owl lock user manual

Upload: imran-noor-ahmad-javed

Post on 16-Oct-2015

69 views

Category:

Documents


2 download

TRANSCRIPT

  • Onity Wireless Lock Users Manual

  • Contact Information

    North America

    Europe, Middle East, and Africa

    The information contained within this manual is subject to change. In no way does Onity, Inc. warrant that the operation of this system will be entirely error free or perform precisely as described within this documentation, or that the functions and features of this system will meet your specific requirements. Additionally, this system has not been

    designed for use in life-critical situations and must not be used for this purpose.

    Windows is a registered trademark of Microsoft Corporation

    Documentation 2007 Onity, Inc.

  • ILS\ILS Users Manual i

    TOC

    1. ILS Lock .................................................................................................... 5

    1.1. Features and Functions ..................................................................................................... 5

    1.1.1. Lock Installation ........................................................................................................................ 5 1.1.2. Lock Audit Trail ......................................................................................................................... 5 1.1.3. Lock Attributes.......................................................................................................................... 5 1.1.4. Users Attributes ........................................................................................................................ 6 1.1.5. Calendar .................................................................................................................................. 6 1.1.6. Time Zones .............................................................................................................................. 6 1.1.7. Operating Mode Changes ......................................................................................................... 6 1.1.7.1. Blocking ................................................................................................................................... 7 1.1.7.2. Facility ..................................................................................................................................... 7 1.1.7.3. Emergency Operation ............................................................................................................... 7 1.1.7.3.1. Unlock (Wireless Lock Only) ............................................................................................... 7 1.1.7.3.2. Lock (Wireless Lock Only) .................................................................................................. 7 1.1.7.4. Automatic Changes .................................................................................................................. 8 1.1.7.5. Daylight Savings Time .............................................................................................................. 8

    1.2. General Lock Characteristics ............................................................................................ 8

    1.2.1. Battery Life (Section not complete from Engineering) ................................................................. 8 1.2.2. Light Signals............................................................................................................................. 8 1.2.3. Micro switches .......................................................................................................................... 9 1.2.4. Connections ........................................................................................................................... 10 1.2.4.1. Batteries and Privacy .............................................................................................................. 10 1.2.4.2. To the PDA ............................................................................................................................ 10 1.2.5. Card Reader Technologies ..................................................................................................... 10 1.2.5.1. MAG ...................................................................................................................................... 10 1.2.5.2. iClass ..................................................................................................................................... 10 1.2.5.3. 125 kHz Prox .......................................................................................................................... 10 1.2.6. Lockcases .............................................................................................................................. 10 1.2.6.1. Mortise with deadbolt .............................................................................................................. 10 1.2.6.2. Mortise, Latch Only ................................................................................................................. 11 1.2.6.3. Heavy Duty Cylindrical Latch BLA ........................................................................................... 11 1.2.6.4. Mortise with Deadbolt / AFC .................................................................................................... 11 1.2.7. Emergency Key Override ........................................................................................................ 11 1.2.8. Alternative Fire Code (AFC) .................................................................................................... 11 1.2.9. Capabilities of the Lock ........................................................................................................... 12 1.2.10. Maintenance........................................................................................................................... 12

    1.3. Door Position and Monitoring ......................................................................................... 12

    1.3.1. Door Contact .......................................................................................................................... 12 1.3.2. Latch Monitor ......................................................................................................................... 12

    1.4. Lock Operating Environment .......................................................................................... 13

    1.5. Lock Certifications........................................................................................................... 13

    2. System Commissioning......................................................................... 13

    2.1. Lock Installation .............................................................................................................. 13

    2.2. Lock Testing .................................................................................................................... 14

  • ii ILS\ILS Users Manual

    2.3. Lock Commissioning ....................................................................................................... 14

    3. PDA ......................................................................................................... 15

    3.1. Description ....................................................................................................................... 15

    3.2. Main Components ............................................................................................................ 15

    3.2.1. Connectors ............................................................................................................................. 16 3.2.2. PDA Adapter .......................................................................................................................... 16

    3.3. Connections ..................................................................................................................... 16

    3.3.1. To the Lock ............................................................................................................................ 16 3.3.2. To the Computer..................................................................................................................... 16

    3.4. Set Up and Configuration ................................................................................................ 16

    3.4.1. Downloading Lock Configuration file onto PDA ........................................................................ 16 3.4.2. Uploading PP/Lock Audits File onto LMS System .................................................................... 16

    3.5. Operators ......................................................................................................................... 17

    3.5.1. Operator Log on ..................................................................................................................... 17

    3.6. Using the Portable Programmer...................................................................................... 17

    3.6.1. PDA Maintenance ................................................................................................................... 24

    3.7. Wireless Functionality ..................................................................................................... 24

    3.7.1. Wireless Connectivity.............................................................................................................. 24 3.7.2. Main Components .................................................................................................................. 24 3.7.3. Connections ........................................................................................................................... 24 3.7.4. Description ............................................................................................................................. 24 3.7.5. Lock Radio ............................................................................................................................. 24 3.7.5.1. Installation .............................................................................................................................. 24 3.7.5.2. Lock Heartbeat ....................................................................................................................... 25 3.7.5.3. Wireless Connectivity.............................................................................................................. 25 3.7.5.3.1. Join Network .................................................................................................................... 25 3.7.5.4. Visual Feedback ..................................................................................................................... 25 3.7.5.4.1. Successful Join ................................................................................................................ 25 3.7.5.4.2. Failed Join ....................................................................................................................... 25 3.7.5.4.3. Connectivity Loss ............................................................................................................. 26 3.7.5.4.4. Poor / No Connectivity ..................................................................................................... 26 3.7.6. Wireless Features ................................................................................................................... 26

    3.8. Wireless Site Installation Planning ................................................................................. 26

    3.8.1. Wireless Range Estimations ................................................................................................... 27 3.8.2. WAP Mounting Locations ........................................................................................................ 28

    4. WIRELESS ACCESS POINT ................................................................... 28

    4.1. Description ....................................................................................................................... 28

    4.2. Wired Access Point (Ethernet) ........................................................................................ 28

    4.3. Wireless Access Point (Wi-Fi) ......................................................................................... 30

    4.4. Wireless Access Point Commissioning .......................................................................... 32

    4.4.1.1. Assigning WAP IP Address ..................................................................................................... 32 4.4.1.2. Establish a Static IP Address .................................................................................................. 34 4.4.2. Wi-Fi WAP Configuration ........................................................................................................ 36 4.4.2.1. Connect the Wi-Fi WAP to the commissioning computer via HyperTerminal ............................. 37

  • OWL Users Manual iii

    4.4.3. Lock Table ............................................................................................................................. 39

    4.5. WAP LED .......................................................................................................................... 39

    4.6. WAP Power Supply .......................................................................................................... 39

    4.7. WAP Certifications........................................................................................................... 39

    4.8. WAP Environmental Requirements................................................................................. 40

    5. Troubleshooting ..................................................................................... 40

    6. Hardware Upgrade ................................................................................. 42

    6.1. Description ....................................................................................................................... 42

    6.2. Radio Upgrade ................................................................................................................. 43

    6.2.1. Radio Upgrade / replacement procedure ................................................................................. 43

    6.3. Reader Upgrade ............................................................................................................... 43

    6.3.1. Reader Upgrade / replacement procedure ............................................................................... 43

    6.4. WAP Replacement ........................................................................................................... 44

    6.5. Firmware / Software Upgrade .......................................................................................... 44

    6.5.1. Upgrade components ............................................................................................................. 44 6.5.2. Lock Upgrade procedure via PDA ........................................................................................... 44 6.5.3. Lock Upgrade procedure via wireless ...................................................................................... 44 6.5.4. PDA Application procedure ..................................................................................................... 45 6.5.4.1. FROM INSTALLING COMPUTER ........................................................................................... 45 6.5.4.2. Install Application File on Mobile device ................................................................................... 46 FROM PDA ........................................................................................................................................ 46

    7. Appendix A ............................................................................................. 47

    Audit Events table ....................................................................................................................... 47

    8. Index ........................................................................................................ 48

  • ILS\ILS Users Manual 5

    1. ILS Lock

    1.1. Features and Functions

    The features and functions in the following sections are common to both the offline and wireless lock

    1.1.1. Lock Installation

    Installation of the ILS lock should only be performed by on Onity certified installer. Please completely read and understand the lock installation template and guide before installation of the lock.

    1.1.2. Lock Audit Trail

    In standard operation, the lock can record the last 1000 events in its memory. The memory does not overflow, once the memory is full, new audits are added to the end of the audit list, and the oldest record is removed in a first-in, first-out process.

