ImageVerifierCode 换一换
格式:PDF , 页数:124 ,大小:313.52KB ,
资源ID:1075001      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1075001.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(VA 28 13 00-2011 PHYSICAL ACCESS CONTROL SYSTEM.pdf)为本站会员(lawfemale396)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

VA 28 13 00-2011 PHYSICAL ACCESS CONTROL SYSTEM.pdf

1、10-11 28 13 00 - 1 SECTION 28 13 00 PHYSICAL ACCESS CONTROL SYSTEM SPEC WRITER NOTE: Delete / _ / if not applicable to project. Also delete any other item or paragraph not applicable in the section and renumber the paragraphs. Insert additional provisions as required for this project. PART 1 GENERAL

2、 1.1 DESCRIPTION A. This section specifies the finishing, installation, connection, testing and certification of a complete and fully operating Physical Access Control System, hereinafter referred to as the PACS. B. This Section includes a Physical Access Control System consisting of a system server

3、, one or more networked workstation computers, operating system and application software, and field-installed Controllers connected by a high-speed electronic data transmission network. The PACS shall have the following: SPEC WRITER NOTE: Adjust list to suit the project. 1. Physical Access Control:

4、a. Regulating access through doors , gates , traffic-control bollards b. Anti-passback c. Visitor assignment d. Surge and tamper protection e. Secondary alarm annunciator f. Credential cards and readers g. Biometric identity verification equipment h. Push-button switches i. RS-232 ASCII interface j.

5、 Credential creation and credential holder database and management k. Monitoring of field-installed devices l. Interface with paging HVAC elevator control systems. m. Reporting SPEC WRITER NOTE: Edit list of security functions below to be integrated into or coordinated with access-control system. It

6、ems listed above are described in this Section; items listed below are traditionally specified in other Sections. If items below are specified Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 2 in other Sections, special coordination

7、is required in those Sections. For example, “Key Tracking“ software in this Section is more comprehensive than manual tracking specified in Division 08 Sections. 2. Security: a. Real-time guard tour. b. Time and attendance. c. Key tracking. d. Video and camera control. e. Time and attendance f. C. S

8、ystem Architecture: 1. Criticality, operational requirements, and/or limiting points of failure may dictate the development of an enterprise and regional server architecture as opposed to system capacity. Provide server and workstation configurations with all necessary connectors, interfaces and acc

9、essories as shown. D. PACS shall provide secure and reliable identification of Federal employees and contractors by utilizing credential authentication per FIPS-201. E. Physical Access Control System (PACS) shall consist of: 1. Head-End equipment server, 2. One or more networked PC-based workstation

10、s, 3. Physical Access Control System and Database Management Software, 4. Credential validation software/hardware, 5. Field installed controllers, 6. PIV Middelware, 7. Card readers, 8. Biometric identification devices, 9. PIV , , , , , cards, 10. Supportive information system, 11. Door locks and se

11、nsors, 12. Power supplies, 13. Interfaces with: a. Video Surveillance and Assessment System, b. Gate, turnstile, and traffic arm controls, c. Automatic door operators, d. Intrusion Detection System, Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-

12、11 28 13 00 - 3 e. Intercommunication System f. Fire Protection System, g. HVAC, h. Building Management System, i. Elevator Controls, j. . 14. . F. Head-End equipment server, workstations and controllers shall be connected by a high-speed electronic data transmission network. G. Information system s

13、upporting PACS , Head-End equipment server, workstations, network switches, routers and controllers shall comply with FIPS 200 requirements (Minimum Security Requirements for Federal Information and Information Systems)and NIST Special Publication 800-53 (Recommended Security Controls for Federal In

14、formation Systems). H. PACS system shall support: 1. Multiple credential authentication modes, 2. Bidirectional communication with the reader, 3. Incident response policy implementation capability; system shall have capability to automatically change access privileges for certain user groups to high

15、 security areas in case of incident/emergency. 4. Visitor management, I. All security relevant decisions shall be made on “secure side of the door”. Secure side processing shall include; 1. Challenge/response management, 2. PKI path discovery and validation, 3. Credential identifier processing, 4. A

