Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Using the links below, refer to each hardware component's installation note for technical specifications and installation procedures.
Permaconn PM54 (NZ/AUS only)
SMB Monitoring Kit (North America only)
Technical specifications and other information for the following hardware components are found within the SMB Base Kit installation note:
Gallagher SMB Controller
Gallagher SMB Power Supply
The following hardware components are compatible with the SMB solution:
Default configuration overview
Door status, history, and overrides
The front optical tamper detector will sense when the cabinet door has been opened. The rear optical tamper detector will sense when the cabinet is removed from its mounting surface.
Initialising the tampers should be the last thing you do before you leave the site.
If you will be completing the Installer Portal (configuration app) configuration on-site, initialise the tampers just before you activate the site.
If you will be leaving the site and completing the Installer Portal configuration off-site, initialise the tampers now.
When you have finished wiring the devices and no longer need to access the cabinet:
Close and lock the cabinet door using the key provided.
Within the SMB Installer Portal, open the site and click the Controller at the top of the hardware tree.
Within the Controller lightbox, select RESTART.
This section covers the configuration of the Gallagher SMB system, including:
Create a Site or Demo Site
Default configuration overview
Enable Guarding
Assign a Controller to a site
Configure inputs and outputs
Configure readers
Configure monitoring
Configure areas
Configure Entry Delay
Configure Exit Delay
Configure Doors
Door status, history, and overrides
Site Actions
Publish configuration to Controller
Activation
In situations where organisations or Site Managers are apprehensive about managing their own alarms and don’t want to take on this responsibility outside of work hours, Third-Party Monitoring can be configured for the site.
Alarm messages are sent from the Controller at the site to the nominated monitoring station in a standard format in accordance with a set of rules. Monitoring stations will have software that interprets messages received. The software will send notifications to nominated personnel at the site or display details on a workstation at the station in a form that is easy for an operator to action.
The monitoring company can notify relevant parties in accordance with an agreed action plan. This could be people from your site, your security technician, or a guarding company who will send someone to check your premises.
If Third-Party Monitoring is enabled, the Site Manager will not receive alarm incident notifications.
Actions taken by the monitoring station will depend on the response plan defined by the customer.
Possible actions are:
do nothing
monitoring station software sends an automated notification to nominated people at the site
telephone nominated personnel at the site one by one in an escalation sequence
call a guard out
contact police.
The required response by the monitoring station may depend on:
the day of the week and/or time of day
what happened
the value of property at the site
the level of trust the business owner has in the people who have access to the site
how much the business owner is prepared to pay monitoring for the service
whether the system is police graded and/or the alarm has been verified. The rules and requirements for calling the police vary by country and jurisdiction. If required, verification could be by someone at the premises, video verification, or following dual activation.
Messages are sent from the SMB system to the monitoring station in Contact ID format. This is a standard protocol used worldwide to communicate what is happening on a site to a monitoring station.
The message format is: ACCT MT Q XYZ GG CCC
Code mappings and the rules for formatting and determining which messages to send are fixed. The need or ability for a Technician to configure anything has been minimised.
The Gallagher SMB security solution gives you the flexibility to offer your customers the access options that suit their security and operational needs. Gallagher SMB offers four types of credentials: Mobile Credentials, SMB Key Tags, SMB Cards, and User Codes. Their different benefits are described below.
Gallagher SMB is a mobile-first security solution. Mobile credentials offer unparalleled convenience for both administrator and user. Using a device the user already has, an administrator need not order, purchase, or distribute physical access credentials ever again.
Gallagher SMB mobile credentials come from Gallagher’s award-winning Mobile Connect credentialing solution. Mobile credentials are provisioned using the Gallagher SMB app, meaning an administrator can invite a user into the system from anywhere, at any time. There is no limit to the number of mobile credentials that can be provisioned per site. The user will receive an email invite, download the Gallagher SMB app, and register their credential.
The user can then request access by presenting their smartphone at the door’s reader. iOS smartphones communicate with the reader using Bluetooth®. Android smartphones communicate with the reader using NFC or Bluetooth®.
Two Factor Authentication
Two factor authentication ensures the person is who they claim to be and is designed to prevent an unauthorised user from disarming the site.
Two factor authentication requires two factors;
something the user has (smartphone), and
something the user has on their phone that only they know (PIN/Password) or are (biometric data) - this must be on the smartphone (not a PIN at the reader).
Gallagher SMB does not support two factor authentication with mobile credential/card and PIN at the T30 reader. If you require two factor authentication, please use the SMB app.
Credentials are stored securely on the smartphone using FIDO open standard security.
Two factor authentication is always required to disarm. If the area behind the door is already disarmed, a user need only present their smartphone like an access card to request access at the door. The smartphone must host the Gallagher SMB app with a valid mobile credential for the site.
Gallagher SMB Key Tags are a MIFARE® DESFire EV2 4K keyfob. Constructed using an overmolding process and PA6 industrial grade plastic, they are waterproof, robust, and cost-effective. Laser engraved, they offer an elegant and convenient physical credential solution. An SMB Key Tag can be attached to a key ring, lanyard, or placed in a smartphone case.
MIFARE DESFire EV2
The MIFARE® DESFire EV2 platform represents the highest security available in access card technology currently. It is more secure than 125kHz and MIFARE® Classic. It has evolved from the MIFARE® DESFire EV1 platform, providing a secure, flexible credential, with an improved read range compared to that of MIFARE® DESFire EV1.
Custom Encoding
Gallagher SMB Key Tags are encoded using an NFC enabled smartphone, running the Gallagher SMB app. A user with elevated privileges must authenticate themselves prior to encoding a tag. When encoded, a site-specific application is stored securely on the tag, meaning the tag can only be used on the site it was encoded for. Multiple layers of security prevent tag cloning. The tag’s unique serial number is available for use by third-party systems.
A multi-site solution
The tag must be encoded per site. If the same user (confirmed as the same user) exists on another SMB site, the additional site’s application must be encoded on the tag. Up to 27 site applications can be stored on a MIFARE® DESFire EV2 4K tag.
*MIFARE Classic, MIFARE DESFire EV1, and MIFARE DESFire EV2 are registered trademarks of NXP B.V.
Gallagher SMB User Codes are unique codes generated by Site Managers via the SMB app to allow access to their site. A user with Site Manager privileges can generate a code for a user during the user creation process or edit an existing user’s credential and generate a User Code. User Codes can be deleted directly from the SMB app to revoke access if required.
SMB User Codes must be used with the Gallagher T30 Keypad. They can be used for access as well as arming and disarming. When a user with disarming privileges enters their User Code at an armed area, the area disarms and access is granted.
SMB User Codes save you time and money. They remove the need to travel to your customer’s site to generate new codes or to change codes that have been compromised. Your customer has full control to create and delete User Codes independently, all via the SMB app.
The Gallagher SMB solution supports three different readers or the ability to configure a door without a reader.
Gallagher SMB T11 (C500430/C500431)
Gallagher SMB T15 (C500480/C500481)
Gallagher T30 Multi Tech Keypad (C300490/C300491)
The Gallagher SMB Reader provides users with a convenient way to control their site’s security. The reader can be used for local alarm management, access control, or both.
Arming Reader: When a reader is not associated with a door, it's an arming reader, by default.
Access Reader: When a reader is added to a door, it's can perform both jobs, access and (local) arming.
Arming and disarming affect a whole site or area. When one or more areas are armed, all doors in those areas are locked.
A privileged user can locally arm or disarm their site at a reader using their smartphone, SMB Key Tag, SMB Card, or User Code. A user’s smartphone communicates using Bluetooth® to the reader. This functionality is useful if internet connectivity has been lost. The areas that a user can arm and disarm are determined by their roles and configured privileges.
Users arm and disarm areas by:
presenting their smartphone, SMB Key Tag, or SMB Card to the reader (a single badge is required to disarm the site and a double badge to arm the site), or
entering their User Code (T30 Keypad only).
Gallagher SMB T11 and T15
When a T11 or T15 is configured as an arming reader, the reader’s LED will display:
Green: one or more areas are disarmed.
Red: all areas are armed.
Gallagher SMB T30 Keypad
When a T30 Multi Tech Keypad is configured as an arming reader, the reader’s LED squiggle will display:
Green: one or more areas are disarmed.
Red: all areas are armed.
And the reader’s LED Arm (shield) icon will display:
Green: one or more areas are disarmed.
Red: all areas are armed.
Quick Flash White: a long press on the Arm (shield icon) button causes the LED to flash white briefly, ready for the user to present their smartphone, SMB Key Tag, or SMB Card, or enter their User Code, to start the arming process.
Blue: a long press on the '0' button changes the LED Arm icon to blue or white to reveal the reader's supported technology; blue is the Multi Tech variant and white is the MIFARE variant.
Access control affects only one door at a time. When a door is unlocked with a user's credential, only that door momentarily unlocks to allow access. Additionally, if the door's area was armed and the user has the privilege to disarm, entering their credential disarms that area only.
If a reader is assigned to a door, a user can locally request access at the reader. Access can be requested using a smartphone, SMB Key Tag, SMB Card, or User Code. Access control is limited to Bluetooth® for iOS devices. Android devices will use NFC for access control by default (if enabled on the device) or Bluetooth®.
Users gain access through doors by:
presenting their smartphone, SMB Key Tag, or SMB Card to the reader, or
entering their User Code (T30 Keypad only).
When configured as an access reader, the reader’s LED (squiggle) will display:
Solid green: the door is unlocked.
Solid red: the door is locked.
Flashes green: access has been granted.
Flashed red: access has been denied.
Note: When assigned to a door, the reader’s LED squiggle will always display the locked state of the door, not the armed or disarmed state of the site.
From the Hardware tab, click the + ADD NEW button and select a reader.
Enter a name for the reader.
Enter the reader's serial number in the Serial Number field. After plugging in the reader, the serial number can be copied from the controller's event history. The serial number can also be found on the back of the reader and on its packaging.
Click OK.
Notes:
If all T30 Keypads are removed from the site configuration, all User Code functionality is hidden within the SMB app, including existing User Codes. If the T30 Keypad is ever added back again, any previously-configured User Codes will remain and can be used again (and new ones can again be generated).
If you are replacing a T15/T11 reader with a T30 Keypad, the door associated with the reader must be unlocked.
The Enable NFC connectivity check box is included in the properties of all readers that have been assigned to a door. Hence, you will not see this option on readers you have only just created. After assigning the reader within a door's properties, you can return to the reader's properties and:
select the 'Enable NFC connectivity' check box to allow Mobile Credentials to request access via NFC and Bluetooth® (selected by default), or
deselect the 'Enable NFC connectivity' check box to force Mobile Credentials to request access via Bluetooth® and not NFC. SMB tags are unaffected by this setting.
Environmental factors (e.g. metal surfaces) will affect the reader's Bluetooth® performance. The following Bluetooth® connection settings can be adjusted to improve the user's phone performance when communicating with the reader.
These settings are adjusted in the SMB Installer Portal on the Reader's properties tab.
Transmit Power
Increasing the Transmit Power will increase the readers Bluetooth® read range. Adjusting this range will increase both the Door Connection and Local Arming ranges. The default value is -26 dBm (decibel-milliwatts).
Door Connection Range
This is the range at which the customer’s Bluetooth® device will automatically connect to the reader and grant access to the user if the user has access privilege to the area the door is associated to. The default value is 45 dBm (decibel-milliwatts) and must always be less than the value set for the local arming range.
Local Arming Range
This is the range within which the user can manually connect their Bluetooth® device to the reader to arm or disarm their alarm system. The default value is 64 dBm (decibel-milliwatts).
Note: These settings will need to be checked and adjusted according to the site as the distance at which a device connects to the reader depends on the construction of the wall the reader is placed on and the types of devices (phones) the users will be using.
In the following situations, if the T30 Keypad loses power and comes back online, it might cause the Keypad to become unresponsive:
T30 Keypad is unplugged and connected back.
The Controller is power cycled.
The Controller is soft restarted or restarted from the controller debug page.
When replacing a T15/T11 reader with a T30 Keypad, the door must be unlocked.
If the T30 Keypad becomes unresponsive, unlocking and then locking the door will recover the reader.
Gallagher SMB has partnered with First Security (New Zealand) and Wilson Security (Australia) to provide an integrated guarding solution as an alternative to self-monitoring or third-party monitoring. Guarding is not currently available outside of New Zealand and Australia.
With the Guarding service enabled, customers can request a guard directly from the Gallagher SMB app or enable automated guarding where the system will automatically request a guard in an alarm incident.
The guarding provider will respond to the alarm, assess the site, call the police if needed, and provide a full report within the SMB app. Customers will receive regular update notifications indicating the guard has arrived on site and departed, followed by updates on their actions on-site and a final report.
To be eligible for Guarding, a site must:
be in New Zealand or Australia
be activated
not be a demo site
A guard call-out can be initiated either manually or automatically.
Manual guard call-out
With Guarding enabled, the customer can choose to manually request a security guard when an incident occurs. When reviewing an incident, the site Manager can take the Action to “Request Security Guard”. A warning will appear to ensure they want to proceed and are aware the call-out could result in a call-out fee. Once agreed to proceed, the customer would need to call the guarding company to cancel, and fees may still apply.
Auto-Guard call-out
The customer can enable Auto-Guard call-outs, where the request for a guard is automatically sent. Customers can configure a guard to be automatically requested if an incident is not responded to within the selected timeframe. This does not need to be set at the time of activation; the customer can enable auto-guarding within the SMB app.
Guarding has a monthly ongoing subscription associated with it. Billing will commence once the 'Setting up Guarding' section (below) is complete for a site and the site is activated. When a guard call-out is made either manually or via Auto-Guarding, the customer incurs a call-out fee additional to the monthly billing.
Getting the Client Code
To enable Guarding for a customer, a Client Code is required from the Guarding provider.
Note: Guarding is only available for activated, real (not demo) New Zealand and Australia sites.
Complete the Guarding Form.
Provide Site Details, Site Name, Site Address, Site Contact & After-Hours Contact.
Click Send form to send the Guarding Form to the guarding provider (First Security NZ or Wilson Security AUS).
The guarding provider will organise a site visit with the customer and create a proforma.
Once the site visit is completed, the Site Plan is sent to the customer.
The guarding provider advises the Technician of the Client Code, which should start with 'GAL'.
Once the Technician has the Client Code, Guarding can be enabled for a site.
Enabling Guarding in the SMB Installer Portal
To enable Guarding for a customer, perform the following:
Note: Guarding is only available for activated, real (not demo) New Zealand and Australia sites.
From the menu on the right-hand side of the customer’s site configuration screen, click Enable Guarding.
The Guarding Subscription lightbox displays.
Enter the Client Code. This is provided by the Guarding company and us ually starts with 'GAL'.
If the customer wants a guard to be called automatically when an incident occurs, enable the Automatically Request Guard toggle.
In the Request Guard After field, enter the number of minutes (0-15) after which the customer wants a guard to be automatically called out, when an incident is raised through the SMB app.
Click OK.
If a guard call-out is made either manually or via Auto-Guarding, the customer will incur a call-out fee.
The following diagram shows the architecture for the Gallagher SMB solution. The system is a collection of hardware and software items, tightly integrated to provide a seamless intruder alarm monitoring system. The Gallagher Cloud server is hosted on AWS, Amazon web cloud servers.
The design allows integration with a range of external systems to provide the user with a single point of control for building security management.
The diagram above illustrates the secure nature of the Controller's communications with the internet. The key takeaway is that the Controller is isolated from the internet – it accepts no inbound traffic.
All communications between the Controller and the Cloud server are encrypted using AES encryption.
If the Controller loses connection to the Cloud server, it will continually try to reconnect, in order that the system handles temporary network/internet outages. If the Controller is offline for a predefined period of time, an alarm is raised, notifying the appropriate users of the outage.
Customer data (site data) is replicated across multiple data centres in Sydney, Australia. Customer data is backed up nightly, and the backups replicated across the data centres.
All historical events are stored within their own event database.
Installing the Gallagher SMB Kit hardware involves the following steps:
Install the cabinet
Install readers
Connect inputs and outputs
Connect power to the controller
Connect the controller to the cloud
Initialise tampers
For the full procedures for the above steps, refer to the appropriate SMB Kit installation note, depending on your region:
As an additional aid, you may also refer to the appropriate hardware installation video module, which contains mostly the same information as the SMB Base Kit installation note:
Refer to the relevant installation notes for any additional hardware components you need to install:
Permaconn PM54 (NZ/AUS only)
SMB Monitoring Kit (North America only)
Gallagher SMB HBUS I/O 8In Board (NZ/AUS only)
The following hardware components are compatible with the SMB solution:
The Controller’s cloud configuration web pages allow configuration of specific Controller settings, including the Controller’s date/time and NTP server if needed.
To connect to the Controller’s cloud configuration web pages, there are two methods:
Method | Procedure |
---|---|
About this topic
The Gallagher SMB Kit installation note contains the procedures for bringing the controller online. This topic contains information to surplus the installation note, in case further help is required.
Bringing the controller online
The Controller should be brought online before the site is configured in the SMB Installer Portal.
Connect the site's LAN (Ethernet cable) to the Router's secondary Ethernet port.
Power on the Controller and wait for for the Controller to show as Online in the SMB Installer Portal. To indicate the Controller has come online in the SMB Installer Portal, the word 'OFFLINE' will not display next to the Controller item on the 'HARDWARE' tab. The physical Controller also enters the single flash state when it comes online.
Once connected, the controller will receive any outstanding firmware updates from the Cloud server.
Check the site has an internet connection - plug the laptop into the network via ethernet and test the connection.
If the site does have internet connectivity, try the following:
Check the controller flash state (see below table)
Use cellular router instead, as a last resort
Controller Flash Modes
The 8 In 4 Out LED is located near the centre of the board. The 8 In LED is located above IN3.
Flash | Pa | Meaning |
---|---|---|
If the site is using a proxy server, this may also stop the controller from coming online.
To resolve this issue, you will need to connect a web browser to the Controller's configuration web pages and enter the proxy server's connection details.
When the Controller is powered up with DIP switches 2 and 3 ON, the Controller uses the following default addresses:
Controller IP: 192.168.1.199
Gateway: 192.168.1.198
Subnet: 255.255.255.0
This enables you to configure your PC with an IP address in the same subnet as the Controller, and by setting DIP switch 1 to ON, connect a web browser to the Controller. Your PC IP address should be different from the Controller's IP address, (i.e. not 192.168.1.199).
To enter the proxy server's connection details, perform the following procedure:
Connect the Controller to your PC via the Controller's Ethernet port.
Set DIP switches 1, 2 and 3 to ON.
Power cycle the Controller.
Using a web browser, enter the IP address of the Controller as follows: http://192.168.1.199/cloud/ The Enter Network Password web page displays.
Enter cloud for the username, then GGLcloud for the password and press Enter. The Gallagher Cloud Controller Configuration web page displays.
Click the Proxy Server Configuration link. The Proxy Server Configuration web page displays.
Enter the proxy server's name, port number, and logon credentials (if required).
Click Save.
Set DIP switches 1, 2 and 3 to OFF.
Connect the Controller to the site's network.
Power cycle the Controller.
The proxy settings are persisted across Controller re-power.
To clear the proxy settings, set DIP switches 1, 2 and 3 to ON, then power cycle the Controller. Wait for the Controller's Run LED to enter a 2 flash pattern, then set DIP switches 1, 2 and 3 to OFF, and power cycle the Controller again.
If the site has a firewall, this may also stop the controller from coming online.
The customer will need to open the required ports/protocols to allow the controller to communicate to the internet through their firewall.
Destination Ports
Detailed below are the destination ports that the SMB Controller and router will try to connect to for various services.
SMB Controller:
Router:
If you need to clear the Controller's configuration, perform the following procedure:
Set DIP switches 1, 2 and 3 to ON.
Power cycle the Controller.
Wait a few minutes until the LED is flashing in a steady state (2 flash or 5 flash).
Set DIP switches 1, 2 and 3 to OFF.
Power cycle the Controller again.
The Controller can now be assigned to a new site.
The Controller works through the following steps:
The Controller requests an IP address using DHCP.
The DHCP server on the local area network assigns an IP address to the Controller, so it can send and receive TCP/IP messages from the Cloud server.
Most networks have a DHCP server. The Router provided has a DHCP server.
The Controller uses DNS to resolve the IP address for the Gallagher cloud services.
The Controller uses the SNTP to obtain the time.
The Controller establishes an HTTPS session with the Cloud server for encrypted communications.
The Controller authenticates the Cloud server. This ensures that site-specific data is only exchanged with the authentic Cloud server.
The Cloud server authenticates the Controller. This ensures that site-specific data is only exchanged with a Gallagher provisioned device.
The Controller connects to the site's local TCP/IP network. If required (i.e. TCP/IP network connectivity is unreliable), the Router can be used to provide connection to a mobile network provider. The router comes pre-equipped with a SIM card and an ethernet cable to connect it to the controller. Purchase of the Cellular data subscription package will automatically enable the controller to communicate over the cellular network.
Check cable type, size and maximum distances
Pull cables for all inputs and outputs
Check device power requirements
Cable type | Cable format* | Single HBUS device – data only | Single HBUS device – data and power | Multiple HBUS devices – data only | Multiple HBUS devices – data and power |
---|---|---|---|---|---|
* The matching of wire sizes to equivalent wire gauges are only approximate. ** Recommended cable types for optimal HBUS RS485 performance.
Shielded cable may reduce the obtainable cable length. Shielded cable should be grounded at the Controller end only.
This topic gives an overview of the default configuration that comes with a new SMB site.
Note: If you selected a "Controller Only" Configuration Template during the , only a Controller item is added by default. All other items can be added manually.
If you selected the 'NZ AU Base Kit' Configuration Template when creating the site, the following default configuration is applied:
Item | Description |
---|
If you selected the 'USA Base Kit' Configuration Template when creating the site, the following default configuration is applied:
Item | Description |
---|
About inputs: Inputs detect the voltage level change on the input to determine the state of the device connected. For example, if the voltage on the input is 2.5 Vdc (normal) and then changes to 3.3 Vdc as a result of the alarm relay opening, then this will be reported as an alarm condition.
All inputs on the Gallagher SMB solution have the same operational characteristics. They are provided to allow the connection of monitored switches for intruder detectors, door and window monitoring, fire alarm detection, and general equipment monitoring.
From the Hardware tab, open the input you want to configure.
Name the input something meaningful to the customer (e.g. 'Office PIR' rather than 'PIR 1'), as the names are present within the customer app.
Select the required Area.
Select the Sensor type.
Select the appropriate Alarm Response type. Options include:
'Secure Alarm': When activated, the item will generate an alarm if the area it is assigned to is armed. Commonly used for intruder items such as PIRs or Reed Switches.
'24 Hour Alarm': When activated, the item will generate an alarm, regardless of whether the area it is assigned to is armed or not. Generally used for system alarms or building alarms.
'24 Hour Silent Alarm': Similar to the 24 Hour Alarm, but the alarm output for the area will not be activated. This can be used to discreetly raise an alarm when duress or holdup buttons are being used without alerting the threat to the fact an alarm has been raised.
'Alarm when disarmed': When activated, the item will only generate an alarm when the area is disarmed. Generally used for safety issues onsite.
'No Event Recorded': When activated, neither an event nor an alarm will be generated. This can be used when nothing needs to be recorded and no one needs to be alerted.
Note: See below for more information.
Click the + ASSIGN OUTPUTS button and assign the appropriate output(s) to the input. The outputs you assign here will turn on when this input opens.
Notes:
The 'Outputs' box displays all outputs assigned to this input.
The Status tab displays the current status of this input.
