Aperio Online System Description
|
|
|
- Brenda Griffin
- 9 years ago
- Views:
Transcription
1 Aperio Online Aperio Online System Description Document No: ST B, Issue date: 4 August The global leader in Aperio Online Mechanical Installation Guide, Document No: ST PB, Date: Online System door Description opening solutions
2 2 Aperio Online System Description, Document No: ST PD Date: 4 August 2015
3 Table of Contents 1 Introduction...4 Purpose...4 Scope...4 Applicable products...4 Product availability...4 Aperio support in the EAC system...4 References System Overview...5 The Aperio Online System...5 The Aperio Online concept...5 Installation and Configuration Tool Aperio Online Functional Support...6 System components...6 Main system features...6 Remote unlock...6 Communication hub functions...6 Lock functions...6 AS100 Door Sensor functions...6 Alarm/event handling to EAC...6 Audit trail...6 Override credentials...7 Maintenance functions...7 Security...7 Communication protocols towards EAC...7 Software tool - Programming Application Detailed feature descriptions...8 Credential technologies...8 Locks...8 Unlock times...8 Keypad support...8 Battery supervision...8 Battery replacement...8 RTC time drift...8 Status report interval...8 Communication hubs...9 EAC addressing features (RS-485)...9 Addressing alternatives...9 Different EAC addressing modes...9 Remote Unlock use cases...10 Office Mode/First Man In...10 Scheduled relock...10 Remote unlock...10 Remote unlock configuration...10 Audit trails...10 Aperio Online System Description, Document No: ST B Date: 4 August
4 1 Introduction Purpose The main purpose of this manual is to provide necessary information to plan and perform the mechanical installation of Aperio communication hubs. Intended reader is installation personnel, project managers and people with similar responsibilities. Scope This manual includes a complete description of an Aperio Online system and its integration to surrounding systems. For a description of Aperio Online system components refer to ref [1], Aperio Online Mechanical Installation Manual and ref [2], Aperio Programming Application Manual. Applicable products This manual can be used for all versions of communication hubs Product availability The products included in this manual may not be available on all markets. Please check your local ASSA ABLOY company for details. Aperio support in the EAC system Note that the Aperio support may vary depending on the Aperio communication hub used and the level of integration. Please contact your OEM for details. Abbreviations and definitions Abbreviation Definition EAC DIP RFID TLS OEM Electronic Access Control. The system controlling access decisions. Dual in-line Package. A manual electric switch used for settings on the communication hub. Radio Frequency Identification. The credential technology used. Transport Layer Security. Cryptographic protocol that provides secure communication over TCP/IP connections. Original Equipment Manufacturer, the company that integrates the Aperio support in their EAC system. References [1] ST Aperio Online Mechanical Installation Manual [3] ST Aperio Online Programming Application Manual [2] ST Aperio Online Quick Installation Guide [2] 4 Aperio Online System Description, Document No: ST PD Date: 4 August 2015
5 2 System Overview Figure 1. Aperio technology overview Programming Application Offline updater IEEE (2.4GHz) Communication Hub RS-485, Wiegand or Ethernet USB RFID card RFID card EAC system (Electronic Access Control) Aperio OFFLINE Aperio ONLINE The Aperio Online System Aperio Online is a technology that enables mechanical locks to be connected wirelessly to an existing access control system in a convenient and cost effective manner. The main feature is the use of a wireless short distance communication protocol for communication with locks and a wired connection to an online access control system. Aperio is easy to integrate with most devices and systems, regardless of manufacturer, as it has a large integrated base. Different mechanical standards and RFID technologies are supported to provide a solution for most markets. The Aperio Online concept The Aperio system is used in the following way: The user holds an RFID card in front of an online lock and/or enters a PIN. The lock sends credentials or PIN wirelessly to the communication hub which in turn communicates with an EAC (Electronic Access Control) system (wired through RS-485, Wiegand or TCP/IP). The EAC system makes the access decision. The decision is sent via the communication hub to the lock and access is granted or denied. Installation and Configuration Tool A software tool, the Aperio Programming Application is used for installation and configuration, which connects to the communication hub wirelessly with a USB radio dongle. The software can also connect directly to locks using a standard USB cable. Aperio Online System Description, Document No: ST B Date: 4 August
