Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0IntroductionEN | 4
Table 3: Type Styles Used in Manual
1.0Introduction
1.1Manual Organization
This manual is divided into seven sections with an
appendix. A summary of each section and appendix
is detailed in the table below.
Table 1: K2200 Series User Guide
Organization
SectionDescription
1
2
3
4
5
6
7
Appendix
A
Introduction
System Overview – Basic overview of the
K2200 Series.
Administrating the System – Information
and procedures on administrating a
K2200 Series system.
Key Administration and Access Control –
Covers administration of the personnel
database, including adding/deleting keys
and specifying Access Control functions.
Displays, Alarms and Printing - describes
the various displays and also covers the
printing options which are available
Installer Commands - describes the
commands used to configure the door
controller.
Troubleshooting – Common solutions
and procedures to rectify troubleshooting
con
Transactions - shows all the transactions
generated by the door controllers
Bold Text
Bold Italicized
Text
Italicized Text
Courier Text
[CAPITALIZED
TEXT]
On-Screen
Buttons
File New
Usually indicates selections that
you may use while programming
your panel. May also indicate an
important fact that you should note.
Denotes notes, cautions and/or
warnings.
Refers you to a drawing, table, or
other section of this document, or
to another document. Also used to
symbolize names for records that
you will create.
Indicates what may appear on the
command center/keypad, or
internal printer.
Indicates a specific key on the
device to be pressed.
Indicates a specific button that
appears on screen
This is used to describe the path in
getting to a specific sub-menu or
command in a Windows-based
application.
Example: …select File•New to
create a new
1.3.2Tips, Important Notes, Cautions and
Warnings
Throughout this document, helpful tips, important
notes, cautions and warnings will be presented for the
reader to keep in mind. These appear different from
the rest of the text as follows;
1.2Other Literature Referenced
Throughout this manual, references will be made to
other documentation. See the following table for a
more complete and detailed description of the K2200
Series Controllers.
Table 2: Other Literature Referenced
Part Number
Name of Document
Readykey K2200 Series
Controller Installation Guide
Bosch/
Radionics
4651317375
PAC
1.3Documentation Conventions
These conventions are intended to call out important
features, items, notes, cautions, and warnings that the
reader should be aware of in reading this document.
1.3.1Type Styles Used in this Manual
To help identify important items in the text, the
following type styles are used:
Important Notes - should be heeded for
successful operation and programming.
Also tips and shortcuts may be included
here.
Caution - These caution the operator that
physical damage to the program and/or
equipment may occur.
Warning - These warn of the possibility of
physical damage to the operator, program
and/or equipment.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0IntroductionEN | 5
1.4Abbreviations Used
The following list of abbreviations are used throughout this manual.
AC
AEM
AVR
BAT
CH
CLK
CMD
CNC
COM
CTS
D/C
DC
DL
DOS
DTR
DR
EMF
FIFO
GND
HBC
ID
IP
LED
LK
LRT
MOV
MS
MS-DOS
OVRD
PAL
PB
PB-TIM
PBC
PC
PIN
PINTP
RDR
RTE
RTS
RX
SIG
TAMP
TP
TX
VCA
Access Code
Alarm Event Manager
Automatic Vehicle Recognition
Battery
Channel
Clock
Command
Central Network Controller
Common
Clear To Send
Door Controller
Door Contact
Down Load
Disk Operating System
Delay Transmit/Receive
Door
Electro-Motive Force
First In First Out
Ground
High Breaking Capacity
Identity
Input or Internet Protocol
Light Emitting Diode
Lock
Lock Release Time
Metal Oxide Varistor
Alarm Module Sensors
Microsoft Disk Operating System
Override
Primary Access Level
Pass Back
Pass Back Timeout
Pass Back Controller
Personnel Computer
Personal Identity Number
PIN Reader Time Profile
Reader
Request To Exit
Request To Send
Receive
Signal
Tamper
Time Profile
Transmit
Valid Code Accepted
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0IntroductionEN | 6
1.5Listings and Approval
1.5.1FCC Notice
This equipment generates and uses radio frequency
energy. If not installed and used in accordance with
the manufacturer's instructions, it may cause
interference to radio and television reception. It has
been tested and found to comply with the
specifications Subpart F of Part 15 of FCC rules for
Field Disturbance Sensors. If this equipment causes
interference to radio or television reception - which
can be determined by turning the equipment on and
off - the installer is encouraged to correct the
interference by one or more of the following
measures:
• Reorient the antenna of the radio/television,
• Connect the AC power cord to a different outlet
so the control panel and radio/television are on
different branch circuits,
•Relocate the control panel with respect to the
radio/television.