    Each recorded event includes the following data:

    Date

    Hour

    Minute

    User code (if applicable)

    Event Type

    Event types include. Refer to Appendix A for a full list of audit events

    Access Grants

    Access Denied

    Invalid Card

    Automatic Lock state changes

    DST updates

    Blocking card

    Join Card ( Wireless)

    Test Card

    Lock Malfunction

    1.1.3. Lock Attributes

    The lock has several attributes that modify its behavior. These attributes are controlled by the system software. Some attributes are global; if the attribute is enabled, it applies to all of the locks in the system. Other attributes are selectable on a door-by-door basis. The following list defines the attributes and whether they are Global (G) or Individual Door (D) attributes:

  • 6 OWL Users Manual

    Door unlock time (1 to 255 seconds) [D]

    Door unlock time for disabled users. (ADA, 1 to 255 seconds) [D]

    Lock when the handle is released. [D]

    Is the Privacy function used? [D]

    Is the Office function used? [D]

    Note The disk space requirements will increase as you add data to the program.

    1.1.4. Users Attributes

    User attributes allow the lock to function in a different manner for cardholders assigned different permissions within the system.

    ADA is an attribute that may be set for a user who may require an extended amount of time to enter a door due to a handicap, injury, or other debilitating condition. If the ADA attribute is set for a user, it applies to every door the user accesses.

    Owner is an attribute that may be set for an individual who has the need to override the privacy function of a given door, or the need to place a given door in office mode with the user card. This attribute is set either on or off for each user in each door, so a user may be the owner of many doors and a door may have many owners.

    Blocking is an attribute that may be set for a user who requires the ability to override a blocked lock. This attribute is frequently given to security personnel. If the blocking attribute is set for a user, it applies to every door the user accesses.

    1.1.5. Calendar

    The behavior of the lock with regard to the time of day (Schedules and Automatic Changes) can be different for every day of the week, Sunday - Saturday, and holidays. The Calendar determines the days that will be specified as holidays. The lock has capacity to record the holidays of an entire year beginning with the current month. Splitting the holidays out and individually identifying the days of the week gives the system 8 different day types.

    1.1.6. Time Zones

    Each time zone is composed of 5 time windows. Each window is defined by the beginning hour and minute, the ending hour and minute and the day types to which the window applies. Each window may apply to several day types.

    The system allows a maximum of 30 user defined timetables. The system also has two pre-defined timetables - Always and Never. All 32 timetables are loaded into every lock in the system. Users are assigned to one timetable per lock when being granted access, but they may be assigned to a different timetable for each lock to which they have access.

    1.1.7. Operating Mode Changes

    The lock may change modes of operation either by a user action or by an automatic change table. The different operational modes are:

    Office mode (Passage) - The lock is unlocked and users may pass freely through the door

    Office first - The lock is placed in office mode, but only after the first valid card is used after the mode change

  • ILS Users Manual 7

    Standard mode - Each user must use a valid card to open the door. Use of a card with the Owner attribute may allow the lock to change to office mode (if enabled).

    Privacy Mode - When the user engages the privacy knob of the door, the door shall be switched to the privacy state. When the user disengages the privacy knob then the door shall come out of privacy state.

    1.1.7.1. Blocking

    This is a special state that is controlled by the Blocking Card. When a lock is blocked with the Blocking Card it will reject all cards that do not have the blocking override attribute. The Blocking Card will alternately change the state of a lock from blocked to not blocked each time it is inserted. User cards which override a blocked lock will leave the lock in the blocked state. Each of these actions as well as card rejection due to a blocked lock is registered in the audit trail.

    1.1.7.2. Facility

    In Facility mode the lock will grant access to a card holder based only on the Facility Code, Authorization level and card activation / expiration date.

    1.1.7.3. Emergency Operation

    An ILS lock equipped with wireless radio module can support emergency operational modes. The emergency operational modes can be control from the host end wireless. These modes are dependent upon the individual lock heartbeat.

    1.1.7.3.1. Unlock (Wireless Lock Only)

    The lock will operate in the unlock mode until the command is given to return to is previous mode of operation. The lock will only change modes based on the user defined lock heartbeat. The heartbeat control when communications from the lock to the head end software occurs. Please refer to section 2.5.7.2 Lock Heartbeat for further detail.

    The emergency unlock command can be sent wirelessly from the host end through the wireless access point to a lock equipped with a radio module or through a card equipped with emergency unlock feature.

    1.1.7.3.2. Lock (Wireless Lock Only)

    The lock will operate in the unlocked mode until the command is given to return to its previous mode of operation. The lock will only change modes based on the user defined lock heartbeat. The heartbeat control when communications from the lock to the head end software occurs. Please refer to section 2.5.7.2 Lock Heartbeat for further detail.

    The emergency lock command can be sent wirelessly from the host end through the wireless access point to a lock equipped with a radio module or through a card equipped with emergency lock feature.

    Note Emergency Lock and Unlock features sent wirelessly are dependent upon the

    wireless heartbeat cycle of the each lock. These commands cannot be pushed down to the lock and require the lock to wake up before the command is executed.

  • 8 OWL Users Manual

    1.1.7.4. Automatic Changes

    The lock may be assigned an automatic changes table. This table allows the lock to automatically change operational states up to 20 times per day type. Each change is registered in the lock audit trail

    1.1.7.5. Daylight Savings Time

    The locks can automatically adjust for daylight savings time. Each lock can store the dates of the next four changes (two years). The lock will adjust one hour forward or backward as dictated by the programming.

    1.2. General Lock Characteristics

    1.2.1. Battery Life (Section not complete from Engineering)

    The lock is powered by three alkaline type AA or LR4 batteries located under the inside cover. When the both the offline and wireless locks are not being used or sleeping, they consumes about

    0.02mA. When the lock circuit is active it consumes 10mA. The motor consumes 150mA when it is active. The following estimates for battery life are based on these operational characteristics in offline mode of operation, as well as the current battery technology:

    10 openings / day 9 years 32,000 openings

    20 openings / day 6.4 years 46,300 openings

    50 openings / day 3.5 years 63,100 openings

    100 openings / day 2 years 71,800 openings

    200 openings / day 13 months 77,200 openings

    500 openings / day 5.4 months 80,700 openings

    The estimation for the wireless lock will vary depending on the radio heartbeat interval. Battery consumption will be reduced for higher heartbeat interval in conjunction with the number of openings per day. Standard opening time with 5 min heartbeat intervals

    1 min interval

    5 min interval

    The lock will begin giving the low battery indication to the users when the batteries still have approximately 10% of the usable battery power remaining. When the power level of the batteries drops below this point the lock will still signal the low battery indication but it will refuse to unlock.

    1.2.2. Light Signals

  • ILS Users Manual 9

    The lock uses two light indicators (one red and one green light) to communicate with the users as follows:

    The reason for a card rejection may be discovered by reading the lock with the PDA and then examining the readout either directly on the PDA or at the PC. See Section 2.6 Using the Portable Programmer for the required steps.

    1.2.3. Micro switches

    The lock uses micro switches to detect different operations. Some micro switches are included on every lock and some are only for special options. The switches are listed below and notated as to whether they are standard (S) or optional (O):

    Card Insertion Micro switch (S) - This micro switch is located within the card slot and is used to detect the presence of a card. (MAG Card Only)

    Handle Micro switch (S) - This switch is located within the internal clutch mechanism and is used to detect the position of the outside handle.

    End User Related

    Situations

    Alternate

    Red and

    Green

    Blink

    Together

    Solid

    GreenSolid Red

    Green

    Binking

    Red

    Blinking

    HIGH

    BEEP

    LOW

    BEEP

    Access granted X

    Access granted low battery X X

    Access denied privacy X X

    Time zone mismatch X X

    Authorizations X X

    Seq no mismatch X X

    Card is Expired X X

    User notEnabled X X

    Card from different site X X

    Access denied -> blocked mode X

    Access denied -> Emergency lock X

    SCF_failure X X

    Blank card X X

    ACF failure X X

    Technician

    Situations

    Alternate

    RED and

    GREEN

    Blink

    Together

    SOLID

    GREEN

    SOLID

    RED

    GREEN

    BLINKIN

    G

    RED

    BLINKIN

    G

    HIGH

    BEEP

    LOW

    BEEP

    Enter office mode X

    Enter Emergency unlock X

    Enter blocked mode X

    Enter Emergency lock X

    Exit blocked mode X X

    Exit Emergency lock X X

    Exit office mode X X

    Exit Emergency unlock X X

    Identification with WLM and n/w join pass X

    Identification with WLM and n/w join fail X

  • 10 OWL Users Manual

    Privacy Micro switch (O) - This switch is located on the inside subassembly below the battery pack and is used to indicate whether the privacy indicator is on or off.

