Access Control System
Access Control System
E. SAN Storage:
1. Storage Units
a. The recording system should be a unified SAN with minimum RAIDS
6.
b. The SAN storage shall be offered with redundant controller
configuration.
c. The SAN shall be optimized for video surveillance.
d. The hard disks required for recording must be enterprise level one
with minimum 7200rpm.
G. CCTV Keyboard
1. 10.1” touchscreen
2. Wifi connection
3. PoE powered
4. HDMI, DVI output
5. Liew view, display and transmission control, screen joint, cross-window
External video play
2. Intrusion System
4. Card Reader
6. Credential cards
A. Type
1. Rack mounted server
2. Capable of fitting in a standard 19inch 42U rack
B. Hardware
1. Hardware performance shall be above security optimum
recommended specification. The following performance
specifications are provided as a minimum.
1.1. The ISMS will incorporate a fully functional intruder alarm system.
1.2. All inputs globally within the system must be able to be utilised as intrusion
alarm inputs to allow intruder detection sensors to be connected to the
system.
1.3. All outputs anywhere within the system shall be available for intruder alarm
purposes such as sounding remote sirens etc.
1.4. Arming and disarming the intrusion detection system shall be either by using
card readers, alarm management terminals, key-switches or schedules.
1.5. It shall be possible for the system to cause readers to beep during entry and
exit delays.
1.6. It shall be possible for the system to active outputs during entry and exit
delays.
1.7. It shall be possible to configure the system to isolate faulty external devices so
as not to trigger false alarms.
1.8. It shall be possible to configure the system to fail to arm if an input point is
active.
1.9. It shall be possible to configure the system to fail to arm if an input point has
unacknowledged alarms.
1.10. It shall be possible for the system to cause readers to beep when alarms are
present in the system.
1.11. It shall be possible to set the system to a test mode to allow for testing and
maintenance.
1.12. The intruder alarm zone and the access zone for an area shall be treated as
separate logical items.
1.13. The intruder alarm system shall provide a dependency feature whereby an
alarm zone does not go into the set state until all dependent alarm zones are
in the set state.
1.13.1. If the alarm zone is set (armed) and the access door is secure:
1.13.2. If the alarm zone is unset (disarmed) and the access door is secure:
1.14. When specified, alarm monitoring may use a connection with central alarm
monitoring stations via digital communicators using Contact ID format,
connected directly to the IFC panels.
1.15. Connection with central alarm monitoring stations may be by TCP/IP or cellular
networks.
1.15.1. It shall be possible for alarms from one IFC to be transmitted via a
second IFC where the digital communicator is installed. (Peer-to-peer
communications).
1.15.3. The system shall report and log all digital communicator activity and
the reason for any failure to communicate.
1.1. The ISMS servers shall use a Microsoft Windows operating system as defined
previously.
1.2. The system database shall be a version of Microsoft SQL Server appropriate for the
system size required. The version of Microsoft SQL Server is among those defined
previously.
1.3. The connection between ISMS and Microsoft SQL Server shall use Windows
Authentication.
1.4. The ISMS shall employ a server incorporating current generation design and
components. The hardware specification, including processor speed, internal memory and
hard disk size shall be specified by the supplier and must be sufficient to meet or exceed the
capacity and throughput of the specified system.
1.5. The ISMS shall be capable of supporting a minimum of 100 hardware based
operator workstations running concurrently. Operator workstations running terminal
emulation software will not be accepted.
1.6. The ISMS shall automatically log and time/date-stamp all events within the system
including intruder alarm set/unset events, access control events, operator actions and
activity.
1.7. The configuration GUI shall make extensive use of menus and windows and require
a minimum of operator training to operate the system proficiently. Systems requiring a
script/program language approach to configure the system will not be accepted.
1.8. A free text notes/memo field shall be available for each logical/physical object to
store abstract information relating to that item.
1.8.2. The notes field shall support word-wrap, insert, delete, cut, copy and paste
functions.