If necessary, the installer should consult an
experienced radio/television technician for additional
suggestions, or send for the "Interference Handbook"
prepared by the Federal Communications
Commission. This booklet is available from the
U.S. Government Printing Office,
Washington D.C. 20402,
stock no. 004-000-00450-7.
FCC Registration Number: IDHM32Y6K2000
1.5.2UL Listing
UL 294 -Access Control System Units
Figure 1: Failsafe Lock Wiring
B
A
• The controller must be grounded.
• Disconnect both ac and battery power supply
before working on the controller.
1.5.4CABLING
The cabling used in the Readykey access control
systems (six wire bus, reader cables, etc.) are not
prone to electrical interference. However, you should
avoid routing cable close to heavy load switching
cables and equipment. If this is unavoidable, cross
the cable at right angles every 3.3 to 6.6 ft (1 to 2 m)
to reduce the interference.
When installing the K2200 series
controllers the following should be noted:
1.5.3HEALTH AND SAFETY
It must also comply with any local Fire, Health and
Safety regulations. A secured door that may be part
of an escape route from an area must be installed
with:
•A fail-safe lock (A). So that the door will be
released if the power fails. Ideally a magnetic
lock should be used as these are less likely to jam
or seize.
•A normally-closed break-glass or manual pull (B)
in the lock supply wiring. So that in an
emergency the fail-safe lock can be immediately
powered down.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0System OverviewEN | 7
2.0System Overview
This section briefly describes how a Readykey Access
Control System works and covers the basic system
components:
• Readers.
• Door controllers.
• Administration system.
• Connecting door controllers to make a basic
access system.
2.1Specifications
This section details the system specification for a
standalone system.
Table 4: K2200 Series Specifications
Access Points
Personnel4000
Editor KeysMaster key plus 32 editor keys, each
Access Codes128, comprising two access levels,
Access Levels128
Time Profiles128, each comprising 3 time periods
Holiday Profiles24, each comprising 20 holiday
System Holidays
Transactions
Zone Alarms128, up to 32 per door controller
Relay Outputs4 on each door controller, plus 8 on
Alarms
WarningDoor left open
Printer Output
16
One master 4-door Readykey K2200
or 2-door Readykey K1200
controlling up to three slaves, a slave
may be 4-door Readykey K2200 or
2-door Readykey K1200 controller.
with optional password and editor
level.
each with a time profile.
(max. 32 time periods).
periods (max. 254 holiday periods).
20, for controlling access on public
holidays.
2500 most recent transactions
stored in non-volatile memory.
using alarm modules.
each alarm module. These may be
controlled by time profile or system
event.
Unauthorized access, anti-tamper
(on reader, alarm module and door
controller), door override, zone, PIN
reader duress.
Continuous printing of system
events.
9 different reports available on
demand.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0System OverviewEN | 8
2.2How the System Works
Any Readykey access control system consists of three
components: readers, door controllers and an
administration system.
The readers will detect the unique code in a key and
pass it directly to the door controller. The door
In the case of the Readykey K2200 and Readykey
K1200, the administration system is built in to the
door controller and uses the keypad, display and
reader on the front panel. As an option a printer can
be connected to the system that reports events as
they happen, and can also produce listings of
personnel, system setup, past events, etc.
controller compares the code to the information
stored in its memory and, if the key is valid, will
operate the lock and send a report to the
administration system. The administration system is
the means by which the user programs the system
(who is allowed where and when, etc.) and also
where events are reported.
Figure 2: Components of a Readykey Access Control System
Access Decision
Door Controller
Lock Output >
< Key Code
Key Code
Lock
Reader
Key
Administration System
< Transactions
Updates >
2.2.1Readers
A reader is a device, usually mounted close to the
door, that detects the unique code in a key or card
and passes it to the door controller where the access
decision is made. There are several types of reader
suitable for different purposes and environments.
Below are some of the special types of reading
devices.
Request to Exit Switch
Sometimes a reader is used on both sides of a door,
controlling both entry and exit from an area.
Normally, however, a Request to Exit motion or
button is used to open a door from the secure side.
This switch, mounted close to the door, when pressed
sends a signal to the door controller to release the
lock. Of course, anyone can press the switch to open
the door when leaving, therefore no identity of the
person can be recorded.
2.2.2Door Controllers
The door controller is the heart of the access control
system; its main functions are to:
•Decide whether a person has access at a
particular door and at a particular time.
• Provide power to operate the lock.
• Monitor doors for unauthorized access or left
open conditions.
•Automatically lock and unlock doors at certain
times.
•Detect tamper conditions at the reader or at the
controller.
•Monitor any alarm modules for extra alarm
inputs.