    Key Override Micro switch (O) - This switch is located within the internal clutch mechanism and is used to indicate the use of a mechanical key to open the lock.

    1.2.4. Connections

    1.2.4.1. Batteries and Privacy

    The ILS lockset is a self-contained unit which requires no wires to be pulled from a central processor or power supply for lock operation. The lock electronic module receives power from batteries located in the inside escutcheon. Also located in the inside escutcheon is the Privacy Micro switch. The lock is connected to these items by a single 4 conductor wiring harness. This harness is attached to the outside escutcheon and plugs into CN1 on the inside subassembly (see Figure 2).

    1.2.4.2. To the PDA

    Both ILS offline and wireless locksets require initial programming (called initialization); periodic updates and a channel to retrieve lock audit data. This may be accomplished by loading the PC data into the PDA and using the PDA to perform the necessary programming or audit operation. The PDA is connected to the lock by connecting the PDA cable to the jack at the bottom of the lock (see Figure X).

    Note: Once the ILS wireless lock is initialized, all PDA functions may be performed from the host end

    1.2.5. Card Reader Technologies

    Reader selection for the ILS lock is selectable by the end user and supports the following technologies. The ILS readers are up easily upgradable from one technology to another. For reader upgrade procedures please review section 4.3 Reader Upgrade

    1.2.5.1. MAG

    The magnetic reader head can read both high and low coercivity cards. Support Onity Integra encoding. Standard ABA, track 3, encoding

    1.2.5.2. iClass

    Uses the 13.56MHz technology platform contactless smart cards. Supports HID iClass, HID Elite and comply with ISO 1443A, 14443B standards.

    1.2.5.3. 125 kHz Prox

    Supports Corporate 1000, HID Prox and AWID technology

    1.2.6. Lockcases

    1.2.6.1. Mortise with deadbolt

    This is a UL approved, ANSI Grade 1 standard full mortise lock with 1 deadbolt. A unique feature is that the deadbolt may be projected from either inside or outside by lifting the handle. Projection from the outside requires a valid card. When the deadbolt is projected

  • ILS Users Manual 11

    a micro switch signals this condition to the microprocessor. The deadbolt may be retracted by the inside handle upon exit or the outside handle when a valid card is used.

    1.2.6.2. Mortise, Latch Only

    This is a UL approved, ANSI standard mortise lock without a deadbolt. The privacy indicator is available with this lockset.

    1.2.6.3. Heavy Duty Cylindrical Latch BLA

    This is a UL approved latch which installs in a standard prep for a cylindrical lock. Door thicknesses must be between 1-3/8 and 1-3/4. Latches are available for 2-3/8, 2-3/4, 3-3/4, and 5 backsets

    1.2.6.4. Mortise with Deadbolt / AFC

    This is a UL approved, ANSI standard full mortise lock with 1 deadbolt. This lockcase contains a monitor switch which connects directly to the AFC lockset inside trim. Deadbolt is projected by use of a thumb turn from the interior. The deadbolt may be retracted by the inside handle upon exit or the outside handle when a valid card is used.

    1.2.7. Emergency Key Override

    The ILS Lock has the option of installing a mechanical key override in the lever. The ILS currently supports a 6-pin Schlage knob lock cylinder, supplied by the customer. This should only be installed by qualified locksmiths. Before these cylinders may be used, the tail piece that is shipped with the lock must be installed on the cylinder.

    When the cylinder is operated by a key the outside handle is unlocked in the same way that a card unlocks it. The lock will record the use of the key in the audit trail.

    Note No card holder data is recorded in the audit trail when key override is used.

    This feature is not intended for everyday use. The basic philosophies of are card access system are key control and security. The provision for hard key override is intended for limited usage by emergency and maintenance personnel. It is the responsibility of the site to maintain key issuance records and key control if this feature is implemented.

    To operate the key cylinder, rotate the key in a clockwise direction three-quarter of a turn until it stops. Hold the key in this position and operate the handle. Release the key, return it to the original position and remove it from the cylinder.

    WARNING: The ILS offers a high degree of security against surreptitious entry. Therefore the selection of a key cylinder should include only high security cylinders which are resistant to picking and unauthorized key duplication. Failure to observe this rule will compromise the security of your lock system

    1.2.8. Alternative Fire Code (AFC)

    The Alternative Fire Code (AFC) function is available only on locks specifically ordered for with this feature. The AFC function, stated in simplest terms, makes the trim unlock any time the door is opened, and the trim will not relock until the user takes a specific action to relock it - either with a valid card (from outside the door) or by using the thumb turn (from inside the door).

  • 12 OWL Users Manual

    The lockset used for the Alternative Fire Code (AFC) function utilizes a specific inside trim which includes a thumb turn. The mortise lockcase has a latch monitoring switch, and detects when the door is opened. The circuit for this lock contains a firmware specific to this function.

    The Alternative Fire Code function requires function-specific hardware.

    1.2.9. Capabilities of the Lock

    1.2.10. Maintenance

    Cleaning the Outer Cover

    The proper way to clean the outer surface of the reader is to use a wet cloth and simply wipe dirt away. The use of solvents, thinners, polishes, or abrasive cleansers may damage the reader finish, and possibly the reader electronics and mechanical components. Some chemicals may weaken or damage the plastic reader housing. If the facility is to be pressure washed with a chemical agent, it is recommended that the reader be completely covered prior to this task, such that the chemical agents will not damage the reader.

    Cleaning the Magnetic Read Head (MAG Strip reader only)

    The read head is the internal portion of the reader that reads the signal from a magnetic stripe card. To clean the read head, use a cleaning card made specifically for this purpose, available from Onity. Insert the cleaning card in the reader then remove the card. Repeat this process as necessary. This will remove dirt and minor oxidation from the surface of the read head, and improve performance. It is recommended that the readers be cleaned as part of a regular maintenance cycle at least twice per year. If the area where the reader is installed is subject to extreme amounts of dust, humidity or airborne debris, the reader may require cleaning more often

    1.3. Door Position and Monitoring

    1.3.1. Door Contact

    A door contact may be installed to report the open or closed position of the door. For both offline and wireless ILS lock this status is recorded in the lock audit trail.

    For a wireless ILS Lock this information can be reported back to the head end software

    The Door contact sensor connection accepts three (3) wire (C/NC/NO) door contacts.

    1.3.2. Latch Monitor

    A mortise equipped with latch monitor will be able to report back the latch has engaged and the door is secure. For both offline and wireless ILS lock this status is recorded in the lock audit trail.

    For a wireless ILS Lock this information can be reported back to the head end software

    Note Latch Monitoring within ILS is supported only when installed with a latch monitoring mortise

  • ILS Users Manual 13

    1.4. Lock Operating Environment

    The lock operates with 3 AA alkaline batteries. Operational parameters for AA alkaline batteries may vary. Please refer to the battery manufactures standard for operating environment.

    The operating temperature of a lock equipped with MAG card reader is from -35 C to + 75 C

    The operating temperature of a lock equipped iClass reader is from -35 C to +65 C

    1.5. Lock Certifications

    FCC part 15

    RoHS

    CE

    UL10C

    IP46 IClass & 125Khz reader

    IP23 MAG readers

    Ontario Fire Code 3.3.4.5

    UL294 (pending)

    2. System Commissioning

    2.1. Lock Installation

    2.1.1. Door Preparation

    Please refer to the Onity Instructions for preparing door and frame for information and template on door preparation

    Instructions are specific based on the lock (either ANSI mortise or BLA) and reader (MAG or iClass/Prox) type purchased.

    Using the incorrect template could result in improper lock installation.

    Based on the previous lock condition cover plates and or wrap plates may be required to cover the existing door preparation

    2.1.2. Installation

    Once the door has been properly prepped the lock can be installed. Locks should only be installed by someone certified to install Onity Locks

    2.1.2.1. Wireless Radio and Reader

    Please take note that batteries should not be installed into the lock until after all wiring connections have been need. Wireless radio module, readers and rosette motor should all be

  • 14 OWL Users Manual

    connected before batteries are installed. Remove batteries first before uninstalling any component.

    When installing iClass or Prox readers please allow 30 seconds for the lock to power up

    Refer to the Field Upgrade manual for proper installation and safety precautions for radio and reader installation practices.

    2.2. Lock Testing

    Once all components have been connected and batteries installed the lock can be tested for proper operation.

    To verify proper operation, present an ILS Construction card.

    The reader indication lights should turn green and the lock motor will actuate, the motor actuation is audible and distinctive. The user should hear the actuation, this will allow the handle to turn and engage the latch.