1.9. The ISMS must be capable of receiving simultaneous alarm signals from remote
locations without loss or excessive delay in their presentation to the operator. Any
1.10. The ISMS shall be fitted with a real-time clock, the accuracy of which shall be
preserved over the period of a mains power supply failure. Time synchronisation between
the ISMS and Ethernet connected IFCs shall be automatic and not require operator
intervention.
1.11. Operator selection of processing tasks shall be via menu selections. Authorised
operators shall be able to process alarms, produce reports, and modify items without
degrading system performance.
1.12. The following is the minimum operational and monitoring functions required. The
ability to:
1.12.1. program either a group or individual card readers with access control parameters,
without affecting other card readers,
1.12.2. program the access criteria for individual cardholders or groups of cardholders,
1.12.3. store non access control data fields for each cardholder. The names of these data
fields shall be user-definable,
1.12.4. authorise or de-authorise a cardholder in the system with the result reflected
immediately throughout all access points in the system,
1.12.5. enable a card trace against selected cardholders so that an alarm is raised each time
that cardholder presents their access card or token,
1.12.6. pre-program holidays so that different access criteria apply compared to normal
scheduled days. The system must have a capacity to set at least 400 holiday days,
1.12.8. define as many access zones as there are card readers fitted,
1.12.9. allow or disallow individual cardholder access to any single, or group of card
readers, in real-time,
1.12.10. log all ISMS and operator activity to hard disk as it is received at the ISMS server,
1.12.11. program alarm response instructions into the system so that these are presented to
the operator when processing an alarm event,
1.12.12. enable an operator to enter messages against alarm events. This may be an
enforced operator operation based on configuration on a per operator basis,
1.12.13. configure user-definable short messages to allow the operator to enter commonly
used comments with minimal effort when entering messages related to alarms. For
example, false alarm, user error, etc. These messages should also be assigned to keyboard
shortcut keys to enable faster commenting on alarms,
1.12.15. Update multiple AMTs display messages quickly using the bulk change feature
1.13. The operator GUI shall display a one-line plain language event message for every
activity event (alarm or otherwise) occurring in the system. All activity logged shall be time
and date stamped to the nearest second (hh:mm:ss). On having the appropriate operator
authorisation, it shall be possible to drill down into the properties of each component that
makes up that event. The event message shall advise:
1.13.2. the time the event was received at the ISMS server,
1.13.5. if the access attempt is unsuccessful, the reasons for the denial.
1.14.3. all operator activity including logon, logoff, and alarm response messages,
1.17. The system shall provide a detailed operator help file. This help file shall provide
operators with text, audio, and video, help instructions and tutorials.
1.18. The system shall allow for searching of items configured within the system based on
the following:
1.18.3. times related to events including within properties of a configured item (creation
and modification events).
1.19. The system shall integrate with Microsoft Active Directory enabling cardholder and
user records to be fully synchronised on a real-time, bi-directional basis.
1.19.1. Integrations that use third party applications to synchronise between Microsoft
1.20. The system shall allow for a separate biometric operator privilege.
1.21. The system shall be able to find unmigrated and duplicate DesFire cardholder keys
1.22. ISMS shall be able to purge pending queued messages from IFCs as required by the
user with this privilege.
1.23. ISMS shall be able to deploy IFC firmware as follows via an upgrade tool.
1.23.1. On demand
1.24 ISMS shall allow the user to track IFC firmware deployments status via the upgrade
tool.
1.25 ISMS shall allow users to connect via a web-based client safely and securely without
the need for the user to utilise a separate client-based application and provide the following
ISMS client functionality
1.26 ISMS shall allow bulk configuration and setup of supported system devices via a
delimited csv file.
1.27 ISMS shall allow for configuration and setup of a read-only replica SQL database
SQL database
1.28 ISMS shall support the redaction of the following Personal Identifiable Information
in order to meet GDPR requirements
1.30 ISMS shall support cardholder case and accent sensitive searches
1. System Integration
1.1. The ISMS shall support OPC AE protocol.
1.1.2. When an alarm is processed, the OPC AE client shall send an event
processed message back to the ISMS to process the alarm on the
ISMS.