•Operate relays on the door controller itself or on
an alarm module.
The Readykey K2200 may have 4 readers connected,
the Readykey K1200 may have 2 readers connected.
In all other respects, both door controllers are
identical.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0System OverviewEN | 9
Connecting Door Controllers
What makes these door controllers so flexible is the
ability to link controllers together to allow more than
4 doors to be administered. When programmed from
the front panel, as described in this document, up to
16 doors can be controlled and up to 4000 personnel
administered.
Figure 3: Connecting Door Controllers
Master Door Control l er
K2200 (4 - door ) or K120 0 ( 2 - door )
Pri n t e r Cab l e ,
Max length:
50ft/15m
Six- wi r e bus, m ax tot al l engt h: 1000m
Max. distance between controll ers:
Serial
Printer
In all cases, one Readykey K2200 Series Door
Controller (e.g. K2200 or K1200) is the master
controller, up to 3 further door controllers are slaves.
All administration and reporting occurs at the master
controller. Apart from some initial set up functions,
no administration activity occurs at the slave
controllers.
Up to 3 Slave Door Controller s,
K2200 (4-door) or K120 0 ( 2 - door )
1500ft/500m
Alarm Modules
An alarm module is a Readykey Alarm Module or
Alarm Event Manager (AEM). Alarm modules are
optional devices that allow extra inputs (points or
zones) to be monitored and report alarms if activated.
Each alarm module has 8 inputs that can be enabled
and disabled manually or automatically at certain
times.
The alarm modules also have 8 relay outputs that can
be activated by alarm inputs, system events such as
door left open, or at certain times.
2.2.1Administration Software
There are several ways of administering an access
control system. Different methods allow greater
numbers of doors or personnel to be controlled, and
door controllers to be a greater distance from the
central point. The administration systems fall into
two broad categories:
1. Faceplate panel administration. This is covered
by this document and is used for small systems
(up to 16 doors) and, as the name suggests, all
the programming is via the faceplate panel
attached to the controller.
2. Readykey for Windows. This is a PC-based
administration system used for larger systems, or
where more reporting features are required. For
further details, refer to the Readykey for WindowsManual for further details.
Note:
At least one faceplate is required for each system
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 10
Editor Keys
3.0Administering the System
This section looks at the controller is administered
when used as part of a standalone system. It covers:
•What Editor mode is and how to administer the
editor keys needed to access the Editor.
•Using the Editor. This section describes how to
use the Editor mode to administer the system
Note:
If the system has been commissioned and all editor keys
added to the system, you can go straight to Section 3.1.3
3.1Using the Faceplate
3.1.1Editor Mode
The faceplate is used for system administration. The
faceplate is the keypad, display and reader attached
to the door controller to administer keys, respond to
alarms and configure the system. Up to 16 doors and
4000 keyholders can be administered using this
system. An optional, and highly recommended,
printer may be used for both continuous printing of
events and production of various reports.
Note:
For larger systems, it is recommended to be
administered from the Readykey for Windows program.
Each system, whether administered from the faceplate
or a PC, needs at least one faceplate for basic system
administration - see Readykey K2200 Series Controller
Installation Guide (Bosch P/N: 46513, BOSCH P/N:
17375).
3.1.2Editor Key Administration
In order to use the Editor mode to make changes to
the system, you need an editor key. This is a normal
credential that is recognized by the door controller as
allowing the holder to modify data held in the
controller. Up to 32 editor keys may be added, each
may have a different editor level. The editor level
determines what commands that particular key can
operate. In addition, each editor key may be given its
own password. The master key is a special editor key
that can be used to issue all commands and is the
only key able to create or modify other editor keys.
Note:
All editor keys, including the master, are normal
Readykey keys that can be used for gaining access.
However, in order to be used for access control they still
have to be added to the personnel list and given an
access code. Likewise, removing an editor key will not
have any effect on its use as normal access key. The
exception to this is the master programming key.
Up to 32 editor keys can be assigned, each one with
its own individual password and editor level. Only
the master key can add, delete and modify the use of
the editor keys.
Note:
All editor keys, including the master, are normal
Readykey keys that can be used for gaining access.
However, in order to be used for access control they still
have to be added to the personnel list and given an
access code. Likewise, removing an editor key will not
have any effect on its use as normal access key. The
exception to this is the master programming key.
Alarm Acceptance
All editor keys are able to accept alarms either at the
master or slave controllers (if used), whatever their
editor level. For instance, a key with an editor level
of 0 will only be able to accept alarms and be unable
to issue any commands in the Editor.
Master Key
The master key is created when the system is
installed and configured. It can be changed by using
the INST command - a command for which the
master key is required.
