Instruction, MCE Sentry®Security

2022-01-27
●MCE Sentry provides security administration for MCE iControl elevator installations. Both 1ETA and Destination Based Dispatching modes are supported. Sentry defines three administrative roles: Administrator, Manager, and Technician. Once logged on, each role has the ability to view or administer security depending upon the access definitions for that role:
■Administrator: Full system permissions including building security maps, passenger schedules, user administration, and report generation.
■Manager: Passenger schedule administration and report generation. Viewing privileges only for remaining security capabilities.
■Technician: Viewing privileges only.
●The PC used by the Administrator, Manager, or Technician is called a Security Client. The Security Client communicates with a Security Manager PC through an Ethernet connection. Real time security processing and application hosting are handled by the Security Manager. The data base containing the security configuration is automatically mirrored by the Security Manager so that if the primary data base is dam-aged, the secondary data base will assume its place.
●When the system is configured, an IP address is assigned to the Security Manager. To log on (establish a connection to the Security Manager), the administrator, manager, or technician launches their web browsing application, enters the Security Manager IP address into the browser URL window, and presses Return. Once the connection is established, a log-in screen appears. The user clicks login, pro-vides a valid user name and password, and is given access to the system.

Nidec Motor

More

More

User's Guide

More

More

Please see the document for details

More

More

English Chinese Chinese and English Japanese

2014/4/25

Rev B1

42-IS-0227

1 MB

- The full preview is over. If you want to read the whole 26 page document,please Sign in/Register -
  • +1 Like
  • Add to Favorites

Recommend

All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.

Contact Us

Email: