Bosch K2200 User Manual

K2200 Series
EN
User Guide
Readykey Controllers
K2200 Series | User Guide | Contents EN | 2
Contents
1.1 Manual Organization ..................................... 4
1.2 Other Literature Referenced......................... 4
1.3 Documentation Conventions ........................ 4
1.3.1 Type Styles Used in this Manual.................. 4
1.3.2 Tips, Important Notes, Cautions and
Warnings.......................................................... 4
1.4 Abbreviations Used........................................ 5
1.5 Listings and Approval.................................... 6
1.5.1 FCC Notice ..................................................... 6
1.5.2 UL Listing........................................................ 6
1.5.3 HEALTH AND SAFETY ............................. 6
1.5.4 CABLING ....................................................... 6
2.0 System Overview ......................................... 7
2.1 Specifications................................................... 7
2.2 How the System Works ................................. 8
2.2.1 Readers ............................................................ 8
2.2.2 Door Controllers............................................. 8
2.2.1 Administration Software ................................ 9
3.0 Administering the System........................ 10
3.1 Using the Faceplate ...................................... 10
3.1.1 Editor Mode.................................................. 10
3.1.2 Editor Key Administration .......................... 10
3.1.3 Using Editor Mode....................................... 12
3.1.4 Entering Editor Mode.................................. 13
3.1.5 Command Prompt - CMD .......................... 13
3.1.6 Leaving Editor Mode ................................... 13
3.1.7 Panel Keyboard ............................................ 13
4.0 Key Administration/ Access Control .... 17
4.1 Key Administration...................................... 17
4.1.1 Personnel Database ...................................... 17
4.1.2 Adding Keys – The A Command............... 18
4.1.3 Deleting (Voiding) Keys – The V Command
........................................................................ 18
4.1.4 Editing Keys – The E Command ............... 19
4.1.5 PIN Codes – The N Command.................. 20
4.2 Controlling Access........................................ 20
4.2.1 Access Code Overview................................ 21
4.2.2 Organizing Access Codes............................ 21
4.2.3 How to Create Access Codes...................... 22
4.2.4 Access Levels – The AL Command........... 22
4.2.5 Time Profiles ................................................. 23
4.2.6 Access Codes – The AC Command .......... 23
4.2.7 Holidays – The HR and HP Commands .. 24
4.3 Time Profiles ................................................. 24
4.3.1 How Time Profiles Work ............................ 25
4.3.2 Examples ....................................................... 25
4.3.3 The PR Command ....................................... 26
4.3.4 Creating a Time Profile – The T Command
........................................................................ 26
4.4 System Administration................................. 27
4.4.1 Changing the Date and Time – The C
Command...................................................... 27
4.4.2 Manual Lock/Unlock – The L Command 27
5.0 Displays, Alarms, and Printing ............... 28
5.1 Normal Operation........................................ 28
5.1.1 Master Controller ......................................... 28
5.1.2 Slave Controller............................................ 28
5.1.3 Master and Slave .......................................... 28
5.2 Alarms............................................................ 28
5.2.1 Accepted Alarms .......................................... 28
5.2.2 Alarm Activations......................................... 28
5.2.3 Uncleared Alarms......................................... 31
5.2.4 Communication Errors ................................ 31
5.3 Other System Messages............................... 31
5.3.1 Update Progress............................................ 31
5.3.2 Download Progress ...................................... 31
5.4 Using the Printer........................................... 31
5.4.1 Setting up the Printer ................................... 31
5.4.2 On-Line Transaction Printing ..................... 32
5.4.3 High-Priority Events..................................... 32
5.4.4 Printing Reports............................................ 32
5.5 Printer Reports.............................................. 32
5.5.1 Print Report – The P1 to P9 Commands .. 32
5.5.2 Header – The HE Command ..................... 40
6.0 Installer Commands .................................. 42
6.1 The D Command ......................................... 42
6.1.1 Lock Release Time....................................... 42
6.1.2 Door Open Time.......................................... 42
6.1.3 Door Monitoring .......................................... 42
6.1.4 Time Profile .................................................. 42
6.1.5 Door Name ................................................... 44
6.1.6 PIN Reader Time Profile............................. 44
6.1.7 Using the D Command................................ 45
6.2 Alarm Event Manager and Relay Outputs 46
6.2.1 Overview ....................................................... 46
6.2.2 Identiying Modules, Inputs and Relays..... 46
6.2.3 Alarm Module Relays.................................. 47
6.2.4 Alarm Module Programming – The MR and
MS Commands............................................. 47
6.2.5 Relay Programming ..................................... 49
7.0 Troubleshooting......................................... 51
7.1 End User Troubleshooting .......................... 51
7.1.1 Key Not Working......................................... 51
7.1.2 No Access to Editor ..................................... 53
7.1.3 Cannot Add/Delete Keys............................ 54
Appendix A: Transactions ..................................... 55
A.1 List of Transactions ...................................... 55
A.2 High Priority Transactions .......................... 58
Index 59
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | Figures EN | 3
Figures
Figure 1: Failsafe Lock Wiring ............................... 6
Figure 2: Components of a Readykey Access
Control System ........................................ 8
Figure 3: Connecting Door Controllers ................ 9
Figure 4: K2200 Faceplate .................................... 13
Figure 5: Editor Example...................................... 15
Figure 6: Sample System Layout ......................... 21
Figure 7: Unauthorized Access/Anit-Tamper
Alarms .................................................... 29
Figure 8: Door Controller Override Alarm........ 29
Figure 9: Zone Alarm ............................................ 29
Figure 10: Duress Alarm......................................... 30
Figure 11: Case Tamper Alarm.............................. 30
Figure 12: Alarm Module Tamper Alarm ............ 30
Figure 13: Sample P1 – Personnel Printout .......... 34
Figure 14: Sample P2 – Personnel Printout .......... 35
Figure 15: Sample P3 – Access Data Printout ...... 36
Figure 16: Sample P4 - System Status Printout ....37
Figure 17: Sample P5 - Transaction Printout........ 38
Figure 18: Sample P6 - System Set Up Printout... 39
Figure 19: Sample P7 - Alarm Data Printout........ 39
Figure 20: Sample P8 - Time Profile Printout ......40
Figure 21: Sample P9 - Holiday Profile Printout.. 40 Figure 22: Windows Based System Sheet 1Error!
