NAC2500 SOC User Manual
NAC2500 SOC User Manual
NAC2500 SOC User Manual
Copyright 2006 NITGEN Co., Ltd. All rights reserved Reproduction of part or all of the contents in any form is prohibited other than in accordance with the permissions. Product specification can be changed and upgraded to improve functionality without prior notice. NITGEN, NITGEN logo are registered trademark of NITGEN.
-2-
Table of Contents
CHAPTER 1. INTRODUCTION .................................................................... 5 1.1 Product Introduction......................................................................................... 5 1.2 Product Features and Specification.................................................................. 8 CHAPTER 2. HOW TO USE....................................................................... 12 2.1 Detailed Product Parts .....................................................................................12 2.2 LC Screen Layout ........................................................................................14 2.3 Fingerprint Use.................................................................................................15 2.4 Authentication...................................................................................................16 2.4.1 SOC Fingerprint ..........................................................................................16 2.4.2 Password......................................................................................................20 2.4.3 Card .............................................................................................................20 2.4.4 Others: Automatic Attendance Mode...........................................................21 CHAPTER 3. ENVIRONMENT SETTING ................................................... 23 3.1 Menu Composition ...........................................................................................23 3.2 Entering into Menu ..........................................................................................25 3.3 Basic Menu........................................................................................................26 3.4 Detailed Menu...................................................................................................28 3.4.1 User Management........................................................................................28
-3-
3.4.2 Fingerprint Sensor Setting ...........................................................................33 3.4.3 UI (User Interface) Setting ..........................................................................37 3.4.4 System Setting .............................................................................................41 3.4.5 3.4.6 Network Setting........................................................................................47 Cofirmation of Terminal Information .......................................................53
3.4.7 Factory Default Setting................................................................................55 APPENDIX 1: NETWORK CONNECTION ERROR AND SOLUTIONS..... 59 APPENDIX 2: TERMINAL INITIALIZATION ERROR AND SOLUTIONS .. 61 APPENDIX 3: LAW AND REGULATION.................................................... 62 APPENDIX 4: WIEGAND PROTOCOL FORMAT ...................................... 63 APPENDIX 5 : EMERGENCY SCREEN..................................................... 65
-4-
Chapter 1. Introduction
1.1 Product Introduction
Overview
The use of biometrics system continuously increases in various authentication systems and in areas that require a higher level of security because of its ease of use and economical benefits. Among a number of biometrics system, a fingerprint recognition system is not only easy to use but also enables economical product development. It takes up the most part of the market as it allows a wide variety of application. NITGEN, a leader in the fingerprint recognition area, has provided fingerprint recognition solutions for the management of PC security, knowledge, safe, access control, electronic payment and financial clearings. Continuous R&D activities and quality management ensure that NITGEN meets evolving needs and demands of the market and the customers. NITGEN access control system is a culmination of world-renowned technologies from NITGEN including fingerprint recognition algorithms, optical sensor, embedded design and software applications. Unlike legacy access control systems that use only password and ID card, it provides the ease of use and tight security with no risk of forgetting password, stolen cards or forgery. The system is designed to provide maximum operational efficiency over the network by enabling remote monitoring on terminals that have been independent so far. NITGEN access control system allows various combinations of card, password and fingerprints. It also meets the common set of requirements and special needs in the corporate and
-5-
government sectors with such functions as shortened ID, 1:N matching and voice guidelines. The manual gives in-depth explanation as to how to use NITGEN access control terminal (NAC-2500 SOC).
Server PC
Network Terminal
NAC-2500 SOC
Main Features 1. Server S/W : Access Sever 2. Terminal communication, log collection 3. user information & log DB (fingerprint data not stored) data
Server PC
Client PC
-6-
2. user registration and other management 3. Terminal status and event monitoring Terminal ( NAC-2500 ) 1. user check and authentication 2. access door control
NITGEN access control terminal(NAC-2500 SOC) can be used alone for full functionality or can be used in connection with the network together with admin programs (Access Server, Remote Manager, Remote Monitor) in order to reduce the number of terminals and to ensure an easier and a more effective management. Server S/Wand Client S/W can be placed within one PC.
NAC2500 SOC(Store-On-Card) stores user s fingerprint data onto user s card only and the database is not created either on a terminal or on a server. For user authentication, approach user s card close to the terminal and put the finger that has a registered fingerprint on a terminal. Then, authentication result comes out by comparing fingerprint data stored on a card with the fingerprint that is put on a terminal.