6 3 Aperio Online Functional Support System components Communication hub: Wireless connection point (IEEE ) connected to overlaying EAC (RS-485, Wiegand or TCP/IP). It communicates with Aperio online locks with a range of typically 25 m/80 ft. Lock Unit/Door Sensor: Supports all Aperio Online variants. Equipped with an RFID card reader/writer or keypad and a UHF transceiver. Door sensor AS100 also supported. Card formats for different RFID technologies: Aperio Online supports MIFARE Classic/Plus/ DESFire EV1, Legic, iclass, Low Frequency (EM/HID Prox), Seos and HID SE credentials, depending on lock unit used. Programming Application: Installation and maintenance tool that connects wirelessly to the communication hubs (and further on to locks) via a USB radio dongle. Main system features Remote unlock Several options to keep the door unlocked for a longer period of time, either user activated or remotely from the EAC system. Available for RS-485, Wiegand and TCP/IP. Communication hub functions Supports RS-485, Wiegand and TCP/IP. Connect up to 8 locks per communication hub (AH30/40). Different modes of device addressing (RS-485) towards the EAC. Digital/manual setting of EAC address. Automatic/manual pairing with locks/senors. Lock functions Configurable LED & buzzer handling for card read indication. Configurable lock open/close handling and timeouts. Emergency opening (product specific). Escape and return, configurable (product specific). Battery supervision. Configurable RFID search priority (V2 SE locks only). Keypad support, configurable. The lock can indicate lock status, access decisions, alarms and EAC and communication hub status with a LED supporting three colors. Battery life up to openings depending on product, use and configuration. Lock sensor support such has door position, handle, bolt etc (Product specific) AS100 Door Sensor functions Magnetic/mechanical circuit breaker for applications such as door position sensor or glass break sensor. Alarm/event handling to EAC Communication hub and/or lock offline Hub and lock tamper (product specific) Lock battery low, battery flat Lock jammed Device reset Door sensor events Audit trail Audit trail with 200 entries stored in case of lost contact to EAC system. 6 Aperio Online System Description, Document No: ST PD Date: 4 August 2015
7 Audit trails can be extracted with the software tool, Aperio Programming Application. Override credentials 10 positions for override/emergency cards or PIN when the lock/hub is offline from the EAC. Maintenance functions Up to 200 entries in event log. Firmware upgrade. Use of 3 radio channels that can be configurable. Security Encryption key During installation an encryption key customer key) should be used to apply secure communication between lock and communication hubs and also between communication hub and the software tool, making the Aperio hardware configurable only for the customer key owner. The key uses 128 bit AES encryption. Communication protocols towards EAC Wiegand Security as per the Wiegand standard. RS-485 No encryption on the interface. ASSA ABLOY AADP with is proprietary and open under NDA. OEM protocols HID VertX and Mercury are proprietary and closed. AADP IP Security over the TCP/IP interface is implemented using TLS. Software tool - Programming Application Installation and configuration of Aperio hardware are done with an Windows installation tool (Aperio Programming Application). USB radio dongle: UHF transceiver used by the programming application to communicate with communication hubs. Installation data is entered manually in the tool, and can be saved for reuse purposes, also exported/imported. Aperio Online System Description, Document No: ST B Date: 4 August
8 4 Detailed feature descriptions Credential technologies The following credential types are supported by Aperio Online: Credential MIFARE Classic MIFARE Classic UID MIFARE Classic Sector MIFARE Plus UID MIFARE Plus Sector MIFARE DESFire UID MIFARE DESFire Application Low Frequency: HID Prox Low Frequency: EM PROX iclass Legic UID Legic UID with data Seos HID SE credentials PIN (via Keypad) Note: All credentials are not supported by all products. All card credential can be combined with a pin code. Locks Unlock times The unlock time for an Aperio lock can be controlled in several ways. There is a configurable default time in the lock. The unlock time can be controlled from the EAC per access decision and through the different "Remote Unlock" type of use cases. In addition a normal unlock time can be extended by double-badging the lock thus extending the open time by the same time used for the particular operation Keypad support This keypad function is product specific and supports two reading modes, PIN with configurable length or use of end character that also can be set. The Aperio keypad function does not send character per character, but a whole PIN to EAC, in order to save battery life. Battery supervision This function is product specific and is performed in the following two ways: Energy counter: Typically used on products that use lithium batteries of type CR123 and CR2. Battery life is calculated from measured energy consumption for each lock operation such as lock, unlock etc. It is therefore important to always use fully charged batteries during battery replacement to guarantee correct battery life measurement. At battery low, this type of product performs a minimum of 1000 lock operations before reaching battery flat. Battery measurement: Used on other products. Battery measurement is normally made at every lock operation and every time a status report is sent to the EAC (default every 60 minutes). Battery life is product and battery specific. The battery check interval can be set using the Aperio Programming Application. Battery replacement In Aperio readers there is a RTC maintaining the date and time. The time is typically set via the