Bookmark not defined. Figure 23: Windows-Based System Sheet 2Error!
Bookmark not defined.
Figure 24: Standalone System ................................ 52
Figure 25: No Access to Editor .............................. 53
Figure 26: Cannot Add/Delete Keys..................... 54
Table 17: Reader and Lock Operation Settings –
Mode 1 ................................................... 43
Table 18: Reader and Lock Operation Settings -
Mode 2 ................................................... 44
Table 19: Lock Mode Options.............................. 45
Table 20: Lock Mode 2 Options........................... 45
Table 21: Zone Number ........................................ 46
Table 22: Relay Defaults........................................ 47
Table 23: Relay Numbers...................................... 48
Table 24: Event Types ........................................... 49
Table 25: LED StatusError! Bookmark not
defined.
Table 26: Transactions........................................... 55
Table of Tables
Table 1: K2200 Series User Guide Organization 4
Table 2: Other Literature Referenced.................. 4
Table 3: Type Styles Used in Manual.................. 4
Table 4: K2200 Series Specifications.................... 7
Table 5: Editor Level Assignments..................... 11
Table 6: Editor Level Calculations ..................... 11
Table 7: Master Key Commands........................ 11
Table 8: Navigation Keys .................................... 14
Table 9: Display Altering Keys........................... 15
Table 10: Door to Door Controller Association . 22
Table 11: Access Level Examples......................... 23
Table 12: Time Profile Effect ................................ 25
Table 13: Time Period Examples ......................... 26
Table 14: : Display Key ......................................... 31
Table 15: Print Report Commands ...................... 33
Table 16: System Status – Doors and Alarm Zones
................................................................. 37
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0 Introduction EN | 4
Table 3: Type Styles Used in Manual
1.0 Introduction
1.1 Manual Organization
This manual is divided into seven sections with an appendix. A summary of each section and appendix is detailed in the table below.
Table 1: K2200 Series User Guide
Organization
Section Description
1 2
3
4
5
6
7
Appendix
A
Introduction System Overview – Basic overview of the
K2200 Series. Administrating the System – Information
and procedures on administrating a K2200 Series system.
Key Administration and Access Control – Covers administration of the personnel database, including adding/deleting keys and specifying Access Control functions.
Displays, Alarms and Printing - describes the various displays and also covers the printing options which are available
Installer Commands - describes the commands used to configure the door controller.
Troubleshooting – Common solutions and procedures to rectify troubleshooting con
Transactions - shows all the transactions generated by the door controllers
Bold Text
Bold Italicized Text
Italicized Text
Courier Text
[CAPITALIZED TEXT]
On-Screen Buttons
File New
Usually indicates selections that you may use while programming your panel. May also indicate an important fact that you should note.
Denotes notes, cautions and/or warnings.
Refers you to a drawing, table, or other section of this document, or to another document. Also used to symbolize names for records that you will create.
Indicates what may appear on the command center/keypad, or internal printer.
Indicates a specific key on the device to be pressed.
Indicates a specific button that appears on screen
This is used to describe the path in getting to a specific sub-menu or command in a Windows-based application.
Example: …select File•New to create a new
1.3.2 Tips, Important Notes, Cautions and
Warnings
Throughout this document, helpful tips, important notes, cautions and warnings will be presented for the reader to keep in mind. These appear different from the rest of the text as follows;
1.2 Other Literature Referenced
Throughout this manual, references will be made to other documentation. See the following table for a more complete and detailed description of the K2200 Series Controllers.
Table 2: Other Literature Referenced
Part Number
Name of Document
Readykey K2200 Series Controller Installation Guide
Bosch/
Radionics
46513 17375
PAC
1.3 Documentation Conventions
These conventions are intended to call out important features, items, notes, cautions, and warnings that the reader should be aware of in reading this document.
1.3.1 Type Styles Used in this Manual
To help identify important items in the text, the following type styles are used:
Important Notes - should be heeded for successful operation and programming. Also tips and shortcuts may be included here.
Caution - These caution the operator that physical damage to the program and/or equipment may occur.
Warning - These warn of the possibility of physical damage to the operator, program and/or equipment.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0 Introduction EN | 5
1.4 Abbreviations Used
The following list of abbreviations are used throughout this manual.
AC AEM AVR BAT CH CLK CMD CNC COM CTS D/C DC DL DOS DTR DR EMF FIFO GND HBC ID IP LED LK LRT MOV MS MS-DOS OVRD PAL PB PB-TIM PBC PC PIN PINTP RDR RTE RTS RX SIG TAMP TP TX VCA
Access Code Alarm Event Manager Automatic Vehicle Recognition Battery Channel Clock Command Central Network Controller Common Clear To Send Door Controller Door Contact Down Load Disk Operating System Delay Transmit/Receive Door Electro-Motive Force First In First Out Ground High Breaking Capacity Identity Input or Internet Protocol Light Emitting Diode Lock Lock Release Time Metal Oxide Varistor Alarm Module Sensors Microsoft Disk Operating System Override Primary Access Level Pass Back Pass Back Timeout Pass Back Controller Personnel Computer Personal Identity Number PIN Reader Time Profile Reader Request To Exit Request To Send Receive Signal Tamper Time Profile Transmit Valid Code Accepted
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 1.0 Introduction EN | 6
1.5 Listings and Approval
1.5.1 FCC Notice
This equipment generates and uses radio frequency energy. If not installed and used in accordance with the manufacturer's instructions, it may cause interference to radio and television reception. It has been tested and found to comply with the specifications Subpart F of Part 15 of FCC rules for Field Disturbance Sensors. If this equipment causes interference to radio or television reception - which can be determined by turning the equipment on and off - the installer is encouraged to correct the interference by one or more of the following measures:
Reorient the antenna of the radio/television,
Connect the AC power cord to a different outlet
so the control panel and radio/television are on different branch circuits,
Relocate the control panel with respect to the
radio/television.
If necessary, the installer should consult an experienced radio/television technician for additional suggestions, or send for the "Interference Handbook" prepared by the Federal Communications Commission. This booklet is available from the
U.S. Government Printing Office, Washington D.C. 20402, stock no. 004-000-00450-7.
FCC Registration Number: IDHM32Y6K2000
1.5.2 UL Listing
UL 294 - Access Control System Units
Figure 1: Failsafe Lock Wiring
B
A
The controller must be grounded.
Disconnect both ac and battery power supply
before working on the controller.
1.5.4 CABLING
The cabling used in the Readykey access control systems (six wire bus, reader cables, etc.) are not prone to electrical interference. However, you should avoid routing cable close to heavy load switching cables and equipment. If this is unavoidable, cross the cable at right angles every 3.3 to 6.6 ft (1 to 2 m) to reduce the interference.
When installing the K2200 series controllers the following should be noted:
1.5.3 HEALTH AND SAFETY
It must also comply with any local Fire, Health and Safety regulations. A secured door that may be part of an escape route from an area must be installed with:
A fail-safe lock (A). So that the door will be
released if the power fails. Ideally a magnetic lock should be used as these are less likely to jam or seize.
A normally-closed break-glass or manual pull (B)
in the lock supply wiring. So that in an emergency the fail-safe lock can be immediately powered down.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0 System Overview EN | 7
2.0 System Overview
This section briefly describes how a Readykey Access Control System works and covers the basic system components:
Readers.
Door controllers.
Administration system.
Connecting door controllers to make a basic
access system.
2.1 Specifications
This section details the system specification for a standalone system.
Table 4: K2200 Series Specifications
Access Points
Personnel 4000 Editor Keys Master key plus 32 editor keys, each
Access Codes 128, comprising two access levels,
Access Levels 128 Time Profiles 128, each comprising 3 time periods
Holiday Profiles 24, each comprising 20 holiday
System Holidays
Transactions
Zone Alarms 128, up to 32 per door controller
Relay Outputs 4 on each door controller, plus 8 on
Alarms
Warning Door left open Printer Output
16 One master 4-door Readykey K2200
or 2-door Readykey K1200 controlling up to three slaves, a slave may be 4-door Readykey K2200 or 2-door Readykey K1200 controller.
with optional password and editor level.
each with a time profile.
(max. 32 time periods).
periods (max. 254 holiday periods). 20, for controlling access on public
holidays. 2500 most recent transactions
stored in non-volatile memory.
using alarm modules.
each alarm module. These may be controlled by time profile or system event.
Unauthorized access, anti-tamper (on reader, alarm module and door controller), door override, zone, PIN reader duress.
Continuous printing of system events.
9 different reports available on demand.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0 System Overview EN | 8
2.2 How the System Works
Any Readykey access control system consists of three components: readers, door controllers and an administration system.
The readers will detect the unique code in a key and pass it directly to the door controller. The door
In the case of the Readykey K2200 and Readykey K1200, the administration system is built in to the door controller and uses the keypad, display and reader on the front panel. As an option a printer can be connected to the system that reports events as they happen, and can also produce listings of personnel, system setup, past events, etc.
controller compares the code to the information stored in its memory and, if the key is valid, will operate the lock and send a report to the administration system. The administration system is the means by which the user programs the system (who is allowed where and when, etc.) and also where events are reported.
Figure 2: Components of a Readykey Access Control System
Access Decision
Door Controller
Lock Output >
< Key Code
Key Code
Lock
Reader
Key
Administration System
< Transactions
Updates >
2.2.1 Readers
A reader is a device, usually mounted close to the door, that detects the unique code in a key or card and passes it to the door controller where the access decision is made. There are several types of reader suitable for different purposes and environments. Below are some of the special types of reading devices.
Request to Exit Switch
Sometimes a reader is used on both sides of a door, controlling both entry and exit from an area. Normally, however, a Request to Exit motion or button is used to open a door from the secure side. This switch, mounted close to the door, when pressed sends a signal to the door controller to release the lock. Of course, anyone can press the switch to open the door when leaving, therefore no identity of the person can be recorded.
2.2.2 Door Controllers
The door controller is the heart of the access control system; its main functions are to:
Decide whether a person has access at a
particular door and at a particular time.
Provide power to operate the lock.
Monitor doors for unauthorized access or left
open conditions.
Automatically lock and unlock doors at certain
times.
Detect tamper conditions at the reader or at the
controller.
Monitor any alarm modules for extra alarm
inputs.