The Event History tab displays all events associated with this input. Events can be filtered.
Once finished configuring the output, click OK to close and save your changes.
See the '' topic to assign this input to Areas.
Note: For inputs that are not currently being used, we recommend disabling the input by setting its toggle to Off. This ensures the controller ignores all unused inputs and avoids unnecessary open circuit tamper alarms being raised.
About outputs: All outputs on the Gallagher SMB system, irrespective of the actual hardware unit, have the same operational characteristics. They are provided to allow control of external devices such as door locks, lighting, sirens, and external systems.
From the Hardware tab, open the output you want to configure.
Name the output something meaningful to the customer (e.g. 'Office Light' rather than 'Light 1'), as the names are present within the customer app.
Select the Output type from the drop-down list: Siren, Strobe, Light, or Pulsed.
If you selected 'Siren', 'Strobe', or 'Light', enter the Maximum On Time in minutes and/or seconds. Defaults to None.
If you selected 'Pulsed', enter the Pulsed Time in minutes and/or seconds. Defaults to 5 seconds.
Notes:
The 'Used on Areas' box displays all Areas this output is assigned to.
The 'Used on Inputs' box displays all inputs this output is assigned to.
The Status tab displays the current status of this output.
The Event History tab displays all events associated with this output. Events can be filtered.
Once finished configuring the output, click OK to close and save your changes.
See the 'Configure Areas' topic to assign this output to Areas.
Additional I/O boards can be added to expand the solution to 128 Inputs and 61 Outputs.
The following I/O Boards are compatible with the SMB Solution:
Gallagher SMB 8In Board
Gallagher SMB 8In 4Out Board
Gallagher HBUS 16 In 16 Out Board
To add more I/O Boards:
From the Hardware tab, click the + ADD NEW button.
Select '8 In Board', '8 In 4 Out Board', or '16 in 16 Out Board' from the drop-down list.
The Properties lightbox displays.
Enter the Name and Serial Number of the board that is being added to the site.
If different EOL Resistors are required, select the required option from the drop-down list.
Click OK.
To configure the additional inputs and outputs, refer to the procedures above.
Refer to the table below for a detailed overview of the behaviour of each of the Alarm Response types:
Once the site has been created, the will display. The default configuration supports the pre-wired mains power failure and battery low inputs.
If configuring the site remotely before installation, the controller assignment can be completed last, prior to site activation.
To associate a controller with a site, perform the following procedure:
Navigate to the customer's site.
Click the Scan controller QR code button and scan the QR code printed on the controller.
If using a laptop, take a photo of the QR code using your phone and present it to the laptop. If you are unable to scan the controller's QR code, you can enter the controller's ID in the Controller ID field. The controller's ID is printed on the controller, below the QR code.
Click the ASSIGN CONTROLLER button.
The controller will come online and connect to the Gallagher cloud. An IP address is automatically assigned to the controller via DHCP. There is no MAC address or IP addressing required. The controller will download the latest firmware and update its default configuration. This takes approximately five ( 5 ) minutes.
Notes:
If the controller does not come online, check the site has an internet connection.
If the site has a firewall preventing the controller from connecting to the internet, the following ports on the controller need to be reachable:
Port | Protocol | Details |
---|
If the message 'Cannot assign controller' displays, the controller has already been assigned to a site.
Select the Controller.
The ‘Controller’ lightbox displays.
Notes:
If the site is using tamper detection, the controller’s optical tampers can be enabled here.
The controller’s firmware version and application version are shown here.
The Controller's 'EOL Resistors' setting is only applied to the '8In Board 1' by default; not the '8In4Out Board 1'. This is because the 8In4Out Board's two power-monitored inputs (Battery Low and Mains Failure) require 4k7 Ohm Rs in order to function, and therefore are set this way in the 8In4Out Board's default configuration.
The controller’s ‘Event History’ shows events generated by the controller, and cloud events that are related to the controller. Use the event history to help diagnose issues with the site.
For New Zealand and Australia sites, the Permaconn PM54 is the available alarm transmitter. For North American sites, the Alula BAT-Connect is available.
NZ/AUS: Permaconn PM54 The Permaconn PM54 can also function as an alarm communicator, transmitting alarms from the Gallagher SMB Controller to a monitoring station using the Contact ID alarms transmission protocol. The Permaconn PM54 is powered by the Gallagher SMB Kit and provides connection to the site's WAN or Wi-Fi.
North America: Alula BAT-Connect The Alula BAT-Connect is an alarm communicator, transmitting alarms from the Gallagher SMB Controller to a monitoring station using the Contact ID alarms transmission protocol. The Alula BAT-Connect is powered by the Gallagher SMB Kit and provides connection to the site's WAN, cellular, or Wi-Fi.
If the customer requires third-party monitoring, configure the alarm transmitter.
In the , click the MONITORING tab.
Enter the Account Code received from the monitoring station and click SAVE.
The Alarm Transmitter item displays.
Enable the toggle next to the Alarm Transmitter.
Note: If you are also enabling the IP Alarm Transmitter, select which transmitter is the primary one from the Primary option (next to the 'Account Code' field).
Click on the Alarm Transmitter to open its properties. The Alarm Transmitter lightbox displays.
Enter the transmitter device's serial number or MAC address (this is an optional field).
To enable , enable the Periodic Dialling toggle.
To set the frequency of dialling tests, select either Dial daily at or Dial every.
Dial daily at: Select this option to have a periodic dial occur at the same specified time each day. Consider selecting a unique time for each site so the load on monitoring stations is spread throughout the day. If you change the periodic dial time, notify the monitoring station of the new test time. The time will automatically adjust for daylight savings.
Dial every: Select this option if you require more frequent periodic test dials. This means that a test dial will occur at the interval specified, starting at the time that has been specified. Any time can be entered as the start time. Daylight savings corrections will be applied when the Controller's clock is updated.
If required, select the Skip periodic dial following successful alarm dial check box.
With this option selected, the periodic dial test will be skipped if there has been a successful alarm dial since the last periodic dial test. If the periodic dial is skipped, the next time you can expect a periodic dial is at the configured time the next day or after the periodic dial interval, depending on how it is configured.
Click OK to complete the configuration.
For more information about your alarm transmitter, refer to the appropriate installation note:
About Periodic Dialling
A timer test (also known as the ‘periodic test’ or ‘24 hour’ test) is an affirmation to the monitoring station that the alarm system is capable of sending Contact ID. Most alarm systems send one test per day. The signal is fixed in its format and will be sent with an XYZ (Contact ID event code) of 602 and it will be sent in the (GG) partition or Alarm Zone 00. Only one periodic test can be enabled per account number for accurate reporting of line status (this is a consideration when using multiple Diallers using single client code reporting). It may be necessary to configure periodic tests from different diallers into different account numbers. It will also be reported as a new event and will have a CCC of 000, (e.g. 123418160200000, where 1234 is the account number).
If a test is not received when it should have been, action is taken by the monitoring station staff.
Publishing configuration with monitoring enabled pushes the monitoring-related configuration to the controller. This publishing is also the trigger for the controller to carry out dial checks and construct and send messages to the monitoring station.
THE MONITORING STATION WILL RECEIVE ALARMS FROM THE SITE WHENEVER MONITORING IS ENABLED AND A PERMACONN IS CONNECTED OR THE IP ALARM TRANSMITTER IS ENABLED (even if installation and configuration are still underway).
Monitoring Report
Generating the report Once a site is activated, a Monitoring Report will be available to download and send to the monitoring station. The Monitoring Report outlines the XZY Codes, GG Codes, Zone list CCC Codes, and User CCC Codes.
Under Site Actions on the right-hand side of the screen, click Download Monitoring Report.
A warning appears: Only published changes will appear in the report. NOTE: This report contains personal data. Please respect privacy laws.
Click Download.
The Monitoring Report downloads as a CSV file.
Send the file to the monitoring station.
As no users are created for the site yet, the User List CCC Codes will only contain the Key Account Holder. The Monitoring Report can be downloaded at any stage, and you may wish to wait until the Site is set up with more users before downloading and sending the report.
Users' CCC codes If an incident occurs and the monitoring station doesn’t know who the user is by name, they will have a CCC code. In the SMB app, the customer can search for this code.
For the Site Manager to find which user the CCC code is related to:
Log into the SMB customer app.
Select Team from the navigation bar.
In the search field, enter the CCC code.
The user with the related CCC code appears in the search results.
This section contains answers to common questions about Gallagher SMB.
A customer's site is first created and then configured in the Gallagher SMB Installer Portal.
Log into the .
Login details can be requested through Gallagher Sales Order Management team.
Click the + ADD NEW SITE button located at the top of the screen.
The 'New Site' wizard displays.
Enter a Name for the site.
It is important to consult with the customer to identify a meaningful name for the site - as well as areas, doors, inputs, and outputs - as these names will appear in the Gallagher SMB App.
Select the Timezone, Country and Address of the site.
Ensure you select the appropriate 'Country'. The associated country code is used as the default dialling prefix (country code) when adding phone numbers in the Gallagher SMB App.
Click Next.
The Key Account Holder screen displays.
Enter the Name, Email and Cellphone number of the key account holder.
The key account holder should be the main point of contact at the customer’s site and they will be the first person to receive access to the SMB security solution. An invitation is sent to this person once the site is activated.
Click Next.
The Setup screen displays.
Select the appropriate Configuration Template. If you select 'NZ AU Base Kit' or 'USA Base Kit', after you click 'SAVE', the site is given a default configuration as outlined in . If you select 'NZ AU Controller Only' or 'USA Controller Only', the site will only have a Controller added by default.
Select the Billing Frequency. The available options are Monthly and Annually. Subscription billing commences once the site is activated.
Enable the Site uses tags check box if the site will be issuing key tags to users. This will enable the key tag assignment and management functionality within the Gallagher SMB App.
Tags are considered a single-factor credential. If tags are used for access, the area the doors are associated with must be configured to disarm with a single-factor authentication. This is part of the Area configuration lightbox.
Click the Save button.
The site is created, and the is displayed.
About Demo Sites
The Demo Site workflow is designed to provide SMB Partners with a platform to train technicians to configure SMB Sites. Demo Sites can also be used for promoting the solution to potential customers. All SMB Partners have a default of five (5) Demo Sites available to configure. Demo Sites can be deleted at any stage in the process and are non-chargeable. If you require more than five demo sites at one time, please contact your Gallagher representative with an explanation so this can be adjusted in the system.
Demo Sites can have hardware allocated to them and they can be fully activated and used in the same way as a real site. By activating the site, SMB Partners can demonstrate the registration process and SMB app to potential customers.
Demo Sites are not development sites and are not monitored by Gallagher's development teams. Demo Sites should be used for training and promotion only.
Creating a Demo Site
Login details can be requested through Gallagher Sales Order Management team.
Click the SUPPORT tab at the top of the screen.
Under 'Manage Demo Sites', click the + ADD NEW DEMO SITE button.
The 'New Demo Site' wizard displays.
Enter a Name for the site. The name of the site, areas, doors, inputs, and outputs will appear in the Gallagher SMB App.
Select the Timezone, Country and Address of the site.
Ensure you select the appropriate 'Country'. The associated country code is used as the default dialling prefix (country code) when adding phone numbers in the Gallagher SMB App.
Click Next.
The Account Holder screen displays.
Enter the Name, Email and Cellphone number of the key account holder.
The key account holder should be the main point of contact at the customer’s site and they will be the first person to receive access to the SMB security solution. An invitation is sent to this person once the site is activated. As this is a demo site, it can be the Technician.
Click Next.
The Setup screen displays.
Select the appropriate Configuration Template. Once the site creation wizard is completed, this template provides a default configuration for the site.
Select the Billing Frequency. This defaults to non-chargeable. No subscription is charged for Demo Sites.
Enable the Site uses tags toggle if the site will be issuing key tags to users. This will enable the key tag assignment and management functionality within the Gallagher SMB App.
Tags are considered a single-factor credential. If tags are used for access, the area the doors are associated with must be configured to disarm with a single-factor authentication. This is part of the Area configuration lightbox.
Click the Save button.
All other configuration procedures are the same as a real site, as is outlined in the Installer Help, documentation, and training videos.
Identifying Demo Sites
Demo Sites will appear on the SITES tab. They can be identified within the list by the word '(Demo)' that appears after their status in the 'Status' column. Demo Sites will also appear under the 'Manage Demo Sites' section in the SUPPORT tab.
Deleting a Demo Site
Login details can be requested through Gallagher Sales Order Management team.
On the SITES tab, use the search box to search for the Demo Site to be deleted, or go to the SUPPORT tab to see a list of Demo Sites.
Click on the site that is to be deleted.
Click SITE DETAILS on the right-hand side of the screen.
The 'Site Details' lightbox displays.
Click the DELETE button.
A warning displays.
Click OK to delete or CANCEL to return to the site configuration page.
Once a Demo Site is deleted, there is no further record of this site. Gallagher does not store any history, events or users’ details about the site.
Reusing the Demo Site Controller
Please note that if you purchase your Gallagher SMB solution through a distributor, they will provide your Level 1 Technical Support.
Phone:
Australia - 1800 009 259 | +61 2 9439 8599
New Zealand - 0800 654 256 | +64 7 838 9800
USA - +1 866 922 7329
Email:
Web:
LinkedIn:
Facebook:
SMB Installer Portal:
The same login credentials are used to access both the Partner Portal and the Installer Portal.
To check which smartphones are supported:
Refer to the Apple Store to confirm the latest iOS compatibility.
Refer to the Google Play Store to confirm the latest Android compatibility.
The following is required for all smartphones:
Users must have a passcode or pattern lock set on their phone. Even if they have face recognition or a thumbprint set up, a passcode or pattern lock is still necessary.
Users must have email access on their phone. Each person using the app will need a separate email address.
Product Name | Credential Technology | Product Number |
---|---|---|
If required, adjust the reader's . Refer to the section below.
Once a reader has been assigned to a door, the '' check box is included in the reader's properties, and is enabled by default. Refer to the section below.
To cancel charging, contact Gallagher () and the Guarding company.
This is available from within the under 'Support' tab > 'Administration' > Guarding Form.
Log into the and navigate to the site.
Port Number | Protocol | Details |
---|---|---|
Port Number | Protocol | Details |
---|---|---|
Alarm Response | Alarm/event behaviour if the input's area is armed | Remote notification if the input's area is armed? | Activate outputs assigned to the input's area if the area is armed? | Keep alarms/relays active if the input's area is armed? | Alarm/event behaviour if the input's area is disarmed | Remote notification if the input's area is disarmed? | Activate outputs assigned to the input's area if the area is disarmed? | Deactivate the outputs activated by this event response once the alarm is acknowledged? |
---|
(NZ/AUS only)
(North America only)
Log into the .
The Demo Site is created, and the is displayed.
Log into the .
If a Controller was assigned to a site that was deleted and you wish to use the Controller for a different site, the previous site’s configuration must be cleared from the controller. To clear a Controller’s configuration, refer to in the topic 'Bring Controller online'.
The SMB App can be downloaded from the or
As an alternative to the SMB mobile app, you can use the . The web app is only supported by Chrome and Safari web browsers.
Navigate to the Controller's IP address
Find the IP address that has been assigned to the Controller by the local DHCP server.
Set DIP switch 1 to ON.
Connect a laptop/PC to the same network as the Controller.
Using a web browser, go to the Controller’s cloud configuration web page, replacing <ip_address> with the assigned IP address for the Controller:
http://<ip_address>/cloud/
The Sign In dialog displays.
Enter cloud for the username, then GGLcloud for the password and press Enter.
The Gallagher Cloud Controller Configuration web page displays.
Select the required link to configure the Controller as needed.
When finished, set DIP switch 1 to OFF.
Reset the Controller's IP address, then navigate to it
If you cannot find the Controller's DHCP IP address, the Controller can use the default IP address by powering it on with DIP switches 1, 2, and 3 ON. The Controller then uses the following default addresses:
Controller IP: 192.168.1.199
Gateway: 192.168.1.198
Subnet: 255.255.255.0
Connect the Controller to your PC via the Controller's Ethernet port.
Set DIP switches 1, 2 and 3 to ON.
Power cycle the Controller.
Using a web browser from a PC on the same subnet as the Controller, enter the default IP address of the Controller as follows:
http://192.168.1.199/cloud/
The Sign In dialog displays.
Enter cloud for the username, then GGLcloud for the password and press Enter.
The Gallagher Cloud Controller Configuration web page displays.
Select the required link to configure the Controller as needed.
When finished, set DIP switches 1, 2 and 3 to OFF.
Gallagher SMB Key Tag - Black
MIFARE® DESFire EV2 4K
C500470
Gallagher SMB Key Tag - White
MIFARE® DESFire EV2 4K
C500471
Short flash Long flash (1s cycle)
100 ms on, 250 ms off 400 ms on, 250 ms off
Boot code monitor running, network unplugged.
Half flash
450 ms on, 50 ms off (2Hz flash)
Controller resetting.
Fast
130 ms on, 130 ms off (4Hz flash)
Initialising.
1 flash
500 ms on, 500 ms off (1Hz flash)
Normal running.
2 flash
2 flashes - pause (each flash is 50 ms on, 400 ms off, 1.2 s pause)
Controller is operating, connected to the Cloud server but has no configuration.
3 flash
3 flashes - pause (each flash is 50 ms on, 400 ms off, 1.2 s pause)
Controller has a valid set of keys but has not connected to the Cloud server.
4 flash
4 flashes - pause (each flash is 50 ms on, 400 ms off, 1.2 s pause)
No private keys or certificate loaded, so will be unable to authenticate with the Cloud server. Contact the Gallagher Support Team.
5 flash
5 flashes - pause (each flash is 50 ms on, 400 ms off, 1.2 s pause)
Controller has a connection to the Cloud server but either the server has failed to authenticate the Controller or the Controller has failed to authenticate the server. Contact the Gallagher Support Team.
6 flash
6 flashes - pause (each flash is 50 ms on, 400 ms off, 1.2 s pause)
Controller does not have runnable firmware. Contact the Gallagher Support Team.
67
UDP
DHCP to internal router
53
UDP
DNS to internal router
123
UDP
NTP to time.google.com
443
TCP
SMB Cloud HTTPS
67
UDP
DHCP to internal router
53
UDP
DNS to internal router
123
UDP
NTP to time.google.com
514
UDP
RCMS Syslog
443
TCP
RCMS HTTPS
8883
TCP
RCMS HTTPS
ICMP
Ping time.google.com
CAT 5e or better**
4 twisted pair Each 2 x 0.2 mm2 (24 AWG)
500 m (1640 ft)
50 m (165 ft)
500 m (1640 ft)
50 m (165 ft)
SEC472
4 x 0.2 mm2 Not twisted pairs (24 AWG)
400 m (1310 ft)
50 m (165 ft)
–
–
SEC4142
4 x 0.4 mm2 Not twisted pairs (21 AWG)
400 m (1310 ft)
100 m (330 ft)
–
–
Pull cables
Installing the hardware
Bring Controller online
Secure Alarm | Raise Alarm | Yes (default IP Alarm Transmitter) | Yes | No | No Event / No Alarm | N/A | N/A | Yes |
24 Hour Alarm | Raise Alarm | Yes (default IP Alarm Transmitter) | Yes | No | Raise Alarm | Yes (default IP Alarm Transmitter) | Yes | Yes |
24 Hour Silent Alarm | Raise Alarm | Yes (default IP Alarm Transmitter) | No | No | Raise Alarm | Yes (default IP Alarm Transmitter) | No | N/A |
Alarm when disarmed | Event Only | N/A | N/A | N/A | Raise Alarm | Yes (default IP Alarm Transmitter) | Yes | Yes |
No Event Recorded | No Event / No Alarm | N/A | N/A | N/A | No Event / No Alarm | N/A | N/A | N/A |
500 - Controller 1 | A Controller item. You cannot delete this item from the configuration. Most sites will only require one Controller. The Controller acts as the head of the other configuration items, and is responsible for making access decisions and distributing firmware updates to the other hardware items. |
501 - 8In Board 1 | An input board. You may optionally delete this item. This board is connected to and powered by the Controller. The 8In Board comes with eight Inputs that can be individually configured. You cannot delete individual Inputs. |
502 - 8In4Out Board 1 | An input and output board. You may optionally delete this item, however, since it is used for monitoring mains power failure and low battery by default, you should configure the Inputs of another Board to monitor these if you delete this one. This board is connected to and powered by the Controller. The 8In4Out Board comes with eight Inputs and four Outputs that can be individually configured. You cannot delete individual Inputs or Outputs. By default, this 8In4Out Board does not use the 'Use Site Default' EOL Resistors setting. This is because the two power-monitored inputs (Battery Low and Mains Failure) require 4K7 Ohm Rs in order to function, and therefore are set this way by default. |
508 - Permaconn Alarm Dialler | Found on the MONITORING tab after the Account Code is entered. Sites created with the 'NZ AU Base Kit' Configuration Template come with a Permaconn in the default configuration. You cannot delete this item from the configuration, but you can toggle it to be disabled. |
500 - Controller 1 | A Controller item. You cannot delete this item from the configuration. Most sites will only require one Controller. The Controller acts as the head of the other configuration items, and is responsible for making access decisions and distributing firmware updates to the other hardware items. |
501 - 8In4Out Board 1 | An input and output board. You may optionally delete this item, however, since it is used for monitoring mains power failure and low battery by default, you should configure the Inputs of another Board to monitor these if you delete this one. This board is connected to and powered by the Controller. The 8In4Out Board comes with eight Inputs and four Outputs that can be individually configured. You cannot delete individual Inputs or Outputs. |
502 - 8In4Out Board 2 | A second input and output board. You may optionally delete this item. This board is connected to and powered by the Controller. The 8In4Out Board comes with eight Inputs and four Outputs that can be individually configured. You cannot delete individual Inputs or Outputs. |
511 - Alula Alarm Dialler | Found on the MONITORING tab after the Account Code is entered. Sites created with the 'USA Base Kit' Configuration Template come with an Alua in the default configuration. You cannot delete this item from the configuration, but you can toggle it to be disabled. |
67 | UDP | DHCP to internal router |
53 | UDP | DNS to internal router |
123 | UDP | NTP to time.google.com |
443 | TCP | SMB Cloud HTTPS |
The IP Alarm Transmitter requires no additional hardware; only the Controller is required.
Firmware requirement: To use IP Alarms, the Controller must be using Application version 2-3-11 or higher. Check the 'Application' field in the Controller's properties.
If the customer requires third-party monitoring, you can configure the IP Alarm Transmitter as an alternative or addition to the Permaconn or Alula alarm transmitter.
In the SMB Installer Portal, click the MONITORING tab.
Enter the Account Code received from the monitoring station and click SAVE.
The IP Alarm Transmitter item displays.
Enable the toggle next to the IP Alarm Transmitter.
Note: If you are also enabling the Permaconn or Alula alarm transmitter, select which transmitter is the primary one from the Primary option (next to the 'Account Code' field).
Click on the IP Alarm Transmitter to open its properties.
The IP Alarm Transmitter lightbox displays.
Select the required Protocol for transmitting to the monitoring station.
CSV uses Comma Separated Values (CSV) format for transmitting alarms. This method uses TCP/IP and is unencrypted.
DC-09 Gallagher uses Gallagher's own format of DC-09. Select this option if you are transmitting alarms to a Gallagher receiver. Encryption is available.
DC-09 SIA uses the Security Industry Association (SIA) protocol for DC-09. You will most likely want this option when transmitting to a third-party monitoring station. Encryption is available.
If you selected a DC-09 protocol, the Encryption check box displays. Optionally select this check box to encrypt all transmissions from the Controller, then enter the Encryption Key.