If the master key is lost, a replacement can be
programmed, but only by performing a reset. This
procedure is described in Readykey K2200 Series
Controller Installation Guide (Bosch P/N: 46513, BOSCH
P/N: 17375). No data will be lost by this process, but
it can only be carried out by someone with access to
the inside of the master door controller housing.
Editor Keys
Up to 32 editor keys can be assigned, each one with
its own individual password and editor level. Only
the master key can add, delete and modify the use of
the editor keys.
Passwords
All editor keys can have a password assigned. This
prevents anyone has possession of an editor key
gaining access unless they also know its password.
Passwords can only be issued to editor keys, or
altered, by the holder of the master key (using the I
command).
Editor Levels
The ability of any editor key to issue commands is
determined by the editor level it is assigned. The
editor level is a numeric value, between 0 and 4095,
calculated from the following table. Each action is
given a value, by adding the values for each action to
be assigned an editor level is obtained. Some typical
examples are given.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 11
Table 5: Editor Level Assignments
ValueCommandActions
0noneAccept alarms only
P1-P9(exc P6) HE,
1
K
2LManual lock and unlock
4AC, AL
E
8DSet door data
16T, PRTime profile functions
32CChange date and time
64VVoid (delete) a
This table gives some examples of how to calculate
editor levels. The names used refer to typical types of
operator or user.
Note:
The Installer cannot add or delete personnel, or the
Administrator modify door programming
Master Key Commands
The following commands can only be issued when
the master key is used:
Table 7: Master Key Commands
CommandActions
IAdminister editor keys
INSTInstaller functions
P6Print set up details
INIT, INITnInitialize a door controller
DLDownload to door controllers
SYSTEM
START
Initialize a door controller
The INST and SYSTEM START commands are
fully described in Readykey Series ControllersInstallation Manual (Bosch P/N: 46513, PAC P/N:
17235), the P6 command is described in the Section
5.5.3.6, the INIT, DL, and UL commands are
described in Installer Functions.
Assigning Editor Commands – The I
Command
Up to 32 editor keys can be assigned. Editor keys are
maintained by modifying a database using the I
command. Before adding each key, you should first
determine the editor level that key will be assigned,
see Editor Keys.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 12
Adding, Modifying or Deleting an Editor
Key
Note:
Only the master key is able to issue the I command.
1. Present the master key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [I] and press [ENT].
CMD I_
5. The display will now show the first unassigned
editor. An unassigned editor key is one with a
key code of 00000000.
E3 KEY 00000000
6. To add a new editor key, present a key to the
faceplate reader.
If the key is already assigned, a REPEATED
KEY message is displayed for about 2 seconds
REPEATED KEY
If the key is valid, its 8-character code will
appear.
E3 KEY 8824A474
7. Press [NXT] to go to the Editor Level Field.
8. To modify an existing editor key:
At the KEY prompt,
E3 KEY 00000000
you can either use the up and down arrow keys
to select a key, or press the FastFind button (*).
- If you are in possession of the key itself,
present the key to the faceplate reader.
- If the key is not in the database, you
will get a message (left) for about 2
seconds before returning to the ID
prompt.
NOT IN DATABASE
- Type the editor key number (1-32) and
press [ENT].
You can now change the key, if required, by
presenting a new key to the faceplate reader.
Press [NXT] to go to the Editor Level field.
9. To delete an editor key.
Select the key to delete as described above.
When the key code is displayed,
E9 KEY 28851408
press [CLR] - the key code will be replaced with
zeroes.
E9 KEY 00000000
Press the [ENT] key.
Press [ESC] to return to the CMD prompt.
10. Enter the editor level to be assigned to the key,
(see Editor Keys for editor level values).
E3 LEVEL 0
The value must be between 0 and 4095. 0 means
the key can only accept alarms, 4095 gives access
to all but the master key only commands.
Press the [ENT] key.
Press [NXT] to go to the next field.
11. The name you enter here will appear on printed
reports of editor use and alarm acceptance when
this editor key is used.
ID
Type a name of up to 12 characters (A-Z, 0-9 and
SPC). Press [ENT].
Press [NXT] to go to the next field.
12. Whatever method you use to find a key you will
be presented with the ID number and access
code.
ID 27 AC 0
Note:
If you use 12-character IDs, press NXT to view the
name assigned to the key (left).
WHO SMITH AB
At this point you can use the up and down arrow
keys to move through the database to find the
key you want to edit.
You can also press the FastFind button (*) to
return to the ID prompt.
3.1.3Using Editor Mode
New Users
Please read this section if you are unfamiliar with
programming a door controller. It contains important
information that will help you understand how the
Editor mode works, what the different keys do, and
how to make changes to different items. By reading
this section you will find it easier to follow the more
detailed descriptions of commands in later sections.
