All rights reserved. This product and related documentation are protected by copyright and
distributed under licenses restricting their use, copying, distribution, and de-compilation. No
part of this product or related documentation may be reproduced in any form by any means
without written permission from L-1 Identity Solutions and its licensors, if any.
Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
Neither the name of the L-1 Identity Solutions, Inc. nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior written
permission.
Copyright
TRADEMARKS
The trademarks identified herein are the trademarks or registered trademarks of L-1 Identity
Solutions, Inc. All other brands and products referenced herein are acknowledged to be
trademarks or registered trademarks of their respective holders or manufacturers.
THE PRODUCT AND PUBLICATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, OR NON-INFRINGEMENT.
THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR
TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE
INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW
EDITIONS OF THE PUBLICATION. L-1 IDENTITY SOLUTIONS, INC MAY MAKE
IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S)
DESCRIBED IN THIS PUBLICATION AT ANY TIME.
IMPORTANT—Please refer to the L-1 Identity Solutions End User License Agreement
document and read it carefully before using any L-1 Identity Solutions software on your
computer. This document contains important information about your legal rights.
This chapter provides an introduction to the L-1 Identity Solution 4G Lite product family
devices. The 4G V-Flex Lite, 4G CR-Pass and 4G Secure Control, their specifications and
features, and safety guidelines that should be observed when using or handling the devices.
This manual provides step-by-step procedures for installing all L-1 Identity Solutions 4G Lite
devices. It covers the entire process of physically installing the device, making the necessary
power, ground, and network connections, and registering the device with the SecureAdmin
Lite administration software. Instructions for field repairs and cleaning are also provided.
1.1 SYMBOLS USED IN THIS GUIDE
The symbols shown below are used throughout this manual. They denote special issues the
user might encounter. Their definitions are given below.
DANGER
This symbol denotes a danger condition that may cause death or
excessive damage to property.
WARNING
This symbol denotes a warning condition that may cause severe
injury or major damage to property.
Do not touch other people or objects when touching the sensor.
Always maintain at least 12 inches of space around yourself when touching
the sensor.
Do not allow articles of clothing to touch the sensor.
L-1 Identity Solutions recommends that Installers always follow these points (in addition to
the points listed above):
When installing or working on a unit, always use a grounding wrist-strap
that is connected to a quality Earth ground.
Check the device's cabling for ground faults.
Ensure that the device's ground connection (located on the rear of the
device) is connected to a quality Earth Ground.
1.4.2 DEVICE HANDLING GUIDELINES
Introduction
Do not install the device in locations where the device would be exposed to
direct sunlight, high levels of relative humidity, particulate matter, or
flammable vapors.
Do not install the device near radiators or other heat sources.
Do not allow magnetic objects to come within close proximity to the device.
Strong magnetic fields might damage the device.
Do not let liquids spill on the device.
Do not attempt to alter the device for any reason. Modifications will void the
product warranty.
Do not attempt to disassemble the device in any way beyond what is
necessary for sensor field replacement.
Do not use the device for any purpose other than for what it was designed.
Do not plug any equipment into the USB port other than flash memory
devices.
Do not allow users to place or hang objects on the device, such as coffee
cups or purses.
Do clean the device regularly to remove dust, grime, and fingerprint residue.
This chapter details how to plan a successful installation, recommended steps, and explains
the hardware and software components of typical setup scenarios.
2.1 PLANNING THE INSTALLATION
Planning the installation is the single most important aspect of a successful installation. In
general, you need to consider the access controller, the door locks, the devices, and the
need for a network. By the time you are ready to install the system, all of the details
presented in the list below should be known. Take a moment to go through them now before
starting your installation.
During the planning phase, you should determine:
What type of authentication is required for your application?
How many doors need to be secured?
What type of device will be on each door? Doors already inside a secure
area might not need the same type or level of security.
If multiple 4G V-Series devices require networking for template
distribution/management, then a dedicated PC is recommended to
administer the system, as well as an RS-485 to RS-232 converter, and
cabling for serial communications or cabling for Ethernet.
Verify that the chosen access controller supports the Wiegand formats
supported by 4G V-Series devices.
Identify all wiring by the signal levels it is to carry. Use separate cables and
conduits for different signal groups to avoid cross talk. Plan to separate them
by these groups:
Power distribution: Wires carry power to devices, door strikes, etc.
Data communication: RS-485, USB, Wiegand, Ethernet, etc.
Signal: Door contact, request-to-exit push button, alarm input, etc.
When planning device placement, determine the distance limitation of each
If you have any unresolved issues with the items on this list, contact L-1 Identity Solutions
Technical Support for additional information before beginning any installation.
WARNING
4G Lite devices should be installed by only a qualified
technician. If you are not qualified to perform an
installation task, call L-1 Identity Solutions Technical
Support or contact a qualified installer.
2.1.1 RECOMENDED STEPS FOR A SUCCESSFUL INSTALLATION
Every installation is unique. Sometimes the issues are well defined and can be handled in a
standard fashion; sometimes the issues are very specific and may not be immediately
recognizable.
