Wireless CDT Overview - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

Wireless CDT Overview

Description:

Select the COM port from the pull down that the cable is connected ... CDT COM Port and Address Assignment. Wireless Access System Configuration. 10. CDT ... – PowerPoint PPT presentation

Number of Views:233
Avg rating:3.0/5.0
Slides: 31
Provided by: wyreles
Category:

less

Transcript and Presenter's Notes

Title: Wireless CDT Overview


1
Wireless CDT Overview
01/07/2008
2
Configuration and Demonstration Tool
  • Wyreless Access units are configured and tested
    using the Configuration And Demonstration Tool
    (CDT) Utility Program
  • Download latest version from ir-swa.com
  • Runs in Internet Explorer
  • Requires Microsoft Virtual Machine
  • Not included in WINDOWS XP
  • Old versions available from 3rd party sites
    (Google MSJAV86.exe)
  • Upgrade old version from Microsoft before CDT
    runs
  • Straight serial cable connection to PIM J5 9-pin
    D
  • Process to connect to PIM-TD2/TD4 and PIM-485
    differ

3
Configuration and Demonstration Tool
  • A browser-based software application for
    configuring and testing installations of the
    Schlage Wireless Access line of access control
    products. This tool provides the ability to
  • Configure various WPIM and WAPM parameters
  • Display card swipe data
  • Quickly test granting or denying access
  • Display the WAPMs status
  • Report various WAPM and WPIM statistics
  • Store and display card swipes recorded while the
    CDT is running

4
Starting the CDTPIM-TD2 PIM-TD4
  • Start the CDT application by opening the
    WyrelessDemo.html file or by using the shortcuts
    placed during installation
  • Connect the computer to the 9-pin D connector J5
    on the PIM with a straight through serial cable
    (pins 2 to 2, 3 to 3 and 5 to 5)
  • Select the COM port from the pull down that the
    cable is connected
  • The PIM Status changes from Install PIM on COMX
    to Standard PIM Connected on COMX

5
Starting the CDTPIM-485
  • Start the CDT application by opening the
    WyrelessDemo.html file or by using the shortcuts
    placed during installation
  • Disconnect the 485 connection to the access
    control panel
  • Connect the computer to the 9-pin D connector J5
    on the PIM with a straight through serial cable
    (pins 2 to 2, 3 to 3 and 5 to 5)
  • Select the COM port from the pull down that the
    cable is connected
  • Press and hold SA or SB while momentarily
    pressing and releasing the PIM Reset Switch, S3.
    Continue pressing SA or SB until LEDs CR7 and
    CR10 both start flashing.
  • The PIM Status changes from Install PIM on COMX
    to XXXXX PIM Connected on COMX

6
CDT Status Screen on PIM-TD2 with WRI Linked and
in Tamper, Raw (Hexadecimal) Card Data Mode
Selected
7
CDT Status Screen on PIM-485 with MIRL Linked and
Decoded Card Data Mode Selected
8
CDT Status Page Highlights
9
CDT COM Port and Address Assignment
10
CDT Activity Screen
  • Shows all card reads during the CDT session
  • Time stamped by the computer
  • Data provided in format selected when card was
    read

11
CDT Configuration Screen
12
Heartbeat
  • Default Setting 10 minutes
  • Battery-Powered Access Points
  • Battery life using default setting is
    approximately 4 years or 60,000 card swipes.
  • Adjustable down to 15 seconds with less than 1
    year battery life
  • Wireless Reader Interfaces
  • Adjustable down to 1 second.

13
Relatch Time
  • Default Setting
  • 3 Seconds, Timer Only
  • Timer Only
  • Access point relatches at the set time regardless
    of door status or position.
  • On Door Open or Timer
  • Access point relatches either when opened or at
    the set time, whichever comes first. Recommended
    for battery-powered devices for optimum battery
    life. This is also the most secure setting, as it
    reduces tailgating.
  • On Door Close or Timer
  • Access point relatches either when closed or at
    the set time, whichever comes first.