All programming of the access control system are
made using the Editor mode. The Editor mode
consists of a set of commands issued by the user.
Each command allows the user to enter or modify
various items, depending on the command. To gain
access to the Editor mode and issue commands,
present an editor key to the reader on the faceplate.
A full description of editor keys, editor levels,
passwords and administration is given in see Section
3.1.2Editor Key Administration.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 13
Present the editor key to the faceplate reader. If the
key is a valid editor key or the master key:
•You may be prompted to enter a password,
PASSWD _
In which case, use the keypad to enter the
password (maximum 8 characters) and press
[ENT]. If the password is valid, you will see the
CMD prompt - see Section 3.1.5 Command Prompt -
CMD.
If the password you enter is not valid, you will
get:
INVALID PASSWORD
and be returned to a blank screen. Present the
key and try again. If it still does not work, ask the
person responsible for the system to check your
password.
•If no password has been assigned to the key, you
will immediately have the CMD prompt - see
Section 3.1.5Command Prompt - CMD.
Note:
If the key you present is not an editor key, you will see
T
This indicates that a key has been presented, but is not
recognized as an editor key.
Note:
No alarm conditions will be reported while you are in
Editor mode, nor will any transactions be printed.
When you leave Editor mode, any alarms that occurred
will be reported and all the transactions will be
printed. Door controller or alarm module relays will
operate during Editor mode.
3.1.5Command Prompt - CMD
The starting point for any operation within the
Editor mode is the CMD prompt:
CMD _
Here you are being prompted to enter one of the
commands that either alters the information stored in
the door controller, such as adding or deleting
personnel, or initiates an action, such as a manual
unlock.
Editor Levels
The commands you can perform are determined by
your editor level. This is set by the person
responsible for issuing editor keys. If you try to enter
a command that is not available to you, you will see:
INVALID ID LEVEL
and be returned to the CMD prompt.
Editor Time Out
Once in Editor mode, if you do not press any keys
for more than 3 minutes, the mode will time-out. You
will then have to present your editor key again to
return to the Editor mode. This means you cannot
inadvertently walk away from the system leaving it in
the Editor mode.
3.1.6Leaving Editor Mode
Once you are in the Editor mode, you can press the
[ESC] key at the CMD prompt to leave and return the
door controller to its normal operation. Any alarm
conditions that occurred while you were in the
Editor mode will now be reported. Also, if you have
a printer connected, any transactions that have
occurred while the Editor mode was being used will
now be printed.
3.1.7Panel Keyboard
In the Editor mode the ? key provides extra help.
For instance, at the CMD prompt, if you press ? you
will see:
ENTER COMMAND
This display lasts about 3 seconds before returning to
the CMD prompt or the prompt at which you
pressed the key. You should press [?] at any time if
you are not sure what is required.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 14
ESC Key
The [ESC] key is used to leave the current operation
and go back to the previous step. For instance,
pressing [ESC] while editing data will take you back
to the CMD prompt.
Table 8: Navigation Keys
KeyNameDescription
Up and Down
Arrow Keys
Minus and Next
Keys
FastFindThe dot on the center of the arrow keys is the FastFind button. In most commands, if you
Use the up and down keys to move from one record to another. Usually there will be an
indication of which record you are in; however, some fields may not have room to display
a record number as well as their value.
When you are on record 1, the up arrow will have no action; on the last record, the
number will vary from one database to another, the down arrow will have no action.
Use the minus and Next keys to move from field to field across a record. When you are
on the leftmost field the minus key has no action; on the rightmost field, the [NXT] key
has no action. If you move up or down using the arrow keys, you remain in the same field
but move to the record above or below.
press this you will receive the prompt
FIND _
Here you can enter a record number and press [ENT], to move directly to that record. If
you enter a number larger than the number of records, you will go to the last record in the
database.
The Void Personnel (V) and Edit Personnel (E) commands give the prompt:
ID _
In this case, you have three choices for searching:
1. Enter the record number and press [ENT].
2. Type the exact 12-character ID (if used) and press [ENT]
If the ID is not known, you will get the message:
UNKNOWN NAME
and be returned to the ID prompt.
3. Present a key to the faceplate reader.
If the key is not known you will get the message:
NOT IN DATABASE
and be returned to the ID prompt.
FastFind in printer commands. In the printer commands (P1-P9), the FastFind button is
used to initiate printing. see Section 5.5.1 Print Report – The P1 to P9 Commands.