    This complete lock testing

    2.3. Lock Commissioning

    2.3.1. Wireless Gateway

    For wireless lock, Wireless Access Points should be installed and commissioned following instruction in section 4.4 Wireless Access Point Commissioning

    Once Wireless Access Points and installed and commissioned it can be added to the LMS database.

    IMPORTANT - In order to preserve battery life it is recommended that the Initial full lock database be downloaded via the PDA. Verifying all cardholders and access are assigned to the lock prior to bringing the lock online will prevent lengthy downloads to locks as the system is being brought online. This may also result in higher than normal battery drain in the initial stages of use.

    2.3.2. Assigning Locks

    Locks can now be assigned either to a Wireless Gateway for wireless locks or to an offline PDA for offline locks

    All locks should be configured in the head end software with these minimal setting prior to download to the lock. For Offline locks all information is mandatory in order to assure proper lock operation and cardholder experience.

    Lock Name

    Reader Type

    Card Formats

    Cardholders

    Access Levels

  • ILS Users Manual 15

    Lock Heart beat (for wireless locks)

    2.3.3. Initializing Locks

    Refer to Section 3.6 using the Portable Programmer for instructions on database download to the PDA and lock Initialization.

    Once initialized, locks will join the associated Wireless Gateway. If join process does not occur and locks are not visible within LMS, please refer to Section 5 Troubleshooting

    3. PDA

    3.1. Description

    The ILS PDA is the communication device used to transfer data between the main computer and the electronic lock. The PDA application runs on the Microsoft Windows Mobile 6.0 Platform Pocket PC version. It is also used as a maintenance and security tool; providing lock diagnostics and onscreen lock audit trail data. The PDA is used to initially program all ILS locks with Lock ID, clock time and locking plans.

    The ILS PDA can support:

    300 doors

    100 PDA Operators with unique passwords

    1000 Lock audits per lock

    5000 PP audit events

    English, French and Spanish Languages

    3.2. Main Components

  • 16 OWL Users Manual

    3.2.1. Connectors

    Refer to the Motorola MC70 Users Guide for basic PDA features and connections

    3.2.2. PDA Adapter

    The PDA Adapter is used to physically connect to the PDA to the lock. The PDA communicates to the Adapter via serial port and the Adapter plugs into the jack at the bottom of the keypad on the locks. The PDA adapter uses Motorola MC70 serial cable to connect to the PDA and 2-wire communicator to connect to the lock.

    The PDA adapter requires 3 AA batteries to power up the lock during very low battery or battery dead conditions.

    3.3. Connections

    3.3.1. To the Lock

    The PDA communicates with the lock serially using the Motorola MC70 Pre-Wired Connector Plug

    Connect the Portable Programmer (PDA) to a lock by inserting the PDA Adapter connector into the PDA, next insert plug into the jack on the bottom of the lock. Turn the PDA on, and use the menu button to select an option.

    3.3.2. To the Computer

    The PC running the head end software must be installed with Active Sync version 4.0 for computer running Windows XP which acts as communication interface between PC and the PDA. Please refer to the software head end manual for PC system requirements

    For system running Windows 7 Windows Mobile Device Center is used

    All the data files from PC with to PDA and vice versa are transferred using Active Sync or Mobile Device Center.

    Refer to the Motorola MC70 Users Guide for information on installation of Active Sync.

    3.4. Set Up and Configuration

    3.4.1. Downloading Lock Configuration file onto PDA

    The software head end application will generate the PP Application configuration data file named as PPdata.txt with the details as described in section 3.

    When the PP Data has been copied to the PDA, launch the PP Application (ILSPPApp) from the PDA. When launching for the first time, or after the data has been deleted, you will be required to enter the unlock password in the system. This unlock password is ILSPPAPP. Note, this is just an additional security measure in case your PDA is lost or stolen. The operator password is also required before the system can be used

    3.4.2. Uploading PP/Lock Audits File onto LMS System

    Upon executing upload operation by the PP Application operator, PP Application will generate PP/Lock audits file in the My Document folder (\My Document).

  • ILS Users Manual 17

    The software head end application will automatically read the audit file from the PDA when connected to the computer.

    The files created by the PDA and uploaded to the head end are

    PP audit file is named as PPAudits.txt

    Lock audit file is named as LockAudits.txt.

    The software head end application will delete PPAudits.txt and LockAudits.txt files from the PDA upon successful upload operation in order to avoid the possibility of reading the same audit files again.

    Refer to the software user manual for detailed information on loading the PDA

    3.5. Operators

    Each can operate the portable programmer application depending on the privileges provided to that user

    3.5.1. Operator Log on

    After entering this unlock code, the operator must enter a user name and password.

    This User name is established from the head end software. Please refer to the software configuration in order to assign PDA users, passwords and privileges.

    If the incorrect login information for user configured number of times, the software will deactivate itself and erase all the data other than the PP database. If this occurs, a new PPData.txt file must be loaded to the PDA before another login attempt can be made.

    (SHOW SCREEN SHOT OF LOG ON)

    3.6. Using the Portable Programmer

    There are 14 different menu options on the PDA which may be selected by using the touch screen to highlight a desired function. These options are:

    Initialize

    The lock can be initialized either when it is in the Factory mode or any other operating mode. However, the lock has to be first initialized when it is in the Factory mode. Once initialized, all factory mode setting will be erased.

    In the initialization process a new system code and lock ID shall be written in the lock followed by the different Lock configuration parameters

  • 18 OWL Users Manual

    Figure

    This menu option is used to program the locks when the locks are first installed on the doors. During this process, the PDA will download the lock identifier and system data, as well as the user information and time data. To initialize a lock, perform these steps:

    1. Load the PDA with the required data from the computer.

    2. Turn the PDA on and log on.

    3. Connect the PDA cable to the lock.

    4. Use the cursor keys to select the INITIALIZE LOCK option and press the ENTER key.

    5. All of the locks or readers loaded into the PDA will appear in a list, which you may scroll through using the cursor keys. Doors that have been initialized or updated will appear with a checkmark next to them. Select the proper door from this list, and press the ENTER key. When the data has been transferred, the message OK, READY will appear.

    NOTE: The proper door name must be selected from this list, as the PDA will then assign this name to the lock. Failure to choose the proper door name could result in unauthorized personnel having access to this area.

    Update

    The Update function is used when changes have been made to the locking plan, the clock needs adjusting, or any other parameters have changed that need to be communicated to the lock. This feature is different from the initialize function in that it does not set the lock ID, but reads the ID from the lock and then loads the relevant information. To begin the process, select Update from the Lock menu

    1. Load the PDA with the required data from the computer.

    2. Turn the PDA on and log on.

    3. Connect the PDA cable to the lock.

    4. Select the UPDATE LOCK option using touch screen and press the ENTER key.

    (SHOW SCREEN SHOT OF UPDATE MORE INFORMATION IS NEEDED AS FEATURES HAS NOT BEEN SEEN)

  • ILS Users Manual 19

    Change Lock Modes

    PP shall allow the operator to check the current mode of the lock and change the mode of the lock. The following are the different states of the lock:

    o Office mode

    o Office First mode

    o Standard mode

    o Blocked mode.

    Figure

    Check Mode

    The PP application will check and display the current operational mode of the lock.

    Test and Diagnostics

    PP shall provide option to perform the following diagnostic tests on the lock. System code and Lock ID validation shall not be done for Test and Diagnostics commands.

    o Battery Level

    Use the portable programmer to test the battery level of the lock. To run this test, connect the PDA Adapter to the

    lock. Then select Battery Level from the menu. Click on

    the Test Battery button and the programmer will run the battery test and display the results. When the battery level

    is below 20%, the batteries should be replaced.

    o LED and buzzer Test

    o Switch Test

    The ILS lock has a number of switches that are used in their operation. These switches should be periodically

    tested to ensure proper function. To test the switches,

  • 20 OWL Users Manual

    connect the PDA Adapter, and then select Switch Test from the menu. Click on the Switch Test button to begin the test.

    Card

    Latch Monitor

    Handle

    Privacy

    Clear

    Key Override

    Door Sensor

    Figure

    The Handle switch pertains to the lock and is tested by turning the inside lever on the lock. When turned, this

    button should display as shown in Error! Reference

    source not found.. The privacy switch is tested by turning

    the thumb turn on the inside trim if applicable. The clear

    switch is tested by pressing the clear button on the circuit

    board of either the lock or the wall reader. This test is

    typically not required once the lock is installed and

    working. Finally, the Key Override switch will test the

    functionality of the mechanical key override switch if

    applicable in your installation. To test this switch, engage

    the key override and the button will display

    View Lock Information

  • ILS Users Manual 21

    The view lock info option will display the information of the lock as shown in Error! Reference source not found. XX. To view the information, connect the PDA Adapter to the lock and turn it on. Select View Lock Info from the menu, and then click on the View Info button.

    o Manufacturing Timestamp

    o Lock ID

    o Firmware Version

    o Hardware Version

    o Serial Number of the Circuit Board

    o Lock Name

    Figure

    Read Audit Trail Events

    The PP shall be able to communicate with the Lock and get the audit trails. At the end of data transfer the PP Application shall update the RTC of the lock.

