander
Which default input type should be used for a PIR covering the keypad at the main entry?
 Instant
 Delay
 Trouble Silent
 24 Hour Alarm

308 Review Questions and Answers | Module 133: Basic Intruder Detection
Module 134: Basic Access Control
If a door has been created by the Controller wizard with no additional configuration and is
in a Forced Open state, which input must be open?
 The REN (Request to Enter) input
 The REX (Request to Exit) input
 The Bond Sense (Lock State) input
 The Door Sense (Reed) input
Which inputs are configured by default as Bond Sense (lock state) inputs on a reader
expander?
 1 and 5
 2 and 6
 3 and 7
 4 and 8
What does this event mean?

 A card has been read that was programmed incorrectly at the factory
 The reader expander has the wrong format programmed
 A new card has been assigned to a user
 An unknown card has been read on Port 1
If a new area is created but it is not added to any area groups, who will be able to disarm
it?
 Nobody
 The installer
 The manager
 Anyone with the 'All Areas' disarming area group

Level One: ProtegeGX Installer Study Guide | February 2018 309


If a new door is created but it is not added to any door groups or access levels, who will
have access to it?
 The installer
 Anyone with the 'All Doors' door group
 Nobody
 The manager
If a user is automatically logged out of a keypad after a period of time, which option do
they NOT have checked in their menu group?
 Installer (4)
 Advanced Installer (4, 8)
 Installer Menu Group
 Time (6)
What do Door Types do?
 They define which lock outputs to use
 They set double badge arming
 They define the reading mode used to gain access
 All of the above
For a reader expander to allow a cached user through a door in offline mode, which items
must be configured?
 The controller must have the Enable Automatic Offline Download option checked and the reader
expander offline operation mode must be set to First 10 Users + Cache

 The reader must be programmed for Intelligent offline mode and the user must have the Super Rights
option checked

 The reader must be programmed for Intelligent offline mode and the reader expander offline operation
mode must be set to First 10 Users + Cache

 The controller must have the Enable Automatic Offline Download option checked and the user must
have the Super Rights option checked

Two readers are to be wired to Port 1 of a reader expander. To configure multiplexing,


what must be done?
 The exit reader must have D0 wired to reader port 2 and Multiple Reader Input Port 1 must be checked
 The exit reader must have D0 wired to reader port 2 and Multiple Reader Input Port 2 must be checked
 The exit reader must have D1 wired to reader port 2 and Multiple Reader Input Port 1 must be checked
 The exit reader must have D1 wired to reader port 2 and Multiple Reader Input Port 2 must be checked

310 Review Questions and Answers | Module 134: Basic Access Control
Module 135: Integrating Intruder Detection
and Access Control
Which of the following is a good example of where a Qualify Output should be used to
validate a schedule?
 To change a door's entry reading mode when an area is armed
 To keep a door locked on a holiday
 To turn on the keypad red LED when an area is armed
 To unlock a door when an area is disarmed
To enable automatic disarming of an area when access to a door is granted, which of the
following must be configured?
 Area Inside Door (set in door programming) and Disarm Users Area On Valid Card (set in reader
expander programming)

 Reader One Arming Mode (set in reader expander programming) and Disarm Users Area On Valid Card
(set in reader expander programming)

 Area Inside Door (set in door programming) and Disarm Area For Door On Access (set in reader
expander programming)

 Reader One Arming Mode (set in reader expander programming) and Disarm Area For Door On Access
(set in reader expander programming)

If the first door on a reader expander has in and out readers, which of the following
statements is correct?
 D0 of the entry reader must be wired into D0 of reader port 2
 D1 of the entry reader must be wired into D1 of reader port 2
 D0 of the exit reader must be wired into D0 of reader port 2
 D1 of the exit reader must be wired into D1 of reader port 2