Navigation Keys
Moving within a database
Most commands allow you to edit a database, or
table. Each database has several rows, or records,
consisting of several columns, or fields. When you
first issue a command, you will be placed in the first
field of the first record or, if you prefer, the top lefthand corner of the table. You use the navigation keys
on the keyboard to move this 'window' around the
table.
Editor Example
The following example (see Figure 5) shows the
Personnel database as seen when the Edit (E)
command is used. The highlighted box shows the
first item that will appear in the screen. Use the keys
shown to move the 'window' around the database.
Use the FastFind button (•) to go directly to a
particular record.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 15
(Right)
Figure 5: Editor Example
(Left)
(Up)
(Down)
ID 1 AC 1
ID 2 AC 0
ID 3 AC 0
ID 4 AC 0
ID 3999 AC 0
ID 4000 AC 0
WHO _
WHO _
WHO _
WHO _
WHO _
WHO _
Alphanumeric Keys
These are the keys [A]-[Z], [0]-[9] and [SPC], which
take up most of the keyboard. You use these for
entering names or values when prompted. Normally
you will not be allowed to enter characters ([A]-[Z] or
[SPC]) when a numeric value, such as an access code
or lock release time is required.
When you enter any name or value, you
should always press [ENT] before moving
on to the next prompt. If you do not press
[ENT], the name or value you entered will
be lost and the contents of the field will
revert to their previous value
Making Changes
When a field is visible on the screen, the flashing
underline cursor will appear on the first character.
The cursor is always positioned on the next character
to be changed. You can use the following keys to
move and alter the display (see Table 9).
ID 1 HOLS 0
ID 2 HOLS 0
ID 3 HOLS 0
ID 4 HOLS 0
ID 3999 HOLS 0
ID 4000 HOLS 0
Table 9: Display Altering Keys
KeyNameDescription
Left and
Right
Arrows
Clear
The left and right arrow keys
move the cursor to the left
and right within the field. The
cursor always starts on the
leftmost character of the field
and returns to that position
when you press ENT
The CLR (clear) key will blank
out the existing value. This is
convenient especially when
changing long names. If you
press CLR followed by ENT,
numeric values will be set to 0
and alphabetic values set to
all spaces.
The next example shows how to make changes to
items. Most data items fall into 3 different categories:
• Alphanumeric
• Numeric
• Options
Alphanumeric
These are names given to personnel, editors, doors
etc. You may use any of the alphanumeric characters
(A-Z, 0-9) including SPC (space.)
1. Once you have selected a field to change, use the
alphanumeric keys to enter a new value.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0Administering the SystemEN | 16
ID DOOR 1
The cursor, a flashing underline, marks the
character that will be overwritten by the next key
press.
2. When a valid key is pressed, the new character
will appear on the screen and the cursor will
move to the next position.
ID FOOR 1
3. Continue entering characters, until you have
completed the entry.
ID FRONT DOOR_
Use the left and right keys to move the cursor
within the field. Press [ENT]
You must press [ENT] to save your new
entry. If you do not, when you move to the
next field or press [ESC], your entry will
be lost.
Numeric
These are values or codes such as lock release time,
access code, etc. In this case, you can only enter
numbers (0-9). Each type of entry will have a
maximum and minimum value. If you enter a value
outside the range allowed, the value you entered will
be adjusted to the nearest allowed, e.g. the maximum
value for a lock release time is 255 seconds, if you
enter 300, the value will change to 255 when you
press [ENT].
1. Once you have selected a field to change, use the
alphanumeric keys to enter a new value.
DR1 LRT 5
The cursor, a flashing underline, marks the
character that will be overwritten by the next key
press.
2. When a valid key is pressed, the new character
will appear on the screen and the cursor will
move to the next position.
1. No cursor appears in this type of field. In order
to make changes, press the number
corresponding to the option you wish to change.
In this example, time period days (PR command)
are shown.
F1 DAY --------
2. In this example, to select a day press the
corresponding number to the day of the week,
Mon=1, Tue=2, etc. To deselect an option, press
the number again.
F1 DAY MTWTF---
When you have made your selections, press
[ENT].
You must press [ENT] to save your new
entry. If you do not, when you move to the
next field or press [ESC], your entry will
be lost.
There are other types of entry, such as date, time,
manually locking/unlocking doors etc. These will be
described in detail in the relevant sections.
DR1 LRT 1
°
3. Continue entering characters, until you have
completed the entry.
DR1 LRT 10
°
Use the left and right keys to move the cursor
within the field. Press [ENT]
You must press [ENT] to save your new
entry. If you do not, when you move to the
next field or press [ESC], your entry will
be lost.
Options
These are special fields that allow various options to
be set, such as days of the week, etc.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0Key Administration/ Access ControlEN | 17
If you use this method, it is vital that you keep an
4.0Key Administration/
Access Control
This section deals with the Personnel database and
covers the following:
• Adding new keys to the database.