    The Auditor Menu

  • 22 OWL Users Manual

    The Auditor Menu of the portable programmer is used to read the event auditor of a lock or wall reader, view these collected lock audits, view the portable programmer audits, or upload these collected audits to the head end system.

    (INSERT PICTURE)

    Read Lock Audit

    To read the audit of a lock or wall reader, connect the PDA Adapter and turn it on, then select Read Lock Audit from the Auditor Menu. Click on the Read Lock Audit button to perform the function.

    When completed, the audit events may be viewed on the portable programmer or uploaded and stored in the software database.

    View Lock Audit

    The View Lock Audit option allows for fast viewing of the audits that have been collected from the locks and wall readers directly on the portable programmer. Select View Lock Audit from the menu. You will be able to filter the date range to show just the period of time you wish to see as shown in Figure XX.

    Open of Lock.

    The PP application shall be able to open the lock from outside even in case of low battery or battery dead condition.

    Power up the lock.

    The PP application shall be able to power up the lock from outside in case of low battery or battery dead condition.

    Upgrade firmware

    The PP application can upgrade the lock firmware

  • ILS Users Manual 23

    Lock information

    When selected the PP application will read number of users in the lock, firmware version of the ACU and current date and time of the lock

    Read Openings

    Update RTC.

    The following information will be read from the lock and displayed on the PDA

    Production test key

    Network join key (Wireless Lock only)

    The network join will send the command to the radio lock module in any wireless ILS signaling the radio module to attempt to join the associated wireless access Point

    Send heart beats (Wireless Lock only)

    When Send the Heart beat option is selected by the operator, the software shall start communication with the lock and send the Heart beat command to lock.

    On successful communication the PDA will display a message upon response from the lock and shall stop the communication with lock and a PP audit shall be recorded

    For any communication error before the end of the operation or the configurable timeout period occurs, the PDA will display an error message

  • 24 OWL Users Manual

    3.6.1. PDA Maintenance

    Please refer to the PDA owners manual for proper maintenance.

    3.7. Wireless Functionality

    3.7.1. Wireless Connectivity

    The ILS lock can operate and communicate back to the host system wirelessly. Wireless communication to the host end requires an ILS wireless access point and an ILS lock equipped with an ILS 900 MHz radio module.

    3.7.2. Main Components

    1. Lock Radio

    2. Wired Access Point

    o Wireless Access Point (Ethernet 10/100)

    o Wireless Access Point (Wi-Fi 802.11)

    o Power Over Ethernet POE Wireless Access Point (Ethernet 10/100)

    3.7.3. Connections

    (SHOW IMAGES OF BOTH WIFI AND ETHERNET CONNECTIONS)

    3.7.4. Description

    A proprietary 900 MHz radio module is used to provide communication from the ILS lock through the wireless access point to the head end software.

    3.7.5. Lock Radio

    3.7.5.1. Installation

    Refer to Section 4.2 of Hardware Upgrade for information on installation the wireless lock radio.

  • ILS Users Manual 25

    3.7.5.2. Lock Heartbeat

    The lock heartbeat is the amount of time that each lock will remain in non-host communication. During this time the lock ACU will not receive updates from the host end.

    Once the Lock heart beat time elapses the lock radio will wake up and poll the Wireless Access Point for any updates. If updates are present the information will be transferred to the Lock ACU and be stored.

    Each locks heartbeat is configurable on a per lock basis at the host end and can be selected for 1 min to 24 hours. Optimum heartbeat time has been established at five minutes, providing maximum battery life and quick response and updates to the locks.

    For details on lock heartbeat configuration please refer to the software operator manual

    3.7.5.3. Wireless Connectivity

    Prior to each lock radio join the network. The wireless access points must be commissioned and configured as described in Section 3 Wireless Access Point

    3.7.5.3.1. Join Network

    Once the lock table has been downloaded to each WAP, all locks can be initialized VIA the PDA (if not done so previously) with the appropriate lock ID. Each lock must then be commanded to join the WAP it has been assigned to using the Join Network feature. The Join Network command can be sent via the following actions

    1. PDA Command to lock

    2. Dip of the Join Network Card

    3. Pressing reset button on the Lock Radio for 3 seconds

    4. Power Cycle / Reset

    Note The Power Cycle / Reset will occur when the lock power source has been removed then replaced

    3.7.5.4. Visual Feedback

    3.7.5.4.1. Successful Join

    Visual feedback for a successful join to the network will be provided to the end user in to locations.

    On the inside trim, the radio module - flashing green light. The inside trim must be removed for these lights to be visible.

    On the outside trim, provided on the reader head green light three flashes

    3.7.5.4.2. Failed Join

    Visual feedback for a successful join to the network will be provided to the end user in to locations.

    On the inside trim, the radio module - flashing red light. The inside trim must be removed for these lights to be visible.

  • 26 OWL Users Manual

    On the outside trim, provided on the reader head red light three flashes

    3.7.5.4.3. Connectivity Loss

    The lock may use communication to the access point due to the WAP going offline. This can be caused by an extended power loss to the access point or some other issue. The lock will attempt to rejoin the wireless access point for a period of two heartbeat cycles. If the lock is unsuccessful in rejoining to its wireless access point, the lock will enter offline mode. Once the wireless access point has been restored, the lock must rejoin the network via the predefined methods in Section 2.7.3.5.1 Join Network

    3.7.5.4.4. Poor / No Connectivity

    A RF site survey should be performed prior to wireless access point install to verify connectivity level to each lock position. The survey should confirm the ability of each lock radio, in its install position, to join the wireless access point. If lock radio continues to witness poor or no connectivity additional wireless access point may need to be installed and test to improve network connectivity of each radio.

    LED indication

    Poor / No Connectivity of a radio to an access point will display as one solid green light and one flashing red light.

    This indication means that radio has found the WAP point but does not have enough signal strength to join the access point. The WAP may need to move to a location with less interference or moved closer to the location in question.

    When moving WAPs please be aware of the other doors assigned to the access point as a shift to reach one door may affect another door which may be on the edge of connectivity

    3.7.6. Wireless Features

    All ILS PDA function can be performed from the host end with the addition of Wireless Access Point (WAP) and a lock radio. Each lock must have its own wireless radio installed for communication to the host end through the WAP. Each WAP can control up to 32 lock equipped with a wireless radio.

    Refer to Section 2.6 Using the Portable Programmer for PDA Function available through wireless connectivity

    3.8. Wireless Site Installation Planning

    In-building wireless range Preliminary layout and wireless planning is essential to determine areas on the site where wireless coverage is desired, the number of WAPS needed to provide desired coverage, placement of those WAPs in relationship to the locks which will be installed.

    A clean building / site floor plan drawn to scale is an important tools when site planning. The floor plan should depict position of rooms, hallways, stairwells and other building obstructions.

    Special purpose rooms should be marked and identified, equipment rooms, elevator hoist, IT closets, fire/ steel doors, Fire walls and HVAC ducting to be denoted for reference as the site and WAP locations are planned.

    Each ILS wireless lock should be marked on the floor plan to begin WAP assignment and WAP locationing.

  • ILS Users Manual 27

    3.8.1. Wireless Range Estimations

    The achievable range for wireless communication will be different in different directions. This range will depend on many factors

    In-building wireless range

    These estimations do not account for the various factors that may affect the signal strength in a building, but provide a baseline for planning. These include, but are not limited to:

    Building Construction

    o Masonry Block

    o Plain Concrete

    o Reinforced Concrete

    o Steel

    Internal Obstructions

    o Metal racks

    o Filing cabinets

    o Metal partitions

    o Refrigerators

    o Transformers and other heavy Electrical Equipment

    Potential RF Interference

    o 900MHZ Cordless phones and wireless headset

    o Fire and security Systems operating on 900MHz band

    o Wireless Meter Reading systems operating at 900MHz band

    Potential WAP mounting location should be inspected for accessibility in case of servicing

    NOTE: Location of Wireless Gateways and Wireless and offline locks should always be updated on the building and site floor plans

    The following will not interfere with ILS wireless system:

    Any device operating at 2.4 / 5 GHz

    o Microwave ovens

    o Wi-Fi networks and access points

    RF Output

    Power Setting

    Open space (line

    of sight) in feet

    In-building (line

    of sight) in feet

    0 dBm 100 35

    5 dBm 160 55

    10 dBm 320 100

    15 dBm 470 150

  • 28 OWL Users Manual

    o Most cordless phones in use today

    Security and Fire detection systems at 315, 433 MHZ

    3.8.2. WAP Mounting Locations

    The Wireless Gateway is design to be installed the following locations

    1. Non plenum rated ceilings

    2. Wall mounted

    3. Vertical post mounting

    The location of the WAP should ensure the antennae are clear of metal obstructions near-by. The antennae should be fully exposed if it is in a protective enclosure.