1.2.1. The OPC interface shall support OPC DA specification 2.0 and 3.0.
1.2.2. The OPC DA interface shall allow the status of system components to
be reported to an external OPC DA client.
1.2.3. The OPC Interface shall allow third party OPC DA clients to generate
system component overrides including but not limited to alarm zone
and access zone overrides.
1.3.1. The ISMS cardholder functionality shall support a REST Web Service
to allow an external system to create, remove, and modify
cardholders, including assigning access rights.
1.3.2. The ISMS alarms and events functionality shall support a REST Web
Service to allow external systems to receive alarms and events from
the ISMS.
1.3.3. The ISMS shall provide a REST Web Service that will allow a third-
party system to perform actions in the ISMS such as open doors,
disarm alarm zones, and turn an IFC output on.
1.3.4. The ISMS shall support a REST Web Service that will allow a third-
party system to interrogate the status of ISMS items such as doors,
alarm zones, and IFC inputs.
1.4. The ISMS shall allow data exchange with other applications using XML
protocols.
1.4.1. The system shall provide an XML interface to allow for the import,
export, and synchronization of data in an on-going basis from other
applications directly into the cardholder database both in a real-time
1.4.2. The system shall provide an XML interface to allow for updating
access control schedules from other applications directly into the
ISMS database in both a real-time manner and in a batch-oriented
approach. A developer’s kit with sample application shall be readily
available.
1.5. The system shall provide a tool which allows configuration and synchronization
of cardholder data with third party systems via a csv file. The CSV import
functionality shall support the following functionality:
1.6.1. The API shall allow third party systems to pass events to the IFC and
for the events to appear in the ISMS event window.
1.6.4. The API shall allow the third-party system to interact directly with the
IFC with no reliance on the ISMS server.
1.7.2. The IFC will communicate with BACnet devices with no need for
server intervention.
1.7.3. The BACnet integration will enable the IFC to monitor BACnet objects
for state changes and raise alarms accordingly.
1.9. Events from third party systems shall be managed in the same way as inputs
connected directly to IFCs.
1.10. Interactions with third party systems shall be logged in the ISMS.
1.11. ISMS shall support smart sensor integration which detects the following
1.11.1. Masking
1.11.4. Vaping
1.11.5. Gunshot
1.11.8. Ammonia
1.11.13. Aggression
1.11.16. Temperature
1.11.17. Humidity
1.11.18. Tampered
1.12 The system shall support biometric reader integration which can read all
four finger prints on a cardholder’s hand.
1.13 The ISMS shall have the ability to integrate with SIP intercoms and provide
the following
functionality
1.13.1 Answer calls from the ISMS
1.13.2 Call a SIP intercom from ISMS
1.13.3 Please a call on hold
1.13.4 Hanging up a call
1.13.5 View video for an intercom at 720p resolution
1.13.6 Grant access
The IFC shall use a Linux operating system, this OS shall be specifically
re-developed for a security purpose. Applications on a general-
purpose OS such as Windows CE, Arduino, or a standard Linux kernel
shall not be accepted.
1.04 Each IFC shall be intelligent such that in the event of failure of
power or communications to the ISMS, for whatever reason, the
IFC shall continue to allow or deny access based on the full
security criteria at time of disconnection.
1.05 The IFC shall store on-board all the security and access
parameters to operate completely independently from the
central control server. Systems that rely on the central control
server for access decisions will not be considered.
1.06 The IFC shall buffer activity data and immediately transmit it to
the central control server upon re-establishment of
communications.
1.07 Should communications fail with the ISMS, each IFC shall be
capable of buffering up to 80,000 events.
1.11 The IFC shall support the use of six-state end-of-line circuits and
enunciate whether the circuit is open, closed, alarm, trouble,
open circuit tampered, or short circuit tampered as separate
conditions.
1.13 The IFC shall include tamper protection for the front and the back
of the panel. The front panel shall be tamper protected for door
open, and the rear of the panel to detect if the panel has been
removed from the wall. These shall use optical tamper detection.