Operate relays on the door controller itself or on
an alarm module.
The Readykey K2200 may have 4 readers connected, the Readykey K1200 may have 2 readers connected. In all other respects, both door controllers are identical.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 2.0 System Overview EN | 9
Connecting Door Controllers
What makes these door controllers so flexible is the ability to link controllers together to allow more than 4 doors to be administered. When programmed from the front panel, as described in this document, up to 16 doors can be controlled and up to 4000 personnel administered.
Figure 3: Connecting Door Controllers
Master Door Control l er
K2200 (4 - door ) or K120 0 ( 2 - door )
Pri n t e r Cab l e ,
Max length:
50ft/15m
Six- wi r e bus, m ax tot al l engt h: 1000m
Max. distance between controll ers:
Serial
Printer
In all cases, one Readykey K2200 Series Door Controller (e.g. K2200 or K1200) is the master controller, up to 3 further door controllers are slaves. All administration and reporting occurs at the master controller. Apart from some initial set up functions, no administration activity occurs at the slave controllers.
Up to 3 Slave Door Controller s,
K2200 (4-door) or K120 0 ( 2 - door )
1500ft/500m
Alarm Modules
An alarm module is a Readykey Alarm Module or Alarm Event Manager (AEM). Alarm modules are optional devices that allow extra inputs (points or zones) to be monitored and report alarms if activated. Each alarm module has 8 inputs that can be enabled and disabled manually or automatically at certain times.
The alarm modules also have 8 relay outputs that can be activated by alarm inputs, system events such as door left open, or at certain times.
2.2.1 Administration Software
There are several ways of administering an access control system. Different methods allow greater numbers of doors or personnel to be controlled, and door controllers to be a greater distance from the central point. The administration systems fall into two broad categories:
1. Faceplate panel administration. This is covered
by this document and is used for small systems (up to 16 doors) and, as the name suggests, all the programming is via the faceplate panel attached to the controller.
2. Readykey for Windows. This is a PC-based
administration system used for larger systems, or where more reporting features are required. For further details, refer to the Readykey for Windows Manual for further details.
Note:
At least one faceplate is required for each system
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 10
Editor Keys
3.0 Administering the System
This section looks at the controller is administered when used as part of a standalone system. It covers:
What Editor mode is and how to administer the
editor keys needed to access the Editor.
Using the Editor. This section describes how to
use the Editor mode to administer the system
Note:
If the system has been commissioned and all editor keys added to the system, you can go straight to Section 3.1.3
3.1 Using the Faceplate
3.1.1 Editor Mode
The faceplate is used for system administration. The faceplate is the keypad, display and reader attached to the door controller to administer keys, respond to alarms and configure the system. Up to 16 doors and 4000 keyholders can be administered using this system. An optional, and highly recommended, printer may be used for both continuous printing of events and production of various reports.
Note:
For larger systems, it is recommended to be administered from the Readykey for Windows program.
Each system, whether administered from the faceplate or a PC, needs at least one faceplate for basic system administration - see Readykey K2200 Series Controller Installation Guide (Bosch P/N: 46513, BOSCH P/N:
17375).
3.1.2 Editor Key Administration
In order to use the Editor mode to make changes to the system, you need an editor key. This is a normal credential that is recognized by the door controller as allowing the holder to modify data held in the controller. Up to 32 editor keys may be added, each may have a different editor level. The editor level determines what commands that particular key can operate. In addition, each editor key may be given its own password. The master key is a special editor key that can be used to issue all commands and is the only key able to create or modify other editor keys.
Note:
All editor keys, including the master, are normal Readykey keys that can be used for gaining access. However, in order to be used for access control they still have to be added to the personnel list and given an access code. Likewise, removing an editor key will not have any effect on its use as normal access key. The exception to this is the master programming key.
Up to 32 editor keys can be assigned, each one with its own individual password and editor level. Only the master key can add, delete and modify the use of the editor keys.
Note:
All editor keys, including the master, are normal Readykey keys that can be used for gaining access. However, in order to be used for access control they still have to be added to the personnel list and given an access code. Likewise, removing an editor key will not have any effect on its use as normal access key. The exception to this is the master programming key.
Alarm Acceptance
All editor keys are able to accept alarms either at the master or slave controllers (if used), whatever their editor level. For instance, a key with an editor level of 0 will only be able to accept alarms and be unable to issue any commands in the Editor.
Master Key
The master key is created when the system is installed and configured. It can be changed by using the INST command - a command for which the master key is required.
If the master key is lost, a replacement can be programmed, but only by performing a reset. This procedure is described in Readykey K2200 Series
Controller Installation Guide (Bosch P/N: 46513, BOSCH P/N: 17375). No data will be lost by this process, but
it can only be carried out by someone with access to the inside of the master door controller housing.
Editor Keys
Up to 32 editor keys can be assigned, each one with its own individual password and editor level. Only the master key can add, delete and modify the use of the editor keys.
Passwords
All editor keys can have a password assigned. This prevents anyone has possession of an editor key gaining access unless they also know its password. Passwords can only be issued to editor keys, or altered, by the holder of the master key (using the I command).