You can either generate this Encryption Key yourself and then provide it to the monitoring station, or request an Encryption Key from the monitoring station. Either way, the monitoring station must have the same key that you enter here.
For the IP Alarm Transmitter to provide authentication, select the Authentication check box and enter the Username and Password that will be used by the monitoring station to authenticate the data received.s
Note: The Username and Password must not contain the following characters: < > & ‘ “ ,
Enable as many Receivers as you like; there are two available. You must enable at least one Receiver for the IP Alarm Transmitter to function.
Transmissions are sent to 'Receiver 2' if attempts with 'Receiver 1' fail.
In the IP field of the enabled receiver(s), enter the IP address of the receiver. This must be provided to you by the monitoring station.
In the Port field of the enabled receiver(s), enter the Port used by the receiver. This must also be provided to you by the monitoring station.
To enable polling, select the time under the Polling field and enter how often a heartbeat will be sent to poll the receiver. Otherwise, select 'None'.
Click OK to complete the configuration.
A timer test or 'poll' (also known as the ‘periodic test’ or ‘24 hour’ test) is an affirmation to the monitoring station that the alarm system is capable of sending Contact ID. Most alarm systems send one test per day. The signal is fixed in its format and will be sent with an XYZ (Contact ID event code) of 602 and it will be sent in the (GG) partition or Alarm Zone 00. Only one periodic test can be enabled per account number for accurate reporting of line status (this is a consideration when using multiple Diallers using single client code reporting). It may be necessary to configure periodic tests from different diallers into different account numbers. It will also be reported as a new event and will have a CCC of 000, (e.g. 123418160200000, where 1234 is the account number).
If a test ('poll') is not received when it should have been, action is taken by the monitoring station staff.
Publishing configuration with monitoring enabled pushes the monitoring-related configuration to the controller. This publishing is also the trigger for the controller to carry out dial checks and construct and send messages to the monitoring station.
THE MONITORING STATION WILL RECEIVE ALARMS FROM THE SITE WHENEVER MONITORING IS ENABLED AND A PERMACONN IS CONNECTED OR THE IP ALARM TRANSMITTER IS ENABLED (even if installation and configuration are still underway).
Monitoring Report
Generating the report Once a site is activated, a Monitoring Report will be available to download and send to the monitoring station. The Monitoring Report outlines the XZY Codes, GG Codes, Zone list CCC Codes, and User CCC Codes.
Under Site Actions on the right-hand side of the screen, click Download Monitoring Report.
A warning appears: Only published changes will appear in the report. NOTE: This report contains personal data. Please respect privacy laws.
Click Download.
The Monitoring Report downloads as a CSV file.
Send the file to the monitoring station.
As no users are created for the site yet, the User List CCC Codes will only contain the Key Account Holder. The Monitoring Report can be downloaded at any stage, and you may wish to wait until the Site is set up with more users before downloading and sending the report.
Users' CCC codes If an incident occurs and the monitoring station doesn’t know who the user is by name, they will have a CCC code. In the SMB app, the customer can search for this code.
For the Site Manager to find which user the CCC code is related to:
Log into the SMB customer app.
Select Team from the navigation bar.
In the search field, enter the CCC code.
The user with the related CCC code appears in the search results.
Entry Delay provides some time (default of 30 seconds) for a user to disarm an area, after entering the site. It is ideally suited for intruder alarm sites, where a user has entered using a physical key, and must then disarm the site.
To configure entry delay, perform the following procedure:
Click the Areas tab.
Select the area to configure entry delay for.
Select the Delay Warnings tab.
Enable Entry Delay. The default entry delay time is 30 seconds. This is the period of time a user will have to disarm the site, after entry.
Click the Assign Inputs button and assign one or more entry points.
The first entry point to be activated will trigger entry delay. When the area is in delay, entry points will not raise an alarm until the delay period has expired. Non-entry point sensors will immediately raise an alarm when the area is in delay or armed.
Notes:
Assignment of an entry point is required if entry delay has been enabled.
Only inputs assigned to the area, can be assigned as entry points.
Inputs assigned to an access-controlled door cannot be assigned as entry points.
Battery Low and Mains Failure inputs cannot be assigned as entry points.
When a disabled input is assigned as an entry point, it will be automatically enabled.
When an input is assigned as an entry point, the input’s alarm response will be set to ‘Secure Alarm’.
If required, select the readers to beep when the area is in entry delay.
Any reader can be assigned as a delay warning. When the area is in delay, the reader will emit a continuous beep, until such time, as the delay has been cancelled, or the delay period has expired.
If required, select the outputs to activate when the area is in entry delay.
Any output, excluding door relays, can be assigned as a delay warning. The output will activate, until such time, as entry delay has been cancelled, or entry delay has expired. The output could be a piezo buzzer or light that provides an audible or visual indication to users, that the area is in entry delay. An output is useful when the audio from a reader cannot be heard, (e.g. a user has entered an upstairs office, failing to disarm before entry).
Note: To complete the configuration, a warning (reader or output) must be assigned.
If the delay warning output is on, and delay occurs, the output will remain on for the delay period and will turn off when the delay has been cancelled, or the delay period has expired. If the output is an Alarm Output, the output will be on when the area is in alarm, (i.e. will remain on after the delay period, if the area is in alarm). Likewise, if the output is a Reflected Output, the output will be on when the area is armed, (i.e. remain on after the delay expires, if the area is armed).
If the delay period expires and an incident is generated, auto-guard callout will occur from the time the incident was raised. For example, if the system has been configured to call a guard after 10 minutes, and entry delay is configured for 30 seconds, the system will call a guard 10 minutes and 30 seconds after activation of the first entry point.
If a customer isolates an entry point when arming, the input will continue to trigger entry delay. An alarm will be raised that entry delay has timed out (if timed out), however, the isolated input will not raise an alarm. This is expected behaviour. Ideally, the customer should not arm the area when the entry point is open.
The Gallagher SMB Installer Portal is where Technicians configure SMB customer sites. This section gives an overview of the portal, before you use it to configure sites in the 'Configuration' section of this Help.
The SITES tab lists all of the sites that you as a technician have access to. To view an existing site, click on its name in the list, or search its name in the search bar and then select it.
From this tab, you can also create a new site. This is covered in the topic Create a Site or Demo Site.
The TECHNICIANS tab is only viewable when logged in as an Install Manager technician.
It lists all the technicians within your organisation. A technician has one of two roles: Install Manager or Install Technician.
Install Managers can create, view, update, delete, and resend invites to all the technicians on the TECHNICIANS tab, and change a site's Key Account Holder and general configuration.
Install Technicians cannot access the TECHNICIANS tab or change a site's Key Account Holder, but can perform standard configuration for sites.
On the TECHNICIANS tab, as an Install Manager, you will see your own technician account listed. You can edit and resend the invite to your own account, but you can never delete your own account or change your own Role. These actions must be performed by another Install Manager technician.
The SUPPORT tab contains three sections; 'Technical', 'Administration', and 'Manage Demo Sites'.
The 'Technical' section contains links that can help you when you need technical help, including the help centre for installers, installer training material, and an option to contact technical support.
The 'Administration' section contains links to things you and your customers may need for sales and product setup. This includes links to SMB sales and marketing material, the SMB product order form, and the guarding form.
The 'Manage Demo Sites' section contains all the Demo Sites you have access to. For more information about Demo Sites, click here.
The Site Details button allows the general details of the site to be changed after it has been created. The site must be in Installer Mode for the site details to be changed.
To modify the Site Details:
Click the Site Details button.
The Site Details lightbox displays.
Change the details as required, such as the Name, Timezone, Country and Address of the site.
Note: For a timezone change to take effect on the Controller, you must publish the configuration.
Change the Subscription and Guarding details as required.
Note: These are not applicable for Demo Sites.
The Site uses tags toggle defines whether Key Tag assignment and management functionality is enabled.
Tags are considered a single-factor credential. If tags are used for access, the area the doors are associated with must be configured to disarm with a single-factor authentication. This is part of the Area configuration.
Click the OK button.
The site details are changed.
The 'SITE ACTIONS' section of a site in the Installer Portal contains key actions around the configuration and activation of the site. The available options depend on the current state of the site, but can include:
At all times:
View the Site Details
View, add, and modify Site Notes
View and change the Key Account Holder
Only before the site is activated:
Activate the site (see Activation)
Only once the site is activated:
Download the Monitoring Report (see Alarm transmitters or IP Alarms)
Only in Installer Mode (or before the site is activated):
Modify the Site Details
Enable Test Mode (cannot be done manually before activation)
The Key Account Holder button lets Install Managers view the details of the Key Account Holder and also change the Key Account Holder.
Note: Install Technicians cannot change the Key Account Holder. For more about Technician roles, refer to Installer Portal overview > 'TECHNICIANS tab'.
Click the Key Account Holder button.
The Key Account Holder lightbox displays.
Click the CHANGE KEY ACCOUNT HOLDER button.
The New Key Account Holder lightbox displays.
Enter the email address of an existing SMB app user for this site.
Click OK.
In the confirmation pop-up, tick the check box then click OK.
The selected user is given the Site Manager role and is made the Key Account Holder. They will receive an email informing them of the change.
Exit Delay provides some time (default of 30 seconds) for an on-site user to exit or disarm the area, after an arming request has been sent. It is ideally suited when a user has remotely armed an area, unaware that a user is on-site. It provides the on-site user with an opportunity to disarm the area (cancel the arming request) or to exit the area.
Functionality:
After arming an area (or several/all areas), the area's configured Exit Delay starts counting down (if Exit Delay is enabled). If a user with the Privilege to disarm presents a valid credential at one of the area's readers before the delay period expires, the 'arm' action is cancelled and the area/site remains disarmed.
The area's Exit Delay period expires (and the area is armed) as soon as a door that accesses the area is opened and closed. If one of the area's access doors is opened or closed after the Exit Delay period has expired, an alarm is raised.
To configure exit delay, perform the following procedure:
Click the Areas tab.
Select the area to configure exit delay for.
Select the Delay Warnings tab.
Enable Exit Delay. The default exit delay time is 30 seconds. This is the period of time a user will have to exit or disarm the area, after an arming request has been sent.
Click the Assign Inputs button and assign one or more exit points.
When an exit point closes, exit delay will cancel, and the area will immediately arm. For example, a reed switch on a door, when closed, will immediately arm the area.
Notes:
Assignment of an exit point is optional.
Only inputs assigned to the area, can be assigned as exit points.
Battery Low and Mains Failure inputs cannot be assigned as exit points.
When a disabled input is assigned as an exit point, it will be automatically enabled.
When an input is assigned as an exit point, the input’s alarm response will be set to ‘Secure Alarm’.
If required, select the readers to beep when the area is in entry delay.
Any reader can be assigned as a delay warning. When the area is in delay, the reader will emit a continuous beep, until such time, as the delay has been cancelled, or the delay period has expired.
If required, select the outputs to activate when the area is in exit delay.
Any output, excluding door relays, can be assigned as a delay warning. The output will activate, until such time, as exit delay has been cancelled, or exit delay has expired. The output could be a piezo buzzer or light that provides an audible or visual indication to users, that the area is in exit delay. An output is useful when the audio from a reader cannot be heard, (e.g. the site has been armed remotely, and an onsite user is unable to hear the reader beep).
Note: To complete the configuration, a warning (reader or output) must be assigned.
If the delay warning output is on, and delay occurs, the output will remain on for the delay period and will turn off when the delay has been cancelled, or the delay period has expired. If the output is an Alarm Output, the output will be on when the area is in alarm, (i.e. will remain on after the delay period, if the area is in alarm). Likewise, if the output is a Reflected Output, the output will be on when the area is armed, (i.e. remain on after the delay expires, if the area is armed).
If an input is open when an area configured with exit delay is armed, the input will raise an alarm. For areas without exit delay, the user will be notified that the input is open when attempting to arm.
If an input is open when an area configured with exit delay is armed, the input will raise an alarm. For areas without exit delay, the user will be notified that the input is open when attempting to arm.
A door's 'Status' tab only displays when a reader is assigned to the door and the reader is online.
You can view a door's status to diagnose connection faults with the door. To view a door's status, open the door's properties and select the 'Status' tab. This tab displays the state of the door and all items assigned to the door. Status is updated in real-time.
A door's 'Event History' tab only displays when a reader is assigned to the door and the reader is online.
You can view a door's event history to see a record of its historical events. For example, the event history will include a record of access denied events, access granted events, lock and unlock overrides, and other alarms such as 'forced' or 'open longer than expected'. You can filter the event history by 'All Events', 'Alarms', or 'Active Alarms', and by the time the event occurred.
After the configuration has been published and before the site is activated, you can unlock a door from within the SMB Installer Portal.
Opening the door The 'Open Door' override is intended to let someone through the door, and let the door lock again once they have passed through. Next to the door item, click Open Door. The door will unlock momentarily, then relock.
Unlocking the door
The ‘Unlock Door’ override is intended to unlock the door for a set period of time.
Next to the door item, click Unlock Door.
Set the Duration in Minutes. This duration is how long the door will remain unclocked for, before locking again. The default is 10 minutes.
Click OK. The door will unlock for the set duration, then relock.
To re-lock the door manually, select Lock Door. When the site is activated, the ‘Unlock Door’ override will be cancelled.
The Site Notes button opens the notes for the site, where you can add, edit, and delete notes for you and other Technicians to refer to.
Click the Site Notes button.
The Notes lightbox displays.
Click the + button to create a new note.
Type out the note you would like to add for this site. Each note is limited to 500 characters.
Click the SAVE button.
The note is added to the left-hand navigation panel within the Notes lightbox. Notes are listed in this panel in order of most recently modified.
Click the x button to close the Notes lightbox.
Click the Site Notes button.
The Notes lightbox displays.
Select the note from the left-hand navigation panel.
Type in the text area to make any required changes.
Click SAVE, then click the x button to close the Notes lightbox.
Click the Site Notes button.
The Notes lightbox displays.
Select the note from the left-hand navigation panel, and click the DELETE button.
Click YES, then click the x button to close the Notes lightbox.
An area is a collection of sensors that the customer will want to arm or disarm together, separately from other areas. Areas typically define a physical space within the customer’s site, and include the sensors installed in that space.
Example: The manager's office is set up as a separate area from the reception. The receptionist is able to disarm the reception, leaving the office secure.
Area Groups allow areas of a site to be grouped to suit the way the business owner wants to operate their site. Area Groups typically define parts of the site which are physically separate from each other, so that entering one doesn’t necessarily mean you want to enter or disarm another.
Example: The site has an office block and a separate warehouse. Staff that work in the office block typically don’t have access to the warehouse. By creating two area groups, fully privileged users can easily disarm the office block on arrival while leaving the warehouse armed, or vice versa.
If a site wants to use Key Tags, cards, or User Codes to access an area, the area must use Single Factor. In the Area's properties, set the Locally disarm area option to 'Single Factor'.
When first created, the site is populated with default input and output data. The inputs are assigned to the default Area - Area 1, and default Area Group - Default Area Group.
The data can be viewed by 'As wired' and 'By area'. For configuring Areas and Area Groups, 'By area' is the easiest view to be in.
To add a new Area, select the + ADD NEW button and select 'Area'.
From the Areas tab, select the Area you have created to open its properties.
Name the Area something meaningful to the customer.
If the site has Area Groups configured, the Area Group drop-down list displays. Select an Area Group for the Area to be added to, or leave it in the 'Default Area Group'.
If using Key Tags, Cards, or User Codes to arm & disarm an Area, change the Locally disarm area to 'Single Factor'. 'Two Factor' can only be used if the customer is using the SMB app only.
Select the customer's desired behaviour from the Default Arming Mode drop-down list. This option determines how the Area arms when it is armed via SMB tags and User Codes or Automatic Arming schedule. It does not affect arming via the SMB app, which always uses the Bypass method.
Force Arm: When the Area is armed via SMB tag, User Code, or schedule, it will arm even if there are open (active) Inputs in the Area. Any input that is open when the Area arms will immediately trigger an alarm, and an incident will be raised.
Bypass: When the Area is armed via SMB tag, User Code, or schedule, it will arm even if there are open (active) Inputs in the Area. When the Area arms, any open Input will be bypassed, i.e. it will not trigger an alarm or raise an incident until the Area is disarmed and armed again.
Fail to Arm: When the Area is armed via SMB tag, User Code, or schedule, it will fail to arm if there are open (active) Inputs in the Area. If arming fails, this is raised in an incident. If arming fails when attempting to arm at an access reader, the reader will also briefly sound a siren noise to indicate the arming failed. If no Inputs in the Area are open, the Area will arm successfully.
Assign Inputs and Outputs as required.
To configure the Delay Warnings tab, refer to the following sections: Configure Entry Delay and Configure Exit Delay.
Once finished configuring the Area, click OK to close and save your changes.
Note: Once the Area is configured, its Event History tab displays all events associated with this output. Events can be filtered.
Assign the Area to Area Groups, if applicable.
To add a new Area Group, select the + ADD NEW button and select 'Area Group'. Or, select an existing Area Group to open its properties.
Name the Area Group something meaningful to the customer.
To add Areas to the Area Group, select the + ASSIGN AREAS button, then select the check box next to each Area you wish to add to the Area Group.
Once finished, click OK to close and save your changes.
Note: Once you have created at least one Area Group, all Areas must be in one Area Group. An Area cannot be in multiple Area Groups. To accommodate this, all Areas that you have not yet added to an Area Group, and all newly created Areas, are added to a 'Default Area Group' by default.
Since all Areas must be in an Area Group (once you have created at least one Area Group), you cannot simply remove an Area from its group. To remove an Area from an Area Group, add it to another Area Group or the 'Default Area Group'. This will remove it from its previous group, since it can only be in one group.
Once an Area Group has had all of its Areas moved to another group, it can be deleted. If all Area Groups are deleted, the 'Default Area Group' is also deleted.
Test Mode allows Technicians to install, configure, and test an SMB site without annoying or alarming anyone by setting off the sirens or any other type of device activated in response to an alarm. Test mode also prevents Site Managers, guards, and monitoring services from responding to alarms generated while the system is being tested.
Test Mode can be used as part of your ongoing maintenance process. All Gallagher-manufactured parts are covered under the Gallagher SMB Product Warranty Policy. Annual testing and maintenance checks are recommended to ensure the solution is meeting the customer’s needs.
Test Mode starts automatically when a new site is created, and ends when the site is activated.
Test Mode gives Technicians the ability to test individual outputs. Alarm Relays are bypassed, and technicians can ‘chirp’ test outputs from this screen.
When Test Mode is enabled for new sites:
All alarm outputs are automatically bypassed. This prevents sirens etc. being activated during Test Mode.
The Installer Portal will display a banner showing when Test Mode will expire.
During Test Mode (new sites)
Technicians can "Test" individual outputs by using the TEST found next to the outputs in the Installer Portal. This will override the output to On for 1 second, then Bypass the alarm output again (or cancel the override) which will turn it off.
Enabling Test Mode for existing sites
Once a site is activated, ask the Site Manager to enable Installer Mode within the Gallagher SMB app. Notes:
Installer Mode allows Technicians to make configuration changes to the site in the Installer Portal and publish changes to the Controller.
Test Mode can only be enabled after Installer Mode has been enabled.
Test Mode puts the site in a state that is no longer production-ready (alarm relays will not activate), therefore Test Mode can only be enabled for a short period of time, less than 24 hours.
If Installer Mode is disabled, Test Mode will automatically be disabled too.
After Installer Mode is enabled in the Customer app, the Enable Test button is visible in the Installer Portal.
Select Enable Test Mode in the Admin section of the Installer Portal.
Select an expiry time.
If the site has Monitoring or Guarding enabled, a message will display to remind the Technician to contact the Monitoring or Guarding company to advise that the system is being tested. This will prevent unnecessary call-outs.
Note: Test Mode can only be enabled if there are no Guard call-outs currently in progress for the site.
When Test Mode is enabled:
All alarm outputs are automatically bypassed. This prevents sirens etc. being activated during Test Mode.
Any currently in-progress Incidents will not receive any new alarms (existing incidents remain open).
A new Test Mode incident is created to capture any alarms generated during Test Mode.
A notification is sent to all Site Managers alerting them that Test Mode is enabled.
The Installer Portal will display a banner showing when Test Mode will expire.
The Customer app will display a banner explaining that the site is under maintenance.
During Test Mode (existing sites)
Any alarms generated will be added to the 'Test Mode Incident'.
Technicians can "Test" individual outputs by using the TEST found next to the outputs in the Installer Portal.
This will override the output to On for 1 second, then Bypass the alarm output again (or cancel the override) which will turn it off.
If Monitoring is enabled during Test Mode, the Technician will be advised, when publishing the change, that the Monitoring company needs to be informed that the system is under test.
Disabling Test Mode (existing sites)
Test Mode can be disabled due to any of the following occurring:
The Technician selects Disable Test Mode in the Admin section of the Installer Portal.
The Test Mode period expires.
The site is taken out of Installer Mode (expires or is manually disabled).
Ideally, a technician disables Test Mode manually by selecting Disable Test Mode in the Admin section of the Installer Portal when they have finished testing, as the site will be 'live' again when Test Mode is disabled.
For sites with Monitoring or Guarding enabled, if Test Mode is disabled manually, a reminder will display to inform the Monitoring or Guarding company that testing has finished.
When Test Mode is disabled:
Incidents generated during Test Mode are automatically closed.
Alarm outputs are un-bypassed.
Banners in both the Customer app and the Installer Portal are removed.
The Display Names button lets Technicians change the names of an SMB site's roles, which are by default 'Site Manager', 'Site Admin', and 'Site Member'. An SMB customer may request this, for example, so that the role names in the app correspond with the job titles that they already use.
Click the Display Names button.
The Display Names lightbox displays.
Change the Role Names as requested by the customer.
Click OK. Wherever a role type is displayed or selectable in the SMB app, the new role names will now be displayed.
Reset Role Names: You can click the RESET button in the Display Names lightbox to reset the Role Names to the defaults of 'Site Manager', 'Site Admin', and 'Site Member'.
You can set the length that User Codes will be when they are generated for users in the SMB app. User codes that have already been assigned to users will not be affected if you change the minimum user code length.
Note that this option only displays if at least one T30 Terminal has been configured for the site. The User Code Length can only be changed before the site has been activated or while in Installer Mode.
To set the minimum User Code length:
If the site has been activated, ask the customer to enable Installer Mode.
Click the User Code Length button.
The User Code Length lightbox displays.
Select the Minimum length from the drop-down list. Generally, longer User Codes are considered more secure.
Click the OK button. New User Codes will now be generated at this length in the SMB app.
The Gallagher SMB solution can support up to 10 access control doors. Access control doors have a Gallagher SMB reader which a user can either present their smartphone or SMB key tag or enter an SMB User Code into a Keypad.
iOS smartphones communicate with the reader using Bluetooth®. Android smartphones communicate with the reader using NFC or Bluetooth®. A tag will communicate with the reader using NFC.
Access granted and access denied events will appear in the Activity log. The user’s name, credential type, and door name are reported.
Ensure Bluetooth® is enabled on your device. Android devices also need NFC enabled.
Location permission must be enabled on Android devices, as without this permission the device’s Bluetooth® won’t scan, even if Bluetooth® itself is enabled.
The area assigned to the door must be disarmed before the door will unlock. Two-factor authentication is required to disarm (their smartphone must have a passcode, biometrics, or facial recognition).
Users are given the privilege to enter areas; not doors, which means a user given access to a particular area will be able to enter through any of the access-controlled doors leading into that area.
Only Site Managers and privileged Site Admins can view doors and their locked/unlocked status within the Gallagher SMB app.