14
Card Conversion (PIM-TD2)
  • Default Setting
  • (none) Pass Through
  • Reverse Not applicable
  • Northern 1 Provides 32 bit Wiegand used with
    mag stripe (clock and data) readers on Northern
    access control panels
  • Northern 2 Provides raw output data in Wiegand
    used with mag stripe (clock and data) readers on
    Northern access control panels
  • Northern 5 Provides 26 bit Wiegand output to
    Northern access control panels from mag stripe
    (clock and data) readers.
  • Northern 6 Provides 32 bit Wiegand output to
    Northern access control panels from mag stripe
    (clock and data) readers.
  • CKM2W34 Provides Cardkey 34 bit format Wiegand
    output with properly coded mag stripe cards.
  • CKM2W26 Provides Cardkey 26 bit format Wiegand
    output with properly coded mag stripe cards.

15
Mode
  • Default
  • Normal
  • Normal
  • Standard configuration. Card data and access
    point status reported in real time.
  • Auto
  • For factory use only.
  • Paused
  • For factory use only.

16
Latch Type
  • Default
  • Factory setting based on lock or latch type
    issued with the access point.
  • Motor 1 WEXK Best Cylindrical IRL
  • Motor 2 - Best Mortise IRL MIRL
  • Motor 3 - Saflok Mortise MIRL
  • Motor 4 WA5600 Series, WA993 Marks
    Cylindrical MIRL
  • Motor 5 WA5200 Series
  • Motor 6 8 - For future use.

17
Fail Safe/Secure
  • Default
  • Disable
  • In the event of a loss of RF communications
    between the PIM and an access point
  • Disable
  • the lock or latch will remain in whatever
    condition it was at the time RF communications
    was lost.
  • Lock
  • the lock or latch will reengage to secure the
    facility or room.
  • Unlock
  • the lock or latch will disengage to allow free
    ingress and egress.
  • Note This feature is over-ridden when the Cache
    feature is enabled.

18
First / Delay / Retry
  • Default First 200 msec. / Delay 200 msec. /
    Retry 5
  • First
  • The first query an access point makes to a PIM
    occurs immediately following a card swipe.
  • First is the amount of time, in milliseconds,
    an access point should wait before making its
    second query to a PIM.
  • This setting should be slightly greater than the
    fastest response time from the access control
    panel or host. This optimizes battery life and
    system performance.
  • Delay
  • Delay is the idle time between subsequent
    queries.
  • Shorter delays may reduce latency.
  • Longer delays may enhance battery life.
  • Retry
  • Retry is the maximum number of times an access
    point queries a PIM before the access point goes
    back to sleep.
  • The number of retries should be slightly greater
    than the longest response time from the access
    control panel or host.
  • Retrys Max Response Time of Panel-
    First/Delay 1

19
Extend Unlock
  • Default
  • Extend Unlock enabled (Checked)
  • Extend Unlock enabled allows the access point
    module to respond to unlock schedules
  • Extend Unlock disabled prohibits the access point
    from responding to unlock schedules
  • Extended Unlock must be enabled for a WRI to
    respond to remote unlock commands when short
    heartbeats are configured

20
Rxt Sift
  • The Rxt Sift feature determines how a WA5600
    Series Mortise or WA993 Exit Trim will handle
    reporting of a request to exit activation when in
    an unlocked state.
  • If Rxt Sift is not checked (disabled), then the
    WA5600 Series or WA993 will always report when a
    request to exit has occurred regardless of the
    lock state.
  • If Rxt Sift is checked (enabled), then the WA5600
    Lockset or WA993 Exit Trim will not report that a
    request to exit has occurred anytime the unit is
    unlocked. This is the default setting for the
    WA5600 Series and WA993.
  • The Rxt Sift configuration can not be enabled for
    WA5200 Series Cylindrical Locksets or Wireless
    Reader Interfaces (WRIs) although the CDT may
    show the feature enabled. These units always
    report requests to exit no matter the setting of
    Rxt Sift or lock status.