Editor Levels
The ability of any editor key to issue commands is determined by the editor level it is assigned. The editor level is a numeric value, between 0 and 4095, calculated from the following table. Each action is given a value, by adding the values for each action to be assigned an editor level is obtained. Some typical examples are given.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 11
Table 5: Editor Level Assignments
Value Command Actions
0 none Accept alarms only
P1-P9(exc P6) HE,
1
K 2 L Manual lock and unlock 4AC, AL
E
8 D Set door data
16 T, PR Time profile functions 32 C Change date and time 64 V Void (delete) a
128 A
N
256 MR, MS, RE Alarm module
512 DC Passback and door
1024 HR, HP Holiday functions 2048 DP Data protection
Printer functions
Access codes and access levels Edit personnel
personnel key Add a personnel key
View a PIN
programming
interlock
Table 6: Editor Level Calculations
Value Commands
0 none Yes Yes Yes 1 P1-P9,HE, K Yes Yes 2 L Yes Yes Yes 4AC, AL, E Yes Yes
8 D Yes Yes 16 T, PR Yes Yes Yes 32 C Yes Yes Yes 64 V Yes Yes
128 A,N Yes Yes 256 MR, MS, RE Yes Yes
512 DC Yes Yes 1024 HR, HP Yes Yes Yes 2048 DP Yes
Total
Supervisor
4095 1271 1850
Administrator
Installer
Editor Level Examples
This table gives some examples of how to calculate editor levels. The names used refer to typical types of operator or user.
Note:
The Installer cannot add or delete personnel, or the Administrator modify door programming
Master Key Commands
The following commands can only be issued when the master key is used:
Table 7: Master Key Commands
Command Actions
I Administer editor keys INST Installer functions P6 Print set up details INIT, INITn Initialize a door controller DL Download to door controllers
SYSTEM START
Initialize a door controller
The INST and SYSTEM START commands are fully described in Readykey Series Controllers Installation Manual (Bosch P/N: 46513, PAC P/N:
17235), the P6 command is described in the Section
5.5.3.6, the INIT, DL, and UL commands are described in Installer Functions.
Assigning Editor Commands – The I Command
Up to 32 editor keys can be assigned. Editor keys are maintained by modifying a database using the I command. Before adding each key, you should first determine the editor level that key will be assigned, see Editor Keys.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 12
Adding, Modifying or Deleting an Editor Key
Note:
Only the master key is able to issue the I command.
1. Present the master key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [I] and press [ENT].
CMD I_
5. The display will now show the first unassigned
editor. An unassigned editor key is one with a key code of 00000000.
E3 KEY 00000000
6. To add a new editor key, present a key to the
faceplate reader. If the key is already assigned, a REPEATED
KEY message is displayed for about 2 seconds
REPEATED KEY
If the key is valid, its 8-character code will appear.
E3 KEY 8824A474
7. Press [NXT] to go to the Editor Level Field.
8. To modify an existing editor key:
At the KEY prompt,
E3 KEY 00000000
you can either use the up and down arrow keys to select a key, or press the FastFind button (*).
- If you are in possession of the key itself,
present the key to the faceplate reader.
- If the key is not in the database, you
will get a message (left) for about 2 seconds before returning to the ID prompt.
NOT IN DATABASE
- Type the editor key number (1-32) and
press [ENT].
You can now change the key, if required, by presenting a new key to the faceplate reader.
Press [NXT] to go to the Editor Level field.
9. To delete an editor key.
Select the key to delete as described above. When the key code is displayed,
E9 KEY 28851408
press [CLR] - the key code will be replaced with zeroes.
E9 KEY 00000000
Press the [ENT] key. Press [ESC] to return to the CMD prompt.
10. Enter the editor level to be assigned to the key,
(see Editor Keys for editor level values).
E3 LEVEL 0
The value must be between 0 and 4095. 0 means the key can only accept alarms, 4095 gives access to all but the master key only commands.
Press the [ENT] key. Press [NXT] to go to the next field.
11. The name you enter here will appear on printed
reports of editor use and alarm acceptance when this editor key is used.
ID
Type a name of up to 12 characters (A-Z, 0-9 and SPC). Press [ENT].
Press [NXT] to go to the next field.
12. Whatever method you use to find a key you will
be presented with the ID number and access code.
ID 27 AC 0
Note:
If you use 12-character IDs, press NXT to view the name assigned to the key (left).
WHO SMITH AB
At this point you can use the up and down arrow keys to move through the database to find the key you want to edit.
You can also press the FastFind button (*) to return to the ID prompt.
3.1.3 Using Editor Mode
New Users
Please read this section if you are unfamiliar with programming a door controller. It contains important information that will help you understand how the Editor mode works, what the different keys do, and how to make changes to different items. By reading this section you will find it easier to follow the more detailed descriptions of commands in later sections.
All programming of the access control system are made using the Editor mode. The Editor mode consists of a set of commands issued by the user. Each command allows the user to enter or modify various items, depending on the command. To gain access to the Editor mode and issue commands, present an editor key to the reader on the faceplate.
A full description of editor keys, editor levels, passwords and administration is given in see Section
3.1.2 Editor Key Administration.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 13
2
3
Figure 4: K2200 Faceplate
1
1 - Reader 2 - 16 Character Display 3 - 48 Key Keypad
3.1.4 Entering Editor Mode
Present the editor key to the faceplate reader. If the key is a valid editor key or the master key:
You may be prompted to enter a password,
PASSWD _
In which case, use the keypad to enter the password (maximum 8 characters) and press [ENT]. If the password is valid, you will see the
CMD prompt - see Section 3.1.5 Command Prompt - CMD.
If the password you enter is not valid, you will get:
INVALID PASSWORD
and be returned to a blank screen. Present the key and try again. If it still does not work, ask the person responsible for the system to check your password.
If no password has been assigned to the key, you
will immediately have the CMD prompt - see Section 3.1.5 Command Prompt - CMD.
Note:
If the key you present is not an editor key, you will see
T
This indicates that a key has been presented, but is not recognized as an editor key.