Doors will lock automatically when the area they are associated with is armed.
A user can request access by presenting their smartphone, SMB Key Tag or SMB Card at the door’s reader or entering a User Code into the T30 Keypad. The smartphone must host the Gallagher SMB app with a valid mobile credential for the site.
iOS smartphones communicate with the reader using Bluetooth®. Android smartphones communicate with the reader using NFC or Bluetooth®. The tag and card communicate with the reader using NFC.
Access granted events will appear in the History log of the Site Manager’s app when access has been granted and taken through the door. The user’s name and door name are reported.
Notes:
Location permission must be enabled on Android devices, as without this permission the device’s Bluetooth® won’t scan, even if Bluetooth® itself is enabled.
Only Site Managers and privileged Site Admins can view doors and their locked/unlocked status within the Gallagher SMB app.
For an access granted event to appear in the History log, access must be granted and taken through the door. The door’s open sensor must change state.
Door configuration supports a reader on one side of the door only. The solution does not support entry and exit readers on the same door.
To be granted access, the user must have privilege to the area the door leads into. If they have privilege for the area, access will be granted, and the controller will unlock the door.
If the area the door leads into is armed, the system will prompt for a second factor to disarm. The user must have privilege to disarm the area the door leads into, hence must present a valid FIDO authenticator (PIN, Fingerprint, or Face ID). The controller will then disarm the area and unlock the door.
Notes:
Access decisions are made at the controller, not the reader.
Site Members cannot arm or disarm areas, hence if the door leads into an armed area, access will be denied. A Site Manager or Site Admin must first disarm the area.
If an area is disarmed as a result of a successful access request, it is not re-armed if access isn’t taken.
Exiting the area is achieved by either turning the door handle (mortise lock) or by using a push button release (magnetic lock). The door will temporarily unlock, allowing the user to pass through.
Note: The Request to Exit must transition to the closed state to unlock the door. If it transitions to the opened state, invert the Request to Exit input.
Unlocking the door from within the Gallagher SMB app will perform an unlock override. The door will not automatically change back to the locked state, until scheduled to do so. For example, if the door is scheduled to lock at 5pm each day, but a user unlocks the door from within the app at 6pm. The door will not lock again until 5pm the following day, unless a user locks it from within the app or the site is armed.
Note: Arming the site will automatically lock all doors.
Doors with readers can be used for access control. They allow people to access them with a valid credential.
Gates, roller doors, or cupboards without a reader are not considered ‘access control’ doors, as the door is locked and unlocked remotely via the app or open-door button.
Within the customer app:
Doors without readers are displayed on the 'Doors' tab.
All actions for these doors must be performed in the SMB Customer app. SMB Key Tags, SMB Cards, and User Codes cannot be used for these doors. See Controlling a Door remotely.
All Site Managers get privilege by default.
Site Admins have the optional Additional Privilege to lock/unlock remote doors to selected areas.
'Unlock by' and 'Lock by' will appear in the History Log. These are not Access Granted events, as the system doesn't know who (if anyone) opened the door.
Refer to the table below for a detailed overview of the behaviour of each of the Alarm Response types:
Using the SMB app:
Open the Gallagher SMB app (the app can be running in the background).
Place your smartphone on or near the reader.
If successful, the reader’s LED will turn green, and the door will temporarily unlock.
If you receive an access denied message, you will either have the wrong permission for the door or, the area will be armed and you don’t have disarm privileges. Contact your Site Manager for assistance.
SMB Key Tags:
Tap the SMB key tag once (single badge) at the reader.
If successful, the reader’s LED will turn green, and the door will temporarily unlock.
If you receive an access denied tone and the reader flashes red, you will either have the wrong permission for the door, or the area will be armed and you don’t have disarm privileges. Contact your Site Manager for assistance.
SMB User Codes:
Enter your User Code.
Push the button with the green tick.
If entered correctly, the LED squiggle on the T30 reader flashes green, and access is granted.
If entered incorrectly, the LED squiggle on the T30 reader flashes red, and access is denied.
The Gallagher SMB app provides the ability to arm and disarm your site's security from anywhere at any time.
A Site Manager or Site Admin, with additional privileges, can arm and disarm the solution using the SMB app, SMB Key Tags, or SMB User Codes. Should connection to the internet be lost, app users can use Bluetooth on their phone to arm and disarm their site locally at the reader.
From the ALARM tab within the SMB app, privileged users can arm and disarm their alarm for the whole site or select specific areas.
With the SMB app open in the background and with Bluetooth background settings enabled, the site can also be armed and disarmed by holding a phone up to the reader.
Arming
To arm the whole site:
Navigate to the Site page.
From the ALARM tab, click the ARM SITE button.
Arming the site will automatically lock all doors.
To arm a specific area:
From the ALARM tab on the Site page, click the Areas dropdown.
Select the check box next to the area.
Click the ARM SELECTED AREAS button.
The ALARM tab will indicate the site is Part Armed. If you want to arm the full site, click ARM SITE.
After arming:
After arming an area (or several/all areas) and if Exit Delay is enabled, the area's configured Exit Delay starts counting down. If a user with the Privilege to disarm presents a valid credential at one of the area's readers before the delay period expires, the 'arm' action is cancelled, and the area/site remains disarmed.
The area's Exit Delay period expires (and the area is armed) as soon as a door that accesses the area is opened and closed. If one of the area's access doors is opened or closed after the Exit Delay period has expired, an alarm is raised.
Disarming
To disarm the whole site:
Navigate to the Site page.
From the ALARM tab, click the DISARM SITE button.
To disarm a specific area:
From the ALARM tab on the Site page, click the Areas dropdown.
Select the check box next to the area.
Click the DISARM SELECTED AREAS button.
The ALARM tab will now indicate the site is Part Armed. If you want to disarm the full site, click DISARM SITE.
If you are a Site Admin, with access to the SMB app but not the privilege to remotely arm and disarm a site through the SMB app, you can do it onsite at the reader.
To use the SMB app to arm & disarm at the reader:
The user must be next to the reader to perform this action.
Bluetooth must be turned on and permissions enabled.
Arming
To arm the whole site:
Navigate to the ALARM tab.
Click the ARM/DISARM SITE AT READER button.
This will connect the user to the reader.
Click ARM SITE button.
After arming:
After arming an area (or several/all areas) and if Exit Delay is enabled, the area's configured Exit Delay starts counting down. If a user with the Privilege to disarm presents a valid credential at one of the area's readers before the delay period expires, the 'arm' action is cancelled, and the area/site remains disarmed.
The area's Exit Delay period expires (and the area is armed) as soon as a door that accesses the area is opened and closed. If one of the area's access doors is opened or closed after the Exit Delay period has expired, an alarm is raised.
Disarming
To disarm the whole site:
Navigate to the ALARM tab.
Click the ARM/DISARM SITE AT READER button.
This will connect the user to the reader.
Click DISARM SITE button.
To disarm the specific area associated with the reader:
Tap the phone at the reader.
The reader will make a sound and go green.
If the reader light is green, disarming was successful.
When you don't have a Wi-Fi or cellular connection on your phone, the No Connection screen of the app will show.
To connect with Bluetooth, you will need to be on-site, close to the Bluetooth reader.
Check your mobile data or Wi-Fi are on and airplane mode is off.
If you are still unable to establish an online connection, select Connect with Bluetooth.
The reader will flash blue while attempting to connect. Stay close to the reader until a Bluetooth connection is established.
Once connected, arm or disarm your alarm as usual.
The app will then return to the No Connection screen. Use the light on the reader to confirm your action was successful – it should be green if disarmed and red if armed.
If an online connection becomes available, you will see a Restore Online Connection button. Select this to reconnect.
An SMB Key Tag provides an alternative credential to the Gallagher SMB app, in case the user is not using a phone. In addition to gaining access, an SMB key tag can be used to arm and disarm an area.
Arming
Tap the SMB key tag twice (double badge) at the reader.
The reader will make a sound and go red.
If the reader light is red, arming was successful.
Disarming
Tap the SMB key tags once (single badge) at the reader.
The reader will make a sound and go green.
If the reader light is green, disarming was successful.
SMB User Codes must be used with the Gallagher T30 Keypad. They can be used just for access, or, if the user has the correct privilege for a site, to disarm the area prior to accessing it.
Arming
The user must have arming privileges to arm an area with a User Code. If they have the correct privilege, the area arms. If the user does not have arming privileges, access is denied.
At the T30 reader Keypad, while the area is disarmed:
Press and hold the shield icon button for 3 seconds.
Enter your User Code.
Push the green tick button.
If entered correctly, the shield LED on the T30 reader turns red.
If entered incorrectly, the LED squiggle on the T30 reader flashes red, and access is denied.
Disarming
Once a User Code is generated, it is immediately available for the user to gain access.
If the area is armed, the user must have disarming privileges for the User Code to work. If they have the correct privilege, the area disarms and access is granted. If the user does not have disarming privileges, access is denied.
At the T30 reader Keypad, while the area is armed:
Enter your User Code.
Push the green tick button.
If entered correctly, the LED squiggle on the T30 reader flashes green, and access is granted.
If entered incorrectly, the LED squiggle on the T30 reader flashes red, and access is denied.
Door Schedules are simplified to reduce the need for them to be maintained or frequently changed. A Door Schedule can be set by your Technician which specifies the hours each day that the door will be unlocked for.
Door Schedules are configured by the Technician in the SMB Installer Portal.
One Door Schedule per door.
Each day of the week can be configured differently.
Two options available: 'Locked 24 Hours' or 'Customised'.
Locked 24 Hours
The door will remain in the locked state unless a Site Manager changes the state to unlocked through the SMB app. If a Site Manager changes the state to unlocked, it will remain unlocked until it is locked again through the app, or the area is armed.
Customised
The technician can set the times when the door will be in an Unlocked or Locked state. At the time the door is scheduled to be unlocked, if the 'First access unlock' feature is enabled, the door remains locked until a user presents a valid credential. After being unlocked, the Door stays unlocked by default until the scheduled 'Locked' time.
If the 'First access unlock' feature is enabled for the door, then regardless of the door's schedule, the door will remain locked until a user with the Site Manager or Site Admin privileges badges at the reader.
If 'First access unlock' is not enabled for the Door, it will unlock immediately at the time its schedule states it will become unlocked, even when its Area is armed.
Andrew’s Motorbikes
Andrew’s Motorbikes supplies motorbikes and maintenance to the Waikato region. There are three staff members.
Andrew – Store Manager and Site Manager
Michael – Mechanic and Site Admin
Simon – Salesman and Site Member
Andrew’s Motorbikes have both intruder detection and one access control door at the front.
The Doors Schedules are set up by the technician as follows:
All of the following scenarios are managed without making changes to the Door Schedule or contacting the technician:
Where is the server? | The Gallagher SMB system is hosted using Amazon Web Services (AWS). Data resides in the Sydney, Australia datacentre. Technicians use a web application to configure and commission customer sites from a desktop PC, laptop, tablet, or smartphone. Web address is |
Can the system operate entirely off the cellular router? | The Permaconn 54 (NZ/AUS) can be used to provide a backup communication path to the cloud in the event of the site losing its internet connection. This router should only be used temporarily until the local network is restored. |
If the site loses internet connection, how does the system work? | If the controller loses its connection to the cloud it will continue to operate locally, keeping the site secure. During this time, the customer will be able to arm and disarm their site at the reader and gain access. |
How do I upgrade a site - do I need to? | The controller is automatically updated with the latest firmware, cyber security, and functionality. |
How is the system updated? | The Gallagher SMB app is automatically updated. If the user has ‘Automatic Downloads’ enabled on their mobile device or tablet, the app will remain updated. If automatic downloads are disabled, the Gallagher SMB app will prompt the user to update the app if they are running an incompatible version. |
Will the system be unavailable while it is being updated? | The SMB cloud server will remain online at all times. Controller firmware updates are automatically applied by Gallagher. The controller will remain online during the firmware download but will restart on completion. During restart, access to areas might be delayed temporarily (1-2 minutes). |
What is the default door access time? | 5 Seconds. Currently, this is hard-coded and cannot be altered. |
Can the system support wireless devices? | There is no support for built-in wireless devices. However, low-level wireless support through Inovonics detectors have been tested and approved by Gallagher |
Can the system communicate to Command Centre? | No, currently the system has no integration path to Gallagher Command Centre. |
Are there Logic Blocks in the system? | No. |
What can I apply schedules to? | Doors schedules can be configured by the installer or user schedules can be created in the SMB app by a Site Manager. |
Can you bulk provision users? | No. Each user must be added to a site individually. |
Can I set an expiry date on a user's account? | Yes. Start & end dates can be applied to users. |
Can the system record Time and Attendance? | Reporting on Time and Attendance is not currently available within the Gallagher SMB app; however, user events are recorded and can be viewed in the History Log. |
How many doors can the system support? | 10 doors per controller is the maximum amount recommended by Gallagher. |
How long are the SMB logs kept for? | Refer to the |
If you need to make additional configuration changes after activating a site, the customer must .
By enabling Installer Mode, the customer has granted you permission to make changes to their site.
If you wish to use the customer app to test the site's access, alarm, and app behaviour from the perspective of the customer, you can invite yourself to the site. This can only be done before the site has been or while in . As a Technician, you have some restrictions in the customer app. You cannot:
see the details of any user (except for names in events)
create, delete, or send invites to users
close incidents
manually call out a guard.
You can only invite yourself to sites where you are recorded as being a Technician of the customer's Installer. You can send as many invitations as you like. You can have just one credential per site per technician. If you invite yourself as a user to multiple sites, you can interact with readers at all of those sites and can in the customer app.
To request a credential for yourself to the customer's site:
If the site has been activated, ask the customer to enable .
Click the Invite Myself To The Site button.
This sends an invitation to the email address entered against your Technician account; there is no option to send it to a different email address. SMS verification is not required.
Download the Gallagher SMB app if you have not already.
Select the Complete Registration link in the email invitation.
Changes made within the Installer Portal do not take effect until they are published to the Controller with the or button. The PUBLISH button displays when there are pending hardware changes; the REFRESH button displays at all other times to allow you to ensure the Controller configuration is up to date (e.g. if you have made a non-hardware site change).
When publishing/refreshing configuration to the Controller, doors will revert to their original schedule regardless of whether the customer has performed an override. For example, if the customer has overridden the schedule to Free, and then a Lock Door override is performed, the door will lock and the override will be lost.
Once changes have been published to the Controller, there is no way to restore to a previously published version. To revert the site configuration to how it was when it was last published, select DISMISS CHANGES under Unpublished Changes.
Note: Configuration can only be published/refreshed when the Controller is online.
All changes appear in the sidebar to the right under Unpublished Changes.
Note: If no changes have been made since the last publish, the 'Unpublished Changes' section does not display.
Select the floating PUBLISH button to publish the changes.
Note: If the Controller is offline, the button will be disabled. If there are no pending hardware configuration changes, the '' button shows instead.
When PUBLISH is selected, a pop-up window will appear asking you to confirm you want the changes published. Select Publish Changes. Note: For all newly-installed sites, when the Controller comes online, it will immediately start downloading new firmware. If the firmware is still downloading when you attempt to publish the changes, a warning will appear. If changes are published while the download is not completed, the download will restart from the beginning.
After the configuration has been published, a small confirmation displays.
If you have not made any hardware changes, but need to update the Controller's configuration anyway (e.g. you changed the site's timezone), you can use the 'REFRESH' button.
Select the floating REFRESH button to publish the current configuration to the Controller. Note: If the Controller is offline, the button will be disabled. If you have pending hardware configuration changes, the '' button shows instead.
When REFRESH is selected, a pop-up window will appear asking you to confirm you want the Controller to be updated. Select Yes. Note: For all newly-installed sites, when the Controller comes online, it will immediately start downloading new firmware. If the firmware is still downloading when you attempt to refresh the configuration, a warning will appear. If configuration is refreshed while the download is not completed, the download will restart from the beginning.
After the configuration has been refreshed, a small confirmation displays.
Once the customer's site has been , an invitation email is sent to their key account holder (normally the business owner). You may help the key account holder through the steps in the email to ensure they are onboarded as the first fully privileged system user. The steps are:
Download the app, following the link in the email.
Trigger the SMS verification code to be sent.
Enter the verification code in the app.
Set up their preferred FIDO authentication option for logging into the app.
In order to download the credential and gain access to the security system, each user must have access to both the email address and mobile phone number (to receive the verification code) entered on their account details.
If you are unable to onboard the key account holder, ensure they have a PIN, pattern, fingerprint, or Face ID set on their phone. If they don’t, they will need to set one.
When a site is activated, it will become operational and billing will commence. A site can be commissioned as soon as the system is operational, allowing the key account holder to start using the system before the Technician has fully completed the installation. The site can be activated at the Technician's discretion.
To activate the site:
Ensure you have in the SMB cabinet.
Select the floating ACTIVATE SITE button. This will send an 'account activation' email to the Customer key account holder.
The Customer key account holder will need to follow the instructions in the email to download the Gallagher SMB app and accept the credentials. Refer to Onboard users.
The site has now been handed over to the customer. The SMB Installer Portal changes to ‘read-only’ for the site. If you need to make additional configuration changes, the customer must enable within the Settings of the SMB App.
Gallagher SMB is a cloud-based security system that lets you take control of your business security from anywhere, at any time, all from your smartphone.
Everything is at your fingertips, managed through the Gallagher SMB app. It’s simplified security, using the latest in cloud technology.
The Site page is the homepage of the Gallagher SMB app and shows the status of the security system. It can be accessed from anywhere in the app by clicking the Site button on the navigation bar at the bottom of the screen.
If an incident occurs on your site, an incident banner will appear across the top of the SMB app. Tapping on the banner will show you more details about what has occurred.
Alarm tab
From the Alarm tab, users can arm and disarm the entire site or specific areas.
.
Doors tab
If the Site has access control doors, the Doors tab will appear under the Site homepage.
From the Doors tab, the Site Manager or Site Admin (if given the additional privilege) can unlock, lock or temporarily open the doors on the site/s they have access too.
.
From the Team page, the Site Manager can add, edit and delete users. They can also allocate users' roles and manage which areas they have privileges for.
To find an existing user quickly, Site Managers can use the search and filter functions. If they are managing multiple sites, they can filter the users based on what site they are allocated to.
If a Site has SMB Key Tags, they can be encoded from the Team page.
The Activity page is split into two tabs: Events and Incidents.
Events
The Events tab shows a log of the arming and disarming activity and all events related to access control, including access granted and access denied.
Events can be filtered and exported to a CSV file.
Incidents
The Incidents tab shows details of all previous alarm activations, showing which alarms were activated, who actioned the alarm, and how.
More about incidents:
The Multi-Site feature allows users to control and monitor the security of physically separate sites from one app. This is useful for businesses where user and alarm management are centralised, or where staff are required to move between premises regularly.
My Account
My Account gives an overview of your account details, including phone number, email address, and device registered for using the SMB app. From My Account, you can delete your own account (unless you are the Key Account Holder).
User Settings
User Settings allows you to apply settings to yourself as a user, including Bluetooth Background Access, Critical Alert Notifications, and enable Dark Mode.
Switch Site
If a Site Manager has access to more than one site, they can switch between them by clicking on Switch Site for a list of all other sites.
About
About gives an overview of the App version, Open Source Licenses used in development, and a link to Gallagher SMB Policies available on the Gallagher website.
Help
Help links from within the SMB app to the Customer Help.
Site Settings
Site Settings contains settings that apply at a site level, including enabling Installer Mode, Contact your Installer, and configuring Late to Arm Notifications. And, if Guarding is enabled, you can manage auto-guarding.
SMB customers can momentarily unlock a gate, roller door, or other type of door, from anywhere at any time. This saves the need to travel to the business, for example, when someone needs access to a site after hours, such as a courier driver dropping off goods.
For Site Managers and Site Admins with additional remote unlock/locking privileges, OPEN, PULSE, UNLOCK, UP, and/or ON buttons appear in the DOORS tab of the SMB app. Correspondingly, CLOSE, LOCK, DOWN, and OFF buttons are available to perform the opposite actions.
On the DOORS tab of the SMB app:
Door Type | State | Buttons available |
---|
The door cannot be "Opened" or "Pulsed" if the site is armed (just like it cannot be unlocked).
In the table above, all buttons described with the word "Overrides" will override the status of the door. All other buttons do not change the door's status.
Temporarily opening ('Door' and 'Other' type doors' OPEN button) or pulsing a door creates 'Opened by' events in the door's Event History.
Temporarily opening or pulsing a door sends a command to the Controller to unlock the door. This is not a request for access.
User Schedules can only be applied to Site Admins and Site Members; Site Managers have full privileges at all times. Site Admins can only unlock doors and disarm areas within the timeframes specified in their User Schedule. Site Members can only open locked doors within the timeframes specified in their User Schedule. If a user does not have a User Schedule, they can perform their privileged actions at all times.
Time | Open doors? | Lock doors? | Disarm areas? | Arm areas? |
---|
User Schedules give no user any extra privileges; they restrict the times within which users can perform their existing privileges.
User Schedules are configured by Site Managers in the Gallagher SMB app.
One User Schedule can be assigned per user.
There is no limit on how many User Schedules you create.
Each day of the week can be configured differently.
One User Schedule can be set as the default.
Navigate to the Team screen within the SMB app.
Click the clock icon near the top.
The User Schedules screen displays.
Click the + CREATE SCHEDULE button.
The Create User Schedule screen displays.
Enter a Name for the schedule. Choose a meaningful name, e.g. one that describes the times or types of users for which this schedule provides access, so it is recognisable when assigning it to users.
If you manage more than one site, select the Site for which this User Schedule is applicable. Only users belonging to this site can be assigned this schedule.
If you want this schedule to be selected by default when a new user is created for this site, select the Show as default when creating new users check box.
The schedule can still be changed from the default or set to none when creating a user.
Toggle on each day of the week for which this schedule provides access. Access is denied at all hours on any day that is not selected.
For each day you selected, select the times that access is granted From and To. Outside of these times, access is denied.
Note: If a Door is armed and the user does not have the privilege to disarm the site, access is denied regardless of their User Schedule.
Click the SAVE button.
New users
Existing users
To assign a User Schedule to an existing user, perform the following procedure:
Navigate to the Team screen within the SMB app.
Click the arrow to expand the user's card.
Click on Privileges.
The Privileges screen displays. If you manage more than one site and the user belongs to more than one of them, each site is displayed.
If there is more than one site, click the arrow to expand the site for which you are assigning a schedule.
From the Schedule drop-down list, select the user's schedule for the site.
If the user has other sites, assign schedules for any other sites as required.
Click the SAVE button.
Alarm Response | Alarm/event behaviour if the input's area is armed | Remote notification if the input's area is armed? | Activate outputs assigned to the input's area if the area is armed? | Keep alarms/relays active if the input's area is armed? | Alarm/event behaviour if the input's area is disarmed | Remote notification if the input's area is disarmed? | Activate outputs assigned to the input's area if the area is disarmed? | Deactivate the outputs activated by this event response once the alarm is acknowledged? |
---|---|---|---|---|---|---|---|---|
To open a door while you are not at the site, see .
To arm and disarm remotely, you will need a Wi-Fi or cellular connection. If you do not, you can connect to your alarm on-site with .
Gallagher are unique codes generated by Site Managers via the SMB app to allow access to their site.
.
.
.
.
A User Schedule can be assigned to a new user when they are created. Refer to .
