This document must not be reproduced in any way or otherwise further used without the written consent of Kaba AG.
All product names are trademarks of the respective companies.
Copyright 2016 Kaba AG. All rights reserved.
04045708 - 04/2016
Technical ManualContents
Contents
1About this Document ............................................................................................................................. 7
1.2Target group ...................................................................................................................................................................7
1.3Contents and purpose.................................................................................................................................................7
1.6Orientation in the Document.................................................................................................................................... 8
2.1Use as directed .............................................................................................................................................................11
2.2Mounting and Installation........................................................................................................................................11
2.3Service and Maintenance .........................................................................................................................................11
2.4Accessories and spare parts ....................................................................................................................................11
3.2Registration Unit Compatibility .............................................................................................................................14
3.5Interface for Extension Modules ............................................................................................................................18
3.5.1Number of Supported Extension Modules .........................................................................................18
3.6Technical Data ..............................................................................................................................................................19
3.6.1Overview of Technical Data......................................................................................................................19
4.4Behavior with two Registration Units ..................................................................................................................27
4.5Behavior with Several Media in the Field (Anti-Collision).............................................................................27
5.2.2Installation site ..............................................................................................................................................51
5.4.2Data line RS-485............................................................................................................................................55
5.4.3Line to the door opener and door contacts........................................................................................57
5.4.4Coaxial Cable to the Registration Units................................................................................................58
5.7.1Configuration process ................................................................................................................................68
6.1Putting into operation process ..............................................................................................................................80
6.2"Standalone Access Control without Host System" Commissioning .......................................................80
6.3Functional Test (RS-232 A/B)...................................................................................................................................83
7.3.1Enable service mode ...................................................................................................................................87
7.3.2Disable service mode..................................................................................................................................87
7.4Factory Reset/Reset Device to the Basic Status................................................................................................88
7.5Firmware Update/LEGIC OS Update.....................................................................................................................90
7.5.1Firmware update/LEGIC OS update via access manager...............................................................90
7.5.2Firmware Update / LEGIC OS Update with programmer 1460....................................................90
8.1LED Displays on the Remote Reader ....................................................................................................................93
This document describes all device versions and optional equipment and functions.
Options need to be paid for and are therefore only available if they have been purchased. Additional equipment and functions may not yet be available at the time of
issuing the document and, possibly, can only be purchased at a later stage.
Product name:Kaba remote reader 91 25 (US / CAN)
Article number:04044475
Functional type:AM (access manager)
Serial number:
Date of manufacture:
Firmware versionfrom BREB03.05.RD_
Display in Kabaexos: BREB03.05.RD
1.2Target group
This document is exclusively intended for specialist personnel.
The descriptions require specialist personnel trained by the manufacturer. The descriptions do not replace product training.
For reasons of device safety, the installation and maintenance operations described
in this document must be carried out only by service persons according to EN
60950-1 (Information technology equipment - Safety).
Service persons are persons having adequate technical training and sufficient experience to be aware of and to minimize the possible risks for themselves or other persons, which may occur when carrying out these operations. The service persons are
responsible for adhering to the instructions given by the manufacturer and to the applicable standards and regulations during execution of their work.
This document is also used as information for persons with the following tasks:
•project planning and implementation
•Commissioning the product within the network
•Connecting the product to the user software by programming customer applica-
•Customer-specific adjustment by setting the parameters of the product
1.3Contents and purpose
The contents is limited to the assembly, installation, start-up, and basic operation of
the hardware.
This product has been built in accordance with state-of-the-art standards and the
recognized safety rules. Nevertheless, its use may constitute a risk to persons and
cause damage to material property.
Read and observe the following safety instructions before using the product.
2.1Use as directed
The product is only intended for use as described in chapter “Product description”.
Any use beyond that is considered contrary to its designated use. The manufacturer
cannot be held liable for damage resulting from such use. Such use is at the sole risk
of the user/operator.
2.2Mounting and Installation
Mounting and installation may only be carried out by service persons (see chapter 1
“Target group”).
Installation may only be carried out in places that fulfill the climatic and technical
conditions stated by the manufacturer.
The manufacturer is not liable for damages resulting from improper handling or incorrect installation.
2.3Service and Maintenance
Maintenance work / troubleshooting
Only the service person (see chapter 1 “Target group”) is entitled to remove faults
and carry out maintenance work.
Reconstruction and modification
Any alteration or modification to the device may only be performed by the service
person (see chapter 1 “Target group”). Any alteration or modification performed by
unauthorized persons shall render void any liability.
2.4Accessories and spare parts
Accessories and spare parts must comply with the technical requirements specified
by the manufacturer. This is guaranteed when using original accessories and spare
parts from Kaba.
Danger for electronic components due to electrostatic discharge.
Improper handling of printed circuit boards or components can cause damages that
lead to complete failures or sporadic errors.
•During installation and repair of the product, the ESD protective measures must
be considered.
•Wear an ESD wristband when handling electronic components. Connect the end
of the wristband to a discharge socket or an unvarnished grounded metal component. This way, static charges are discharged from your body securely and effectively.