21
Rxt
  • The Rxt feature determines how a WAPM will handle
    a request to exit.
  • If Rxt is not checked (disabled), then the WAPM
    will only report that a request to exit has
    occurred. Use this mode if the access point does
    not need to be electronically unlocked in order
    to provide egress (for instance, the access point
    has a crash bar) but the access control panel
    needs to be notified so that a forced door does
    not occur.
  • If Rxt is checked (enabled), then the WAPM will
    not only report that a request to exit has
    occurred, but will query the WPIM (as in a card
    swipe) to determine if the access point should be
    electronically unlocked. Use this mode if the
    access point needs to be electronically unlocked
    in order to provide egress.

22
Hi Lo Output(PIM-TD2 only)
  • Default
  • Lo on RTE
  • Hi on Door Open
  • Lo on Trouble
  • Lo closed switch
  • Hi open switch
  • Note If the access control system requires
    supervised status inputs, then slaved relays are
    required on these interfaces.

23
MAG Track
  • Default
  • Track 2
  • 1 Track 1
  • 3 Track 3
  • Note Only the first 255 bits of track 1 and 3
    data are captured by the PIM. If data extends
    beyond the first 255 bits on the card it will be
    lost and the access system will not recognize it
    as legitimate data.

24
Cache Mode
  • Data Bits enter the number of bits in the
    credential
  • No Purge If not checked deletes the cache entry
    after 5 days of non-use
  • FC Mode If checked uses facility codes of
    previously approved credentials in degraded mode.
    If not checked then the full credential is used.

Definition Cache Mode When activated the
access point module will make access decisions
based on previously approved credentials or
facility codes when RF communications are lost to
the PIM-TD2 or a PIM 485 is not polled by the
access control system for longer than 5 seconds.
25
UNIQUE CDT Settings for Recognition Systems Open
Protocol PIM-485
26
PIM-485 Select Door Option
  • Default
  • Door 0
  • Click on the down arrow to open the drop down
    menu.
  • Click the access point you want to configure
    between Door 0 and Door 15.
  • Note A variety of access point types can be
    assigned to a PIM. For example 6 MIRLs, 5 WPRs, 3
    WRIs and 2 WSMs.
  • You may configure each access point with unique
    settings using the Configuration tab or observe
    status and activity using the respective tabs.

27
PIM-485 Addresses Tab
  • Defaults
  • Unique Randomly selected from 00000 to 65,535.
    Used to create a unique address for RF
    communications
  • Addr Lo 0 Addr Hi 15 PIM Addr 0
  • To change the settings, enter new data in the
    appropriate field(s) and click the Set button.
  • Addr Lo Displays the lowest access point address
    assigned to the PIM between 0 and 254.
  • Addr Hi Displays the highest access point
    address assigned to the PIM between 0 and 254.
  • PIM Addr Displays the PIMs address on the same
    RS485
  • Set Click this button to establish the new
    settings.

Definition Addresses Tab to display or change
the PIMs unique RF address and range of door
(reader) addresses.
28
PIM-485 Link Tab
  • Defaults
  • Panel 0
  • Not Linking
  • The Panel number determines the reader number to
    the access control system and in the RF address.
  • Start puts the PIM in link mode for selected
    Panel (Door) number.
  • Only the Panel number must be used to set the
    reader address. Changing the Select Door number
    results in all units being linked as the PIMs
    lowest assigned Panel (reader) number.
  • Stop takes PIM out of link mode.
  • PIM automatically comes out of link mode when
    access point successfully links or in 30 minutes.

29
Configuration Screen for PIM-485
30
PIM-485 Prealarm
  • Defaults
  • Prealarm not active
  • Door held alarm time 15 seconds
  • Checking the Prealarm results in the battery
    powered access point sounding its beeper 5
    seconds prior to the PIM sending a door held open
    message to the access control system
  • Changing the number setting results in the new
    time the PIM sends the door held open alarm
    message.
  • The particular access control system may not
    implement the door held open alarm report from
    the PIM and make its own decision on the door
    held open alarm.
Write a Comment
User Comments (0)
About PowerShow.com