VA 28 13 00-2011 PHYSICAL ACCESS CONTROL SYSTEM.pdf
《VA 28 13 00-2011 PHYSICAL ACCESS CONTROL SYSTEM.pdf》由会员分享,可在线阅读,更多相关《VA 28 13 00-2011 PHYSICAL ACCESS CONTROL SYSTEM.pdf(124页珍藏版)》请在麦多课文档分享上搜索。
1、10-11 28 13 00 - 1 SECTION 28 13 00 PHYSICAL ACCESS CONTROL SYSTEM SPEC WRITER NOTE: Delete / _ / if not applicable to project. Also delete any other item or paragraph not applicable in the section and renumber the paragraphs. Insert additional provisions as required for this project. PART 1 GENERAL
2、 1.1 DESCRIPTION A. This section specifies the finishing, installation, connection, testing and certification of a complete and fully operating Physical Access Control System, hereinafter referred to as the PACS. B. This Section includes a Physical Access Control System consisting of a system server
3、, one or more networked workstation computers, operating system and application software, and field-installed Controllers connected by a high-speed electronic data transmission network. The PACS shall have the following: SPEC WRITER NOTE: Adjust list to suit the project. 1. Physical Access Control:
4、a. Regulating access through doors , gates , traffic-control bollards b. Anti-passback c. Visitor assignment d. Surge and tamper protection e. Secondary alarm annunciator f. Credential cards and readers g. Biometric identity verification equipment h. Push-button switches i. RS-232 ASCII interface j.
5、 Credential creation and credential holder database and management k. Monitoring of field-installed devices l. Interface with paging HVAC elevator control systems. m. Reporting SPEC WRITER NOTE: Edit list of security functions below to be integrated into or coordinated with access-control system. It
6、ems listed above are described in this Section; items listed below are traditionally specified in other Sections. If items below are specified Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 2 in other Sections, special coordination
7、is required in those Sections. For example, “Key Tracking“ software in this Section is more comprehensive than manual tracking specified in Division 08 Sections. 2. Security: a. Real-time guard tour. b. Time and attendance. c. Key tracking. d. Video and camera control. e. Time and attendance f. C. S
8、ystem Architecture: 1. Criticality, operational requirements, and/or limiting points of failure may dictate the development of an enterprise and regional server architecture as opposed to system capacity. Provide server and workstation configurations with all necessary connectors, interfaces and acc
9、essories as shown. D. PACS shall provide secure and reliable identification of Federal employees and contractors by utilizing credential authentication per FIPS-201. E. Physical Access Control System (PACS) shall consist of: 1. Head-End equipment server, 2. One or more networked PC-based workstation
10、s, 3. Physical Access Control System and Database Management Software, 4. Credential validation software/hardware, 5. Field installed controllers, 6. PIV Middelware, 7. Card readers, 8. Biometric identification devices, 9. PIV , , , , , cards, 10. Supportive information system, 11. Door locks and se
11、nsors, 12. Power supplies, 13. Interfaces with: a. Video Surveillance and Assessment System, b. Gate, turnstile, and traffic arm controls, c. Automatic door operators, d. Intrusion Detection System, Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-
12、11 28 13 00 - 3 e. Intercommunication System f. Fire Protection System, g. HVAC, h. Building Management System, i. Elevator Controls, j. . 14. . F. Head-End equipment server, workstations and controllers shall be connected by a high-speed electronic data transmission network. G. Information system s
13、upporting PACS , Head-End equipment server, workstations, network switches, routers and controllers shall comply with FIPS 200 requirements (Minimum Security Requirements for Federal Information and Information Systems)and NIST Special Publication 800-53 (Recommended Security Controls for Federal In
14、formation Systems). H. PACS system shall support: 1. Multiple credential authentication modes, 2. Bidirectional communication with the reader, 3. Incident response policy implementation capability; system shall have capability to automatically change access privileges for certain user groups to high
15、 security areas in case of incident/emergency. 4. Visitor management, I. All security relevant decisions shall be made on “secure side of the door”. Secure side processing shall include; 1. Challenge/response management, 2. PKI path discovery and validation, 3. Credential identifier processing, 4. A
16、uthorization decisions. J. For locations where secure side processing is not applicable the tamper switches and certified cryptographic processing shall be provided per FIPS-140-2. K. System Software: Based on central-station, workstation operating system, server operating system, and application so
17、ftware. L. Software and controllers shall be capable of matching full 56 bit FASC-N plus minimum of 32 bits of public key certificate data. M. Software shall have the following capabilities: Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13
18、 00 - 4 1. Multiuser multitasking to allow for independent activities and monitoring to occur simultaneously at different workstations. 2. Support authentication and enrolment; a. PIV verification, b. Expiration date check, c. Biometric check, d. Digital photo display/check, e. Validate digital sign
19、atures of data objects (Objects are signed by the Trusted Authority f. Private key challenge (CAK drawing submittals shall be per the established project schedule. D. Shop drawing and as-built packages shall include, but not be limited to: 1. Index Sheet that shall: a. Define each page of the design
20、 package to include facility name, building name, floor, and sheet number. b. Provide a complete list of all security abbreviations and symbols. c. Reference all general notes that are utilized within the design package. d. Specification and scope of work pages for all individual security systems th
21、at are applicable to the design package that will: 1) Outline all general and job specific work required within the design package. 2) Provide a detailed device identification table outlining device Identification (ID) and use for all security systems equipment utilized in the design package. 2. Dra
22、wing sheets that will be plotted on the individual floor plans or site plans shall: a. Include a title block as defined above. b. Clearly define the drawings scale in both standard and metric measurements. c. Provide device identification and location. d. Address all signal and power conduit runs an
23、d sizes that are associated with the design of the electronic security system and other security elements (e.g., barriers, etc.). Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-10-11 28 13 00 - 10 e. Identify all pull box and conduit locations, size
24、s, and fill capacities. f. Address all general and drawing specific notes for a particular drawing sheet. 3. A detailed riser drawing for each applicable security subsystem shall: a. Indicate the sequence of operation. b. Relationship of integrated components on one diagram. c. Include the number, s
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- VA2813002011PHYSICALACCESSCONTROLSYSTEMPDF

链接地址:http://www.mydoc123.com/p-1075001.html