16、uthorization decisions. J. For locations where secure side processing is not applicable the tamper switches and certified cryptographic processing shall be provided per FIPS-140-2. K. System Software: Based on central-station, workstation operating system, server operating system, and application so

17、ftware. L. Software and controllers shall be capable of matching full 56 bit FASC-N plus minimum of 32 bits of public key certificate data. M. Software shall have the following capabilities: Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13

18、 00 - 4 1. Multiuser multitasking to allow for independent activities and monitoring to occur simultaneously at different workstations. 2. Support authentication and enrolment; a. PIV verification, b. Expiration date check, c. Biometric check, d. Digital photo display/check, e. Validate digital sign

19、atures of data objects (Objects are signed by the Trusted Authority f. Private key challenge (CAK drawing submittals shall be per the established project schedule. D. Shop drawing and as-built packages shall include, but not be limited to: 1. Index Sheet that shall: a. Define each page of the design

20、 package to include facility name, building name, floor, and sheet number. b. Provide a complete list of all security abbreviations and symbols. c. Reference all general notes that are utilized within the design package. d. Specification and scope of work pages for all individual security systems th

21、at are applicable to the design package that will: 1) Outline all general and job specific work required within the design package. 2) Provide a detailed device identification table outlining device Identification (ID) and use for all security systems equipment utilized in the design package. 2. Dra

22、wing sheets that will be plotted on the individual floor plans or site plans shall: a. Include a title block as defined above. b. Clearly define the drawings scale in both standard and metric measurements. c. Provide device identification and location. d. Address all signal and power conduit runs an

23、d sizes that are associated with the design of the electronic security system and other security elements (e.g., barriers, etc.). Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 10 e. Identify all pull box and conduit locations, size

24、s, and fill capacities. f. Address all general and drawing specific notes for a particular drawing sheet. 3. A detailed riser drawing for each applicable security subsystem shall: a. Indicate the sequence of operation. b. Relationship of integrated components on one diagram. c. Include the number, s

25、ize, identification, and maximum lengths of interconnecting wires. d. Wire/cable types shall be defined by a wire and cable schedule. The schedule shall utilize a lettering system that will correspond to the wire/cable it represents (example: A = 18 AWG/1 Pair Twisted, Unshielded). This schedule sha

26、ll also provide the manufacturers name and part number for the wire/cable being installed. 4. A detailed system drawing for each applicable security system shall: a. Clearly identify how all equipment within the system, from main panel to device, shall be laid out and connected. b. Provide full deta

27、il of all system components wiring from point-to-point. c. Identify wire types utilized for connection, interconnection with associate security subsystems. d. Show device locations that correspond to the floor plans. e. All general and drawing specific notes shall be included with the system drawing

28、s. 5. A detailed schedule for all of the applicable security subsystems shall be included. All schedules shall provide the following information: a. Device ID. b. Device Location (e.g. site, building, floor, room number, location, and description). c. Mounting type (e.g. flush, wall, surface, etc.).

29、 d. Power supply or circuit breaker and power panel number. e. In addition, for the PACS, provide the door ID, door type (e.g. wood or metal), locking mechanism (e.g. strike or electromagnetic lock) and control device (e.g. card reader or biometrics). Provided by IHSNot for ResaleNo reproduction or

30、networking permitted without license from IHS-,-,-10-11 28 13 00 - 11 6. Detail and elevation drawings for all devices that define how they were installed and mounted. E. Pre-installation design packages shall go through a full review process conducted by the Contractor along with a VA representativ

31、e to ensure all work has been clearly defined and completed. All reviews shall be conducted in accordance with the project schedule. There shall be four (4) stages to the review process: 1. 35 percent 2. 65 percent 3. 90 percent 4. 100 percent F. Provide manufacturer security system product cut-shee

32、ts. Submit for approval at least 30 days prior to commencement of formal testing, a Security System Operational Test Plan. Include procedures for operational testing of each component and security subsystem, to include performance of an integrated system test. G. Submit manufactures certification of