-7-
1.2
Product Features Nitgens access control system, NAC-2500 SOC, stores fingerprint information only on users card, not on a server or a terminal in order to ensure maximum security and information protection. The system has following features; access control and management on small & medium number of users a combination of various (fingerprint, password, RF card) authentication methods
network-based access control on terminals for multiple users easy remote management on the system (Server/Client PC can be separated) view on users access history and various additional functions real-time access monitoring access control by period and time SDK (S/W Developers Kit) for the development of application programs such as attendance management program (separate)
-8-
System Specification Specification Connection Terminal Remote Management Details Maximum 255 units
# of Users to be 30,000 users Registered Network Authentication Type Authentication Speed TCP/IP, 10M bps fingerprint, password, SOC RF card SOC auth mode: less than 1.5 second
-9-
Speed Authentication Algorithm # of registered Terminal users TCP/IP RS-485 Wiegand Communication
SOC Auth mode: less than 1.5 sec FRR: less than 0.1%, FAR: less than 0.001% 20,000 (1/2 fingerprints per user) 10 base-T Ethernet (optional) Max. 115200bps (Custom requirement) 1. Input: provided with the use of external card reader 2. Output 2.1 Access Controller mode: Facility Code and ID 2.2 Reader mode: Values read from Card reader 4 characters only for ID 90 (W)* 200 (L)* 48 (H) mm
Case
Dead Bolt / Strike / EM Lock / auto door Adapter 1 In: AC 100V ~ 240V, 50/60 Hz Out: DC 12V, 3A (24V OK) In: AC 100V ~ 240V, 50/60 Hz Out: DC 5V, 3A
- 10 -
ID length (4 ~ 15 digits) Authentication results to be displayed in LED Network Board Optional Door Control Board SOC Mifare Module (13.56MHz Mifare) Storage Temperature Operation Storage Humidity Operation 25% ~ 85% RH -25 ~ 65 -20 ~ 60 (with no dew condensation) 15% ~ 90% RH
- 11 -
LCD: All activities are displayed with text message. Key pad: Used for ID input and environment setting. Details are as follows. Key 0 ~ 9 *, # Description To type in numbers To move a curser up and down for menu selection and to change direction. *(Backward), #(Forward)
- 12 -
To complete ID type-in or environment setting. To erase typed-in numbers one by one or to move to higher level in menu. To set or change an environment. User-customizable buttons that can be used for attendance management including arrival/leave/go-out/return. F1~F4 can be set freely depending on software requirements. Reserved Reserved
F1 ~ F4
SHIFT AUX
Speaker: Used for recorded voice guidelines and warnings. LED lamp: Showing operations of the terminal. Each lamp represents the followings. Operation Color To display the results of Authentication authentication. Green for Green/red success and red for failure. Power To display power status wit LED on for power on. To display network connection with LED on for network connected. Red Function
Network
Green
- 13 -
fingerprint.
Card reader: To read card information. Hold the card lengthwise and approach it towards the terminal so that information stored on the card can be transferred to the terminal.
2.2
LC Screen Layout
- 14 -
2.3
Fingerprint Use
To prevent authentication errors from occurring during the registration and authentication of fingerprint, please follow the methods below. To maximize the contact area and press the surface evenly. On a scale of 0 to 100% (0%: minimum power 100%: maximum power), please press the surface with approximately 50%~70% power.
Please place the core of fingerprint shape in the center. In general, the core of fingerprint is located in the same line with half moon in user s fingernail and therefore, place the half moon in the center of fingerprint sensor.
- 15 -
2.4 Authentication
NAC2500 SOC determines whether to authenticate an access or not by comparing users fingerprint stored in the card with fingerprint information taken by the terminal when Mifare card is approached towards the terminal. Also, an optional function can be utilized to determine an access which compares password information stored in the card with the password taken by the terminal. It is also possible to use the card only to authenticate an access.
- 16 -
Authentication for attendance mode It does authentication by using function keys (F1~F4). Before trying authentication, please press an appropriate function key and proceed with authentication. In this case, the result associated with the pressed function key remains in log history which can be used for attendance data. For example, if a user presses F1 and then inputs an ID, the ID+F1 remain in log history.. The following shows an LCD display when pressing F1.