•Touch only the edges of circuit boards. Do not touch the circuit board nor the
connector.
•Place all dismantled components on an antistatic surface or in an antistatic container.
•Avoid contact between circuit boards and clothing. The wristband only protects
the printed circuit boards against electrostatic discharge from your body, but
there is still a risk of damage through electrostatic discharge from your clothing.
•Transport and dispatch dismantled modules only in electrostatically shielded
protective bags.
Access Management System
Kaba exos 9300
(US / CAN)
Registration units
Reader
Communication
Hub
Database
Web- and Application Service
CardLink
USB
92 00
1)
90 30
91 25
91 08
3Product Description
3.1Overview
The Kaba remote reader 91 25 with functional type AM can either control and monitor access control at access points or register coming/leaving bookings for time registration.
Two registration units can be connected to the Kaba remote reader 91 25. The remote reader has two RS-232 interfaces (e.g. for keypads, Hyper X or system-dependent functions) and can be integrated into the Kaba exos access control system. The
remote reader is installed on a DIN rail. Thanks to the separation of the remote reader
and registration units, the remote reader can be installed in a tamper-proof area and
the registration units can be installed in an area that is not tamper-proof.
The door components (locking elements, monitoring contacts) are directly connected to the remote reader. This controls the electric strikes as well as the optical
and acoustic signal transmitters of the registration units. As two registration units can
be connected, one Kaba remote reader 91 25 is sufficient for implementing an on/off
configuration (e.g. turnstile). The remote reader communicates with the host system
via the RS-485 interface. The host system checks the company codes and the user
medium numbers, and activates the access points.
If the communication between the remote reader and the host system is interrupted,
then, with the relevant programming of its offline behavior, the remote reader automatically takes on the tasks of the host system; i.e. authorization checks and door
functions are retained.
The door configuration determines the operating mode of the Remotereader. A detailed description of the door configurations and their operating modes can be
found in the chapter Operating Types and Modes.
3.4Supported RFID Standards with Possible Media Definitions
The following table shows the RFID standards and media definitions supported by
the device.
The Kaba remote reader 91 25 recognizes up to eight different media definitions at
the same time.
Media definitionsSupported RFID technologies
MIFARE
DESFire
ISO
14443A
Unique number (UID)
*1
Safe UID----✔
Card ID✔✔✔✔-
Kaba group header--✔✔✔
Kaba advant ID--✔✔-
LEGIC access™
(advant)
LEGIC access™ pool
(prime)
CardLink
1.1
CardLink1.0Data incl.
Additional media
numbers
Data✔✔✔✔-
Actuator
status
Media
traceback
*2
actuator
status
*1 The LEGIC chip set does not use the safe UID command set
*2 Media traceback information can only be read out directly
✔✔✔✔-
✔✔✔✔-
✔-✔--
✔✔✔✔✔
so that UID from other media, such as MIFARE, can also be
read.
on the access manager and no media traceback information is written.
MIFAREClassic
ISO
14443A
--✔✔-
----✔
----✔
LEGICadvantLEGICpri
me
ISO
14443A
ISO
15693
LEGICRF
3.4.1MIFARE
The system can evaluate everything that can be defined in Kaba media manager. MIFARE DESFire or MIFARE Classic media can be read and described on the same Kaba
remote reader 91 25 MIFARE using various media applications.
3.4.2LEGIC
LEGIC prime or LEGIC advant media can be read and described on the same Kaba remote reader 91 25 LEGIC using various media applications (LEGIC advant media can
only be described using LEGIC advant components).
The extension modules are connected to the system bus of the Kaba remote reader
91 25. There is a limit to the maximum number of supported extension modules.
The host system determines the maximum number of connectible extension modules.
Configuration of the Kaba
remote reader 91 25
Only extension module
9030
Only extension modules
9031
Mixed operation (extension
modules9030 and extension modules 9031)
*non-standard
Max. connectible
extension modules 9030
9020VDC*
05As specified in the technical
22As specified in the technical
Max. connectible
extension modules 9131
Minimum supply voltage
of the Kaba remote reader
91 25
EN 60950-1 : 2014-08
EN 60950-1:2006/A2:2013
UL 60950-1:2007/R:2014-10
CAN/CSA-C22.2 No. 60950-1:2007/A2:2014-10
EN 301 489-1 V1.9.2 : 2011-09
EN 301 489-3 V1.6.1 : 2013-08
EN 300 330-1 V1.8.1 : 2014-12
EN 300 330-2 V1.6.1 : 2014-12
in accordance with the provisions of the EC directives
2014/53/EC: R&TTE Directive
RoHSThis device complies with the regulations of the Directive 2011/65/EU of the Euro-
pean Parliament and of the Council of June 8, 2011, on the restriction of the use of
certain hazardous substances in electrical and electronic equipment.
The original Declaration of Conformity can be downloaded from
www.kaba.com/conformity in PDF format.