33、 Underwriters Laboratories, Inc. (UL) listing as specified. Provide all maintenance and operating manuals per Section 01 00 00, GENERAL REQUIREMENTS, and Section 28 05 00 COMMON WORK RESULTS FOR ELECTRONIC SAFETY AND SECURITY. H. Completed System Readiness Checklists provided by the Commissioning Ag

34、ent and completed by the contractor, signed by a qualified technician and dated on the date of completion, in accordance with the requirements of Section 28 08 00 COMMISSIONING OF ELECTRONIC SAFETY AND SECURITY SYSTEMS. I. General: Submittals shall be in full compliance of the Contract Documents. Al

35、l submittals shall be provided in accordance with this section. Submittals lacking the breath or depth these requirements will be considered incomplete and rejected. Submissions are considered multidisciplinary and shall require coordination with applicable divisions to provide a complete and compre

36、hensive submission package. Additional general provisions are as follows: 1. The Contractor shall schedule submittals in order to maintain the project schedule. For coordination drawings refer to Specification Section 01 33 10 - DESIGN SUBMITTAL PROCEDURES, which outline basic submittal requirements

37、 and coordination. Section 01 33 10 shall be used in conjunction with this section. Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 12 2. The Contractor shall identify variations from requirements of Contract Documents and state prod

38、uct and system limitations, which may be detrimental to successful performance of the completed work or system. 3. Each package shall be submitted at one (1) time for each review and include components from applicable disciplines (e.g., electrical work, architectural finishes, door hardware, etc.) w

39、hich are required to produce an accurate and detailed depiction of the project. 4. Manufacturers information used for submittal shall have pages with items for approval tagged, items on pages shall be identified, and capacities and performance parameters for review shall be clearly marked through us

40、e of an arrow or highlighting. Provide space for Resident Engineer and Contractor review stamps. 5. Technical Data Drawings shall be in the latest version of AutoCAD, drawn accurately, and in accordance with VA CAD Standards. FREEHAND SKETCHES OR COPIED VERSIONS OF THE CONSTRUCTION DOCUMENTS WILL NO

41、T BE ACCEPTED. The Contractor shall not reproduce Contract Documents or copy standard information as the basis of the Technical Data Drawings. If departures from the technical data drawings are subsequently deemed necessary by the Contractor, details of such departures and the reasons thereof shall

42、be submitted in writing to the Resident Engineer for approval before the initiation of work. 6. Packaging: The Contractor shall organize the submissions according to the following packaging requirements. a. Binders: For each manual, provide heavy duty, commercial quality, durable three (3) ring viny

43、l covered loose leaf binders, sized to receive 8.5 x 11 in paper, and appropriate capacity to accommodate the contents. Provide a clear plastic sleeve on the spine to hold labels describing the contents. Provide pockets in the covers to receive folded sheets. 1) Where two (2) or more binders are nec

44、essary to accommodate data, correlate data in each binder into related groupings according to the Project Manual table of contents. Cross-referencing other binders where necessary to provide essential information for communication of proper operation and or maintenance of the component or system. Pr

45、ovided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 13 2) Identify each binder on the front and spine with printed binder title, Project title or name, and subject matter covered. Indicate the volume number if applicable. b. Dividers: Prov

46、ide heavy paper dividers with celluloid tabs for each Section. Mark each tab to indicate contents. c. Protective Plastic Jackets: Provide protective transparent plastic jackets designed to enclose diagnostic software for computerized electronic equipment. d. Text Material: Where written material is

47、required as part of the manual use the manufacturers standard printed material, or if not available, specially prepared data, neatly typewritten on 8.5 inches by 11 inches 20 pound white bond paper. e. Drawings: Where drawings and/or diagrams are required as part of the manual, provide reinforced pu

48、nched binder tabs on the drawings and bind them with the text. 1) Where oversized drawings are necessary, fold the drawings to the same size as the text pages and use as a foldout. 2) If drawings are too large to be used practically as a foldout, place the drawing, neatly folded, in the front or rea

49、r pocket of the binder. Insert a type written page indicating the drawing title, description of contents and drawing location at the appropriate location of the manual. 3) Drawings shall be sized to ensure details and text is of legible size. Text shall be no less than 1/16” tall. f. Manual Content: In each manual include information specified in the individu

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1