Note:
No alarm conditions will be reported while you are in Editor mode, nor will any transactions be printed. When you leave Editor mode, any alarms that occurred will be reported and all the transactions will be printed. Door controller or alarm module relays will operate during Editor mode.
3.1.5 Command Prompt - CMD
The starting point for any operation within the Editor mode is the CMD prompt:
CMD _
Here you are being prompted to enter one of the commands that either alters the information stored in the door controller, such as adding or deleting personnel, or initiates an action, such as a manual unlock.
Editor Levels
The commands you can perform are determined by your editor level. This is set by the person responsible for issuing editor keys. If you try to enter a command that is not available to you, you will see:
INVALID ID LEVEL
and be returned to the CMD prompt.
Editor Time Out
Once in Editor mode, if you do not press any keys for more than 3 minutes, the mode will time-out. You will then have to present your editor key again to return to the Editor mode. This means you cannot inadvertently walk away from the system leaving it in the Editor mode.
3.1.6 Leaving Editor Mode
Once you are in the Editor mode, you can press the [ESC] key at the CMD prompt to leave and return the door controller to its normal operation. Any alarm conditions that occurred while you were in the Editor mode will now be reported. Also, if you have a printer connected, any transactions that have occurred while the Editor mode was being used will now be printed.
3.1.7 Panel Keyboard
In the Editor mode the ? key provides extra help. For instance, at the CMD prompt, if you press ? you will see:
ENTER COMMAND
This display lasts about 3 seconds before returning to the CMD prompt or the prompt at which you pressed the key. You should press [?] at any time if you are not sure what is required.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 14
ESC Key
The [ESC] key is used to leave the current operation and go back to the previous step. For instance, pressing [ESC] while editing data will take you back to the CMD prompt.
Table 8: Navigation Keys
Key Name Description
Up and Down Arrow Keys
Minus and Next Keys
FastFind The dot on the center of the arrow keys is the FastFind button. In most commands, if you
Use the up and down keys to move from one record to another. Usually there will be an indication of which record you are in; however, some fields may not have room to display a record number as well as their value.
When you are on record 1, the up arrow will have no action; on the last record, the number will vary from one database to another, the down arrow will have no action.
Use the minus and Next keys to move from field to field across a record. When you are on the leftmost field the minus key has no action; on the rightmost field, the [NXT] key has no action. If you move up or down using the arrow keys, you remain in the same field but move to the record above or below.
press this you will receive the prompt
FIND _
Here you can enter a record number and press [ENT], to move directly to that record. If you enter a number larger than the number of records, you will go to the last record in the database.
The Void Personnel (V) and Edit Personnel (E) commands give the prompt:
ID _
In this case, you have three choices for searching:
1. Enter the record number and press [ENT].
2. Type the exact 12-character ID (if used) and press [ENT]
If the ID is not known, you will get the message:
UNKNOWN NAME
and be returned to the ID prompt.
3. Present a key to the faceplate reader.
If the key is not known you will get the message:
NOT IN DATABASE
and be returned to the ID prompt.
FastFind in printer commands. In the printer commands (P1-P9), the FastFind button is used to initiate printing. see Section 5.5.1 Print Report – The P1 to P9 Commands.
Navigation Keys
Moving within a database
Most commands allow you to edit a database, or table. Each database has several rows, or records, consisting of several columns, or fields. When you first issue a command, you will be placed in the first field of the first record or, if you prefer, the top left­hand corner of the table. You use the navigation keys on the keyboard to move this 'window' around the table.
Editor Example
The following example (see Figure 5) shows the Personnel database as seen when the Edit (E) command is used. The highlighted box shows the first item that will appear in the screen. Use the keys shown to move the 'window' around the database.
Use the FastFind button () to go directly to a
particular record.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 15
(Right)
Figure 5: Editor Example
(Left)
(Up)
(Down)
ID 1 AC 1
ID 2 AC 0
ID 3 AC 0
ID 4 AC 0
ID 3999 AC 0
ID 4000 AC 0
WHO _
WHO _
WHO _
WHO _
WHO _
WHO _
Alphanumeric Keys
These are the keys [A]-[Z], [0]-[9] and [SPC], which take up most of the keyboard. You use these for entering names or values when prompted. Normally you will not be allowed to enter characters ([A]-[Z] or [SPC]) when a numeric value, such as an access code or lock release time is required.
When you enter any name or value, you should always press [ENT] before moving on to the next prompt. If you do not press [ENT], the name or value you entered will be lost and the contents of the field will revert to their previous value
Making Changes
When a field is visible on the screen, the flashing underline cursor will appear on the first character. The cursor is always positioned on the next character to be changed. You can use the following keys to move and alter the display (see Table 9).
ID 1 HOLS 0
ID 2 HOLS 0
ID 3 HOLS 0
ID 4 HOLS 0
ID 3999 HOLS 0
ID 4000 HOLS 0
Table 9: Display Altering Keys
Key Name Description
Left and Right Arrows
Clear
The left and right arrow keys move the cursor to the left and right within the field. The cursor always starts on the leftmost character of the field and returns to that position when you press ENT
The CLR (clear) key will blank out the existing value. This is convenient especially when changing long names. If you press CLR followed by ENT, numeric values will be set to 0 and alphabetic values set to all spaces.
The next example shows how to make changes to items. Most data items fall into 3 different categories:
Alphanumeric
Numeric
Options
Alphanumeric
These are names given to personnel, editors, doors etc. You may use any of the alphanumeric characters (A-Z, 0-9) including SPC (space.)