Access Silent / Secure Alarm
Raise Alarm
Yes (default IP Alarm Transmitter)
Yes
No
Raise Alarm
Yes (default IP Alarm Transmitter)
No
Yes
Secure Alarm
Raise Alarm
Yes (default IP Alarm Transmitter)
Yes
No
No Event / No Alarm
N/A
N/A
Yes
24 Hour Alarm
Raise Alarm
Yes (default IP Alarm Transmitter)
Yes
No
Raise Alarm
Yes (default IP Alarm Transmitter)
Yes
Yes
Event Only
Event Only
N/A
N/A
N/A
Event Only
N/A
N/A
N/A
No Event Recorded
No Event / No Alarm
N/A
N/A
N/A
No Event / No Alarm
N/A
N/A
N/A
Door | Locked | OPEN: Unlocks the door for a few seconds so someone may enter. The door locks again as soon as it is shut (after being opened). UNLOCK: Overrides the door to remain unlocked until its schedule or another override locks it. |
Unlocked | LOCK: Overrides the door to remain locked until its schedule or another override unlocks it. |
Automatic Door | Closed | PULSE: Unlocks and opens the door for a few seconds so someone may enter. OPEN: Overrides the door to remain open until its schedule or another override closes it. |
Open | CLOSE: Overrides the door to remain closed until its schedule or another override opens it. |
Roller Door | Down | PULSE: Pulses the roller door open. UP: Overrides the door to remain up until its schedule or another override closes it. |
Up | DOWN: Overrides the door to remain down until its schedule or another override opens it up. |
Gate | Closed | PULSE: Pulses the gate open. OPEN: Overrides the gate to remain open until its schedule or another override closes it. |
Open | CLOSE: Overrides the gate to remain closed until its schedule or another override opens it. |
Fence | Off | ON: Overrides the fence to remain on until its schedule or another override turns it off. |
On | OFF: Overrides the fence to remain off until its schedule or another override turns it on. |
Other | Off | OPEN: Unlocks the door for a few seconds so someone may enter. The door locks again as soon as it is shut (after being opened). ON: Overrides the door to remain on until its schedule or another override turns it off. |
On | OFF: Overrides the door to remain off until its schedule or another override turns it on. |
What happens on a normal workday? | The store is scheduled to open at 9 a.m. Andrew gets there at 9 a.m. Andrew badges his phone, tag, or card aft the reader, and because Andrew is a Site Manager, the site disarms and the door unlocks so he can access the store. The door remains unlocked until 5 p.m. (Monday-Wednesday) or 8 p.m. (Thursday and Friday), as per the schedule. |
What happens if Andrew is running late? | The store is scheduled to open at 9 a.m. Simon gets there at 9 a.m. and the door is locked. Simon badges his phone, tag, or card at the reader, but as Simon is a Site Member, he cannot be the first person on site as he doesn’t have the privilege to disarm the site or unlock the door. The store remains armed, and the door is locked. Simon has two options; wait for Andrew or Michael to arrive, or phone Andrew and ask him to remotely disarm and unlock the door via the SMB app. |
What happens if Michael arrives really early? | The store is scheduled to open at 9 a.m. Michael gets there at 7 a.m. Michael badges his phone, tag, or card at the reader, and because Michael is a Site Admin, the site disarms and he can gain access through the door to the store. While Michael is working in the workshop, he wants the door to be locked so customers can’t come in early. As the Door Schedule isn’t set to unlock until 9 a.m., the door will lock again behind him. He doesn’t have to do anything else. When it is time for the store to open, Michael, Andrew, or Simon can badge their phone, tag, or card at the reader to unlock the door. Because the store is disarmed, Simon will be able to unlock the door as a Site Member. The door remains unlocked until 5 p.m. (Monday-Wednesday) and 8 p.m. (Thursday and Friday), as per the schedule. |
What happens if the team wants to go out for lunch? | At 12 p.m. on Wednesday, the team wants to go out for lunch for a few hours. Once they are outside the store, Andrew double badges his Key Tag at the reader or uses the SMB app to arm the store. By arming the store, the door will lock, overriding its schedule. When the team comes back at 2 p.m., Andrew badges his phone, tag, or card at the reader or uses the SMB app to disarm the store. When he badges at the reader, the door unlocks for a few seconds. But, since the door's schedule was overridden when they armed the store at 12 p.m., the door does not stay unlocked until 5 p.m. For the door to stay unlocked until 5 p.m., Andrew selects the UNLOCK button for the door in the SMB app. At 5 p.m., the door's override is cancelled and it reverts to its schedule (locked). |
What happens if one Wednesday night they want to stay open until 8 p.m.? | The door is scheduled to lock at 5 p.m. At 5 p.m. when the door locks, Andrew or Michael can go into the SMB app and unlock the door. This overrides the schedule and the door will remain unlocked until one of them locks it again. At 8 p.m. when they leave the store, Andrew or Michael can double badge their Key Tag at the reader or use the SMB app to arm the site. Arming the site automatically locks the door. |
What happens if Andrew forgets to arm the site? | Within the SMB app, Andrew can configure a Late to Arm notification. The Late to Arm feature will send a notification to Andrew’s phone if the site is not armed by a specified time. A different time can be set for each day of the week. Andrew can then use the SMB app to arm the site and lock the door. |
What happens if Andrew comes in on the weekend? | The store is closed on the weekends and the door is scheduled to be Locked 24 Hours on Saturday and Sunday. Andrew wants to do some work on Saturday morning. He arrives at 10 a.m. Andrew badges his phone, tag, or card at the reader, and because he is a Site Manager, the site disarms and access is granted. The door will unlock to let him through and once closed, it will lock again behind him. While Andrew is working in the store, he wants the door to be locked. Because the door is on a Locked 24-Hour schedule, and he badged at the reader to get access, the door will lock again. He doesn’t have to do anything else. At 1 p.m., Andrew is ready to leave. He goes through the door, and it locks behind him. When he is outside the store, he can double badge his Key Tag at the reader or use the SMB app to arm the site. Arming the site automatically locks the door. The store will remain armed, and the door locked, until Monday morning when Andrew or Michael arrives. |
What about Public Holidays? | On public holidays, the door is secured by two means. The site will be armed, which prevents all access, and the 'First access unlock' feature prevents the door from being unlocked until someone accesses it, even if it is scheduled to unlock. If no one with the correct privileges badges at the door, the site will remain locked and armed. |
Within User Schedule times | Yes | Yes (if privileged) | Yes (if privileged) | Yes (if privileged) |
Outside User Schedule times | No | Yes via SMB App (if privileged) | No | Yes via SMB App (if privileged) |
There are two types of schedules in Gallagher SMB; Door schedules and User schedules.
Gallagher SMB has simplified Door schedules to reduce the need for them to be maintained or frequently changed. A door schedule can be set by your Technician which specifies the hours each day that the door will be unlocked for.
User schedules control when access is granted on a user level (rather than a Door level). Unlike Door schedules, User schedules are configured in the Gallagher SMB app and are assigned to individual users rather than Doors. User schedules should be used in combination with Door schedules so that the Door schedule determines the times that the door is unlocked, and then within (never outside of) those times, User schedules define when specific users can and cannot gain access.
What is an "SMB tag"?: "SMB tags" refers to the available physical credentials, which are SMB Key Tags and SMB cards. The functionality and configuration for the different tag types are the same; the only difference is their physical shape and size.
An SMB tag (i.e. Key Tag or card) provides an alternative credential to the Gallagher SMB app, should the user not want to use their phone.
An SMB tag can also be used to arm and disarm a site. Using an SMB tag, a single badge at the reader disarms the site and a double badge at the reader arms it.
A tag can also be used by someone who doesn’t want to (or can’t) bring a phone to site. Examples are courier drivers, gate access, locker access, shared facility access, or access to an area or site that is not armed (24-hour site).
SMB tags are assigned to users using the Gallagher SMB app. A tag can be assigned when the user is created or assigned to an existing user. Any user role can be assigned a tag: Site Manager, Site Admin, or Site Member.
Tags are purchased from your install partner. Only Gallagher SMB Tags can be used with the SMB solution.
Tags must be enabled for your site by your Technician, for you to assign them.
Tags must be assigned using a mobile device, not via the browser version of the app, to ensure secure provisioning of the credential.
Only Site Managers can assign tags. The Site Manager must log into the Gallagher SMB app (authenticate themselves) before a tag can be assigned.
When a tag is assigned, the Gallagher Cloud will encode site-specific data to the tag using the phone’s NFC. Most Android phones support NFC. NFC must be enabled on the Android phone and enabled for the Gallagher SMB app. Only iPhone 7 (or later) supports NFC. iOS 13 (or later) is required.
A user can be assigned only one tag per site. If the user exists across multiple sites (the same email address is used, and the Site Manager confirms this is the same person), then the one tag can be used for multiple sites.
Assigning a tag to a new user
To assign a tag while creating a new user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Select the + ADD USER button. The New User screen displays.
Populate the required fields.
Note: If the user does not need to use the app (i.e. they only use tags or User Codes), uncheck the Mobile App User check box. For example, for a cleaner or a courier, or when the user of the tag is not always the same person.
Select the NEXT button.
The Privilege screen displays.
If you are a Site Manager for more than one site, a list of sites appears. Toggle on the Sites for which this user requires privileges.
Select whether the user is a Site Manager, Site Admin or Site Member (for Access Control only). See User Privileges for more information on what each role can do.
If you selected 'Site Admin', select which areas of the site they can arm and disarm. If you selected 'Site Member', select which areas they can access. Site Managers have privileges for the entire site.
Select the SAVE button.
The Credentials screen displays.
Select the ASSIGN TAG button.
Notes: - This button allows you to assign all types of tags, i.e. Key Tags and cards. - This button is only available for Site Managers in the mobile app if the site has tags enabled. Enable the 'Site uses tags' option in Site Details.
The 'Ready to Scan' pop-up displays.
Present an SMB tag to the phone. If the assignment is successful, the tag will show as assigned to the user.
The tag can now be used to request access at the doors that enter into the user’s privileged areas.
If the user belongs to multiple sites, you must use the multi-site feature to switch sites and assign the tag to the user within each site.
Assigning a tag to an existing user
To assign a tag to an existing user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Credentials button.
The Credentials screen displays.
Select the ASSIGN TAG button.
Notes: - This button allows you to assign all types of tags, i.e. Key Tags and cards. - This button is only available for Site Managers in the mobile app if the site has tags enabled. Enable the 'Site uses tags' option in Site Details.
The 'Ready to Scan' pop-up displays.
Present an SMB tag to the phone. If the assignment is successful, the tag will show as assigned to the user.
The tag can now be used to request access at the doors that enter into the user’s privileged areas.
If the user belongs to multiple sites, you must use the multi-site feature to switch sites and assign the tag to the user within each site.
If the user belongs to multiple sites, one tag can be used for multiple sites. Simply switch sites in the Gallagher SMB app and assign the tag to the user within each site.
The user must have the same email address across all sites.
The same tag cannot be assigned to different users on different sites.
If a Tag Only user belongs to multiple sites, they require a separate tag for each site. This is because the system cannot verify the identity of a Tag Only user, as an email address has not been entered.
A Site Manager can remove a tag from a user at any time. When the tag is removed, it can no longer be used on the site. The removed tag can then be assigned to another user.
To remove a tag from a user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Credentials button.
The Credentials screen displays.
Select the Remove button.
The tag is removed from the user.
If the user belongs to multiple sites, you must remove the tag within each site.
If a tag has been misplaced or left in an insecure location, a Site Manager can disable the tag. A disabled tag can no longer be used on the site. When the tag is located, it can be enabled.
To disable a tag, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Credentials button.
The Credentials screen displays.
Select the Tag - Active toggle.
The tag is disabled and can no longer be used on the site. When enabled, the tag can be used again.
If the user belongs to multiple sites, you must disable the tag within each site.
If the Site Manager has an internet connection, they can modify the privileged areas that a Site Admin or Site Member can access at any time. Changes take immediate effect. The Site Manager need not interact with the user or their tag.
A Site Manager can identify a tag's owner by simply scanning the tag at their phone. This is useful when distributing tags to users, searching for a user within the system, or challenging the tag holder.
To scan a tag, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Select the SCAN TAG button.
The 'Ready to Scan' pop-up displays.
Present an SMB tag to the phone.
If scanning is successful, the tag owner’s name will display with a link to navigate to the user’s details.
If you are a Site Manager for multiple sites, the site name will display below the tag owner’s name. Navigate to that site to modify the user’s details.
A user can request access by presenting their smartphone or an SMB key tag at the door’s reader. The smartphone must host the Gallagher SMB app with a valid mobile credential for the site.
iOS smartphones communicate with the reader using Bluetooth®. Android smartphones communicate with the reader using NFC or Bluetooth®. A tag will communicate with the reader using NFC.
Access granted events will appear in the History log of the Site Manager’s app when access has been granted and taken through the door. The user’s name and door name are reported.
Ensure Bluetooth® is enabled on your device. Android devices also need NFC enabled.
Location permission must be enabled on Android devices, as without this permission the device’s Bluetooth® won’t scan, even if Bluetooth® itself is enabled.
The area assigned to the door must be disarmed before the door will unlock. Two factor authentication is required to disarm.
Users are given privilege to enter areas not doors, which means a user given access to a particular area will be able to enter through any of the access-controlled doors leading into that area.
Only Site Managers and privileged Site Admins can view doors and their locked/unlocked status within the Gallagher SMB app.
Doors will lock automatically when the area they are associated with is armed.
To request access:
Open the Gallagher SMB app (the app can be running in the background).
Place your smartphone on or near the reader.
If successful, the reader’s LED will turn green and the door will temporarily unlock.
If you receive an access denied message, you will either have the wrong permission for the door or the area will be armed. Contact your Site Manager for assistance.
Only a Site Manager can delete a user within the SMB solution.
Note: The key account holder entry cannot be deleted. However, the account holder’s details can be updated.
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Click the DELETE button.
A 'Delete User' confirmation pop-up will appear showing all the sites to which this user has access.
Click CONFIRM to delete the user or CANCEL to go back to the 'My Team' screen.
Once a user is deleted
Deleting a user removes the user's privileges to all sites that you are a Site Manager for and can see that they are assigned to. If you are not the Site Manager for a site the user is allocated to, their privileges to that site are not removed.
When a user is deleted, any historical event records associated with that person will retain the person's name and the date and time the action occurred. This includes incidents they have claimed or closed and interactions they had with the security system to arm or disarm areas.
Only a Site Manager can disable a user within the SMB solution.
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Privileges button.
Disable the toggle next to the site for which you want to disable this user's access.
Click the SAVE button.
Once a user is disabled
Disabling a user removes the user's privileges for the site on which the toggle was disabled.
There are two possible states for a door – locked and unlocked.
To enter through a locked door, a user must request access by holding their phone or key tag to the reader, or by entering a User Code at the keypad.
To exit through a locked door, the user must use the Touch to Exit button (magnetic lock) or by turning the door handle (mortise lock). The door will temporarily unlock to allow the user to pass through and will then lock again.
If a door is locked 24/7: The door will remain in the locked state unless a Site Manager changes the state to unlocked through the app. If a Site Manager does change the state to unlocked, it will remain unlocked until it is locked again through the app, or the area is armed.
When the door is in the unlocked state, anyone can open it.
There are three user roles within the system, each with different levels of privileges. These are Site Manager, Site Admin, and Site Member.
Site Managers have full access to the system. They can:
Receive alarm activation notifications and the optional Late to Arm reminder notification.
Manage an alarm incident, including claiming and silencing the alarm, requesting a guard, and closing an incident.
Add, edit, and remove users, and manage which areas Site Admins and Site Members have privileges for.
Lock and unlock doors remotely.
See the History Log.
Set the Late to Arm notification time.
Do everything Site Admins and Site Members can do.
A Site Admin can be given restricted or full access to the site. They can:
Arm and disarm the system remotely, for the areas they have privileges for.
Gain access through doors they have privileges for.
Start the door unlock schedule by being the first to request access at the door during the period it is scheduled to be unlocked.
They can also be given the following privileges by a Site Manager:
Remote lock/unlock doors to selected areas.
Remote arm/disarm selected areas.
Without the above two privileges the use must be onsite and at a reader to complete the actions.
The Site Member is the most limited user role. They can access a locked door only if the site is already disarmed.
The Gallagher SMB security solution provides customers with the ability and flexibility to allocate different roles and credentials to different users across different sites, to meet their security and operational needs. Customers can create an unlimited number of users at no additional cost (except for SMB Key Tag users, as tags must be purchased).
The three user roles all have different levels of privileges. These are Site Manager, Site Admin, and Site Member.
The four types of credentials are Mobile Credentials via the SMB app, SMB Key Tags, User Codes, and SMB Cards.
Site Managers can add new users to the solution through the Gallagher SMB app or the Gallagher SMB web application. The web app is only supported by the Chrome and Safari web browsers.
Navigate to the Team screen within the SMB app.
Select the + ADD USER button.
Enter the new user's first and last name, email, and mobile phone number.
Notes:
The Mobile App User check box is selected by default. The user must be a Mobile App User in order to be a Site Manager.
'Email' and 'Phone' are required for all App Users.
The email address must be for an inbox that the user can access on their phone. The email address is used to link the user across sites; if they require access to multiple sites from the SMB app, the same email address must be used.
Select the Next button.
The Privileges screen displays.
If you are a Site Manager for more than one site, a list of sites appears. Toggle on the sites for which this user requires privileges.
For each site, select whether the user is a Site Manager, Site Admin or Site Member (for Access Control only). See User Privileges for more information on what each role can do.
Select the user's schedule for the site, to determine when they may gain access. Refer to User schedules to create a new User schedule, if required.
Notes:
The 'Schedule' option does not display if you have not created any User schedules.
If you select 'No Schedule', the user is granted access at all times (default access behaviour).
Only one User schedule can be assigned to each user.
Optionally select the date and time when the user can start gaining access from the Start Date field.
The user will only be permitted access from this date and time. If left blank, the user can gain access immediately.
Note: If the 'Start Date' is set to a future date, Mobile App Users still receive an invitation to register on the app immediately. Once registered, the app just displays a message indicating when they will be given access and lets them change their settings.
Optionally select the date and time when the user will stop gaining access from the End Date field.
The user cannot gain access on and after this date and time. If left blank, the user will not be stopped from gaining access.
If you selected the 'Site Admin' Role, select which areas of the site they can arm and disarm. If you selected 'Site Member', select which areas they can access. Site Managers have privileges for the entire site.
Select the SAVE button.
Once saved, an invitation is sent to the user's email address. The new user now needs to follow the steps in the email to complete their registration. The new user appears in the Team list with 'Response Pending' next to their name. This message will disappear when they log in for the first time. See below for a description of this process.
The new user now needs to follow the steps in the email to complete their registration.
Download the Gallagher SMB app.
Select the Complete Registration link in the email invitation.
Enter the 6-digit code from the text message you receive.
The Complete Registration link will expire after a few days. If it does, a Site Manager can send another from the app.
If a new user's invitation link expires or they didn’t receive the initial invitation email, it can be re-sent by the Site Manager.
Navigate to the Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Invite button.
Ensure the Use a Mobile Device option is selected. For additional security, select the Require SMS verification check box.
Click the SEND button.
A new invitation is sent to the user.
There are three options for users who want to resume using the SMB app on a new mobile phone:
Sending their own invitation If the user still has access to their previous phone and they are a Site Manager, they can send themselves a mobile device invitation from the SMB App on the old phone.
Complete the above procedure "Resending the SMB Registration invitation".
On the new phone, complete the above procedure "Gallagher SMB app registration".
On the old phone, go to the My Account screen in the SMB app and select REMOVE next to the old device.
Requesting an invitation If the user still has access to their previous phone and is not a Site Manager, they can ask a Site Manager from their site to send them a mobile device invitation.
After the Site Manager has resent the mobile device invitation, on the new phone, complete the above procedure "Gallagher SMB app registration".
On the old phone, go to the My Account screen in the SMB app and select REMOVE next to the old device.
Requesting a credential If the user does not have access to their previous phone and they cannot contact a Site Manager, they can use the 'Request Credential' process to get a credential for their new phone.
Note: To use this method, the user must have apps and app settings backed up on their old phone. Otherwise, use one of the above methods.
After opening the SMB App on the new phone, the 'Request Credential' screen displays.
Enter your email address and phone number to request a credential for the new phone. The email and phone number must be entered exactly as they were initially entered in the system (e.g. including any leading zeros).
A new Complete Registration link is sent to the user's email address.
On the new phone, select the Complete Registration link that is sent to the user's email address.
Mobile devices are user-specific, not site-specific. If a user’s device is removed from the 'Credentials' section on one site, this device will be removed from all sites with which the user used the device. The devices listed on the ‘Credentials’ screen are all devices assigned to the user.
Gallagher SMB User Codes are a way of providing access to the site, as an alternative to other credential types. User Codes are unique for each user. Site Managers can generate a User Code during the user creation process or edit an existing user’s credential and generate a code. The length of newly generated User Codes is determined by the 'User Code Length' set by the Installer. User Codes can be deleted directly from the SMB app to revoke access if required.
SMB User Codes can be used for access. Additionally, User Codes can be used to disarm the area prior to accessing it, if the user has the privilege to disarm the area associated with the door. User Codes can also be used to arm an area.
Hardware requirement: A site must have a Gallagher T30 Keypad installed to enable the use of SMB User Codes. Once the T30 Keypad is installed and the site is activated, all User Code options will appear in the customer SMB app (including creating, viewing, and using User Codes). If the T30 Keypad is removed from the site, all User Code options are hidden in the customer SMB app. If the T30 Keypad is ever added back again, any previously-configured User Codes will remain and can be used again.
SMB User Codes are generated using the Gallagher SMB app. Any user role can be assigned a User Code; Site Manager, Site Admin, or Site Member. A User Code can be generated when the user is created, or for an existing user.
There are two options when generating a User Code; To View or To Send.
To View: The Site Manager can view the User Code and communicate it to the required recipient.
To Send: The Site Manager cannot view the User Code. The User Code is sent to the user directly via SMS. The code is sent to the mobile number entered against the user.
User Codes are automatically generated by the system. Their length is determined by the 'User Code Length' set by the Installer.
An unlimited number of users can be created, and one unique User Code generated for each of them.
Site Managers can use both the smartphone and browser versions of the app to generate User Codes.
Only Site Managers can generate User Codes. The Site Manager must log into the Gallagher SMB app (authenticate themselves) before a User Code can be generated.
A User Code is only valid on the site it was generated from. The same User Code cannot be used across multiple sites.
Site Members can only access an area using a User Code if the area is disarmed. Users with the privilege to disarm areas can disarm and access areas using a User Code.
User Codes can be generated and viewed by the Site Manager, or generated and sent directly to the user via SMS.
Assigning a User Code to a new user
To assign a User Code while creating a new user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Select the + ADD USER button.
The New User screen displays.
Populate the required fields.
Note: If the user doesn’t want to use the app, deselect the Mobile App User check box.
Select the NEXT button.
The Privilege screen displays.
If you are a Site Manager for more than one site, a list of sites appears. Toggle on the Sites for which this user requires privileges.
Select whether the user is a Site Manager, Site Admin or Site Member (for Access Control only). See User Privileges for more information on what each role can do.
If you selected 'Site Admin', select which areas of the site they can arm and disarm. If you selected 'Site Member', select which areas they can access. Site Managers have privileges for the entire site.
Select the SAVE button.
The Credentials screen displays.
Select the GENERATE CODE button.
You can either view the User Code or send it to the user without viewing it.
Select the desired option:
Select TO VIEW to view the user code so you can manually provide it to the user. Select the eye icon (View Code icon) to view the User Code.