• Deleting keys (voiding) from the database.
• Editing key parameters (access rights etc).
• The use of PIN codes.
• Controlling access - who goes where and when.
Also covered in this section are the following
associated topics:
• Manual lock/unlock facility.
• Setting the system date and time.
4.1Key Administration
Each key that is issued will allow the keyholder
access through certain doors at certain times. This
section describes how to add, delete (or void), and
edit keys.
4.1.1Personnel Database
Identifying Personnel
There are two ways in which individual keyholders
can be identified in the system. The first is to use an
automatically generated ID number, between 1 and
4000. The second method allows the operator to
assign a name, up to 12 characters, to each
keyholder.
Note:
You should decide before you start issuing keys which
method you will use. The system has to be set up to use
one method or the other by the installer. Although this
can be changed later without losing information, it is
not recommended.
Four-Digit Number
The main advantage of this method is speed of entry
because you will not have to enter a different name
for every key that is issued. The disadvantage is that
all references within the system, including printed
reports, are to the 4-digit number. This can make
identification of keyholders difficult, as you will have
to keep looking up your own records. You are not
able to select the number that is issued, the system
will always issue the first free number. For instance, if
you issue 120 keys, they will be automatically
identified as 0001 to 0120 when added. If you were
to delete, say, numbers 25 and 42, the next keys
issued would be identified as 0025, 0042 followed by
0121, 0122 and so on.
accurate record of the 4-digit ID issued to each key
and to whom the key is issued. If a keyholder loses a
key, unless you have an accurate record, you will not
be able to delete the lost key from the system.
Twelve Character Name
A better method is to use the 12-character name.
This method is easier to administer once all the keys
are issued, In this case whenever a key is issued, a
unique name can be entered. The name may consist
of up to 12 characters using A-Z, 0-9 and space (SPC
on the keypad.) Names should not start with a space
or a number. You will probably use the keyholder's
name and initials, e.g. SMITH AB or JONES SL.
You may use any naming system you feel is
appropriate, such as payroll or employee numbers.
Remember names must be unique - you will be
warned if a duplicate name is entered.
Token Code
This is the unique code stored in each Readykey
credential. It is written permanently into the key
during manufacture and never changes. In routine
use, you will not have to use this code. However,
there are some occasions on which it can be used.
One of these is the adding of keys without physically
being in possession of the key. This may come about
if one or more keys are accidentally removed from
the system and it may not be possible or convenient
to recall the lost keys from the keyholders. If a record
has been kept of the token codes of all keys, these
can be entered instead of presenting the key itself.
The personnel printout (P1 command) contains the
token code of each key and is an ideal record for
such purposes.
Access Codes
The access that a key is allowed is determined by
assigning it an access code. Access codes are fully
described in see Section 4.2.6 Access Codes – The ACCommand. When routinely adding keys, you should
know the access code that will need to be assigned to
each key.
Please read Section 4.2 Controlling Access to understand
how access codes work.
Holiday Profiles
Each keyholder can be assigned a holiday profile.
This is a range of date on which the person will not
be allowed access. There are 24 different holiday
profiles, each of which may contain up to 20 holiday
periods. A holiday period consists of a start date and
number of days’ duration. There are not enough
holiday profiles to give every keyholder their own.
For this reason, you are not advised to attempt to
control individual access using holiday profiles.
However, they may be used to cover periods such as
a temporary factory closure.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0Key Administration/ Access ControlEN | 18
Holiday periods and profiles are defined using the
HR and HP commands (see Section 4.2.7 Holidays –The HR and HP Commands) and are applied to a key
using the Edit (E) command (see Section 4.1.4 EditingKeys – The E Command).
4.1.2Adding Keys – The A Command
This procedure describes how to add a key to a
database. Before you start you should have or know
the following:
•An editor key with an editor level that allows
adding of keys
• One or more keys to add
• The names of each keyholder (not required if
using 4-digit identification)
•The access code to be assigned to each
keyholder
To Add a Key:
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [A] and press [ENT].
CMD A_
5. The next available unused ID number will now
appear along with a prompt to enter the access
code.
ID 27 AC 0
Type the access code (0 to 128) and press [ENT].
Press [NXT] to go on to the next prompt.
6. Enter an identification name for this key which
may be a name, a payroll number or a
flat/residence name.
WHO _
Note:
This prompt will only appear when you are using 12character IDs.
You may use any of the characters on the
keyboard (A-Z, 0-9, SPC). Do not start a name
with a space or a number
If you enter an ID that is already being used, the
message DUPLICATE NAME will appear for
about 2 seconds before returning to the WHO
prompt.