1. Once you have selected a field to change, use the
alphanumeric keys to enter a new value.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 3.0 Administering the System EN | 16
ID DOOR 1
The cursor, a flashing underline, marks the character that will be overwritten by the next key press.
2. When a valid key is pressed, the new character
will appear on the screen and the cursor will move to the next position.
ID FOOR 1
3. Continue entering characters, until you have
completed the entry.
ID FRONT DOOR_
Use the left and right keys to move the cursor within the field. Press [ENT]
You must press [ENT] to save your new entry. If you do not, when you move to the next field or press [ESC], your entry will be lost.
Numeric
These are values or codes such as lock release time, access code, etc. In this case, you can only enter numbers (0-9). Each type of entry will have a maximum and minimum value. If you enter a value outside the range allowed, the value you entered will be adjusted to the nearest allowed, e.g. the maximum value for a lock release time is 255 seconds, if you enter 300, the value will change to 255 when you press [ENT].
1. Once you have selected a field to change, use the
alphanumeric keys to enter a new value.
DR1 LRT 5
The cursor, a flashing underline, marks the character that will be overwritten by the next key press.
2. When a valid key is pressed, the new character
will appear on the screen and the cursor will move to the next position.
1. No cursor appears in this type of field. In order
to make changes, press the number corresponding to the option you wish to change. In this example, time period days (PR command) are shown.
F1 DAY --------
2. In this example, to select a day press the
corresponding number to the day of the week, Mon=1, Tue=2, etc. To deselect an option, press the number again.
F1 DAY MTWTF---
When you have made your selections, press [ENT].
You must press [ENT] to save your new entry. If you do not, when you move to the next field or press [ESC], your entry will be lost.
There are other types of entry, such as date, time, manually locking/unlocking doors etc. These will be described in detail in the relevant sections.
DR1 LRT 1
°
3. Continue entering characters, until you have
completed the entry.
DR1 LRT 10
°
Use the left and right keys to move the cursor within the field. Press [ENT]
You must press [ENT] to save your new entry. If you do not, when you move to the next field or press [ESC], your entry will be lost.
Options
These are special fields that allow various options to be set, such as days of the week, etc.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0 Key Administration/ Access Control EN | 17
If you use this method, it is vital that you keep an
4.0 Key Administration/ Access Control
This section deals with the Personnel database and covers the following:
Adding new keys to the database.
Deleting keys (voiding) from the database.
Editing key parameters (access rights etc).
The use of PIN codes.
Controlling access - who goes where and when.
Also covered in this section are the following associated topics:
Manual lock/unlock facility.
Setting the system date and time.
4.1 Key Administration
Each key that is issued will allow the keyholder access through certain doors at certain times. This section describes how to add, delete (or void), and edit keys.
4.1.1 Personnel Database
Identifying Personnel
There are two ways in which individual keyholders can be identified in the system. The first is to use an automatically generated ID number, between 1 and
4000. The second method allows the operator to
assign a name, up to 12 characters, to each keyholder.
Note:
You should decide before you start issuing keys which method you will use. The system has to be set up to use one method or the other by the installer. Although this can be changed later without losing information, it is not recommended.
Four-Digit Number
The main advantage of this method is speed of entry because you will not have to enter a different name for every key that is issued. The disadvantage is that all references within the system, including printed reports, are to the 4-digit number. This can make identification of keyholders difficult, as you will have to keep looking up your own records. You are not able to select the number that is issued, the system will always issue the first free number. For instance, if you issue 120 keys, they will be automatically identified as 0001 to 0120 when added. If you were to delete, say, numbers 25 and 42, the next keys issued would be identified as 0025, 0042 followed by 0121, 0122 and so on.
accurate record of the 4-digit ID issued to each key and to whom the key is issued. If a keyholder loses a key, unless you have an accurate record, you will not be able to delete the lost key from the system.
Twelve Character Name
A better method is to use the 12-character name. This method is easier to administer once all the keys are issued, In this case whenever a key is issued, a unique name can be entered. The name may consist of up to 12 characters using A-Z, 0-9 and space (SPC on the keypad.) Names should not start with a space or a number. You will probably use the keyholder's name and initials, e.g. SMITH AB or JONES SL. You may use any naming system you feel is appropriate, such as payroll or employee numbers. Remember names must be unique - you will be warned if a duplicate name is entered.
Token Code
This is the unique code stored in each Readykey credential. It is written permanently into the key during manufacture and never changes. In routine use, you will not have to use this code. However, there are some occasions on which it can be used. One of these is the adding of keys without physically being in possession of the key. This may come about if one or more keys are accidentally removed from the system and it may not be possible or convenient to recall the lost keys from the keyholders. If a record has been kept of the token codes of all keys, these can be entered instead of presenting the key itself. The personnel printout (P1 command) contains the token code of each key and is an ideal record for such purposes.
Access Codes
The access that a key is allowed is determined by assigning it an access code. Access codes are fully described in see Section 4.2.6 Access Codes – The AC Command. When routinely adding keys, you should know the access code that will need to be assigned to each key.
Please read Section 4.2 Controlling Access to understand how access codes work.
Holiday Profiles
Each keyholder can be assigned a holiday profile. This is a range of date on which the person will not be allowed access. There are 24 different holiday profiles, each of which may contain up to 20 holiday periods. A holiday period consists of a start date and number of days’ duration. There are not enough holiday profiles to give every keyholder their own. For this reason, you are not advised to attempt to control individual access using holiday profiles. However, they may be used to cover periods such as a temporary factory closure.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0 Key Administration/ Access Control EN | 18
Holiday periods and profiles are defined using the HR and HP commands (see Section 4.2.7 Holidays – The HR and HP Commands) and are applied to a key using the Edit (E) command (see Section 4.1.4 Editing Keys – The E Command).