F 1 I N P U T I D
* In order to use attendance mode, the option of terminal is set in by Menu-> system options(4) -> Function mode(4) -> T&A
Expanded attendance mode It does authentication by using extended function keys (F11~F19, F21~F29, F31~F39, F41~F49) Before trying authentication, please press an appropriate function key and select approprating number with a Left key (*)
- 17 -
or a Right Key (#). In case of pressing the left key, it is decressed the number of function. And in case of pressing Left Key (*), it is incressed the number of function displayed in LCD.
F 1 1 2 3 I 4 N P U T I D :
To set or delete the expanded attendance mode, please take the following steps. 1) To set the mode: Please set Menu->System Option (4) -> Function Mode (4) -> T&A -> Auto T&A -> expanded T&A -> YES 2) To delete the mode: Please set Menu->System Option (4) -> Function Mode (4) -> T&A -> Auto T&A -> expanded -> NO Function key Display You can choose the display message when press the function key. The option is set in Menu -> UI Option(3) -> FuncKey Disp -> Mode1 or Mode2
- 18 -
F3 KEY F3 Absense F3
F4 KEY F4 Return F4
If the option of function key display is set by mode1, Follwing message is displayed when you press the F1 key.
C 1 l 2 o c k I n :
Authentication failure message The following messages are displayed depending on authentication method and causes of failure.
- 19 -
failed. When the message is displayed, please check if your fingerprint is too dry or too wet.
T i m e o u t !
2.4.2 Password
It checks the right to access by using 4~8 digit password and it is used in special occasions including damaged fingerprint.
I 1
N 2
P 3
U 4
I :
N *
P *
U *
T * *
2.4.3 Card
The authentication is based solely on the card, not on fingerprint or password information stored with the RF card. To use RF card authentication, either approach RF card in the initial screen or input ID followed by approaching card when a message pops up.
- 20 -
When the card is approached towards fingerprint sensor, authentication procedure begins. When an ID is typed in, the following message pops up from the LCD for a registered card.
C o n t a c t R F c a r d
To set or delete the automatic attendance mode, please take the following steps. 1) To set the mode: Please set Menu->System Option (4) -> Function
- 21 -
Mode (4) -> T&A -> Auto T&A -> YES 2) To delete the mode: Please set Menu->System Option (4) -> Function Mode (4) -> T&A -> Auto T&A -> NO
- 22 -
- 23 -
3 4 4 System Setting 1 2 3
Button tone Function Key Disp Log storing Reserved WIEGAND 1 2 3 OFF 26BIT 34BIT AC T&A (Auto T&A)
4 4 5 6 7 8 5 Network 1 2
Function key setting Function key setting Reserved Time setting Terminal mode Time zone Terminal ID TCP/IP
1 2
1 2 3 4 5
Time limit Port setting Number of users Firmware version DB Format Factory format Number of registered fingerprints
4 5
- 24 -
When using network, an initially registered user can choose between either a master or a normal user. It is the same as a registration process for normal users.
- 25 -
Result Display
The following message is displayed if master authentication is successful. After one second, you can enter into the menu. However, you will get a failure message when the authentication is not successful which is same as the failure message for general authentication failure.
[ 1 2
M 3
N 4
] 5 6 7
The following explains the basic menu. If you press ENTER in the basic menu, you can move to detailed menu which is a sub menu of each basic menu. Please press DELETE to go back to the basic menu from detailed menu or to go back to the initial screen from the
- 26 -
U 1
e 2
r 3
a 4
a 5
e 6
r 7
F 1 2
P 3
p 4
i 5
n 6 7
U 1 2
I 3
p 4
i 5
n 6 7
S 1
s 2
e 3
m 4
p 5
i 6
n 7
N 1 2
E 3
w 4
r 5
k 6 7
I 1
n 2
O 3
m 4
t 5
o 6
n 7
F 1
a 2
T 3
r 4
y 5
n 6
t 7
- 27 -
U 1
e 2
r 3
a 4
It is designed to store the information of users into database who will use the access controller. Please register the user with the following procedures after master authentication.
- 28 -
Terminal registration is possible only for normally connected networks and is not possible for disconnected networks. When registering user card, fingerprint information stored within the card is not transferred and stored to terminals.
1) Authority setting The following explains how to set user authority between normal user and master. Please use a directional key and press ENTER to finish. Normal user: no right to terminal management with access authority only via identification. Master: terminal manager who has not only the right to access but also user DB management, environment setting and other menu.