Select TO SEND to send the user code directly to the user's assigned mobile number. You will not be able to view it. Note that the number of • symbols does not reflect the length of the User Code. Review the user's name and mobile number and click OK to send the User Code, or click CANCEL to not generate or send a User Code.
Note: If you have allocated the maximum combination of user codes, you will see an error. Increase the site's User Code Length.
The User Code can now be used to request access at the doors that enter into the user’s privileged areas.
Assigning a User Code to an existing user
To assign a User Code to an existing user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Credentials button.
The Credentials screen displays.
Select the GENERATE CODE button.
You can either view the User Code or send it to the user without viewing it.
Select the desired option:
Select TO VIEW to view the user code so you can manually provide it to the user. Select the eye icon (View Code icon) to view the User Code.
Select TO SEND to send the user code directly to the user's assigned mobile number. You will not be able to view it. Note that the number of • symbols does not reflect the length of the User Code. Review the user's name and mobile number and click OK to send the User Code, or click CANCEL to not generate or send a User Code.
Note: If you have allocated the maximum combination of user codes, you will see an error. Increase the site's User Code Length.
The User Code can now be used to request access at the doors that enter into the user’s privileged areas.
Once a User Code is generated, it is immediately available for the user to gain access.
At the T30 Access Reader Keypad, enter your User Code.
Push the button with the green tick.
If the User Code is entered correctly, the LED squiggle on the T30 reader flashes green, and access is granted.
If the User Code is entered incorrectly, the LED squiggle on the T30 reader flashes red, and access is denied.
If the area is armed, the user must have disarming privileges for the User Code to work. If they have the correct privilege, the area disarms and access is granted. If the user does not have disarming privileges, access is denied.
To arm the site with a User Code, users must press the shield icon button on the T30 Keypad before entering their User Code and pressing the green tick button.
For Arming Readers only, if the shield button on the T30 Keypad is red, the area the door is associated with is armed; if the shield button is green, the area the door is associated with is disarmed.
A Site Manager can remove a User Code from a user at any time. When a User Code is removed, it can no longer be used to gain access or arm/disarm a site.
To remove a User Code from a user, perform the following procedure:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Credentials button.
The Credentials screen displays.
Click the delete icon (Remove Code icon) next to the User Code.
A pop-up will appear to confirm you want to delete the code.
Select Yes.
The User Code is deleted from the user and the controller.
A new code can be generated for the user if required.
If the Site Manager has an internet connection, they may modify the privileged areas that a Site Admin or Site Member can access from anywhere, at any time. Changes take immediate effect. The Site Manager need not interact with the user or the physical keypad onsite.
The History Log will show Access Granted and Arm/Disarm events related to User Codes.
FIDO Alliance (Fast Identity Online Alliance) is an internationally recognised organisation with an open standard, which Gallagher has implemented to enable fast, simple, and secure logon to the Gallagher SMB app. Behind the scenes, each user has a credential stored on their phone as part of the onboarding process. This credential is a security mechanism that allows our app to verify that the person accessing the cloud service is using an authorised device.
As part of the onboarding process, each user chooses a second means of authentication for logging into the app (the first means of authentication is the credential stored on their phone). The options presented to the user will depend on the options supported by their mobile phone. These include a passcode, or a biometric logon such as a fingerprint or facial recognition.
The value of FIDO authentication is that it provides a high level of security while being very simple to use. Each invited person chooses a means of logging into the app, which they are already familiar with because they already use this to unlock their mobile phone (e.g. a PIN, passcode or fingerprint).
FIDO’s main purpose is to provide a secure and simple means of authenticating from a mobile app to internet-based servers. They particularly wanted to remove the need for people to use passwords on the web, as weak or hacked passwords are known to be a major reason for security breaches.
Gallagher SMB has three solutions for managing alarm incidents:
Gallagher SMB was designed as a self-monitored security solution. Site Managers are notified when an alarm is triggered, and receive details about what is happening on their site. Site Managers can then decide what to do next - request a security guard to check on your site (AU & NZ only) or investigate further and silence the alarm.
To request a Security Guard when an alarm incident occurs, Guarding must be enabled for the site. Gallagher has partnered with First Security (NZ) and Wilson Security (AUS) to provide the ability for Site Managers to request a guard to their site by clicking a button within the SMB app. The Security Guard will attend the site and provide a full report back into the app about what they found.
The third option for monitoring a site is opting for third-party monitoring. If your alarm is triggered, the monitoring company will notify relevant parties in accordance with an agreed action plan. This could be people from your site, your security technician, or a guarding company who will send someone to check your premises.
If Third-Party Monitoring is enabled, the Site Manager will receive
Panic button activation notifications
Controller offline
Controller configuration changed
Test Mode disabled
and will not receive any other alarm incident notifications.
As a self-monitored security solution, SMB provides organisations with the ability to manage their own site's security. Site Managers will receive a notification when an alarm is triggered and then make the decision on who to respond to that incident.
There are two types of alarms that can be activated on a site:
Intruder Alarms
Intruder alarms are activated by sensors, such as motion detectors (PIRs) and window or door sensors (reed switches), and produce 'incidents'.
About incidents An incident is a real-time timeline of activity following an alarm activation. An incident shows which sensors have activated at your site, any other alarms that have occurred, and when each happened. The incident will also show any response to the incident by a Site Manager or, if you have the Guard Monitoring add-on, a Security Guard.
Alarms included in an incident After the first alarm, which creates the incident, any additional alarms that occur within 20 minutes of the previous one are also added to the incident. The close time frame of the alarms means that it is likely they are related.
Viewing an incident Alarms from the security system, the sensors and outputs, will always be displayed on the left-hand side of the incident screen. Any response to the alarm, including the person who claimed or silenced the alarm and any manual or automated guard call-outs, will display on the right-hand side of the incident screen.
Closing an incident An incident stays open until it has been closed by a Site Manager or after 24 hours (see auto-closing of incidents). A site could have multiple open incidents but it is unlikely. If there are multiple incidents open, only one incident (the latest one) can be in progress at any time.
If an alarm at your site is activated, the Site Managers will receive a push notification on their phone saying which sensor was activated. Opening the notification will take you directly to the incident, or if you don’t click on the notification then an incident banner also appears on the home screen of the SMB app.
If any other sensors are activated within 20 minutes of the previous, these will appear in the timeline of the same incident and a Site Manager will need to respond to the incident. The Site Manager can claim the incident to inform the other Site Managers it's under control, silence the alarm, optionally request a Security Guard if enabled, or close the incident. If automatic guarding is enabled and the Site Manager does not want a Guard to be called to the site, the Site Manager must claim the incident before the automatic request period has elapsed.
If Third-Party Monitoring is enabled, the Site Manager will not receive notifications of alarm incidents.
This option only displays if 'Link to Video App From Incident' has been enabled in Site Settings. Select this option as a convenient way of opening your video app if you wish to find footage relating to the incident.
Tap the Actions button at the bottom of the Incident Details page.
Select Open Video App.
Your Video Management System (VMS) app opens to its default/home screen if it is installed. If it is not installed, you are taken to the app store page for that app.
Claiming the incident informs other Site Managers that you are going to handle the situation. They will receive a push notification to tell them you have claimed it. They will also be able to see this in the details of the incident.
To claim an incident:
Tap the Actions button at the bottom of the Incident Details page.
Select Claim Incident.
An entry will appear on the right-hand side of the incident timeline showing that you have claimed the incident.
If you'd like to turn off the siren during an incident, you can do so by silencing the alarm.
To silence the alarm:
Tap the Actions button at the bottom of the Incident Details page.
Select Silence Alarm.
An entry will appear on the right-hand side of the incident timeline showing that you have silenced the alarm.
When the incident is complete, you or another Site Manager need to close it. When doing so, you provide a reason as to why the alarm was activated. The reasons to choose from are:
Intruder
Maintenance
False Alarm
To close the incident:
Tap the Actions button at the bottom of the Incident Details page.
Select Close Incident.
Select the reason for closing the incident.
An entry will appear on the right-hand side of the incident timeline showing that you have closed the incident and the reason for closing.
The incident is then recorded under the Activity > Incidents tab.
Until the incident is closed, the incident banner will remain on the home screen (Site page) of the app.
If an incident is not closed by the Site Manager within 24 hours, the system will automatically close the incident if the following criteria are met:
The incident is open.
There is no guard call out in progress for the incident. If there had been a guard call out for the incident, it must have been closed or cancelled.
The incident has no active alarms.
The most recent alarm assigned to the incident occurred more than 24 hours ago.
The Incident Log will record the Incident as Closed as inactive by System.
If there is an incident stuck in the SMB app and the customer can't close it or claim it, the SMB controller will need to be restarted. Please contact your Security Technician.
Gallagher has partnered with security solution providers First Security® in New Zealand and Wilson Security® in Australia to offer a reliable guard call-out service. If an alarm is activated on your site, you can request a guard directly from the Gallagher SMB app, or you can configure the system to automatically call the guard for you.
The security solution provider will respond to the alarm, check out your site, call the police if needed, and provide you with a full report. You'll be updated at each step through the app and have full transparency of what's going on.
Once the guard has registered that they are on-site, we make an interface available to our guarding partner to disarm the site, so the guard can enter. This interface is only able to be used while the guard is on-site. When the guard has completed their on-site checks, they can also re-arm the site prior to leaving. As a fail-safe backup, as soon as the Gallagher system receives an update that the guard has left the site, we will also re-arm the site remotely.
For information about Guarding eligibility and fees, see Enable Guarding.
To request a Security Guard:
Tap the Actions button at the bottom of the Incident Details page.
Select Request Security Guard.
A warning displays to ensure you want to proceed and are aware the call-out could result in a call-out fee.
Click OK to call a Guard or CANCEL to not proceed with a Guard call-out.
Once agreed to proceed, you would need to call the Guarding provider to cancel. Fees may still apply.
From the SMB app, the Site Manager can set up a guard to be automatically requested after a chosen period of time. This safeguard will ensure the site is in good hands, even if you miss the alarm notification.
To set up automatic guarding:
Within the SMB app, go to the hamburger menu in the top right-hand corner.
Select Site Settings.
Use the toggle to enable Automatically Request Guard.
The Request a guard after drop-down list will appear.
Choose the time you would like the system to wait before it calls a guard (1-15 minutes).
A pop-up message will show when the settings have been saved automatically.
Cancel an automatic Guard call out
If an incident occurs on your site and a Site Manager claims it before the set time has elapsed, the guard call-out will no longer be triggered automatically. Instead, a Site Manager can manually request one. The incident needs to be claimed before the timeout to stop the auto-call-out. Disarming the area or site doesn’t stop the auto-call-out; only claiming the incident does.
If an auto-call-out was initiated and received by the guarding company, it can still be cancelled by calling their support number and asking them to not send the guard.
What triggers an automatic Guard call out?
Any PIR-like input being triggered (open) when an area is armed or tampered with or a Controller being tampered with, at any time of day will result in an automatic guard call-out after the configured timeout if the incident is not claimed.
Only intruder alarms will trigger a guard call-out. The only exception is if an incident starts with a system alarm, and a subsequent intruder alarm is triggered; in this case, a guard call-out will also be requested.
On the Incidents tab (on the Activity page), Site Managers can view the details of all previous alarm activations.
Tap on an incident to open the details and see:
Which alarms were activated
Who actioned the alarm and how
If you need the details of a past incident in an exported format for insurance or police reasons, please contact the Gallagher SMB Support Team.
In situations where organisations or Site Managers are apprehensive about managing their own alarms and don’t want to take on this responsibility outside of work hours, Third-Party Monitoring can be configured for the site.
Alarm messages are sent from the Controller at the site to the nominated monitoring station in a standard format in accordance with a set of rules. Monitoring stations will have software that interprets messages received and sends notifications to nominated personnel at the site or displays details on a workstation at the station in a form that is easy for an operator to action.
Actions taken by the monitoring station will depend on the response plan defined by the customer.
Possible actions are:
do nothing
monitoring station software sends an automated notification to nominated people at the site
telephone nominated personnel at the site one by one in an escalation sequence
call a guard out
contact police.
The required response by the monitoring station may depend on:
the day of the week and/or time of day
what happened
the value of property at the site
the level of trust the business owner has in the people who have access to the site
how much the business owner is prepared to pay monitoring for the service
whether the system is police graded and/or the alarm has been verified. The rules and requirements for calling the police vary by country and jurisdiction. If required, verification could be by someone at the premises, video verification, or following dual activation.
If Third-Party Monitoring is enabled, the Site Manager will receive
Panic button activation notifications
Controller offline
Controller configuration changed
Test Mode disabled
and will not receive any other alarm incident notifications.
Gallagher SMB Controller
What are the common statuses of the SMB Controller?
What is the communication process of the SMB Controller?
The firmware upgrade won’t complete – how do I get the controller updated?
The controller won’t register, it keeps asking the serial number, when it is entered it keeps going back to that message status of the controller is on 5 flash.
How do I clear the SMB Controllers configuration needs to be cleared?
How are the DIP switches used?
How do I configure the controller with proxy server settings?
How do I obtain the Diagnostic Logs from the Gallagher SMB Controller?
Can I restart the SMB controller when I’m not onsite?
How do I get the SMB Controller to sync its time (NTP)?
How do I manually change the SMB Controller’s time?
Are there Command Line tools to help installers check cloud connections from a site?
Gallagher Hardware
What do I do if the I/O Boards are going offline randomly?
HBUS Devices are not coming online but the Controller has detected the device and has events.
Which SMB kit should I use? (New Zealand & Australia)
Gallagher SMB vs CC
What are the commonalities?
What are the main differences?
Connectivity
How will I know if the Cloud goes down?
What do I do if I lose connection to the internet on my phone or at site?
Configuration
Why can’t I log into the SMB Installer Portal?
A user has a user code and privilege to disarm but the code won’t disarm the system.
How do I get the ASSIGN TAG option to show in the Credentials screen?
The door state is not reflecting correctly – how do I fix is?
How do I connect two sites together?
Alarm Transmitter not connected events
SMB app
Are there any phone requirements for the SMB app to work?
What happens if the user doesn’t get the mobile app invitation?
Technical Support have asked for the mobile app log files, how do I get them?
What do I do if the user gets a new phone?
Is there a web version of the SMB app?
Not sure if you are receiving notifications?
What to do if you are not receiving notifications
The customer has an incident in the SMB app and they can't close it or claim it.
User Management
Sending an invitation email or text message
Reporting an Issue
Installer Issues
Customers Issues
The Activity page is split into two tabs, Events and Incidents, and provides details of what activity has happened on a site. The Activity page can be accessed from anywhere in the app by clicking the Activity button on the navigation bar at the bottom of the screen.
The EVENTS tab shows a log of all the arming and disarming activity and all events related to access control, including access granted and access denied. Events are logged showing what type of action occurred, by whom, at what reader or door, and when.
Events from the past 24 hours are displayed by default.
Filter Events
From the EVENTS tab, click the filter drop-down box (set to '24 Hours' by default).
Select the required timeframe; 24 Hours, 7 Days, 30 Days, or Custom.
If you selected Custom, enter the From and To date, and click Apply.
The Events from the specified timeframe appear on the screen.
Scroll down to load all the Events from the specified time.
Export Events
Events can be exported and sent as a CSV file via email.
From the EVENTS tab, click SEND REPORT.
A pop-up message will confirm the email address it will be sent to.
Click SEND to send or CANCEL to go back to the Event log.
The report data is based on what filters are currently applied. If no filter is applied, it will send the past 24 hours of events.
The INCIDENTS tab shows details of all previous intruder alarm and system alarm activations.
Click on an Incident card and more details are available about what alarms were included in the incident, who actioned them, and when.
More information about incidents:
System alarms occur if there is an issue with the system, such as a power failure or a low battery alarm. They display information about Controller offline, low battery, and input tamper alarms. When a system alarm is raised, Site Managers are notified and an incident is created.
If a system alarm is generated, Site Managers will receive a push notification on their phone stating there is an issue. Opening this notification will take you directly to the incident details. An incident banner also appears on the home screen of the SMB app.
If your alarm system goes offline, it will create an incident. The incident will show a Controller offline alarm.
An offline incident occurs when your system can no longer connect to the internet. Your site enters a 'local only' mode. In this mode, your site is still secure, and a siren will still be triggered if an alarm is activated. However, you will not receive notifications about intruder alarms and a guard cannot be called.
If your system comes back online:
Select the Actions button.
Close the Incident, selecting Maintenance as the reason.
If your system does not come back online after about 30 minutes:
Navigate to the Incident.
Click MORE INFO on the Incident details page.
A pop-up will appear with more information and provides an option to EMAIL or CALL your Technician.
Claiming the incident informs other Site Managers that you are going to handle the situation. They will receive a push notification to tell them you have claimed it. They will also be able to see this in the details of the incident.
To claim an incident:
Tap the Actions button at the bottom of the Incident Details page.
Select Claim Incident.
An entry will appear on the right-hand side of the incident timeline showing that you have claimed the incident.
When the incident is complete, you or another Site Manager need to close it. When doing so, you provide a reason as to why the alarm was activated. The reasons to choose from are:
Intruder
Maintenance
False Alarm
To close the incident:
Tap the Actions button at the bottom of the Incident Details page.
Select Close Incident.
Select the reason for closing the incident.
An entry will appear on the right-hand side of the incident timeline showing that you have closed the incident and the reason for closing.
Until the incident is closed, the incident banner will remain on the home screen (Site page) of the app.
If an incident is not closed by the Site Manager within 24 hours, the system will automatically close the incident if the following criteria are met:
The incident is open.
There is no guard call out in progress for the incident. If there had been a guard call out for the incident, it must have been closed or cancelled.
The incident has no active alarms.
The most recent alarm assigned to the incident occurred more than 24 hours ago.
The Incident Log will record the Incident as Closed as inactive by System.
Gallagher’s Multi-Site feature gives customers the ability to manage and interact with the security systems of multiple physically-separate sites through the one SMB app.
This is ideal for businesses where user and alarm management are centralised or staff have a need to move between sites. It can be equally beneficial for those wanting to manage the security systems both at their business premises and at home.
Switching between sites is easy within the SMB app, and site managers will receive live notifications if an incident occurs at any of their sites.
A user’s email address is the common piece of information that allows them to be linked to multiple systems.
To switch between sites:
Within the SMB app, select the more options menu (three vertical dots) in the top right-hand corner.
Select Switch Site.
The sites that the user has the privilege to see are displayed.
Click on the site you want to switch to.
From the Team page on any site, a Site Manager can add, disable, and delete access for users across all sites for which they are a Site Manager. They don’t need to switch between sites to manage users.
For more information, refer to .
When an alarm incident or system alarm occurs for a site that you are a Site Manager for, you receive a notification. By clicking on the notification, you are taken to the site that the notification was from.
The Site Manager can have selected any site within the SMB app and still receive notifications from all sites.
More information about incidents:
There are two main Settings sections within the SMB app: User Menu and Site Settings.
My Account
An overview of your details, including phone number, email address, and the device registered for using the SMB app.
Deleting your account: From My Account, you can also delete your account. If you are unable to use the Delete Account function within the SMB app, make a request via the . Please complete the 'Want to know more' form at the bottom of the page, requesting your account to be deleted.
User Settings
Lets you apply settings to yourself as a user.
Bluetooth Background Access
By enabling Bluetooth Background access, Bluetooth will be used to grant access at doors when the app is running and not visible. You don’t have to open the SMB app to be granted access through access control doors.
Click the toggle to enable and disable.
Critical Alert Notification
By enabling Critical Alert Notifications, you will receive critical alert notifications for incidents, even if your device is set to do-not-disturb.
Critical Alert Notifications are generated when an intruder alarm is raised. To ensure the alert is not missed, a notification will display on your device that must be manually cleared for it to disappear. When triggered, this alert will also produce a distinctive sound.
Critical Alert Notifications allow you to feel confident that you will always know what is happening on your site.
Click the toggle to enable and disable.
Use the Test functionality to hear the distinctive sound that will play.
If you have an Android device and it is muted or the volume is set low, Critical Alert Notifications will not be heard.
Dark Mode
If enabled, the SMB app will appear in dark mode.
Click the toggle to enable and disable.
Share Log Files
If there is an issue with the SMB app, sending the log files to your Technician to discuss with Gallagher can be helpful.
Click the Share Log Files icon.
This will enable the sharing functionality on your phone.
Send via email to yourself or your Technician.
Switch to Offline Mode
The app enters Offline Mode automatically when your phone has no internet connection. If you do have an internet connection but are unable to connect to the site for some other reason, you can manually switch to Offline Mode. This mode lets you use the app to arm or disarm your site while you are on site without a connection.
Entering Offline Mode:
Click the SWITCH TO OFFLINE MODE button. The 'Offline Mode' screen displays.
Using Offline Mode:
Hold your phone to a reader and select CONNECT WITH BLUETOOTH. The reader will flash blue while attempting to connect. Stay close to the reader until a Bluetooth connection is established.
Once connected, arm or disarm your site as usual.
You can then return to the 'Offline Mode' screen. If you used an arming reader (not used for access), the light on the reader confirms if your action was successful – it should be green if disarmed and red if armed.
Returning to Online Mode:
If an internet connection becomes available, you will see a RESTORE CONNECTION button. Select this to reconnect and enter Online Mode.
Settings that apply at a site level.
Panic Button Notifications only
Site Managers can select this option to only be notified of Panic Button incidents and any subsequent events related to those incidents. Other site notifications will be turned off for that Site Manager. This setting only applies to this site for the Site Manager who enables it; not all sites and not all Site Managers.
Automatically Request Guard
From the SMB app, the Site Manager can set up a guard to be automatically requested after a chosen period of time. This safeguard ensures the site is in good hands, even if you miss the alarm notification.
Automatic Arming
The Automatic Arming feature enables a Site Manager to set one time each day when their site will be armed. A different time can be set for each day of the week.
Click the toggle to enable Automatic Arming.
This will display the days of the week. The default configuration is set to arm the site at 6 p.m. Monday-Friday.
To change the arming time for a day, tap the time. This will open an interface where the hour, minutes, and a.m. and p.m. can be set. Once set, select OK.
Set the desired time for each day of the week you want the site to be armed. Enable or disable the toggle by each day of the week as needed.
Click SAVE.
The times you selected are displayed underneath the 'Automatic Arming' toggle.
Late to Arm Notifications
The Late to Arm feature enables a Site Manager to set a notification time and receive a reminder if their site is not armed. At the set time, the system will check if the site is armed, and send the Site Manager a notification through the Gallagher SMB app if it is not. A different time can be set for each day of the week.
Click the toggle to enable Late to Arm Notifications.
This will display the days of the week. The default configuration is set to notify Site Managers at 6 p.m. Monday-Friday when their site is not armed.
To change the notification time for a day, tap the time. This will open an interface where the hour, minutes, and a.m. and p.m. can be set. Once set, select OK.
Set the desired time for each day of the week you want to be notified. Enable or disable the toggle by each day of the week as needed.
Click SAVE.
A pop-up shows when the next check will be done. The times you selected are displayed underneath the 'Late to Arm Notification' toggle.
When you get a Late to Arm notification, simply click on the notification to open the app and then arm your site as usual.
Installer Mode
Once your site is activated, it becomes 'read-only' for the Technician that installed your site.
Enabling Installer Mode gives your SMB Technician the ability to make changes to the configuration of your site and perform maintenance and testing of your security solution. It is intended to be used only while the SMB Technician requires it.
Click the toggle to enable Installer Mode.
A drop-down list appears.
Select the time you want Installer Mode enabled for: an Hour, a day, a week, or 2 Weeks.
After the specified time, Installer Mode will automatically disable, or click the toggle to disable Installer Mode.