Mechanical tamper devices are not acceptable.
1.14 The IFC shall incorporate an ARM 9 processor with at least 256
Megabytes of non-volatile FLASH EEPROM. The IFC shall
incorporate boot code in a protected sector of the flash memory.
For software upgrades, all IFC software shall be downloaded
from the central server over the network
1.15 The IFC shall support direct download via USB to allow local
upgrade of the IFC.
1.16 The IFC shall operate from a DC power supply with battery
backup.
1.17 The IFC shall continue to operate for at least 24 hours in the
event of a mains supply failure.
1.21 The IFC shall contain its own real-time clock. The clock shall be
synchronised with the central control server clock at least once
per hour. The accuracy shall be such that the time difference
between IFCs shall not vary more than 0.5 second at any time.
1.22 The IFC shall be allocated to a time zone appropriate to the IFC
location to cater for regionally and globally located IFCs.
1.23 The IFC shall have an on-board Ethernet (TCP/IP) connection and
driver supporting 10BaseT and 100BaseT operation. Third party
plug-in RS485/Ethernet modules will not be accepted.
1.25 When specified, the IFC shall be fitted with 2 Ethernet ports
providing a fail-over communication capability.
1.28 The ISMS shall natively support WAN and NAT configurations to
communicate with IFCs on distributed networks.
1.30 Should the primary DNS not be available, the IFC shall be able to
automatically establish contact with a secondary or tertiary DNS.
1.32 It shall be possible to view the IFC status and configuration for
commissioning and diagnostic purposes without the use of the
central server software or other proprietary software. This may
be achieved using a conventional web browser.
1.33 The IFC diagnostic web interface shall not share common log on
credentials with any other installed site.
1.35 The IFC shall support a high security configuration that disables
unnecessary ports and legacy communication methods, this shall
be achieved by an onboard jumper or DIP switch.
1.36 All ISMS data communication between the central server and
IFCs shall be encrypted using an industry standard symmetric
encryption algorithm equivalent to AES-256 or stronger.
1.40 Remote communication between the IFCs and the ISMS server
shall use the switched telephone network circuits.
1.41 The IFC shall support a cellular module for alarm transmission to
multiple alarm monitoring stations via a cellular network.
3. door states,
2. physical relay.
E. The state change of the logic block shall have configurable timing
options with at least the following:
1. explicit,
2. delay on,
3. delay off,
4. pulsed,
5. maximum on time,
6. latched.
F. The IFC logic block shall be able to trigger actions across multiple
IFCs, independent of the ISMS server being online.
1. tamper,
4. card error,
5. maintenance warning,
9. card trace,
12. duress,
20. intercom.
1.44 The IFC shall communicate with and control the following
equipment:
1.45 All communications links between the IFCs and remote devices
shall be monitored such that an alarm is raised at the central
control if the data being transmitted is corrupted or tampered
with in any way.
1. number of bits,
1.56 The IFC shall provide relay output facilities that are activated in
response to alarm activations. Relay functions required are:
1.57 The ISMS shall incorporate relay outputs that can be activated
according to time schedules, rather than alarm event.
1.12.5. NFC.
1.13. The reader shall be capable of reading the CSN of the Mifare card and store
the CSN in the ISMS database
1.14.2. When connected to an IFC, the serial number of the reader shall be
reported to the ISMS.
1.15. Data communication rate between IFCs and readers shall be at least
1Mbit/second.
1.17. Data communication between IFCs and readers shall be encrypted and use a
minimum of AES-128.
1.18. Readers shall generate a heartbeat signal to enable the IFC to identify lost
communications and thereby generate an alarm.
1.19. Readers shall be upgradeable via software downloaded from the ISMS without
any intervention at the reader.
1.20. The reader must accept a message from the IFC to advise that data from
reader to IFC has been received and to consequently stop sending the card
data.
1.22. Where a card only reader is specified, the reader shall include:
1.22.2. The card only reader option shall include an audible beeper and
red/green LEDs to provide user feedback.