PAP tool or from the EAC if that system has the SetTime functionality implemented. When replacing the battery in an Aperio V2 device the RTC may lose the time and date and the time for how long the RTC can keep time when the batteries are out varies between the Aperio products. Therefore it is recommended to use the PAP tool to set time and after battery change. When replacing battery in an Aperio V3 device the RTC time is frozen and there will therefore be a time skew for the time it takes to replace the batteries. For Aperio Online the time and date is used for time stamp in audit trail and event logs. RTC time drift In Aperio V2 devices the RTC time drift is +/- 16 minutes/year on average and in in Aperio V3 devices the RTC time drift is +/- 13 minutes/ year on average. This should be considered in regards to battery replacement schemes and the requirement for accuracy in the audit trail time stamps. Status report interval This function enables configuration of how often the lock sends status report to the communication hub and EAC. At the time of a status report, updates from the EAC are also downloaded to the lock. This setting is default set to 60 minutes. Short time intervals will have a negative effect on battery life. However, when using remote unlock, this value is normally set to 5-15 minutes. 8 Aperio Online System Description, Document No: ST PD Date: 4 August 2015
9 Communication hubs There are four communication hub types according to the table below: Functional support Wireless technology EAC Interface Communication hub version AH15 AH20 AH30 AH40 Wiegand/RS-485* (AADP protocol Mercury) Advanced Wiegand RS-485 (AADP protocol HID VertX Mercury) IP (Ethernet) Maximum number of locks/ sensors lock to hub Encryption key (Customer key) 128 bit AES encryption Encryption: hub to EAC None None None TLS EAC address limit (DIP/w PAP tool) 31/63-15 (one-to-several) 16-31/63 (single device mode) Typical range 5 m 25 m 25 m 25 m External antenna (option for alternate coverage pattern) No Yes Yes Yes Lock Keypad support Yes (RS-485) No Yes Yes Wiegand support Byte order Addition of parity bit - - Red LED signal * The firmware type loaded into the communication hub controls what interface is enabled. EAC addressing features (RS-485) This applies for AH15 and AH30 communication hubs. Addressing alternatives The communication hubs can use up to 63 addresses depending on usage: Address 1-15: Applicable for all types of installations where one or several locks are paired to the communication hub. (one-toseveral installation). Addresses is selected by the DIP-switch or the Aperio Programming Application. Address 16-31: For communication hubs with only one lock paired. Address is selected by DIP-switch or the Programming Application. Address 32-63: For communication hubs with only one lock paired (single device mode). Address can only be selected using the Programming Application. For details, refer to the Aperio Programming application Manual, ref [2]. Different EAC addressing modes Communication hubs can be set to address the locks in two different ways, normal and legacy mode. Legacy address offset is used when the EAC has a low limit for handling addresses. Normal address offset mode is used when the EAC can handle addresses without limit. Aperio Online System Description, Document No: ST B Date: 4 August
10 Remote Unlock use cases Aperio support three options for setting a door unlocked. Office Mode/First Man In Scheduled relock Remote unlock The time the unlock command is valid can furthermore be configured in the communication hub through the Time to livesetting when using the Remote Unlock function. During these use cases there is a possibility to disable sensor events from the lock. This will conserve battery life and also keep the traffic down when used in high traffic doors. Office Mode/First Man In The EAC manages which users have right to set a door unlocked. Example: The lock is set unlocked by the first card holder that enters the office in the morning. Scheduled relock This mode is suitable when longer unlock periods are used and ensures that the lock is locked at a certain time. The unlock command from the EAC is sent to the communication hub. First when the Aperio lock performs a status update or a user presents a credential at the lock the unlock command is sent to the lock. The waiting time in the communication hub is deducted from the total remote unlock time to ensure that the relock occurs at the correct time. Example: The EAC sends an unlock command of to a communication hub to unlock a certain lock for 3 hours (between 5 pm and 8 pm). The command waits in the communication hub for 30 minutes until the lock connects. The waiting time is in this case deducted and the lock will be relocked after 2.5 hours (8 pm). Example: The EAC sends an unlock command of 10 minutes to a communication hub valid for a certain lock. The waiting time in the communication hub is 5 minutes until lock connects and gets the unlock command. The total unlock time will in this case still be 10 minutes. Remote unlock configuration The time period the unlock command stays active in the communication hub can be set. This is the Time to live-setting. It is important to synchronize this setting with the Status report interval setting in the lock. The Time to live-setting must be shorter than the status report interval time to ensure that EAC commands are sent to the lock. Audit trails The audit trail log in the lock units keeps track of the access attempts made on each particular door when the lock is offline from the communication hub and/or EAC. There are 200 entries in the log which means that it will be full after 200 access attempts. When a card is presented and the log is full, the oldest entry will be replaced with the result from the new access attempt. Each entry consists: Time stamp Credential UID/Data/PIN Access decision, granted/denied. The audit trail log can be read out with the Aperio Programming Application. Remote unlock This function is similar to the Schedule relock function with the difference that the unlock time period is left unchanged. This mode is suitable for shorter unlock periods of for example a few minutes. 