Level One: ProtegeGX Installer Study Guide | February 2018 311


Module 136: System Monitoring
How many areas can a trouble input be assigned to?
1
4
 None - Trouble inputs are automatically assigned to the System area
 None- Trouble inputs are automatically assigned to the Trouble area
When do you need to set a Reporting ID for a trouble input?
 Only if you want to use a different Reporting ID from the default reporting map
 Only if you need offsite monitoring for that trouble input
 Always
 Never
When manually adding a trouble input, where can you find the module address to use for a
particular trouble input on an expander?
 You can assign any address as long as it is within the memory profile
 In the installation manual for the expander module
 Trouble inputs don't have a module address
 The server automatically assigns the next free module address
Which of the following statements about offsite monitoring is/are true?
 Contact ID is supported on all Protege controllers with an onboard dialer
 All Protege controllers support IP monitoring onboard
 SIA is supported on all Protege controllers with onboard dialer
 All of the above
Which of the following things can Contact ID transmit?
 The account number that identifies the site
 The type of event that has occurred
 The area that the event occurred in
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 313


Which of these configuration examples is/are valid for IP monitoring?

 They are all valid


 A is not valid
 B is not valid
 D is not valid
Which of the following statements is true for ALL IP monitoring protocols?
 No copper phone lines required
 No copper phone lines required, displays additional, accurate information from site
 No copper phone lines required, displays additional, accurate information from site, they are essentially
'always online'

 No copper phone lines required, they are essentially 'always online', alarms are transmitted instantly

314 Review Questions and Answers | Module 136: System Monitoring


Module 137: System Commissioning
What is the Usage tab used for?
 It shows which items are linked to the current item
 It shows when a change was made to the current item
 It shows the events associated with the current item
 It shows which operator made a change to the current item
If an output was on and you need to know what turned it on, what would be the best way to
find out?
 Go to the Usage tab of the output
 Use the find tool
 Run a usage report
 Use the 'Load Events' function for the output
What is the best way to take information such as a list of inputs from the ProtegeGX
databases for use in project documentation?
 Run a report
 Take a screenshot
 Use the Export Tool to create a CSV file
 Take a database backup
The Protege keypad can be used for which of the following?
 Viewing events
 Viewing events and changing the controller IP address
 Viewing events, changing the controller IP address and changing PIN codes
 Viewing events, changing PIN codes and programming users
Which of the following statments are true for the Protege GX Keypad?
 The state of inputs, outputs and doors can be viewed
 The state of inputs, outputs and doors can be viewed and doors can be controlled
 The state of inputs, outputs and doors can be viewed and outputs can be controlled
 All of the above

Level One: ProtegeGX Installer Study Guide | February 2018 315


Can a database that has been backed up from one server be restored to another?
 Yes, any ProtegeGX database will work with any ProtegeGX server
 No, it can only be restored to the server it was taken from
 Yes, as long as the server is running the same or newer version
 Yes, as long as the server is running the same or older version
How do you upgrade a database after it is restored to a newer server version?
 By running the software installer and choosing the Repair option
 It is not possible to restore an older database to a newer server
 The upgrade process must be completed using SQL Server Management Studio
 The software will upgrade the database next time it is run
If a database has been restored from a different server, which additional step must be
taken to get the server running?
 Restart the PC
 Change the name of the Event server and Download server to match the PC name
 Run the software installer to upgrade the database
 Relicense the server

316 Review Questions and Answers | Module 137: System Commissioning


APAC
Integrated Control Technology Limited
4 John Glenn Avenue, Rosedale, Auckland 0632
PO Box 302-340, North Harbour, Auckland 0751, New Zealand
Email: sales@ict.co Toll Free: (0800) 428 111 Phone: 64 (9) 476 7124
AMERICAS
Integrated Control Technology (USA) LLC
5265 S Rio Grande Street, Suite 201, Littleton, CO 80120
Email: ussales@ict.co Toll Free: (855) 428 9111 Phone: 720 442 0767
EMEA
Integrated Control Technology (Europe) Limited
St Mary's Court, The Broadway, Amersham, HP7 0UT, UK
Email: emeasales@ict.co Phone: 44 0 1494 590494

Designers & manufacturers of integrated electronic access control, security and automation products.
Designed & manufactured by Integrated Control Technology Ltd.
Copyright © Integrated Control Technology Limited 2003-2017. All rights reserved.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of these products, neither Integrated Control
Technology Ltd nor its employees, shall be liable under any circumstances to any party in respect of decisions or actions they may make as
a result of using this information. In accordance with the Integrated Control Technology policy of enhanced development, design and
specifications are subject to change without notice

TRN-18-1902

www.ict.co

You might also like