Specifications
Alto 818 Installation and Operation
1-4 P/N 66109074001 Rev. D
1.2.1 ACCESS CONTROL
A combination of proximity readers and keypads can be used to control entry to a building or
controlled area. With proximity sensors a key holder places a command key close to a reader
mounted near a controlled door. The command key is detected and its coded information is
transmitted back to the Alto 818. Access is granted only when the key is valid and other pre-
programmed criteria are matched. Similarly, when a personal identification number (PIN) is
entered on a keypad, access is granted when the preprogrammed criteria are met.
The Alto 818 can provide a complete log of all keys presented, all PINs entered and all locks it
has operated. An operator can take action based on the log to override the database software
to open or close door locks or modify the system response to monitored activities.
1.2.2 SYSTEM S-, E-, AND H-MODE OPERATION
The Alto 818 is a stand-alone access control system that can also report to and be controlled by
a remote host computer. When the Alto 818 is operating as a stand-alone system, it is operating
in the S-Mode.
When the Alto 818 is connected to a WSE host such as the WSE SE 5850 or SE 6000 security
management system, communication is via Security Electronics Extended Protocol (SEEP). In
this instance, the Alto 818 is said to be operating in the E-mode.
When the Alto 818 reports to and is controlled by any other host, it is operating in the H-mode.
1.2.3 MONITORING
Door switches that detect door openings and other monitor points throughout the building or
access control area are constantly monitored for a change in state.
1.2.4 SYSTEM TEST
While in operation, the Alto 818 is in a constant process of system test. If a fault occurs, a
message identifying the fault will be displayed and printed in the system log. If an uninterruptible
power supply is used with the system and the system is being powered by the backup batteries,
a fault message can be generated when the battery charge level becomes low. The database can
be set up to send such fault messages to a host or terminal, to prevent closure of the building, to
send a message over a dial-up modem, and to trigger an alarm device.