10 Aperio Online System Description, Document No: ST PD Date: 4 August 2015
11
12 ASSA Aperio ABLOY Online is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience Contact 12 Wireless lock technology
Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013
Aperio TM Online Programming Application Manual Document No: ST-001321-A, Issue date: 8 July 2013 1 Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013 Table of Contents
R&D Access Touch 3.1 User Manual Version 1.00 Public 1 (13) User Manual. Access Touch 3.1
Public 1 (13) User Manual Access Touch 3.1 Version Date Author Description 1.00 30.09.2011 Pah First version Public 2 (13) 1. Purpose of this user manual... 3 2. Description of Access Touch 3.1... 3 3.
Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.
+3 # Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.2011 Jpo Reset button added 1. Purpose of this user manual...
Access Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
Allegion AD-300 Installation Application Note. 1.0 Hardware Requirements. 2.0 Software/Licensing Requirements
Allegion Schlage AD-300 networked, hardwired locks can be integrated seamlessly with the Doors.NET software when used with the NXT-MSC (Mercury-Powered controllers). You can connect and communicate with
CKM-EP2500, CKM-EP1501, and CKM-EP1502 Mercury Network Controllers
Johnson Controls, Inc. now offers Mercury Security Corporation s high-quality access control hardware products, which can be integrated with the Johnson Controls P2000 Security Management System (SMS)
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
EMBEDDED ACCESS CONTROL Hardware Installation Guide
EMBEDDED ACCESS CONTROL Hardware Installation Guide Lenel goentry Hardware Installation Guide, product version 1.00. This guide is item number DOC- ENHW-ENU, revision 1.003, April 2009 Copyright 2009 Lenel
IP Card Reader Interface User Manual
IP Card Reader Interface User Manual SB Research 2009-2011 The IP Reader Interface family: Concept: The IP Card Reader Interface allows access control card readers to be connected to a network device,
How To Power A Power Control On An Ip40 (Ipl) With A Power Supply (Iplug) With An Ip20 Controller (Iphones) With Power Control (Power Control) With No Antenna) With The Ip20 (Power)
MODEL NUMBER: ISC910-1-0-GB-XX ISC911-5-0-GB-XX IXP20 CONTROLLER SPECIFICATIONS Working Environment Plastic Housing... Power ImproX IXP20 Controller INSTALLATION MANUAL Designed to work in an indoor (dry)
Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:
//DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,
ZME_WALLC-S Z-Wave Secure Wall Controller
ZME_WALLC-S Z-Wave Secure Wall Controller Firmware Version : 1.0 Quick Start S This device operates as Z-Wave sensor in two modes: the normal control mode (daily use) or in management mode for setup. Pushing
Allegion PIM-400/485 and AD-400 Installation Application Note. 1.0 Hardware Requirements. 2.0 Software/Licensing Requirements
This document explains how to setup and use the Allegion AD-400 wireless locks with the NXT Mercury Powered controllers and the Doors.NET software. These locks have extensive functionality and operating
Electronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12
Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering
BigPond Wi-Fi 4G Advanced II AirCard 790S User Manual
AirCard 790S User Manual October 2014 202-11471-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Contact your Internet service provider for technical support. Compliance For regulatory compliance
ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4
ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4 1 PURPOSE:... 1 2 CPM-4/CPM-2 COMPATIBILITY... 2 2.1 NETWORK CABLES... 2 2.2 FACTORY DEFAULT SETTINGS... 2 2.3 CHANGING THE RS-232 SERIAL PORT BAUD
BT LE RFID Reader v1.0
BT LE RFID Reader v1.0 The board The BT LE RFID Reader board v1.0 is shown below. On the board there are the following components: Power connector J7 with positive voltage going to pin 1 (red wire) and
MANUAL Remote Programmer XM3
MANUAL Remote Programmer XM3 Conditions Transactions, deliveries et cetera will be according to the general terms of delivery as deposited at the Chamber of Commerce at Meppel, The Netherlands. Registration
The Access Engine. Building Integration System - The Access Engine. Security Systems
The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware
Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in
Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers
Knowledge Base Article Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Copyright 2009-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...
Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers
Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...
INTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc.
SA-2000-II HARDWARE MANUAL Access Technologies International, Inc. 1 Table of Contents 1. Introduction 3 2. Features 3 3. Specification 4 4. Identifying Supplied Parts 4 5. Panel Description 5 6. Connection
Time Attendance V1.4
Time Attendance V1.4 Installation Manual May 11, 2011 Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE SYSTEM...7 3.1 Set Password...7 3.2
Digitus Biometrics. 2015 Product Catalogue. Request a quote or design assistance by emailing [email protected] or calling 912.231.8175.
Digitus Biometrics 2015 Product Catalogue Request a quote or design assistance by emailing [email protected] or calling 912.231.8175. Table of Contents Access Control Solutions db ServerRack
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:
Edge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
USB Card Reader Interface User Manual
USB Card Reader Interface User Manual SB Research 2009-2012 The USB Reader Interface family: Concept: The USB Card Reader Interface allows access control card readers to be connected to a PC, in order
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
Access Control Unit User s Guide
NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,
Installer and Admin App Guide
CONTENTS EC ))) KEY ))) CONVENIENT SECURITY. YOUR PHONE IS YOUR KEY. 1. Prerequisites... 1 2. Basics of the ECKey Installer and Admin App. 1 3. Connecting to an ECKey Reader.. 2 4. Configuring the ECKey
[FAQ] Troubleshooting Access Control Issues
[FAQ] Troubleshooting Access Control Issues Article ID: GV4-14-06-16-t Release Date: 06/16/2014 Applied to GV-ASManager GV-AS Controller GV-Reader Summary When you encounter problems with GV-ASManager,
Rev 06 1211. GSM base station. Installation instructions
Rev 06 1211 GSM base station Installation instructions Output string format Baud rate 115200 bps Parity none Data bits 8 Stop bits 1 Flow control none The output string is a modified version of the Sureguard
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
ACCESS CONTROL SYSTEM
ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator
AC-115 Compact Networked Single Door Controller. Installation and User Manual
AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.
Schlage Utility Software. For Pidion BM-150 / BM-170 Devices User s Guide
Schlage Utility Software For Pidion BM-150 / BM-170 Devices User s Guide Important Information Customer Service U.S.A.: 877-671-7011 www.schlage.com/support Copyright 2015 Allegion Revision This document
A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper
Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control
To perform Ethernet setup and communication verification, first perform RS232 setup and communication verification:
PURPOSE Verify that communication is established for the following products programming option (488.2 compliant, SCPI only): DCS - M9C & DCS M130, DLM M9E & DLM-M9G & DLM M130, DHP - M9D, P series, SG,
Telstra Wi-Fi 4GX Advanced III AirCard 810S User Manual
AirCard 810S User Manual July 2015 202-11529-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Contact Telstra at livechat.telstra.com for technical support. Compliance For regulatory compliance
RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 1.4 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. COMMUNICATION
Time Attendance V1.0
Time Attendance V1.0 User Manual Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE System...7 3.1 Set Password...7 3.2 Login...8 3.3 Setup -
INSTALLATION MANUAL XM3 Reader
INSTALLATION MANUAL XM3 Reader Conditions Transactions, deliveries et cetera will be according to the general terms of delivery as deposited at the Chamber of Commerce at Meppel, The Netherlands. Registration
Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS
SYMMETRY PRODUCT OVERVIEW
ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations
Telstra Pre-Paid 4G My Pocket Wi-Fi Ultimate User Manual
Telstra Pre-Paid 4G My Pocket Wi-Fi Ultimate User Manual April 2014 202-11387-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Contact your Internet service provider for technical support. Compliance
TT-RFID platform - Introduction
TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION
User Manual. BARKODES BİLGİSAYAR SİSTEMLERİ ARF Panel
1 User Manual Barkodes Bilgisayar Sistemleri Bilgi İletişim ve Yazılım Tic. Ltd. Şti. Adres: Altay Çeşme Mahallesi Sanayi Sokak No:8 Demirli Sitesi B Blok Maltepe-İstanbul/Turkey Tel: + 90 (216) 442 20
SYMMETRY. DATASHEET ACCESS CONTROL Product Overview
DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated
Keep it Simple Timing
Keep it Simple Timing Support... 1 Introduction... 2 Turn On and Go... 3 Start Clock for Orienteering... 3 Pre Start Clock for Orienteering... 3 Real Time / Finish Clock... 3 Timer Clock... 4 Configuring
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
PCS0100en 02.2008. Persy Control Services B.V. Netherlands
P-Bus Gateway PBGW2.128 Universal gateway between the P-bus protocol and open standard protocols. The variety of available electrical interfaces on the gateway offers a wide range of possibilities for
Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever.
Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever. Expandability is the most important feature of any access
AD-Series. Selection Guide
AD-Series Selection Guide The first step in our design process: Listening. We wanted to know exactly what you needed in a security solution. So we asked. We asked hundreds of questions and received thousands
UPS PIco. to be used with. Raspberry Pi B+, A+, B, and A. HAT Compliant. Raspberry Pi is a trademark of the Raspberry Pi Foundation
UPS PIco Uninterruptible Power Supply with Peripherals and I 2 C control Interface to be used with Raspberry Pi B+, A+, B, and A HAT Compliant Raspberry Pi is a trademark of the Raspberry Pi Foundation
ACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
PRT3 Printer Module: ASCII Protocol Programming Instructions
PRT3 Printer Module: ASCII Protocol Programming Instructions We hope this product performs to your complete satisfaction. Should you have any questions or comments, please visit www.paradox.com and send
PRT-CTRL-SE. Protege System Controller Reference Manual
PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology
BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL
TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL w w w. c d v g r o u p. c o m CA-ETHR-A: TCP/IP Module Installation Manual Page Table of Contents Introduction...5 Hardware Components... 6 Technical Specifications...
CipherLab 5100 Time Attendance Utility Manual
CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
What is our purpose?
Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D
WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
Vroom Hardware manual ver. 1.00 Code 114VROOHWE00. Vroom CANBUS USER INTERFACE WITH LCD GRAPHIC DISPLAY AND WITH TEMPERATURE AND HUMIDITY SENSOR
Vroom CANBUS USER INTERFACE WITH LCD GRAPHIC DISPLAY AND WITH TEMPERATURE AND HUMIDITY SENSOR ENGLISH HARDWARE MANUAL ver. 1.00 CODE 114VROOHWE00 page 1 of 22 Important Important Read these instructions
AirCard 785S Mobile Hotspot User Manual
User Manual July 2015 202-11399-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Contact your mobile service provider for technical support. Compliance For regulatory compliance information, visit
Ensto Chago Master EVM300 and EVM500 Operational description
Pages: 1 (8) Ensto Chago Master EVM300 and EVM500 Operational Pages: 2 (8) Contents 1 What is Ensto EVM... 3 2 EVM versions... 3 2.1 EVM300... 4 2.2 EVM500... 5 3 Technical information... 7 Pages: 3 (8)
Surveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA [email protected] [email protected] Abstract The
Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions
Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto
WUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
User s Manual for Fingerprint Door Control Software
User s Manual for Fingerprint Door Control Software Foreword The naissance of F7 indicated that fingerprint reader enters into professional door control domain. That s why we developed this software to
Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data.
LIFT DATA MENU How to access the Lift Data menu: Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data. 1. The display will show: Program Door Data Enter Door No. (17-64):?