U N
s O
e R
r M A
T L
y /
p M
e A S T E R
2) How to Authenticate NAC2500 accepts the following 5 authentication methods. Access Manger determines which method is used at the time of card registration. When registered via terminals, Please choose the authentication mode of users among
- 29 -
fingerprint, password, CARD, and other combinations. Please use a directional key and press ENTER to finish.
A 1
t 2
e 3
. 4
M 5
How to use by authentication mode Legend: FP(fingerprint), PW(password), CARD, Enter( ) /(OR combination), &(AND combination) Mode Description Fingerprint Authentication is conducted only via fingerprint stored within SOC card. SOC Card + fingerprint (1:1 match) Password CARD fingerprint/p assword Password only for authentication. ID + + PW + CARD only for authentication. Input Card Authentication is conducted either via fingerprint stored within SOC card or via password. Fingerprint authentication takes the priority. SOC Card + FP (FP failure, PW + ) Authentication is conducted both via fingerprint stored within SOC card and password. Both should be successfully authenticated. SOC Card + FP + PW +
fingerprint& password
- 30 -
3) Card Contact When card is successfully contacted, a success message appears and it leads to the next procedures of authority setting. For users already registered or for a failed card registration, a failure message appears and it goes back to the initial screen for registration.
C O
o n
t S
a e
c n
t s o
R r
P 1 2
W 3 4 5 6 7 8 9 10
First, you will see the following screen that waits for the input of user ID. After typing in an appropriate user ID, please press ENTER. If the same ID already exists, a failure message will be displayed and the system goes back to a previous menu.
I 1
N 2
P 3
U 4
- 31 -
To correct ID during typing, please use a delete button. It will erase characters one by one or will go back to a higher menu when no character is input.
Your password can be between 4~8 digits. For security reason, the input password will be displayed as *.
I :
N *
P *
U *
T * *
You will get a success message for successful password input and will get a failure message for failed password input. In case of failure, you will go back to the initial registration screen.
- 32 -
F 1 2
P 3
p 4
i 5
n 6 7
3.4.2.1 Brightness
The first category is sensor brightness. Default value is 40. If the value is bigger, fingerprint image gets blurred and if it is smaller, the image gets clearer. It is recommended that the initial value is not changed.
B 1
i 2
h 3
n 4
s 5
s 6
B (
r 0
i -
g 1
h 0
t 0
n )
e :
s 4
s 0
- 33 -
S 1
c 2
. 3
e 4
e 5
l 6
S 1
You can set the security level for 1:1 mode by choosing 1. However, it is recommended that the value is not changed.
1 ( 1
: -
1 9 )
M :
d 5
- 34 -
The product provides three capture modes for fingerprint including normal, latent and intelli. The normal mode provides the highest speed. The latent capture is relatively slower but can capture latent fingerprints on the surface of a sensor. The Intelli is relatively slower in speed, yet it analyzes the fingerprints of users to capture the optimal fingerprint image. The initial setting is Intelli fingerprint. Please use a directional key and press ENTER to finish.
C 1 a p 2 t u 3 r e 4 M 5 o d 6 e
The following message will be displayed when an appropriate function is successfully selected.
S u c c e s s !
- 35 -
It is to set time limit for fingerprint input to a terminal. If a fingerprint is not input within the selected time, a failure message will be displayed to encourage a re-try. Please press ENTER to go into a sub menu.
S 1 e n 2 s o 3 r 4 T i 5 m e 6 o u t
The values can vary between 1~30. The default value is 5 seconds. Please type in an appropriate time with number keys and press ENTER to finish.
S (
e 1
n -
s 3
o 0
r ) :
T 5
- 36 -
3.4.3.1 Language
a 1
g 2
a 3
You can choose Korean, English, Japanese, Chinese, Spanish, French,Thai, and Indonesian.
K 1 / 2 / 3 o / r 4 e / a 5 n / 6 / 7 / 8
- 37 -
V 1
i 2
e 3
i O
c N
e / O F F
- 38 -
3.4.3.3 Button tone It decides whether you will hear a button tone or not when a specific button is pressed.
B 1 e e 2 p 3
e O
p N / O F F
It can select the message when you press the fucntion key(F1~F4)
F u n 1 c K 2 e y 3 D 4 i s p
F O
u F
n F
c /
K M
e O
y D E
D 1
i /
s M
p O D E 2
- 39 -
The default value is OFF When the option is set in mode1 or mode2, Extended attendance mode is not supportted in NAC2500 SOC. The following table shows the message depending on the option of fucntion key display. Option Off Mode1 Mode2 F1 KEY F1 Clock In Check In F2 KEY F2 Clock Out Check Out F3 KEY F3 Absense F3 F4 KEY F4 Return F4
- 40 -
You can then enter into the sub menu of System Option.