1.22.3.4. it shall be possible to turn off the reader beeper via the
ISMS software.
1.22.4. The readers must comply with at least IP68 environmental protection
rating.
1.22.8. The reader shall operate with a temperature range of -30oc to +70oc.
1.23.4. The reader shall display information to the user using a combination
of text and graphics.
1.23.8.4. two soft keys that vary according to the current usage of
the keypad.
1.23.10. The reader shall be capable of (but not limited to) carrying out the
following functions:
1.23.11. User definable custom images shall be displayed on the screen when
the reader is idle.
1.23.12.2. JPG,
1.23.12.3. JPEG.
1.23.13. It shall be possible to adjust the reader beeper via the ISMS software
to the following volume levels:
1.23.13.1. off,
1.23.13.2. quiet,
1.23.13.3. normal,
1.23.13.4. loud.
1.23.14. The reader shall have the ability to display the status of alarms and
indicate the status of physical and logical items via LEDs on front
panel.
1.23.15. It shall be possible to turn off the reader indicator LEDs via the ISMS
software.
1.23.16. Tamper detection shall be provided against the unit being removed
from the mounting surface.
1.23.18. Keypad readers must comply with an impact rating of at least IK08.
1.23.19. The keypad reader shall operate with a temperature range of -30oc to
+70oc.
A. Read range: 5m
B. Type:
1. MIFARE DesFire EV1
C. Material:
1. UL94 Polycarbonate
D. Mounting:
1. Pole
A. The Security Contractor shall provide 2,000 access control cards to the
Owner.
1.25. The access token technology for this project shall match the reader technology
as specified separately but in association with this specification.
1.26. Access cards shall be of standard credit card size, being no larger than CR-80
and shall be direct printable using a dye-sublimation print process or be
capable of accepting an adhesive label printed through such a process.
1.28. As well as CR80 sized cards, vehicle tokens and key-ring transponders should
also be proposed as an alternative, where available.
1.29.2. where a proprietary card number format is offered, the card format
shall include:
1.29.2.1. a unique site code not used for any other system
worldwide,
1.29.2.3. an issue level for each card number to allow for replacing
lost cards without reducing the card database size. Up to
15 levels of issue levels shall be supported.
1.30. The access control token shall uniquely identify the cardholder to the access
control system.
1.32. Transmission of data between the proximity access token and the proximity
reader shall be in a secure format.
1.34. Cards and access tokens shall be able to be encoded by the supplier according
to the client’s specifications, made known at the time of order.
1.35. Allowance shall be made for the supply of encoding software and hardware to
the client to enable encoding of their own cards and/or tokens on site.
F. Card Printer
1. ID plastic card Color printers (double sided) shall be supplied
with the card administration software, fully configured for
printing a number of logo designs incorporating a user photo
and holographic counterfeiting countermeasures as a
minimum. The system shall be configured and training
provided to allow the Operator to produce completed ID cards
based on the access card database.
2. Location: One device in security control room
B. Printers
1. High quality, high speed laser printers for hardcopy system
printouts.
2. The printer shall be multi font, Color output.
3. It shall have a minimum operating speed of 200 characters /
second or higher
4. Printer shall be formatted to print on standard A3 and A4
paper.
5. Minimum of 300 dpi.
Refer the system drawings for the location and quantity of
the printer
INTERCOM SYSTEM
General:
Where clean rooms and laboratories define the workplace, communication can
become tedious due to restricted zones and special requirements to the equipment.
Special intercom stations with a sealed membrane surface should be resistant to
chemicals and allow hands-free speech when handling critical components. Clear,
intelligible, and ideally hands-free communication is essential in medical
environments. Staying connected with team members in remote locations or
coordinating workflows on the fly is just as important. This saves valuable time.
Passive infrastructure cabling system already exists for the hospital network.
However, the bidder must conduct the site survey and consider in his proposal and
pricing any additional requirements to complete the required tender scope.
System Components:
• Intercom Server
• IP Intercom stations
• Desktop station
1- INTERCOM SERVER