Modbus and ION Technology
70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible
Water Metering System SmartMeter Prepayment. SmartMeter Prepayment. Water Metering System
Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System A dynamic approach to Prepayment
BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter
BIT COMMANDER Serial RS232 / RS485 to Ethernet Converter (Part US2000A) Copyrights U.S. Converters 1 Contents Overview and Features... 3 Functions..5 TCP Server Mode... 5 Httpd Client Mode.5 TCP Auto mode....6
Property Description Allowable values (Bold indicates default value) automaticaly relock after an unlock operation. English, Spanish, French 1, 2, 3
V.1 Yale Real Living Door Lock This driver allows the control of a Yale Real Living ZigBee enabled door lock. Lock Functional Overview The Yale Real Living family of locks are full featured electronic
Home Monitoring and Control service provided by Verizon Online LLC
Home Monitoring and Control service provided by Verizon Online LLC A separate subscription to Verizon FiOS TV is required for use with FiOS TV service. About This Manual This manual is designed for online
USB Card Reader Configuration Utility. User Manual. Draft!
USB Card Reader Configuration Utility User Manual Draft! SB Research 2009 The Configuration Utility for USB card reader family: Concept: To allow for field programming of the USB card readers a configuration
Remote Serial over IP Introduction on serial connections via IP/Ethernet
Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and
ELM Security System Electronic Locking & Monitoring
Whitepaper ELM Security System Electronic Locking & Monitoring Issue: September 2006 EMKA Beschlagteile GmbH & Co.KG Release: 1.0 Langenberger Str. 32 42551 Velbert Germany Tel.: 0049 (0) 20 51 / 2 73-0
Technical Support Information
F1P000GNukSK Skype Phone 1: What is the F1P000GNukSK? The F1P000GNukSK is a Wi-Fi phone (IEEE 802.11b/g) designed to allow users to make Skype calls without having to use a computer anywhere that a wireless
F11 User Manual. Version:1.0 Date:Jul. 2010
F11 User Manual Version:1.0 Date:Jul. 2010 Introduction: This document mainly introduces the user s operation of F11. About the device installation please refer to F11 Installation Guide. F11 User Manual
Doc 10. UTM Standards: Card Access Security System
Doc 10 UTM Standards: Card Access Security System 1. GENERAL... 2 1.1. GENERAL REQUIREMENTS.... 2 1.2. SUMMARY OF WORK INCLUDED... 2 1.3. OVERVIEW... 2 1.4. MANDATORY REQUIREMENTS... 3 1.5. ACCESS CONTROL
Configuring Settings on the Cisco Unified Wireless IP Phone 7925G
CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone 7925G This chapter describes the available configuration settings on the Cisco Unified Wireless IP Phone 7925G. It contains the following
USER MANUAL. VS-81H 8x1 HDMI Switcher MODEL: P/N: 2900-000670 Rev 4
KRAMER ELECTRONICS LTD. USER MANUAL MODEL: VS-81H 8x1 HDMI Switcher P/N: 2900-000670 Rev 4 Contents 1 Introduction 1 2 Getting Started 2 2.1 Achieving the Best Performance 2 2.2 Safety Instructions 3
Cisco Unified Wireless IP Phone. Michael Gillespie. Release 1.4(1) IP Communications 7926G, 7925G-EX, 7925G, 7921G
Cisco Unified Wireless IP Phone 7926G, 7925G-EX, 7925G, 7921G Release 1.4(1) Michael Gillespie IP Communications 1 Cisco Unified Wireless IP Phones 7926G, 7925G-EX, 7925G, 7921G 2 1.4(1) Overview Java
ASSA ARX Security system. The complete access control and alarm system. ASSA ABLOY, the global leader in door opening solutions
ASSA ARX Security system The complete access control and alarm system ASSA ABLOY, the global leader in door opening solutions 1 ASSA ARX a security system with access control and alarm When you choose
Bidirectional wireless communication using EmbedRF
Bidirectional wireless communication using EmbedRF 1. Tools you will need for this application note... 2 2. Introduction... 3 3. Connect EmbedRF Board to USB Interface Board... 3 4. Install and Run EmbedRF
Using IDENT M System T with Modbus/TCP
Using IDENT M System T with Modbus/TCP Introduction The Pepperl+Fuchs IDENT M System T consists of two models MTT3000-F180-B12- V45-MON, which is a read only unit and the MTT6000-F120-B12-V45 which is
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics
WPR400 Wireless Portable Reader
P516-098 WPR400 Wireless Portable Reader User guide Para el idioma español, navegue hacia www.schlage.com/support. Pour la portion française, veuillez consulter le site www.schlage.com/support. Contents