S 1 y 2 s t 3 e m 4 O 5 p t 6 i o 7 n 8
When log is on, relevant authentication log during user authentication is sent to a server.
O O
G N / O F F
- 41 -
3.4.4.2 Card
It decides whether to use Wiegand communication protocol to send authentication results and user ID to a server.
W 1 2 3 I E 4 G A 5 N D 6 7 8
Please press ENTER to go into a sub menu. Choose one of the following three for Wiegand protocol.
W OFF
I /
G 26
A BIT
N /
D 34 BIT
OFF does not use Wiegand. As a next step, choose a Facility Code for selected bit.
W OFF
I /
G 26
A BIT
N /
D 34 BIT
- 42 -
F (
a 1
c -
i 3
l 2
i 7
t 6
y 7 )
C :
o 0
When a Facility Code is set for each bit, Weigand is set at26bit/34bit by combining Facility Code and user ID. % please refer to the appendix for details about Wiegand output format.
- 43 -
It decides whether to use Function keys (F1~F4) or not. When access control mode is set, function keys will not be used. Yet, attendance mode will use function keys. . In case of Function key mode, you have to decide to use Auto T&A and Expanded T&A.
F 1
u 2
c 3
i 4
n 5
M 6
d 7
e 8
n A
c C
t /
i T
o &
n A
If you decide to use T&A mdoe, following the message is also displayed to decide Auto T&A mode. The default value is NO
t Y
o E S
T /
& N
A O
When you select to use T&A mdoe, following the message is also displayed to decide expanded T&A mode. The default value is NO
p Y
a E
n S
d /
e N
d O
&
- 44 -
2 1
0 1
0 :
6 4
/ 6
0 :
3 1
/ 9
Terminal mode is an option to control Wiegand output. When a terminal is set at normal mode, wiegand output is Facility Code and user ID. If it is set at reader mode, wiegand output is ay values read from a card reader.
T 1
e 2
m 3
n 4
l 5
M 6
d 7
e 8
T R
e e
r a
m d
i e
n r
a /
- 45 -
l A c
M c
o e
d s
e s
It is to decide whether to use Time zone or not. It Time zone is on, the function will be used. Please refer to Access manager manual for details on the use of time zone.
T 1 i 2 m e 3 z o 4 n e 5 M 6 o d 7 e 8
T O
i N
m /
e O
z F
o F
- 46 -
When selecting network setting, you will find the following 4 sub menu.
[ 1 N e 2 t w 3 o r 4 k ]
3.4.5.1Terminal ID
The values for Terminal ID should not be overlapping within one server and a unique number for each terminal is used for network access.
T e 1 r m 2 i n 3 a l 4 I D
T (
e 1
r -
m 2
i 5
n 5
a )
l : 2
I 5
D 5
- 47 -
3.4.5.2 TCP/IP
T 1
P 2
I 3
P 4
There are 5 sub-menus out of which 2 may not appear depending on DHCP setting. DHCP
U 1
e 2
D 3
C 4
? 5
s O
e N /
D O
H F
C F
- 48 -
e 1
m 2
n 3
l 4
I 5
r 0
m .
a 0
l .
P 0 . 0
Subnet Mask Subnet mask is manually set. It does not appear if DHCP is ON.
u 1
n 2
t 3
m 4
S 5
s 2
u 5
b 5
n .
e 2
T 5 5
m .
k 0 . 0
- 49 -
Gateway Gateway can be set when needed and it is used mostly when connected to external network. If the system is used only within Intranet, you do not need to input any value for it.
G 1 a 2 t e 3 w a 4 Y 5
t 0
e .
y 0 . 0 . 0
Server IP Please input Server IP that has an Access Server installed and the value of the IP should be a fixed IP.
S 1 e r 2 v e 3 r 4 I P 5
r 0
v .
r 0
I .
P 0 . 0
- 50 -
A terminal sends a signal on a regular basis in order to check connection status to a server, and the current menu selects the cycle. The value should be set with an extreme caution and both long and short time have strength and weakness. When the time is short, the terminal status is quickly reflected to a server. In turn, longer time makes a response slower. If the value is too small, network connection is on and off continuously if communication lines are not in a good condition. Therefore, this value should be changed depending on network environment and mostly, it is desirable to use factory setting values. Default time is set at 10 seconds.