L-1 Identity Solutions recommends following these steps for a successful installation:
Plan the installation - Choose the type of hardware required, decide if a
network is required, and decide on the location and number of required
devices.
Unpack all items - Unpack all items and check against the packing list.
Install network hardware components - Install the cabling and
components needed to run the system.
Install software - Install the software needed to set up the devices.
Preconfigure device - Connect the device to the USB cable, supply power
to the device, and preconfigure the device.
Mount devices - Mount the devices in their final locations
Power distribution and device hook up - Connect the device wiring via
the back panel.
Power-up procedure - Check the power connections and start the system
safely. Enroll users into the system (for user enrollment procedures).
Chapters 3 through 7 in this document present more information on these steps.
PC workstation with:
1 GHz Intel(r) Pentium(r) 4 processor or equivalent
1 GB RAM (2 GB recommended)
CD-ROM drive
One available COM port or USB port
Ethernet card
Display: 1024 x 768 high color (minimum)
Regulated DC Power supply
Door controller
Planning the Installation
TCP/IP network environment
RS-232 to RS-485 converter with power supply (for advanced administrative
features).
2.1.2.1 HARDWARE REQUIREMENTS
Deadbolt/door strike
Snubber diode required to protect regulated DC power supply from inductive
kickback(1N4007 diode or equivalent recommended)
Separate power supply for the deadbolt/door strike based on supplier's
2.1.2.2.3 MICROSOFT .NET FRAMEWORK 3.5 SP1 REQUIREMENTS
Hard disk space: Up to 600 MB might be required
2.1.2.2.4 SUPPORTED OPERATING SYSTEMS
SecureAdmin Lite Server and SecureAdmin Lite Client support these operating systems:
Windows Server 2003 R2
Windows Server 2008
Windows Vista
Windows XP Service Pack 2 or higher
Windows 7 32-bit and 64-bit
2.1.2.2.5 SQL SERVER 2008 EXPRESS EDITION
Hard disk space: 350 MB of available hard-disk space for the recommended
installation. Approximately 425 MB of additional available hard disk space
for SQL Server Books Online, SQL Server Mobile Books Online, and sample
databases.
During installation of SQL Server 2008, Windows Installer creates temporary
files on the system drive. Before running setup to install or upgrade SQL
Server, verify that at least 2.0 GB of disk space is available on the system
drive for these files
Actual Hard Disk Space Requirements: 280 MB for the recommended
installation.
2.1.2.3 NETWORK REQUIREMENTS
The 4G Lite devices function on 100 baseT networks.
2.1.2.4 SOFTWARE REQUIREMENTS
Both SecureAdmin Lite Server and SecureAdmin Lite Client require these software
applications as prerequisites:
Windows Installer 4.5
SQL Server 2008 Express Edition
If these applications are not already installed, they will get installed during the setup process.
SecureAdmin Lite Server and SecureAdmin Lite Client also require System Administrator
access to install the application.
SecureAdmin Lite uses a self-signed certificate (x.509 certificate) with a file extension of .pfx
as default certificate. Certificate is installed on both SecureAdmin Lite Server and
SecureAdmin Lite Client components.
You have the option of installing your own certificate, which must be purchased from a
recognized authority in advance. In case of custom certificate, it should be first installed on
the PC. During SecureAdmin Lite Server & Client installation, you need to provide name and
other details of the custom certificate.
2.1.3 UNPACK EQUIPMENT
Unpack all items and check against the packing list.
1 Installation Guide (on Installation CD)
1 Operator's Manual (on Installation CD)
1 Quick Start Guide (on Installation CD and printed copy in package)
4G SecureControl:
1 Quick Start Guide (printed copy in package)
The documentation is provided in Adobe Acrobat format (PDF). The Adobe Acrobat Reader
application is available on the Installation CD or at: http://www.adobe.com
4G V-Flex Lite and CR-Pass devices are designed to mount on either a single-gang electrical
box or on any flat surface. Consult with local professionals regarding any building and safety
codes that might affect your installation. The correct mounting height is shown below.
Factors to consider when determining the position of a device on the wall:
Proximity to other switch plates or fixtures (the device should ideally be
mounted in-line with other plates or fixtures)
Distance from the floor to the top of the device (L-1 Identity Solutions
recommends using a height between 48 and 54 inches).
The device should be mounted on the knob side of the door
Compliance with the Americans with Disabilities Act if in the United States.
Information about http://www.usdoj.gov.
Figure 2-1 Correct Mounting Height
2.1.4.2 4G SecureControl
SecureControl devices can be used in combination with any 4G Lite devices (up to quantity of
4) for control of up to 2 physical doors. SecureControl devices are also designed to be
placed on the secure side of the installation. SecureControl must be placed in an area that is
accessible only by Administrators and not by users during normal operation. Some examples
of installation options for SecureControl include:
Fastened or securely placed in the ceiling
Wall-mounted
All of the above scenarios are valid given that the location is on the secure side of the
installation.