    The low-power wireless antenna should be in line of sight with associated doors and vertical mounted to prevent signal loss due to polarization mismatch

    Ceiling mounted WAPs should be below the ceiling girder, preferably with antenna protruding out of the drop ceiling.

    The mounting height should be higher than the locks. A higher elevation renders a longer line of sight distance, and reduced effects of obstructions on the floor. Installation height should not exceed 20-25

    4. WIRELESS ACCESS POINT

    4.1. Description

    The ILS Wireless Access Point is used to facilitate communication from a wireless enabled ILS lock and the host software. Communication from the Wireless Access Point is bi-directional as information is passed from the ILS lock through the WAP to the head end software and from the head end software through the wireless access point to the ILS lock

    There are two version of the Wireless access point Ethernet 10/100 and Wi-Fi.

    Each WAP can support up to 32 wireless locks. Support of 32 wireless locks is dependent on placement of the wireless access point in relationship the wireless lock and building construction.

    4.2. Wired Access Point (Ethernet)

    The Wired (Ethernet) WAP transfers TCP/IP packets to host software on the users network using wired (10/100 BaseT) communications.

  • ILS Users Manual 29

    1. 900Mhz antenna

    2. Ethernet Wireless Access Point

    3. 5V power cable

    4. 900Mhz antenna connection

    5. LMS Communication

    a. WAP has established connection to head end software

    6. Wireless Network Traffic

    a. Denotes data transfer to and from the lock and WAP.

    7. Ethernet Traffic

  • 30 OWL Users Manual

    a. Denotes data transfer to and from the WAP and head end software

    8. Ethernet Link

    a. Denotes WAP Connection to the Network

    9. Power

    10. Connection for 5V power

    11. Connection for RS-485

    12. Connection for USB cable

    13. Connection for Ethernet cable

    4.3. Wireless Access Point (Wi-Fi)

    The Wireless (Wi-Fi) WAP transfers TCP/IP packets to the host software on the users network using wireless (802.11b/g) communications.

  • ILS Users Manual 31

    1. 900Mhz antenna

    2. Wi-Fi antenna

    3. Wi-Fi Wireless Gateway

    4. 5V power cable

    5. 900Mhz antenna connection

    6. LMS Communication

    a. WAP has established connection to head end software

    7. Wireless Network Traffic

    a. Denotes data transfer to and from the lock and WAP.

    8. Ethernet Traffic

    a. Denotes data transfer to and from the WAP and head end software

    9. Ethernet Link

  • 32 OWL Users Manual

    a. Denotes WAP Connection to the Network

    10. Power

    11. Connection for 5V power

    12. Connection for RS-485

    13. Connection for USB cable

    14. Connection for Ethernet cable

    15. Wi-Fi antenna Connection

    4.4. Wireless Access Point Commissioning

    Each Wireless Access Point ships from the factory with an installed SSL Certificate and DHCP enabled

    The WAP must be commissioned with a unique I.P. address for the host system. This I.P. address will allow the host end system to see the WAP on the network.

    Commissioning of the WAP requires the following items:

    Computer / Laptop with HyperTerminal

    USB cable

    Proper driver install to recognize the WAP

    Power to the WAP

    Network connection to the WAP

    4.4.1.1. Assigning WAP IP Address

    All Access points are shipped from the factory with DHCP enabled. Each unit will automatically be assigned an IP address when they are connected to the network

    Note The WAP may be installed in place prior to commissioning - provided power

    and network connections are also installed and the laptop USB connection can reach the WAP at its installed location.

    Assigning IP address requires a computer with HyperTerminal.

    1. Connect each WAP to the network via Ethernet cable

    2. Connect the WAP to the configuring computer via USB connection

    3. Power on the WAP

    4. Launch HyperTerminal

    5. Assign a name to the connection and click OK

  • ILS Users Manual 33

    6. Connect WAP to the computer or laptop with USB cable

    7. Select the appropriate COM port.

    a. The COM port location may be determined from the computers Device Manager

    b. Once determined click OK

    8. Configure the COM port setting as listed the figure below

  • 34 OWL Users Manual

    9. Type ifconfig and press enter.

    10. The MAC address, IP Address and Gateway for the access point will be displayed

    11. Note the IP address and location of the access point this will be entered in the head in software

    4.4.1.2. Establish a Static IP Address

    Use the following command to set a static IP address via HyperTerminal

    Begin by following steps 1 10 in section 3.4.1.1 Assign WAP IP Address

    1. Once the DHCP IP has been determine the network submask and gateway for the Static IP address must be supplied by the customer site IT team.

    2. Type setnetwork ? and press enter

  • ILS Users Manual 35

    3. Enter the string as it appears in the figure below

    pwd=Netsilicon ip=[Static IP of the WAP] submask=[submask of the network] gateway=[gateway of the network] dhcp=off

    4. Press enter

    5. After the settings have been saved, disconnect from the WAP.

    6. HyperTerminal setting do not need to be saved

  • 36 OWL Users Manual

    7. Each WAP can then be verified as active by pinging each unit with the assigned IP address from a network connected computer.

    4.4.2. Wi-Fi WAP Configuration

    Prior to the configuration of the Wi-Fi WAP the following information must be identified by the site I.T. Department

    Wireless IP address

    Wireless subnet mask

    Wireless IP address of default gateway

    Wireless country name configured is United States

    Wireless protocol mode is for access point (infrastructure) networks only

    Wireless SSID

    Frequency band is band b only

    Wireless channel is (search) [Default]

    Wireless transmit rate is 11 [Default]

    Wireless transmit power is 16dbm [Default]

    Wireless multi domain capability (802.11d) disabled [Default]

    Authentication type

    HARDWARE PARAMETERS:

    Serial channels will use a baud rate of 9600 [Default]

    This board's serial number is (specific to Access point)

    This board's Wireless MAC Address is (specific to Access point)

    After board is reset, start-up code will wait 5 seconds [Default]

  • ILS Users Manual 37

    4.4.2.1. Connect the Wi-Fi WAP to the commissioning computer via HyperTerminal

    1. Once connections are made the reboot the WAP by typing reboot pwd=password and press enter

    Password is the initial password and can be resetting during the following configuration process.

    Once system has rebooted, press any key to change the default settings.

    The current setting can either be accepted or modified. Choose modify and press enter

    2. Reenter the password and chose to reconfigure the settings

    3. The following message will be displayed in HyperTerminal. This will allow the previously saved setting to remain in the WAP configuration

    4. If a static IP address is being assigned choose to disable DHCP

  • 38 OWL Users Manual

    5. Input the desired IP address (if DHCP is disabled)

    6. Enter the network Subnet mask

    7. Enter the network Gateway address

    8. MAC Address [assigned at the factory] does not need an input

    9. Country name [United States]

    10. Network type

    11. Enter the Network name (SSID)

    12. Set maximum transmit power [16dbm]

    13. Chose the Wireless Authentication Settings

    14. User Name and Password are required for WEP, WPA, Cisco LEAP and Cisco EAP FAST

    15. Select wireless network encryption type

    16. Serial port connection should remain at 9600

    17. The WAP password can now be reset. This password is WAP specific, but can be assigned to multiple WAPs.

  • ILS Users Manual 39

    18. Once complete the WAP can be disconnected from the commissioning computer.

    4.4.3. Lock Table

    Once Wireless Access Points have been commissioned via the software operating system, the associated locks can then be assigned to the WAP. These associated locks are known as the WAP Lock Table

    Refer to the users manual or online help for the software package you are using for the appropriate menu options to download the lock table to each WAP.

    4.5. WAP LED

    The WAP shall have 5 LEDs to provide user feedback. The LEDs will detail the following information.

    LMS Connection Connection to head end software established

    Wireless Network Traffic Data transmission from lock to WAP

    Ethernet (or Wi-Fi) Traffic Data transmission from WAP to LMS

    Ethernet (or Wi-Fi) Link Connection established to network either Ethernet or Wi-Fi

    Power

    4.6. WAP Power Supply

    Both the wired and wireless access point operates on a single external 5V DC power supply.