DUPLICATE NAME
Press [NXT] to go on to the next prompt.
7. At this prompt
KEY 00000000
you can either:
- Present the key to be added to the
faceplate reader. If the key is valid, the
addition of this key is complete and you
will move directly to a prompt for the
next key. There is no need to press
[ENT] or [NXT].
- Type the 8-character key code.
If for some reason you are not in
possession of the key, provided you
know its 8-character code, you can enter
it here. Use only the characters A-F and
0-9.
When complete press [ENT].
If the key is valid, the addition of this
key is complete and you will move
directly to a prompt for the next key.
There is no need to press [NXT].
If, using either of these two methods,
you enter a key that is already stored
you will get a message
REPEATED KEY
for about 2 seconds before returning to
the KEY prompt.
8. If you have no more keys to add, press [ESC] to
return to the CMD prompt.
If not, you can now continue adding keys
ID 28 AC 0
Note:
The access code remains the same as the previous key
you entered. If adding a large number of keys, by
grouping them by access code you will speed up entry as
well as reducing the risk of error.
Once a key has been added, it will be recognized by
all the readers in the system. However, this will not
be the case if:
Slave door controllers are disconnected or not
communicating with the master.
A download is in progress to a slave door controller,
in which case the new information will not reach the
slave until completion of the download.
4.1.3Deleting (Voiding) Keys – The V Command
Removing keys from the system is a very simple
process. Several options are available for selecting
the key to be removed. They are:
•When prompted, present the key to the faceplate
reader.
• Enter the 4-digit ID number.
• Enter the 12-character ID, if used.
• Use the up and down arrow keys to search for
the key in the database.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0Key Administration/ Access ControlEN | 19
•
0101
0101
0101
Instead of voiding a key from the system,
consider changing its access code to 0
(zero). By doing this you will prevent use
of the key (any attempt will result in a No
Access: Locked Out transaction being
generated) but you will also have a record
of a 'lost' key being used unsuccessfully
To Void a Key:
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [V] and press [ENT].
CMD V_
5. At the ID Prompt,
ID _
you can select the key to be deleted using one of
these methods:
- If you are in possession of the key itself,
present the key to the faceplate reader.
If the key is not in the database, you
will get a message for about 2
seconds
NOT IN DATABASE
before returning to the ID prompt.
- Type the 4-digit ID of the key and press
[ENT]. Any number between 1 and 4000
will be accepted.
- If you are using 12-character IDs, you
can type the ID and press [ENT]. You
must type the name exactly as it was
originally entered. If no match is found,
you will get a message
UNKNOWN NAME
for about 2 seconds before returning
to the ID prompt.
6. Whatever method you use to find a key, you will
be presented with the ID number and access
code.
ID 27 AC 7
7. At this point, you can use the up and down
arrow keys to move through the database to find
the key you want to delete. You can also press
the FastFind (*) button to return to the ID
prompt.
WHO SMITH AB
8. Once you have selected the key you want to
delete, press [ENT].
9. At the CONFIRM VOID prompt,
CONFIRM VOID
press [Y] to confirm and you will be returned to
the CMD prompt. Any other key will return you
to the CMD prompt without voiding the key.
When a key has been voided, it will be rejected by
all the readers on the system and a
No Access: Unknown ID transaction will be
produced. This will not be the case if:
•Slave door controllers are disconnected or not
communicating with the master.
•A download is in progress to a slave door
controller, in which case the new information
will not reach the slave until completion of the
download.
4.1.4Editing Keys – The E Command
You can change the access code of a key as well as
the 12-character name (if used) at any time. You can
also assign a holiday profile to a keyholder. The
access code and holiday profile must already be
defined (see Section 4.2.6 Access Codes – The AC
Command and Section 4.2.7 Holidays – The HR and HP
Commands).
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [E] and press [ENT].
CMD E_
5. At the ID prompt,
ID _
you can either use the up and down arrow keys
to select a key, or press the FastFind (*) button.
- If you are in possession of the key itself,
present the key to the faceplate reader.
If the key is not in the database, you
will get a message for about 2
seconds
NOT IN DATABASE
before returning to the ID prompt.
- Type the 4-digit ID of the key and press
[ENT]. Any number between 1 and 4000
will be accepted.
- If you are using 12-character IDs, you
can type the ID and press [ENT]. You
must type the name exactly as it was
originally entered. If no match is found,
you will get a message
UNKNOWN NAME
for about 2 seconds before returning
to the ID prompt.
6. Whatever method you use to find a key, you will
be presented with the ID number and access
code.
ID 27 AC 7
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
Loading...
+ 43 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.