4.1.2 Adding Keys – The A Command
This procedure describes how to add a key to a database. Before you start you should have or know the following:
An editor key with an editor level that allows
adding of keys
One or more keys to add
The names of each keyholder (not required if
using 4-digit identification)
The access code to be assigned to each
keyholder
To Add a Key:
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [A] and press [ENT].
CMD A_
5. The next available unused ID number will now
appear along with a prompt to enter the access code.
ID 27 AC 0
Type the access code (0 to 128) and press [ENT]. Press [NXT] to go on to the next prompt.
6. Enter an identification name for this key which
may be a name, a payroll number or a flat/residence name.
WHO _
Note:
This prompt will only appear when you are using 12­character IDs.
You may use any of the characters on the keyboard (A-Z, 0-9, SPC). Do not start a name with a space or a number
If you enter an ID that is already being used, the message DUPLICATE NAME will appear for about 2 seconds before returning to the WHO prompt.
DUPLICATE NAME
Press [NXT] to go on to the next prompt.
7. At this prompt
KEY 00000000
you can either:
- Present the key to be added to the
faceplate reader. If the key is valid, the addition of this key is complete and you will move directly to a prompt for the
next key. There is no need to press [ENT] or [NXT].
- Type the 8-character key code.
If for some reason you are not in possession of the key, provided you know its 8-character code, you can enter it here. Use only the characters A-F and 0-9.
When complete press [ENT].
If the key is valid, the addition of this key is complete and you will move directly to a prompt for the next key. There is no need to press [NXT].
If, using either of these two methods, you enter a key that is already stored you will get a message
REPEATED KEY
for about 2 seconds before returning to the KEY prompt.
8. If you have no more keys to add, press [ESC] to
return to the CMD prompt. If not, you can now continue adding keys
ID 28 AC 0
Note:
The access code remains the same as the previous key you entered. If adding a large number of keys, by grouping them by access code you will speed up entry as well as reducing the risk of error.
Once a key has been added, it will be recognized by all the readers in the system. However, this will not be the case if:
Slave door controllers are disconnected or not communicating with the master.
A download is in progress to a slave door controller, in which case the new information will not reach the slave until completion of the download.
4.1.3 Deleting (Voiding) Keys – The V Command
Removing keys from the system is a very simple process. Several options are available for selecting the key to be removed. They are:
When prompted, present the key to the faceplate
reader.
Enter the 4-digit ID number.
Enter the 12-character ID, if used.
Use the up and down arrow keys to search for
the key in the database.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
K2200 Series | User Guide | 4.0 Key Administration/ Access Control EN | 19
0101 0101 0101
Instead of voiding a key from the system, consider changing its access code to 0 (zero). By doing this you will prevent use of the key (any attempt will result in a No Access: Locked Out transaction being generated) but you will also have a record of a 'lost' key being used unsuccessfully
To Void a Key:
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [V] and press [ENT].
CMD V_
5. At the ID Prompt,
ID _
you can select the key to be deleted using one of these methods:
- If you are in possession of the key itself,
present the key to the faceplate reader.
If the key is not in the database, you will get a message for about 2 seconds
NOT IN DATABASE
before returning to the ID prompt.
- Type the 4-digit ID of the key and press
[ENT]. Any number between 1 and 4000 will be accepted.
- If you are using 12-character IDs, you
can type the ID and press [ENT]. You must type the name exactly as it was originally entered. If no match is found, you will get a message
UNKNOWN NAME
for about 2 seconds before returning to the ID prompt.
6. Whatever method you use to find a key, you will
be presented with the ID number and access code.
ID 27 AC 7
7. At this point, you can use the up and down
arrow keys to move through the database to find the key you want to delete. You can also press the FastFind (*) button to return to the ID prompt.
WHO SMITH AB
8. Once you have selected the key you want to
delete, press [ENT].
9. At the CONFIRM VOID prompt,
CONFIRM VOID
press [Y] to confirm and you will be returned to the CMD prompt. Any other key will return you to the CMD prompt without voiding the key.
When a key has been voided, it will be rejected by all the readers on the system and a No Access: Unknown ID transaction will be produced. This will not be the case if:
Slave door controllers are disconnected or not
communicating with the master.
A download is in progress to a slave door
controller, in which case the new information will not reach the slave until completion of the download.
4.1.4 Editing Keys – The E Command
You can change the access code of a key as well as the 12-character name (if used) at any time. You can also assign a holiday profile to a keyholder. The access code and holiday profile must already be defined (see Section 4.2.6 Access Codes – The AC
Command and Section 4.2.7 Holidays – The HR and HP Commands).
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
3. You will now see the CMD prompt.
4. Type [E] and press [ENT].
CMD E_
5. At the ID prompt,
ID _
you can either use the up and down arrow keys to select a key, or press the FastFind (*) button.
- If you are in possession of the key itself,
present the key to the faceplate reader.
If the key is not in the database, you will get a message for about 2 seconds
NOT IN DATABASE
before returning to the ID prompt.
- Type the 4-digit ID of the key and press
[ENT]. Any number between 1 and 4000 will be accepted.
- If you are using 12-character IDs, you
can type the ID and press [ENT]. You must type the name exactly as it was originally entered. If no match is found, you will get a message
UNKNOWN NAME
for about 2 seconds before returning to the ID prompt.
6. Whatever method you use to find a key, you will
be presented with the ID number and access code.
ID 27 AC 7
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
Loading...
+ 43 hidden pages