Contact Installer
Lets you call your SMB Technician directly from within the SMB app.
Click Contact Installer.
A box will appear, advising who your SMB Technician is.
Click Call to call your Technician, or Close to go back to Site Settings.
Link to Video App From Incident
Adds a 'View Camera' option to the 'ACTIONS' available for incidents. Selecting this action will open your Video Management System (VMS) app. Supported VMS apps currently include:
Click the toggle to enable Link to Video App From Incident.
From the drop-down list that appears, select the supported VMS app that you use.
Click the TEST button to ensure the functionality works. Your selected VMS app should open if it is installed on your device. If it is not installed, you are taken to the app store page for that app.
If you wish to change to another VMS app, click the EDIT button and select your desired app.
Switch Site
If a Site Manager has access to more than one site, they can switch between them by clicking on Switch Site for a list of all their other sites.
About
Provides an overview of the App version, Open Source Licenses used in development, and a link to Gallagher SMB Policies available on the Gallagher website.
Help
Links from within the SMB app to the Customer Help.
The incident is then recorded under the Activity > tab.
Offline/Online Mode only applies to the SMB app; privileged users can always use such as their Key Tag or User Code to arm/disarm and gain access regardless of internet or site connection.
.
Arming Mode: Each Area's 'Default Arming Mode' affects how it is armed via Automatic Arming. If an Area's 'Default Arming Mode' is set to 'Fail to Arm', it will fail to automatically arm if it has any open (active) Inputs. Refer to for more information.
.
Eagle Eye Viewer | Nx Witness Mobile |
Hik-Connect | Provision Cam 2 |
Milestone Kite (Android only) | Wisenet WAVE |
Milestone XProtect |
Frequently asked questions when troubleshooting about connectivity
How will I know if the Cloud goes down?
The Gallagher SMB system is hosted by Amazon Web Services (AWS) cloud computing platform requiring no server to be installed onsite. No downtime is expected as cloud services are deployed across multiple AWS Availability Zones and employ database replication (AWS RDS)
If the Installer app or Customer app is not responding or you are having connectivity issues check the Gallagher Security Cloud Status Page - https://status.gallagher.com/ - for more information.
What do I do if I lose connection to the internet on my phone or at site?
If the Mobile app/phone cannot connect to the cloud, the SMB app will automatically switch to Offline Mode (Local Control) to allow the user to connect with a Reader via Bluetooth
Location services must be enabled to allow Bluetooth connections to readers for Local Control
There is an option to manually switch to Offline Mode from the User Menu - User Settings page - or from the Login page Menu options.
Frequently asked questions when troubleshooting the SMB app.
Are there any phone requirements for the SMB app to work?
Users must have a security credential (PIN, fingerprint, face ID) configured on their device before they can complete the SMB FIDO registration process.
The registration process may complete without the security credential configured, but they will not be able to use the SMB App.
If the user disables or deletes the SMB authorization method (e.g. disables Face ID), the SMB app will display the error:
“Reported logon method cannot be accessed, update settings and relaunch app.”
The user must either re-enable the authorization method or uninstall and reinstall the SMB app and complete the registration process again with an enabled authorization method.
What happens if the user doesn’t get the mobile app invitation?
For new Mobile App invitations, the default settings require SMS verification to confirm the correct phone number.
If this SMS message is not received, another invitation can be sent from the Customer App with the 'Require SMS verification' option disabled.
Technical Support have asked for the mobile app log files, how do I get them?
The Mobile App log files can be useful for debugging issues.
Customers can email the Mobile App log file from their device by:
Login into the app -- Click the Menu hamburger -- select Settings -- select the Share Log Files option -- select an email client to send the log file
If the Customer cannot login to the app, they can still share the log file by:
From the Login screen - click the "Cog" icon in the top right corner
Select "Share Log Files" -- select an email client to send the log file and enter the required email address recipient.
What do I do if the user gets a new phone?
If users replace their phone and copy apps to their new phone, they will need to register for SMB again.
SMB has a feature that will allow users to invite themselves to register again.
When they start the SMB app on their new phone, they will be prompted to enter their email and phone number to request a new credential for their new phone. Then a new credential will be generated, and a new invitation will be sent to the user.
Note - on the request credential page, the phone number must be entered exactly as it was entered when they first registered, otherwise the invitation email will not be sent. This is a security feature to prevent unauthorized requests.
Is there a web version of the SMB app?
Yes, the SMB app can be accessed via a web portal - SMB Web Portal. Basic functionality is the same, but you will not receive notifications or be able to assign tags.
Not sure if you are receiving notifications?
As a Site Manager, you should receive notifications of any incidents on your site, as well as the Late to Arm schedule notification if this is enabled unless Third Party Monitoring is in place.
If you are not, follow the below steps.
Unsure whether or not you're receiving notifications? To test if you are, set your Late to Arm schedule:
Firstly, your site must be set to a disarmed state. If it is armed, disarm it.
Select Settings from the menu in the app.
Tap on Late to Arm Schedule and select the box Notify managers if site is late to arm.
Set the time for today to two minutes from now. For example, if it’s a Tuesday at 02:01 PM, then set the time for 02:03 PM on Tuesday.
If you do not receive the notification within five minutes, the system is not sending notifications to your device. Follow the below steps to fix this.
What to do if you are not receiving notifications
Site Managers that are not receiving notifications will need to delete the app and be re-invited. To do this, follow these steps:
Delete the Gallagher SMB app from your phone. You will need to wait five minutes before re-installing it.
Have another Site Manager re-invite you – they need to:
Select Users from the menu in the app
Select the user from the list you would like to re-invite, tap INVITE
Select Use a mobile device
Hit SEND
Once five minutes have passed, follow the instructions in the invite email to re-install and activate the app.
The customer has an incident in the SMB app and they can't close it or claim it.
If there is an incident stuck in the SMB app and the customer can't close it or claim it, the SMB controller will need to be restarted.
Frequently asked questions when troubleshooting user management.
Sending an invitation email or text message
did not receive the invitation email,
did not respond to the invitation before it expired,
changed their phone and requires a new invitation, or
did not receive the SMS text message with the code,
A new invitation can be sent to them at any time by a Site Manager.
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Invite button.
The Invitation screen displays.
Select Use a mobile device.
Ensure the Require SMS verification check box is unchecked.
Select the SEND button.
If a new user is going to use the web application:
The first email invitation is always a mobile invitation (an invitation to download the mobile app). To send a web app invitation:
Navigate to the My Team screen within the SMB app.
Search for the user and click the downward arrow on their user card for more options.
Select the Invite button.
The Invitation screen displays.
Select Use a web browser.
Select the SEND button.
The user will receive an email to update their password. They will need to follow the link in the email and create a password. Their email address is their username.
Most users should be encouraged to install and use only the mobile app rather than the web app version.
Email addresses must be unique for every user, as this becomes the username if a user requires a web app account (instead of, or in addition to, using the mobile app with FIDO authentication).
This Help Guide gives certain information about products and services provided by Gallagher Group Limited or its related companies (referred to as "Gallagher Group").
The information is indicative only and is subject to change without notice meaning it may be out of date at any given time. Although every commercially reasonable effort has been taken to ensure the quality and accuracy of the information, Gallagher Group makes no representation as to its accuracy or completeness and it should not be relied on as such. To the extent permitted by law, all express or implied, or other representations or warranties in relation to the information are expressly excluded.
Neither Gallagher Group nor any of its directors, employees or other representatives shall be responsible for any loss that you may incur, either directly or indirectly, arising from any use or decisions based on the information provided.
Except where stated otherwise, the information is subject to copyright owned by Gallagher Group and you may not sell it without permission. Gallagher Group is the owner of all trademarks reproduced in this information. All trademarks which are not the property of Gallagher Group, are acknowledged.
If you are not able to find the answer within the SMB Help Centre, follow the process below to report an issue.
Triage process:
Search for the answer in the SMB Help Centre – Installer and Customer.
Complete the training or refer to the training videos or training information provided.
Contact your Distributor (who you purchased the Gallagher SMB hardware from) - NZ or Australia.
Follow their Technical Support processes for Level 1 & Level 2 support.
If the issue isn’t resolved, it can be escalated to Gallagher Technical Support.
Minimum information needed to effectively investigate an issue.
Installer Issues:
Urgency / Priority
Distributor Name
Install Partner Organization Name
Technician Name
Site Name
Controller ID (32-character number on Controller and in the Controller lightbox of Installer App)
Controller MAC - if a hardware issue
Check and record the Controller LED flash pattern if it is a Controller issue.
Time the issue first occurred.
Permaconn issues (if applicable): PM54 Serial Number, PM54 Mode - Alarm Monitoring and/or Cellular Backup Router, PM54 LEDs
Details of the issue and how to reproduce.
Customer Issues:
Urgency / Priority
Customer name
Site name
Install Partner Organization.
Mobile device details: Make, Model, OS Version
Mobile App log file if possible
Time the issue first occurred.
Details of the issue and how to reproduce.
Understanding the main differences between the Gallagher SMB and Gallagher Command Centre solutions.
What are the commonalities?
The Controller 6000 is the same as CC (except for how it connects to its server; SNTP, DHCP, DNS and Websocket to Cloud microservice instead of BOOTP and CC Server)
All H-Bus devices (I/O Boards, Readers) are the same as CC, except we don't yet support all of them (e.g. plug-in modules). Therefore, all the things it can do and how it does it are the same, BUT we present it to the user in a simpler way. For example:
CC Access Zones and Doors are wrapped up into a single SMB concept of a Door
CC Alarm Zones are SMB Areas
In SMB, every user has their own Access Group
What are the main differences?
CC gains its incredible flexibility by providing lots of pieces, each highly configurable and assumes nothing about how it might be used. The downside of this is that even basic things like getting a controller on-line require quite a bit of configuration ('programming') by a qualified Installer.
The SMB system works 'out of the box' and the only configurable options are what are necessary.
To help achieve this we present simplified concepts for Areas, Doors, etc and the goal is very fast installation requiring reduced training yet with a high success rate.
The SMB system is not sold in parts, but as a 'kit' that you can screw to a wall, plug in Ethernet and power, scan a QR code and have a functioning site in literally a few minutes!
This product includes software code developed by third parties, including software code subject to the GNU General Public License (“GPL”), the GNU Library General Public License (“LGPL”), and a variety of additional licenses, including BSD-style licenses. As applicable, the terms of these licenses, and information on obtaining access to the open source code used in this product, are available for free download from https://security.gallagher.com/oss.
The open source code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors. Please refer to the following license details for more information.
BSD-2-Clause
Copyright (c) 2006-2018 Roy Marples roy@marples.name All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of BalaBit nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY BALABIT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Boost Software License - Version 1.0 - August 17th, 2003
Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following:
The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Note: Individual files contain the following tag instead of the full license text.
SPDX-License-Identifier: BSL-1.0
This enables machine processing of license information based on the SPDX License Identifiers that are here available: http://spdx.org/licenses/
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
One line to give the program's name and a brief idea of what it does. Copyright (C) <year> <name of author>
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License.
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Unix SMB/CIFS implementation.
trivial database library Copyright (C) Andrew Tridgell 1999-2004 Copyright (C) Paul `Rusty' Russell 2000 Copyright (C) Jeremy Allison 2000-2003
NOTE! The following LGPL license applies to the tdb library. This does NOT imply that all of Samba is released under the LGPL
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
NOTE: If you use tdbs under valgrind, and in particular if you run tdbtorture, you may get spurious "uninitialized value" warnings. I * think this is because valgrind doesn't understand that the mmap'd area may be written to by other processes. Memory can, from the point of view of the grinded process, spontaneously become initialized.
I can think of a few solutions. [mbp 20030311]
Write suppressions for Valgrind so that it doesn't complain about this. Probably the most reasonable but people need to remember to use them.
Use IO not mmap when running under valgrind. Not so nice.
Use the special valgrind macros to mark memory as valid at the right time. Probably too hard the process just doesn't know.
The files ans.c, atm.h, atmres.h, atmsap.h, misc.c, text2atm.c and text2qos.c are taken from the linux-atm libraries. These are Copyright 1995-2000 EPFL-LRC/ICA, and are licensed under the GNU Lesser General Public License.
The file pppoatm.c contains its own copyright notice, and is licensed under the GPL.
libestr is available under the terms of the GNU LGPL v2.1 or above (full text below).
GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
The modified work must itself be a software library.
You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:
Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)
Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.
Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:
Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.
Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License).
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
liblognorm, a fast samples-based log normalization library Copyright (C) 2010 Rainer Gerhards
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below.
0. Additional Definitions.
As used herein, "this License" refers to version 3 of the GNU Lesser General Public License, and the "GNU GPL" refers to version 3 of the GNU General Public License.
"The Library" refers to a covered work governed by this License, other than an Application or a Combined Work as defined below.
An "Application" is any work that makes use of an interface provided by the Library, but which is not otherwise based on the Library.
Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the Library.
A "Combined Work" is a work produced by combining or linking an Application with the Library. The particular version of the Library with which the Combined Work was made is also called the "Linked Version".
The "Minimal Corresponding Source" for a Combined Work means the Corresponding Source for the Combined Work, excluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application, and not on the Linked Version.
The "Corresponding Application Code" for a Combined Work means the object code and/or source code for the Application, including any data and utility programs needed for reproducing the Combined Work from the Application, but excluding the System Libraries of the Combined Work.
1. Exception to Section 3 of the GNU GPL.
You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL.
2. Conveying Modified Versions.
If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified version:
under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or
under the GNU GPL, with none of the additional permissions of this License applicable to that copy.
3. Object Code Incorporating Material from Library Header Files.
The object code form of an Application may incorporate material from a header file that is part of the Library. You may convey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical parameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in length), you do both of the following:
Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are covered by this License.
Accompany the object code with a copy of the GNU GPL and this license document.
4. Combined Works.
You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following:
Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its use are covered by this License.
Accompany the Combined Work with a copy of the GNU GPL and this license document.
For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.
Do one of the following:
Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding Application Code in a form suitable for, and under terms that permit, the user to recombine or relink the Application with a modified version of the Linked Version to produce a modified Combined Work, in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.
Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of the Library that is interface-compatible with the Linked Version.
Provide Installation Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such information is necessary to install and execute a modified version of the Combined Work produced by recombining or relinking the Application with a modified version of the Linked Version. (If you use option 4d0, the Installation Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.)
5. Combined Libraries. You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities that are not Applications and are not covered by this License, and convey such a combined library under terms of your choice, if you do both of the following:
Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities, conveyed under the terms of this License.
Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered version of the GNU Lesser General Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that published version or of any later version published by the Free Software Foundation. If the Library as you received it does not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation.
If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library.
Copyright (c) 2015 Rainer GerhardsPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Copyright (c) 2009-2012 Eric Haszlakiewicz
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.Copyright (c) 2004, 2005 Metaparadigm Pte Ltd
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
This file is automatically generated from html/copyright.html Copyright Notice jpg "Clone me," says Dolly sheepishly. Last update: 2-Jan-2017 11:58 UTC
The following copyright notice applies to all files collectively called the Network Time Protocol Version 4 Distribution. Unless specifically declared otherwise in an individual file, this entire notice applies as if the text was explicitly included in the file.
Copyright (c) University of Delaware 1992-2015
Permission to use, copy, modify, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty.
Content starting in 2011 from Harlan Stenn, Danny Mayer, and Martin Burnicki is:
Copyright (c) Network Time Foundation 2011-2017 All Rights Reserved
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The following individuals contributed in part to the Network Time Protocol Distribution Version 4 and are acknowledged as authors of this work.
1. [1]Takao Abe <takao_abe@xurb.jp> Clock driver for JJY receivers 2. [2]Mark Andrews <mark_andrews@isc.org> Leitch atomic clock controller 3. [3]Bernd Altmeier <altmeier@atlsoft.de> hopf Elektronik serial line and PCI-bus devices 4. [4]Viraj Bais <vbais@mailman1.intel.com> and [5]Clayton Kirkwood <kirkwood@striderfm.intel.com> port to WindowsNT 3.5 5. [6]Michael Barone <michael,barone@lmco.com> GPSVME fixes 6. [7]Karl Berry <karl@owl.HQ.ileaf.com> syslog to file option 7. [8]Greg Brackley <greg.brackley@bigfoot.com> Major rework of WINNT port. Clean up recvbuf and iosignal code into separate modules. 8. [9]Marc Brett <Marc.Brett@westgeo.com> Magnavox GPS clock driver 9. [10]Piete Brooks <Piete.Brooks@cl.cam.ac.uk> MSF clock driver, Trimble PARSE support 10. [11]Nelson B Bolyard <nelson@bolyard.me> update and complete broadcast and crypto features in sntp 11. [12]Jean-Francois Boudreault <Jean-Francois.Boudreault@viagenie.qc.ca> IPv6 support 12. [13]Reg Clemens <reg@dwf.com> Oncore driver (Current maintainer) 13. [14]Steve Clift <clift@ml.csiro.au> OMEGA clock driver 14. [15]Casey Crellin <casey@csc.co.za> vxWorks (Tornado) port and help with target configuration 15. [16]Sven Dietrich <sven_dietrich@trimble.com> Palisade reference clock driver, NT adj. residuals, integrated Greg's Winnt port. 16. [17]John A. Dundas III <dundas@salt.jpl.nasa.gov> Apple A/UX port 17. [18]Torsten Duwe <duwe@immd4.informatik.uni-erlangen.de> Linux port 18. [19]Dennis Ferguson <dennis@mrbill.canet.ca> foundation code for NTP Version 2 as specified in RFC-1119 19. [20]John Hay <jhay@icomtek.csir.co.za> IPv6 support and testing 20. [21]Dave Hart <davehart@davehart.com> General maintenance, Windows port interpolation rewrite 21. [22]Claas Hilbrecht <neoclock4x@linum.com> NeoClock4X clock driver 22. [23]Glenn Hollinger <glenn@herald.usask.ca> GOES clock driver 23. [24]Mike Iglesias <iglesias@uci.edu> DEC Alpha port 24. [25]Jim Jagielski <jim@jagubox.gsfc.nasa.gov> A/UX port 25. [26]Jeff Johnson <jbj@chatham.usdesign.com> massive prototyping overhaul 26. [27]Hans Lambermont <Hans.Lambermont@nl.origin-it.com> or [28]<H.Lambermont@chello.nl> ntpsweep 27. [29]Poul-Henning Kamp <phk@FreeBSD.ORG> Oncore driver (Original author) 28. [30]Frank Kardel [31]<kardel (at) ntp (dot) org> PARSE <GENERIC> (driver 14 reference clocks), STREAMS modules for PARSE, support scripts, syslog cleanup, dynamic interface handling 29. [32]Johannes Maximilian Kuehn <kuehn@ntp.org> Rewrote sntp to comply with NTPv4 specification, ntpq saveconfig 30. [33]William L. Jones <jones@hermes.chpc.utexas.edu> RS/6000 AIX modifications, HPUX modifications 31. [34]Dave Katz <dkatz@cisco.com> RS/6000 AIX port 32. [35]Craig Leres <leres@ee.lbl.gov> 4.4BSD port, ppsclock, Magnavox GPS clock driver 33. [36]George Lindholm <lindholm@ucs.ubc.ca> SunOS 5.1 port 34. [37]Louis A. Mamakos <louie@ni.umd.edu> MD5-based authentication 35. [38]Lars H. Mathiesen <thorinn@diku.dk> adaptation of foundation code for Version 3 as specified in RFC-1305 36. [39]Danny Mayer <mayer@ntp.org>Network I/O, Windows Port, Code Maintenance 37. [40]David L. Mills <mills@udel.edu> Version 4 foundation, precision kernel; clock drivers: 1, 3, 4, 6, 7, 11, 13, 18, 19, 22, 36 38. [41]Wolfgang Moeller <moeller@gwdgv1.dnet.gwdg.de> VMS port 39. [42]Jeffrey Mogul <mogul@pa.dec.com> ntptrace utility 40. [43]Tom Moore <tmoore@fievel.daytonoh.ncr.com> i386 svr4 port 41. [44]Kamal A Mostafa <kamal@whence.com> SCO OpenServer port 42. [45]Derek Mulcahy <derek@toybox.demon.co.uk> and [46]Damon Hart-Davis <d@hd.org> ARCRON MSF clock driver 43. [47]Rob Neal <neal@ntp.org> Bancomm refclock and config/parse code maintenance 44. [48]Rainer Pruy <Rainer.Pruy@informatik.uni-erlangen.de> monitoring/trap scripts, statistics file handling 45. [49]Dirce Richards <dirce@zk3.dec.com> Digital UNIX V4.0 port 46. [50]Wilfredo Sánchez <wsanchez@apple.com> added support for NetInfo 47. [51]Nick Sayer <mrapple@quack.kfu.com> SunOS streams modules 48. [52]Jack Sasportas <jack@innovativeinternet.com> Saved a Lot of space on the stuff in the html/pic/ subdirectory 49. [53]Ray Schnitzler <schnitz@unipress.com> Unixware1 port 50. [54]Michael Shields <shields@tembel.org> USNO clock driver 51. [55]Jeff Steinman <jss@pebbles.jpl.nasa.gov> Datum PTS clock driver 52. [56]Harlan Stenn <harlan@pfcs.com> GNU automake/autoconfigure makeover, various other bits (see the ChangeLog) 53. [57]Kenneth Stone <ken@sdd.hp.com> HP-UX port 54. [58]Ajit Thyagarajan <ajit@ee.udel.edu>IP multicast/anycast support 55. [59]Tomoaki TSURUOKA <tsuruoka@nc.fukuoka-u.ac.jp>TRAK clock driver 56. [60]Brian Utterback <brian.utterback@oracle.com> General codebase, Solaris issues 57. [61]Loganaden Velvindron <loganaden@gmail.com> Sandboxing (libseccomp) support 58. [62]Paul A Vixie <vixie@vix.com> TrueTime GPS driver, generic TrueTime clock driver 59. [63]Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> corrected and validated HTML documents according to the HTML DTD
1. mailto:%20takao_abe@xurb.jp 2. mailto:%20mark_andrews@isc.org 3. mailto:%20altmeier@atlsoft.de 4. mailto:%20vbais@mailman1.intel.co 5. mailto:%20kirkwood@striderfm.intel.com 6. mailto:%20michael.barone@lmco.com 7. mailto:%20karl@owl.HQ.ileaf.com 8. mailto:%20greg.brackley@bigfoot.com 9. mailto:%20Marc.Brett@westgeo.com 10. mailto:%20Piete.Brooks@cl.cam.ac.uk 11. mailto:%20nelson@bolyard.me 12. mailto:%20Jean-Francois.Boudreault@viagenie.qc.ca 13. mailto:%20reg@dwf.com 14. mailto:%20clift@ml.csiro.au 15. mailto:%20casey@csc.co.za 16. mailto:%20Sven_Dietrich@trimble.COM 17. mailto:%20dundas@salt.jpl.nasa.gov 18. mailto:%20duwe@immd4.informatik.uni-erlangen.de 19. mailto:%20dennis@mrbill.canet.ca 20. mailto:%20jhay@icomtek.csir.co.za 21. mailto:%20davehart@davehart.com 22. mailto:%20neoclock4x@linum.com 23. mailto:%20glenn@herald.usask.ca 24. mailto:%20iglesias@uci.edu 25. mailto:%20jagubox.gsfc.nasa.gov 26. mailto:%20jbj@chatham.usdesign.com 27. mailto:%20Hans.Lambermont@nl.origin-it.com 28. mailto:H.Lambermont@chello.nl 29. mailto:%20phk@FreeBSD.ORG 30. http://www4.informatik.uni-erlangen.de/%7ekardel 31. mailto:%20kardel%20%28at%29%20ntp%20%28dot%29%20org 32. mailto:kuehn@ntp.org 33. mailto:%20jones@hermes.chpc.utexas.edu 34. mailto:%20dkatz@cisco.com 35. mailto:%20leres@ee.lbl.gov 36. mailto:%20lindholm@ucs.ubc.ca 37. mailto:%20louie@ni.umd.edu 38. mailto:%20thorinn@diku.dk 39. mailto:%20mayer@ntp.org 40. mailto:%20mills@udel.edu 41. mailto:%20moeller@gwdgv1.dnet.gwdg.de 42. mailto:%20mogul@pa.dec.com 43. mailto:%20tmoore@fievel.daytonoh.ncr.com 44. mailto:%20kamal@whence.com 45. mailto:%20derek@toybox.demon.co.uk 46. mailto:%20d@hd.org 47. mailto:%20neal@ntp.org 48. mailto:%20Rainer.Pruy@informatik.uni-erlangen.de 49. mailto:%20dirce@zk3.dec.com 50. mailto:%20wsanchez@apple.com 51. mailto:%20mrapple@quack.kfu.com 52. mailto:%20jack@innovativeinternet.com 53. mailto:%20schnitz@unipress.com 54. mailto:%20shields@tembel.org 55. mailto:%20pebbles.jpl.nasa.gov 56. mailto:%20harlan@pfcs.com 57. mailto:%20ken@sdd.hp.com 58. mailto:%20ajit@ee.udel.edu 59. mailto:%20tsuruoka@nc.fukuoka-u.ac.jp 60. mailto:%20brian.utterback@oracle.com 61. mailto:%20loganaden@gmail.com 62. mailto:%20vixie@vix.com 63. mailto:%20Ulrich.Windl@rz.uni-regensburg.de
Libevent is available for use under the following license, commonly known as the 3-clause (or "modified") BSD license:
Copyright (c) 2000-2007 Niels Provos provos@citi.umich.edu Copyright (c) 2007-2012 Niels Provos and Nick Mathewson
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions of Libevent are based on works by others, also made available by them under the three-clause BSD license above. The copyright notices are available in the corresponding source files; the license is as above. Here's a list:log.c: Copyright (c) 2000 Dug Song dugsong@monkey.org Copyright (c) 1993 The Regents of the University of California.
strlcpy.c: Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
win32select.c: Copyright (c) 2003 Michael A. Davis <mike@datanerds.net>
evport.c: Copyright (c) 2007 Sun Microsystems
ht-internal.h: Copyright (c) 2002 Christopher Clark
minheap-internal.h: Copyright (c) 2006 Maxim Yegorushkin maxim.yegorushkin@gmail.com
The arc4module is available under the following, sometimes called the "OpenBSD" license: Copyright (c) 1996, David Mazieres dm@uun.org Copyright (c) 2008, Damien Miller <djm@openbsd.org>
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The Windows timer code is based on code from libutp, which is distributed under this license, sometimes called the "MIT" license. Copyright (c) 2010 BitTorrent, Inc.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE
Copyright (c) 1998-2018 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in thedocumentation and/or other materials provided with the distribution.