    The WAP shall have over-voltage protection up to 28V that will prevent equipment damage if an incorrect power supply is used. In the event of a fault condition, the WAP will be completely powered down. There will be no indication that the WAP is in a fault condition other than it is non-functional.

    4.7. WAP Certifications

    This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

    FCC ID: R32-WLMWWM01

    IC ID: 5059A-WLMWWM01

  • 40 OWL Users Manual

    FCC part 15

    UL

    CSA

    RoHS

    CE

    ICES-001, CAN/CSA C108.6-M91

    4.8. WAP Environmental Requirements

    The WAP shall adhere to following environment requirements

    1. Temperature:

    Operational: 0C to 49C

    Storage: -40C to +70C

    2. Humidity:

    Operational: 95% at 49C

    Storage: 95% at 70C

    3. Vibration:

    Operational: 2 Grms for 1 hr on each axis

    Transportation: 0.0075 G2/Hz for 3 hrs on each axis

    4. Shock (if applicable):

    Operational: 10G

    Transportation: 100G

    5. Troubleshooting

  • ILS Users Manual 41

    SYMPTOM CAUSE FIX

    Lock LED gives GREEN light, but no motor

    activation

    Motor is not connected to lock control

    board

    Check that the lock rosette cable is properly

    connected to the CN6 connection on the lock control

    board

    Invalid cardholder data

    Check the system setting for proper authorization

    for cardholder, Access level, time zone, deactivation

    / activation dates

    Cardholder in not in lock databaseVerify that the lock has been initialized with correct

    database and time

    Lock is not initialized Verify the lock has been initialized

    Exhausted batteries Replace with new AA batteries

    Lock is in Secure ModeLock may be in secure mode, change lock mode to

    card only

    Verify the PDA Adapter is turned on

    Check PDA adapter batteries

    Database cannot be down loaded to PDAComm server is not running as an

    applicationStart the Comm server

    Comm server is not running as an

    applicationStart the Comm server

    ActiveSync in not installed / running Install Microsoft Active Sync

    PDA is not connected to computerCheck the USB connection from PDA to computer

    running MS ActiveSync and the comm server

    Invalid CSV file Download database to PDA from LMS

    Check for correct password "ilsppapp" and

    username / password combination

    Lock is Factory Mode Initialize the lock via PDA

    Initialize via the PDA, following the specified

    procedure, and wit for at least 20 seconds

    Ensure sufficient delay between putting a lock in

    factory mode and initialing it (30 Seconds)

    Verify Lock ID by issuing "VIEW INFO: Command

    from PDA

    WLM-ACU identification may have failed Re-initiate join Command via PDA or Join Card

    Site ID MismatchEnsure that lock was initialized using a PDA

    configured via the same OG as the WAP

    WAP is Offline Follow WAP Troubleshooting

    WAP Lock Table is out-of-dateEnsure that WAP is online & WAP status info is

    correct

    Lock failed Join after firmware upgrade

    on ACU, WLM, or ReaderRe-initiate Lock join

    Verify lock battery level via PDA

    Replace lock batteries

    Check AC power supply properly plugged in

    Make sure network supports POE for POE WAP

    Check Ethernet connection is properly plugged in

    Check Wi-Fi configurations at router and WAP

    Make sure Wi-Fi access point supports IEEE 802.11b

    Check network connectivity/speed/strength (Wi-Fi)

    If incorrect will manifest itself in regularly

    scheduled intervals of connectivity of approximately

    every 20-30 seconds showing online briefly.

    Refer to documentation on setting up SSL for more

    information

    Network Connections Wi-Fi/Ethernet Link LED blinking

    The following problems will require the use of Hyper Terminal as well as the ability to FTP onto the WAP:

    WAP does not stay connected to LMS

    (Intermittent Connection) Make sure SSL communication correct

    WAP Not Found --> LED 2 flashes approx. 50 times

    and both LED go solid red

    Lock drops offline and does not come back online

    on its own

    WAP Troubleshooting

    Not properly powered Power LED off or blinking

    LMS does not recognize the PDA

    Database cannot be loaded on the PDA

    Lock Join Troubleshooting

    No LED Activity on Radio module BoardLock not Initialized properly

    Lock Communication Troubleshooting

    Lock Troubleshooting

    Lock LED gives RED light Indication

    Lock LED gives no indication

    PDA Troubleshooting

    PDA will not communicate to lock Lock Communication Timeout

  • 42 OWL Users Manual

    6. Hardware Upgrade

    6.1. Description

    The ILS lock has been designed for quick and easy modification and upgrade. Depending on current lock version

    The ILS lock can be upgraded to and from any available ILS reader technology.

    WAPs by default are configured for DHCP

    Issue setnetwork for Ethernet or setwireless for

    Wi-Fi WAP command, this will state if DHCP is

    enabled or not

    Issue setnetwork pwd=password dhcp=off if

    necessary

    To set a static ip issue setnetwork pwd=password

    ip=your.ip.addr.here

    Once set, reboot the WAP your.ip.addr.here should

    appear immediately after NETWORK INTERFACE

    PARAMETERS on the startup screen.

    WAPs by default are configured for DHCP

    Issue setnetwork for Ethernet or setwireless for

    Wi-Fi WAP command, this will state if DHCP is

    enabled or not

    Issue setnetwork pwd=password dhcp=off if

    necessary

    To set a static ip issue setnetwork pwd=password

    ip=your.ip.addr.here

    Once set, reboot the WAP your.ip.addr.here should

    appear immediately after NETWORK INTERFACE

    PARAMETERS on the startup screen.

    Connecting to wrong network (Wi-Fi) Specify the correct SSID in the configuration

    settings, instead of Search

    Start screen in Terminal emulation shows an

    indication that the application image has been

    corrupted WAP_BACKUP_APPLICATION READY

    Contact Technical Support for assistance

    WAP does not connect to LMS

    Incorrect IP Address

    Incorrect Network Configuration

    Corrupted Memory

    WAP Troubleshooting

    MAG

    Offline

    MAG

    Offline

    MAG

    Offline

    iClass

    Offline

    iClass

    Offline

    iClass

    Offline

    MiFare

    Offline

    MiFare

    Offline

    MiFare

    Offline

    eProx

    Offline

    eProx

    Offline

    eProx

    Offline

    MAG

    Online

    MAG

    Online

    MAG

    Online

    MAG

    Online

    iClass

    Online

    iClass

    Online

    iClass

    Online

    iClass

    Online

    MiFare

    Online

    MiFare

    Online

    MiFare

    Online

    MiFare

    Online

    eProx

    Online

    eProx

    Online

    eProx

    Online

    eProx

    Online

    MAG

    Online

    MAG

    Online

    MAG

    Online

    iClass

    Online

    iClass

    Online

    iClass

    Online

    MiFare

    Online

    MiFare

    Online

    MiFare

    Online

    eProx

    Online

    eProx

    Online

    eProx

    Online

    eProx

    Offline

    MAG

    Online

    Door Prep

    required

    CT30 - Retro

    Fit

    Slab - Standard

    Advance Door

    Prep

    MAG

    Offline

    iClass

    Online

    eProx

    Online

    MiFare

    Online

    iClass

    Offline

    MiFare

    Offline

    -

  • ILS Users Manual 43

    Note All individuals must take sufficient steps to reduce possibility of ESD during installation, upgrade and service of all ILS components

    6.2. Radio Upgrade

    The offline ILS can be upgrade to wireless functionality with the addition of a radio module. A radio module upgrade kit can be acquired which will include:

    1. Wireless radio module

    2. Hybrid battery cover for lock

    3. Mounting screws

    4. Connection cable

    Please note that the hybrid battery cover must be used in conjunction with the radio module for proper signal transmission to occur.

    Before the lock radio upgrade occurs, the wireless access point to which the lock will communicate must be updated first by associating the Lock ID of the lock that is to be upgraded. Please refer to the software users manual for information on lock and wireless access point association.

    6.2.1. Radio Upgrade / replacement procedure

    1. Remove existing battery cover.

    2. Power down the lock by removing the 3 AA batteries

    3. Position the radio module on the top bracket of the lock back plate

    4. Secure the radio module with two screws

    5. Attach the connection cable to the radio module and the ACU control board

    6. Replace the 3 AA batteries

    a. Once batteries have been replaced, the lock will go through a power cycle in which the radio module will automatically attempt to join the wireless access point.

    b. Please refer to Section 3.4.2 Join Network

    6.3. Reader Upgrade

    When replacing or upgrading the reader head, power down the lock by removing the batteries. The lock configurations will remain in memory. For wireless locks, the join network command will need to be sent after new reader is installed as in section 3.4.2 Join Network.