/ 1
W 2
i 3
e 4
N (
/ 2
W 2
T 0
I )
m :
u 3
- 51 -
Please input connection port number to be used for a server. In most cases, factor setting values do not change.
P o 1 r t 2 N 3 u m 4 b e r
P :
r 7
t 3 3
N 2
- 52 -
3.4.6
You can check terminal information from the sixth main menu.
I 1 n 2 f o 3 r m 4 a t 5 i o 6 n 7
It gives information on the number of users currently registered in a terminal. There are normal users and master users.
f 1
U 2
N M
O A
R S
M T
A E
L R
: :
3 4
Currently, the system has 123 normal users and 4 master users.
- 53 -
V 1
r 2
V 2
e .
r 5
s 1
i 0
o -
n 0 2
- 54 -
F 1
a 2
t 3
r 4
y 5
n 6
t 7
3.4.7.1 DB Format
D Y E S /
B N O
A Y
r E
e S /
Y N
o O
When format is completed, the system goes back to the initial screen.
- 55 -
Factory Format is a command to restore all information stored within a terminal into initial values including user DB, option DB, log information and logo. Therefore, the function should be used with an extreme caution.
F a c t 1 o r 2 y 3 F o 4 r m 5 a t
F Y
a E
c S
t /
o N
r O
A Y
r E
e S /
Y N
o O
- 56 -
3.4.7.3 Number of Registered Fingerprint Relevant sites determine the number of fingerprints that can be registered per each user between 1 and 2. However, the value cannot be change if there is DB.
F 1
P 2
u 3
b 4
r 5
F 1
P / 2
The length of ID for a site will be selected. As the length of ID is a fixed value for each site, the function should be used with an extreme caution. The value cannot be changed if there is DB in existence.
I 1
D 2
e 3
g 4
h 5
I (
D 4 -
L 1
e 5
n )
g :
h 4
- 57 -
R 1
s 2
t 3
T 4
r 5
Terminals can be reset without disassembling. Please chooseyes in a confirmation screen to reset a terminal.
A Y
r E
e S /
Y N
o O
- 58 -
When a terminal ID is not valid, please check the ID again and set it again with a valid ID (1~255.)
0 I
0 n
2 v a l i d T I D
If the number of user ID characters in a server and a terminal is not the same, please set the same number of characters for both IDs.
0 U
0 I
3 D L e n g t h E r r
- 59 -
If the number of registered user fingerprints in a server and a terminal is not the same, please set the same number of fingerprints for the server and the terminal.
0 F
0 i
4 n g e r C n t E r r
When a terminal ID conflicts, please change the terminal ID into an unregistered one.
0 C
0 o
5 n f l i c t o f T I D
When MAC Address is not consistent, please contact the customer service center.
0 M
0 A
6 C A d d r E r r
- 60 -
Error code 001~003 refer to steps before LCD initialization and therefore do not appear on LCD screen.
- 61 -
Device Type
User Guideline The device is designed for home users and can be used for all locations including residential areas as it is registered as a qualified device against electromagnetic wave.
- 62 -
- 63 -
2. Wiegand Output Output: MSB LSB Even Parity: Odd number 1 Odd Parity: Even number 1 2.1 Terminal mode <Access Controller> - 26 Bit P 8 Bit (facility code) 16 Bit (user ID) P Even Parity Odd Parity LSB MSB
- 34 Bit P 16 Bit (facility code) Even Parity LSB 2.2 Terminal mode <Reader>
- 64 -
E D
M o
E o
R r
E O
N p
C e
Y n
! !
In this case, the emergency will be cancelled when the door is checked by a system manager who enters into the menu in a terminal. Please check the following if the emergency message continuously appears. Door sensor Y or N Yes No Check - operation of door sensor - connection status of door sensor If warning time for door open is set at 0 (see 2.4 Door Setting)
* HINT) How to Check Door Status 1) A door with Door Monitor terminal Go to Access Manager and set a value for Door Warning Duration at other than 0. 2) A door without Door Monitor terminal
- 65 -
In this case, there is no means available to check door status. Thus, Relay Ctrl signal is the only means to check door status. Go to Access Manager and set a value for Door Warning Duration at 0.
- 66 -