All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com)
This file is part of the OpenSSH software.
The licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a BSD licence, or a licence more free than that.
OpenSSH contains no GPL code.
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland All rights reserved
As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
[Tatu continues] However, I am not implying to give any licenses to any patents or copyrights held by third parties, and the software includes parts that are not under my direct control. As far as I know, all included source code is used in accordance with the relevant license agreements and can be used freely for any purpose (the GNU license being the most restrictive); see below for details.
[However, none of that term is relevant at this point in time. All of these restrictively licenced software components which he talks about have been removed from OpenSSH, i.e.,
RSA is no longer included, found in the OpenSSL library
IDEA is no longer included, its use is deprecated
DES is now external, in the OpenSSL library
GMP is no longer used, and instead we call BN code from OpenSSL
Zlib is now external, in a library
The make-ssh-known-hosts script is no longer included
TSS has been removed
MD5 is now external, in the OpenSSL library
RC4 support has been replaced with ARC4 support from OpenSSL
Blowfish is now external, in the OpenSSL library
The licence continues]
Note that any information and cryptographic algorithms used in this software are publicly available on the Internet and at any major bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use only at your own responsibility. You will be responsible for any legal consequences yourself; I am not making any claims whether possessing or using this is legal or not in your country, and I am not taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
3. ssh-keyscan was contributed by David Mazieres under a BSD-style license.
Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
Modification and redistribution in source and binary forms is permitted provided that due credit is given to the author and the OpenBSD project by leaving this copyright notice intact.
4. The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the public domain and distributed with the following license:
@version 3.0 (December 2000)
Optimised ANSI C code for the Rijndael cipher (now AES)
@author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> @author Paulo Barreto <paulo.barreto@terra.com.br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5. One component of the ssh source code is under a 3-clause BSD license, held by the University of California, since we pulled these parts from original Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
6. Remaining components of the software are provided under a standard 2-term BSD licence with the following names as copyright holders:
Markus Friedl Theo de Raadt Niels Provos Dug Song Aaron Campbell Damien Miller Kevin Steves Daniel Kouril Wesley Griffin Per Allansson Nils Nordman Simon Wilkinson
Portable OpenSSH additionally includes code from the following copyright holders, also under the 2-term BSD license:
Ben Lindstrom Tim Rice Andre Lucas Chris Adams Corinna Vinschen Cray Inc. Denis Parker Gert Doering Jakob Schlyter Jason Downs Juha Yrjölä Michael Stone Networks Associates Technology, Inc. Solar Designer Todd C. Miller Wayne Schroeder William Jones Darren Tucker Sun Microsystems The SCO Group Daniel Walsh Red Hat, Inc Simon Vallet / Genoscope
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
8. Portable OpenSSH contains the following additional licenses:
md5crypt.c, md5crypt.h "THE BEER-WARE LICENSE" (Revision 42): <phk@login.dknet.dk> wrote this file. As long as you retain this notice you can do whatever you want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
snprintf replacement Copyright Patrick Powell 1995 This code is based on code written by Patrick Powell (papowell@astart.com) It may be used for any purpose as long as this notice remains intacts on all source code distributions
Compatibility code (openbsd-compat) Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/ subdirectory are licensed as follows: Some code is licensed under a 3-term BSD license, to the following copyright holders:
Todd C. Miller Theo de Raadt Damien Miller Eric P. Allman The Regents of the University of California Constantin S. Svintsoff
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Some code is licensed under an ISC-style license, to the following copyright holders: Internet Software Consortium. Todd C. Miller Reyk Floeter Chad Mynhier
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C. MILLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Some code is licensed under a MIT-style license to the following copyright holders: Free Software Foundation, Inc.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, distribute with modifications, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name(s) of the above copyright holders shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization.
$OpenBSD: LICENCE,v 1.20 2017/04/30 23:26:16 djm Exp $
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).
If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
ZLIB DATA COMPRESSION LIBRARYzlib 1.2.11 is a general purpose data compression library. All the code is thread safe. The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files http://tools.ietf.org/html/rfc1950 (zlib format), rfc1951 (deflate format) and rfc1952 (gzip format).
All functions of the compression library are documented in the file zlib.h (volunteer to write man pages welcome, contact zlib@gzip.org). A usage example of the library is given in the file test/example.c which also tests that the library is working correctly. Another example is given in the file test/minigzip.c. The compression library itself is composed of all source files in the root directory.
To compile all files and run the test program, follow the instructions given at the top of Makefile.in. In short "./configure; make test", and if that goes well, "make install" should work for most flavors of Unix. For Windows, use one of the special makefiles in win32/ or contrib/vstudio/ . ��For VMS, use make_vms.com.
Questions about zlib should be sent to <zlib@gzip.org>, or to Gilles Vollant <info@winimage.com> for the Windows DLL version. The zlib home page is http://zlib.net/ . Before reporting a problem, please check this site to verify that you have the latest version of zlib; otherwise get the latest version and check whether the problem still exists or not.
PLEASE read the zlib FAQ http://zlib.net/zlib_faq.html before asking for help.
Mark Nelson <markn@ieee.org> wrote an article about zlib for the Jan. 1997
issue of Dr. Dobb's Journal; a copy of the article is available at http://marknelson.us/1997/01/01/zlib-engine/ .
The changes made in version 1.2.11 are documented in the file ChangeLog.
Unsupported third party contributions are provided in directory contrib/ .
zlib is available in Java using the java.util.zip package, documented at http://java.sun.com/developer/technicalArticles/Programming/compression/ .
A Perl interface to zlib written by Paul Marquess <pmqs@cpan.org> is available at CPAN (Comprehensive Perl Archive Network) sites, including http://search.cpan.org/~pmqs/IO-Compress-Zlib/ .
A Python interface to zlib written by A.M. Kuchling <amk@amk.ca> is available in Python 1.5 and later versions, see http://docs.python.org/library/zlib.html .
zlib is built into tcl: http://wiki.tcl.tk/4610 .
An experimental package to read and write files in .zip format, written on top of zlib by Gilles Vollant <info@winimage.com>, is available in the contrib/minizip directory of zlib.
Notes for some targets: - For Windows DLL versions, please see win32/DLL_FAQ.txt - For 64-bit Irix, deflate.c must be compiled without any optimization. With -O, one libpng test fails. The test works in 32 bit mode (with the -n32 compiler flag). The compiler bug has been reported to SGI. - zlib doesn't work with gcc 2.6.3 on a DEC 3000/300LX under OSF/1 2.1 it works when compiled with cc. - On Digital Unix 4.0D (formely OSF/1) on AlphaServer, the cc option -std1 is necessary to get gzprintf working correctly. This is done by configure. - zlib doesn't work on HP-UX 9.05 with some versions of /bin/cc. It works with other compilers. Use "make test" to check your compiler. - gzdopen is not supported on RISCOS or BEOS. - For PalmOs, see http://palmzlib.sourceforge.net/
The deflate format used by zlib was defined by Phil Katz. The deflate and zlib specifications were written by L. Peter Deutsch. Thanks to all the people who reported problems and suggested various improvements in zlib; they are too numerous to cite here.
Copyright notice: (C) 1995-2017 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:
The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu
If you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents to sign. The sources are provided for free but without warranty of any kind. The library has been entirely written by Jean-loup Gailly and Mark Adler; it does not include third-party code.
If you redistribute modified sources, we would appreciate that you include in the file ChangeLog history information documenting your changes. Please read the FAQ for more information on the distribution of modified source versions.
Packages and the Open Source Software Licenses they use
busybox (v1.27.2) uses GPL-2.0 ccid (v1.4.27) uses LGPL-2.1+ libusb (v1.0.21) uses LGPL-2.1+ pcsc-lite (v1.8.22) uses BSD-3-Clause dhcpcd (v7.0.6) uses BSD-2-Clause eventlog (v0.2.12) uses BSD-3-Clause expat (v2.2.5) uses MIT gmp (v6.1.2) uses LGPL-3.0+ or GPL-2.0+ gtest (release-1.8.0) uses BSD-3-Clause libestr (v0.1.10) uses LGPL-2.1+ libevent (v2.1.8-stable) uses BSD-3-Clause, Open BSD libopenssl (v1.0.2r) uses OpenSSL or SSLeay libopenssl-fips (v2.0.12) uses OpenSSL or SSLeay libzlib (v1.2.11) uses Zlib libfastjson (v0.99.4) uses MIT) libffi (v3.2.1) uses MIT libglib2 (v2.54.2) uses LGPL-2.1+ pcre (v8.41) uses BSD-3-Clause util-linux (v2.31.1) uses GPL-2.0+, BSD-4-Clause, LGPL-2.1+ (libblkid, libfdisk, libmount), BSD-3-Clause (libuuid) ISC (rfkill) liblogging (v1.0.5) uses BSD-2-Clause libmnl (v1.0.4) uses LGPL-2.1+ libnftnl (v1.0.9) uses GPL-2.0+ logrotate (v3.13.0) uses GPL-2.0+ popt (v1.16) uses MIT mtd (v2.0.0) uses GPL-2.0 nftables (v0.8.3) uses GPL-2.0 ntp (v4.2.8p12) uses NTP openssh (v7.9p1) uses BSD-3-Clause, BSD-2-Clause, Public Domain poco (poco-1.8.1-release) uses BSL-1.0 pppd (v2.4.7) uses LGPL-2.0+, LGPL, BSD-4-Clause, BSD-3-Clause, GPL-2.0+ syslog-ng (v3.10.1) uses LGPL-2.1+ (syslog-ng core), GPL-2.0+ (modules)\
Frequently asked questions when troubleshooting about configuration
Why can’t I log into the SMB Installer Portal?
There are three main issues that will affect your ability to log into the Installer Portal: using the wrong URL, your organization isn’t set up or you as a technician aren’t set up.
Please ensure you are using the correct URL - SMB Installer Portal
If your organization has not been set up, please contact your Distributor (NZ & AUS) or your Gallagher Representative (USA).
If your organization has been set up, all technician management can be done by someone in your organization.
Installer Portal overview > Technician Tab
A user has a user code and privilege to disarm but the code won’t disarm the system.
Ensure the Area's Locally Disarm Area setting to Single factor.
Using Key Tags, Cards or User Codes to access an area.
How do I get the ASSIGN TAG option to show in the Credentials screen?
Trying to assign a tag to a user but there is no ASSIGN TAG in the Credentials screen.
For Tags to be used on a site –
Enable the "Site uses tags" option within the Site Details menu
Change the Area's Locally Disarm Area setting to Single factor.
Using Key Tags, Cards or User Codes to access an area.
The door state is not reflecting correctly – how do I fix is?
The current state of the door output is not reflecting correctly on the SMB app. The door is currently lock but on the application its state is open, when they open the door, the state remains lock. Readers are working.
Occasionally Door status can get out of sync in the Cloud.
This can appear in the Customer app as the Door showing the wrong status to what is shown in the Installer Portal Door Status page and selecting the Lock/Unlock option in the Customer app will have no effect on the status.
A workaround is to try a Restart override for the Controller from the Installer Portal - Controller properties.
If that doesn't fix the status, contact SMB with details of the Door that has the problem.
SMB are investigating this issue and will hopefully have a fix soon.
How do I connect two sites together?
To add an existing user to another site, the site manager for the other site needs to create the user with the same email and phone number used for their current SMB account.
The user will then be able to add the new site to their app by either:
· clicking ‘complete registration’ in the invite email without re-downloading the app,
· or when they login to the app the next time, a prompt will pop up asking them to accept the invitation to the new site.
Alarm Transmitter not connected events
If the Alarm Transmitter is enabled in configuration but it is not connected, events will be continuously raised. These may appear as 'Alarm Transmitter evDIALLER_WARNING_NO_MODEM'. To stop these events being raised, either connect the Alarm Transmitter device to the Controller or disable it in the site's configuration.
For feature releases visit the What's New SMB website.
Under construction
Frequently asked questions when troubleshooting about Gallagher Hardware
What do I do if the I/O Boards are going offline randomly?
Check the following that could cause HBUS devices that are going offline intermittently –
Wiring connections,
HBUS terminations are at the ends of the bus - nothing terminated in the middle of the bus,
Devices are wired in a daisy chain - no star wiring.
System’s power consumption – do they have sufficient battery power to support what is wired into the board.
HBUS Devices are not coming online but the Controller has detected the device and has events.
If a Controller is repeatedly generating a lot of these events: Controller 1 has detected a device. This indicates a probable issue with one or more of the connected HBUS devices.
Possible causes are:
Faulty wiring that is causing HBUS device(s) to reconnect constantly.
Not enough power to HBUS devices - if they are being powered from the Controller, the bus length may cause a significant voltage drop. A separate power supply may be needed.
Serial number entered for the wrong kind of device, e.g. using a T15 reader serial number for a T30 reader
Which SMB kit should I use? (New Zealand & Australia).
Frequently asked questions when troubleshooting the Gallagher SMB Controller.
What are the common statuses of the SMB Controller?
LED flash (Hz) | Meaning |
---|---|
What is the communication process of the SMB Controller?
When a SMB Controller starts up, it goes through this process to connect to the cloud:
1. Broadcasts a DHCP request to obtain an IPv4 address,
usually the response will be provided by the Cellular Router or the customer's ISP Router
2. Requests an NTP time sync to time.google.com - to port 123
3. Sends a DNS request to resolve the SMB cloud hostname
4. Authenticates with the SMB cloud - API call to port 443
5. Establishes a websocket connection with the SMB cloud - to port 443
The firmware upgrade won’t complete – how do I get the controller updated?
SMB Controller stuck on "Controller updating" for an extended period. The firmware upgrade failed to complete, and the controller is stuck in a loop of constantly downloading the new firmware.
Unplug all HBUS devices, let the controller complete the upgrade and plug the devices back in. When the controller comes online it communicates with the cloud to obtain the latest firmware available. Some combinations of controller and HBUS devices require the controller to be fully upgraded prior to it attempting to upgrade the attached HBUS devices.
The controller won’t register, it keeps asking the serial number, when it is entered it keeps going back to that message status of the controller is on 5 flash.
The Controller need to be assigned to the site. Enter the UUID of the Controller e.g. e72a4356-bab8-4341-bc3b-b719ff1f4f9d or scan the QR code on the Controller in the Installer Portal. The Controller's run LED will remain in 5 flashes until the technician correctly assigns the UUID of the Controller to a site. The serial number will not be accepted in the Controller ID field.
Assign a controller to a site.
Site configuration started, and controller powered on but not connected to the internet, likely because the internet cable may not have been plugged in. This can cause the controller to accumulate a large number of events internally, which resulted in delays as it took several days to upload those events once it reconnected to the cloud.
This will cause the solution to run very slowly. It will take time for the system to catch up.
To avoid this issue, we recommend powering off the controller if the site configuration won’t be completed within the next few days. Leaving it powered on without an internet connection will cause the events to build up again, leading to similar problems. The controller should not be left running unnecessarily when the wiring is in a partially complete state (inputs not correctly terminated), or the cabinet door left open thus causing system tamper alarms.
The Event tab of the controller dialog will indicate whether any of these conditions currently exist
How do I clear the SMB Controllers configuration needs to be cleared?
Each time changes are published from the Installer app; the SMB controller configuration is updated. In the unlikely event that the controller’s configuration needs to be completely reset, this can be done by:
1. Turn on dip switches 1, 2 and 3.
2. Power cycle the controller.
3. Wait for the Run LED to change to a steady state (could be 5, 3 or 2 flash).
At this point, the Controller's config has been removed and it has been assigned the default IPv4
address of 192.168.1.199
4. Turn off dip switches 1, 2 and 3.
5. Power cycle the controller.
The Controller will now go through the communication process to connect to the Cloud and
download the latest configuration.
How are the DIP switches used?
DIP switch 1 should only be used when access to the local diagnostic page is required.
DIP switch 2 is generally sufficient for resetting the configuration in most real-world scenarios.
DIP switch 3 can be useful for setting the controller to a static IP for easier IP identification, but it’s not always necessary and may prevent the controller from obtaining a DHCP configuration to get online.
How do I configure the controller with proxy server settings?
If a SMB Controller needs to be configured with proxy server settings to allow internet access, this can be done from the cloud web pages.
Bring Controller Online > Proxy Server
How do I obtain the Diagnostic Logs from the Gallagher SMB Controller?
Controller logs can be obtained from the Gallagher SMB Controller debug web pages.
To access the SMB Controller debug web pages requires Dip Switch 1 to be turned on and the controllers IPv4 address. Turning on Dip Switches 1, 2 and 3 will force the controller to use the IPv4 address of 192.168.1.199 (but will also clear the controller’s configuration).
The URL for the SMB Controller debug web page is: http://[IPv4 address]/debug. (note the dot at the end is needed)
The SMB Controller that does not have configuration will have a default diagnostic password. Please contact Gallagher Technical Support for the username and password.
The SMB Controller logs can be obtained from the Application Log link. When the controllers’ downloads configuration from the SMB cloud, the diagnostic password is changed to a unique password for each site.
Logs for configured SMB Controllers will need to be obtained via the SMB cloud - contact Gallagher Technical Support.
Can I restart the SMB controller when I’m not onsite?
A restart override for the SMB Controller can be triggered from the Installer Portal.
How do I get the SMB Controller to sync its time (NTP)?
If a Controller cannot sync its time (NTP), it will not be validated and fail to connect to the SMB cloud.
A Controller that has been powered off for several days will lose its time sync setting, and its time could drift by a significant amount - it will then fail to connect to the cloud.
Check the time on the Controller Config web page - refer below.
Check the site's network does not have a firewall rule that is blocking NTP (UDP Port 123) connections to time.google.com.
How do I manually change the SMB Controller’s time?
By default, the SMB Controller will attempt to sync time with the Google NTP time service - time.google.com using UDP port 123. The Controller's time can be manually changed from the Controller Cloud Config web page.
Find the Controller's local IP address and browse to http://[ip_address]/cloud
· Username: cloud
· Password: GGLcloud
(The Controller's current time (and time zone offset) is shown at the bottom of the web page)
Click on the Set Time and Date link and enter the correct date and time (depending on the time zone offset) in the fields and Save.
Are there Command Line tools to help installers check cloud connections from a site?
DHCP (UDP port 67) - this just checks if there is a DHCP server on the network
Linux: sudo nmap --script broadcast-dhcp-discover -e eth0
Windows: ipconfig /all | find /i "DHCP Server"
DNS resolution (UDP port 53)
Linux + Windows: nslookup app-api.halo.gallagher.com
NTP time.google.com (UDP port 123)
Linux: nc -v4z --wait 5 --udp time.google.com 123
Windows: w32tm /monitor /computers:time.google.com
HTTPS app-api.halo.gallgher.com (TCP port 443)
Linux: nc -v4z --wait 5 app-api.halo.gallagher.com 443
Windows: telnet app-api.halo.gallagher.com 443
(blank screen indicates a successful connection - ^] to exit)
Another Windows option using the Powershell Test-NetConnection command (tnc)
tnc -ComputerName app-api.halo.gallagher.com -Port 443 -InformationLevel "Detailed"
Connectivity
SMB Kit
Usable Inputs
Outputs
Note
SMB BASE KIT - T11 or T15 or T30
14
4
2 Inputs used for Mains & Battery Status
SMB BASE KIT - T11 or T15 or T30 x2
14
4
2 Inputs used for Mains & Battery Status
SMB BASE KIT - T15 BLACK + T30 BLACK
14
4
2 Inputs used for Mains & Battery Status
SMB 4 Door Kit *4 T15 Black
14
16
2 Inputs used for Mains & Battery Status
Provision to add an extra 8In Board
SMB 6 Door Kit *6 T15 Black
14
16
2 Inputs used for Mains & Battery Status
Provision to add an extra 8In Board
SMB 8 Door Kit *8 T15 Black
22
16
2 Inputs used for Mains & Battery Status
SMB 10 Door Kit *10 T15 Black
22
16
2 Inputs used for Mains & Battery Status
5
Invalid date/time - <ADD LINK>
5
Communication failure to Cloud - could be something blocking the TCP connection between the Controller and the cloud or an Authentication failure
4
Corrupt or missing key or certificate - return controller for servicing
3
Attempting connection/authentication with Cloud
2
Authenticated - waiting for configuration
1
Obtained configuration - normal operation
Thank you for choosing Gallagher SMB.
Gallagher SMB is an easy-to-use security system controlled via a mobile app that connects with alarm systems using remote cloud servers. Users can carry out straightforward alarm management tasks from anywhere.
Follow the steps in this Help Guide to install and configure Gallagher SMB, and train the customer. If you need additional help or have any queries, contact the Gallagher SMB Support Team.