    6.3.1. Reader Upgrade / replacement procedure

    1. Remove thumb turn from inside of lock(if equipped)

    2. Remove the top battery cover of the lock inside trim by remove the torx screw

    3. Depress ribbon cable connector to release the reader connector

  • 44 OWL Users Manual

    a. Take note of the cable routing through door interior

    4. Remove old ILS reader and replace with the new reader

    a. Take care to properly reroute reader connection cable as previously installed

    5. Reconnect ribbon cable connection and secure them in place by properly closing contacts

    6. Replace the back cover and thumb turn

    6.4. WAP Replacement

    When a wireless access point is replacing an existing ILS access point the configuration process should follow with Section 3.4 Wireless Access Point Commissioning.

    The WAP ID should remain unchanged in the head in software unless a new access point with new lock table is being installed.

    1. The power source for existing WAP should be disconnected

    2. The new WAP should only be installed after it has been commissioned.

    3. After WAP has been installed in place reconnect the power source

    4. All locks associated with the original WAP must rejoin the WAP through the defined Join Network process found in section 3.4.2 Join Network.

    6.5. Firmware / Software Upgrade

    Firmware upgrade for most hardware and components can be accomplished via PDA or wirelessly through the head end software. Refer to the users manual or online help for the software package you are using for the appropriate menu options to begin the wireless firmware download operation.

    6.5.1. Upgrade components

    There are six (6) system components available for firmware / software upgrade

    1. Lock ACU (Lock Control board) - Firmware

    2. Reader - Firmware

    3. WLM (Lock Radio) - Firmware

    4. WAP (Wireless Access Point) - Firmware

    5. PDA Application - Software

    6. Head End System - Software

    6.5.2. Lock Upgrade procedure via PDA

    For firmware upgrade via PDA there are no constraints on upgrade procedure. The components can be upgraded in any order unless otherwise defined.

    6.5.3. Lock Upgrade procedure via wireless

  • ILS Users Manual 45

    For firmware upgrade via wireless please take not to follow the order process defined to prevent error in lock to head end software communication

    1. Upgrade the Reader firmware

    2. Upgrade the WLM firmware

    3. Upgrade the ACU firmware.

    Note The Lock should not be accessed, or attempt to be accessed, for 30 minutes after the firmware upgrade

    4. Upgrade the WAP firmware (only available through wireless)

    If the head end software requires an upgrade, it should be upgraded after all the lock and wireless access point upgrades have been made.

    6.5.4. PDA Application procedure

    6.5.4.1. FROM INSTALLING COMPUTER

    The new CAB file is downloaded to the PDA through Active Sync. The head end software is not involved.

    From the installing computer connect the PDA device via the appropriate USB cable. Next, navigate to the folder containing the PDA .CAB file. The new .CAB file is downloaded to the PDA through ActiveSync. The head end software is not involved

    1. Copy the .CAB file from the folder to the PDA

    2. In Microsoft Active sync Click Explore and paste the file to

    the device

    Figure 1 Microsoft ActiveSync Connection

  • 46 OWL Users Manual

    Figure 2 PDA Device Directory

    6.5.4.2. Install Application File on Mobile device

    FROM PDA

    1. Once files have been copied to the PDA they can then be

    installed on the device

    2. To Install the file on the device navigate to the files

    3. Start File Explorer

    Figure 3 PDA File Explorer

    4. Click of the appropriate PDA .CAB file to install the

    application. The file will launch and begin installation

    5. Once complete click OK on the top right corner of the PDA

    screen

  • Integra 5 Software Users Manual Index 47

    7. Appendix A

    Audit Events table

    Event ID Event Name Description

    1 GRANTED_ACCESS Access Granted, When no latch monitoring or door sensor

    2 GRANTED_ACCESS_DOOR_OPENED Access Granted and Door Opened, used when latch monitoring or door sensor are present

    3 GRANTED_ACCESS_DOOR_NOT_OPENED Access Granted but Door Not Opened, used when latch monitoring or door sensor are present

    4 EMERGENCY_OPENING Lock opened through PP or LMS

    5 DOOR_OPENED_INTERIOR Door opened from ins ide, only when not in office mode

    6 MECHANICAL_KEY_OVERRIDE Mechanica l key override

    7 DEADBOLT_PROJECTED_FROM_INSIDE Privacy knob turned (enabled) from ins ide

    8 DEADBOLT_WITHDRAWN_FROM_INTERIOR Privacy knob turned back (disabled) from ins ide

    9 DOOR_HELD_OPEN Alarm when door i s left open, used when latch monitoring or door sensor are present

    10 DOOR_FORCED_OPEN Alarm when door i s forced open

    11 CARD_NOT_ACTIVE Card not yet active

    12 CARD_EXPIRED Card has expired

    13 INVALID_BADGE User information is not on the lock

    14 INVALID_AUTHORIZATION Authorization for access i s miss ing

    15 INVALID_ISSUE_CODE Card is cancel led

    16 ACCESS_DENIED_INVALID_TIMEZONE User i s not enabled in this hour

    17 ACCESS_DENIED_PRIVACY User does not have Privacy Override privi lege

    18 ACCESS_DENIED_EMERGENCY_LOCK Lock i s in Emergency Lock Mode no users a l lowed access

    19 ACCESS_DENIED_BLOCKED User does not have Blocked Override privi lege

    20 ACCESS_DENIED_LOW_BATTERY Door open/close fa i led because of low batteries

    21 LOCK_UNLOCKED_UNDER_OFFICE_FIRST office fi rs t unlock

    22 LOCK_LOCKED_UNDER_OFFICE_FIRST office fi rs t relock

    23 LOCK_UNLOCKED_UNDER_AFC Lock entered AFC mode

    24 LOCK_LOCKED_UNDER_AFC End of AFC mode

    25 ENTERED_STANDARD_MODE Lock entered Standard mode

    26 ENTERED_OFFICE_FIRST_MODE Lock entered Office fi rs t mode

    27 ENTERED_OFFICE_MODE Lock entered Office mode

    28 ENTERED_BLOCKED_MODE Lock entered Blocked mode

    29 ENTERED_EMERGENCY_LOCK Lock entered Emergency unlock mode

    30 ENTERED_EMERGENCY_UNLOCK Lock entered Emergency lock mode

    31 ENTERED_FOYER_MODE Lock entered Foyer mode

    32 AUTOMATIC_STANDARD_DENIED_BLOCKED_MODE Automatic change to s tandard mode denied s ince lock i s in blocked mode

    33 AUTOMATIC_OFFICE_DENIED_BLOCKED_MODE Automatic change to office mode denied s ince lock i s in blocked mode

    34 AUTOMATIC_OFFICEFIRST_DENIED_BLOCKED_MODE Automatic change to office fi rs t mode denied s ince lock i s in blocked mode

    35 AUTOMATIC_FOYER_DENIED_BLOCKED_MODE Automatic change to foyer mode denied s ince lock i s in blocked mode

    36 AUTOMATIC_STANDARD_DENIED_EMERGENCY_MODE Automatic change to s tandard mode denied s ince lock i s in emergency mode

    37 AUTOMATIC_OFFICEFIRST_DENIED_EMERGENCY_MODE Automatic change to office mode denied s ince lock i s in emergency mode

    38 AUTOMATIC_OFFICE_DENIED_EMERGENCY_MODE Automatic change to office fi rs t mode denied s ince lock i s in emergency mode

    39 AUTOMATIC_FOYER_DENIED_EMERGENCY_MODE Automatic change to foyer mode denied s ince lock i s in emergency mode

    40 OFFICE_DENIED_LOW_BATTERY Lock cannot go to office mode due to low battery

    41 UPDATE_OF_LOCK Lock was updated

    42 UPDATE_FIRMWARE_READER Update to reader fi rmware

    43 UPDATE_FIRMWARE_ACU Lock fi rmware update

    44 UPDATE_FIRMWARE_WLM Radio Module Fi rmware Updated

    45 UPDATE_RTC Real Time Clock Updates

    46 DAYLIGHT_SAVINGS_EVENT DST s tart or DST end occurred

    47 LOW_BATTERY_EVENT Lock has reached voltage level of 18%of usable range.

    48 AUDIT_TRAIL_CLEARED Recorded when audit tra i l i s cleared

    49 AUDIT_TRIAL_LIMIT Inform LMS about audit log getting ful l and about to be overwri tten

    50 LOCK_POWER_UP_PP Recorded after power up by Portable programmer

    51 INITIALIZATION_OF_LOCK_BY_PP Lock ini tia l i zed through PP Appl ication

    52 DOOR_HELD_OPEN_RESTORED Clear s tate to Door Held Open

    53 DOOR_FORCED_OPEN_RESTORED Clear s tate to Door Forced Open