2.1.5 PLAN DEVICE NETWORK
The 4G Lite devices feature a built-in single-door relay that allows them to control a single
door lock. They can therefore function on their own or as part of a larger access control
system.
System component selection is specific to each installation, but a minimum system would
consist of a 4G V-Series device mounted on or near an access point, an electric lock, and
cabling.
A more complex system might consist of devices at multiple access points (each with an
electric door lock), a multi-point controller, networking, and a PC to run the access controller
and SecureAdmin Lite Server software.
See the diagram below for an example (non-Ethernet) system diagram.
Installation of locks and access controllers should be completed according to their respective
manufacturers' specifications and in accordance with all local codes. Final connections to the
device are explained in more detail in Chapter 4.
To avoid externally generated transients, do not run any wires near utility AC power wiring,
lightning rod grounding wire, etc. Grounding equipment is required for ESD protection and
safety.
2.1.6 CHOOSE NETWORK TYPE
If your installation requires the use of network communications, then the choice of cable, the
cable run length, the network topology, and the termination of the network are important
aspects that must be considered. The 4G V-Flex Lite and CR-Pass devices can be
networked using RS-232, RS-485, or Ethernet protocols.
The table below outlines relevant parameters of the RS-485, RS-232, and 100 baseT
Ethernet communication protocols.
Table 2-1 Communications Network Comparison
Mode of OperationDifferential DC
Multi
Coupled
DC IsolationNoNo
Maximum Distance4000 feet330 feet
Number of Devices
31Unlimited
on one line
Maximum Data
Rate
57600 bps
(recommended)
Autonegotiated
2.1.6.1RS-485
RS-485 has two distinct advantages over the more common RS-232. First, it allows you to
connect up to 31 4G V-Series devices to a PC with an external RS-232 to RS-485 converter
(available from L-1 Identity Solutions). Second, the RS-485 specification allows for cable run
lengths up to 4000 feet (1200 meters) at modest baud rates.
An RS-485 network is required instead of RS-232 if:
Multiple devices must be connected together so that templates can be
distributed among the devices
The installation has only a single device, but it is over 150 feet (45 meters)
4G V-Series devices provide a 2-wire, half-duplex RS-485 interface. The main cable run
should be low capacitance, twisted-pair cable, with approximately 120 ohm characteristic
impedance. Category-5 rated communications cable is used in RS-485 networks and its
characteristics are defined below. This is the recommended cabling for RS-485
communications. The cable connection includes a differential line (A and B) and a GND
connection.
Table 2-2 Category 5 Cable Characteristics
Capacitance (conductor to conductor)<20 pF/ft.
Characteristic Impedance100 - 120 ohms
Nominal DC resistance<100 ohms/1000 ft.
Wire gauge24 AWG stranded
Conductors/Shielding>2 pair (shielding is recommended)
2.1.6.1.2 RS-485 CABLE LENGTHS
As outlined in the RS-485 specification, the total length of the communication cable (adding
up all of the segments of the run) should not exceed 1200 meters (4000 feet). Although the
RS-485 specification calls for a maximum cable length of 1200 meters and provides a
maximum baud rate well above that of the 4G device, a more conservative system should be
configured to no more than 1000 meters and run at a baud rate of 9600 bits per second. After
the network is configured and is running in a stable manner, the baud rate can be increased if
faster network communications are desired.
Drops (down-leads, stubs, T-connections, etc.) to equipment are not recommended, but if
required, should not exceed one foot) and should use the same cable recommended above.
On a long stub, a signal that travels down the wire reflects to the main line after hitting the
input impedance of the device at the end. This impedance is high compared with that of the
cable and the net effect is degradation of signal quality on the bus.
2.1.6.1.3 RS-485 NETWORK TOPOLOGY
Communication cables for RS-485 should be laid out in a daisy chain configuration (See
Figure 2-3). Long stubs or drop downs and the star configuration should be avoided because
they create discontinuities and degrade signal quality. The star configuration usually does not
provide a clean signaling environment even if the cable runs are all of equal length. The star
configuration also presents a termination problem, because terminating every endpoint
overloads the driver. Terminating only two endpoints solves the loading problem, but creates
transmission line problems at the unterminated ends. A true daisy chain configuration avoids
these problems.
NOTICE
The device on the end of the network should be
terminated with a 120 ohm resistor.
Figure 2-3 Network Topologies Star and Daisy Chain Configurations
NOTICE
A Daisy configuration is recommended over a Star configuration.
2.1.6.2 ETHERNET
If your system is to be configured for use over Ethernet, the wiring will be slightly different.
Communication cables for Ethernet logically form a straight line bus but the more devices on
that bus, the less efficient the network becomes due to increased collisions, and the weaker
the signal will get over distance. Repeaters can be used to boost the signal strength;
however, a better solution is to place switches at intermediate positions along the bus. The
most common Ethernet topology in use today is the star configuration with a hub or switch in
the center.