Tested Standard:
FCC Code of Federal Regulations, CFR 47, Part 15, Sections 15.205, 15.207, 15.215 and
15.225
FCC ID NVI-KRR9125-K5
FCC § 15.19
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this
device must accept any interference received, including interference that may cause
undesired operation.
FCC § 15.21 (Warning Statement)
[Any] changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
FCC § 15.105
Note: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at his own expense.
Tested Standard:
Industry Canada Radio Standards Specifications RSS-GEN Issue 4, Sections 8.8, 8.9
and 8.10 and RSS-210 Issue 8, Section A2.6 (Category I Equipment)
IC:11038A-KRR9125-K5
ICES-003
This Class A digital apparatus complies with Canadian ICES-003. Cet appareil
numérique de la classe A est conforme à la norme NMB-003 du Canada.
This device complies with Industry Canada’s licence-exempt RSSs. Operation is subject to the following two conditions: (1) This device may not cause interference; and
(2) This device must accept any interference, including interference that may cause
undesired operation of the device.
Le présent appareil est conforme aux CNR d’Industrie Canada applicables aux appareils radio exempts de licence. L’exploitation est autorisée aux deux conditions
suivantes : 1) l’appareil ne doit pas produire de brouillage; 2) l’utilisateur de l’appareil
doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d’en compromettre le fonctionnement.
The functions and connections of the interfaces, inputs, relay outputs, rotary and DIP
switches are described in the chapterDesign and function [}4].
4.2Firmware
The hardware of this product is used in various Kaba system solutions. The functions
and possible uses of the product are determined by the firmware used.
This manual solely describes the Kaba remote reader 91 25 functional type access
manager (AM).
Firmware designation
Reader type
Device type
Functional type
Version number
Addition 1
Addition 2
Addition 3
Example
Designation of firmware for Kaba remote reader 91 25 with functional type access
manager:
M
A
B
RC
RR
RE
A
B
C
E
xx.xx
R
A
_
MIFARE
LEGIC
LEGIC or MIFARE
(determined during commissioning)
MRD (multi RFID device)
Compactreader
Remotereader 91 15
Remotereader 91 25
E300 V4 or N300/T300/U300 V3
Access Manager
Subterminal
AMC/II (cDML)
Version
Final, approved version
Subversion
Reserve
•BREB03.xxRxx (MRD)
Firmware mark on the product
Devices with firmware with the functional type access manager bear a mark reading
"Type: Access manager" on the identification plate.
4.3System Requirements
•Kabaexos9300 release 4.0.1 and higher
•Kaba access manager 92 00 AM firmware version 3.00 and higher
Further details can be found in the Release Overviews and Release Notes.
The Remote reader 91 25 communicates alternately via the connections 'Ant. A' and
'Ant. B' (toggling) with the connected registration units. This means that the Remote
reader 91 25 cannot communicate with both registration units at the same time. This
results in the following behavior:
•During a longer reading process, the other registration unit is blocked.
•The fields of the two connected registration units do not influence each other.
This means that the two registration units can be installed close together.
•In the case of registration units installed close together, it may be the case that
the medium is read by the two registration units one after the other.
4.5Behavior with Several Media in the Field (Anti-Collision)
The Remote reader 91 25 can recognize several LEGIC advant user media (ISO 14443
A) in the field simultaneously. The Remote reader 91 25 only considers the first user
medium, which corresponds to the search criteria defined in the system. The remaining user media are ignored.
All data for access decisions are saved in the host control device. The authorization
check of a badge and access control are undertaken by the control device.
Functions available before the remote reader is connected to the host system
Standalone access control (without host system); see chapter "Standalone Access
Control without Host System" Commissioning [}6.2]
Access control functions
•Authorization check using badges and temporal authorization incl. verification
•Connection of two separate registration units
•Control of optical and acoustic signal transmitters of the registration units
•Control of electric strikes (doors with electrical blocking elements)
•Support for door opener keys or door handle contacts
•Monitoring of the door status with frame contact, bolt monitoring and door handle contact
•CardLink support: Validation and UID additional recording (only LEGIC)
•Inspection of the functionality even without host system
•Two RS-232 serial interfaces, e.g., for keypads, Hyper X or system-dependent
functions, such as input or issue (only online) of user media numbers
•Hold-open mode, so that, when access is authorized, the door remains open for
as long as the badge remains within range of the antenna (field)
•Monitoring of a tamper switch by integrating the Remotereader into housing
•Signal for authorized access, e.g., for alarm bypass
Restrictions with interrupted connection (offline)
MIFARE
Reduced authorization check using site keys.
Door function is retained depending on the offline parameter setting.
•Authorization check using site keys. A maximum of eight site keys can be saved.
•Not taken into consideration: Time zones and PIN code
•Logbook for 2000 events
•No room monitoring/balancing and no CardLink functionality
•No change in fabrication key
LEGIC
Reduced authorization check using segment search keys. Door function is retained
depending on the offline parameter setting.
•Authorization check using segment search keys. A maximum of eight segment
search keys can be saved.
An operating type of the Remotereader is always made up of the operating mode
(door configuration) with the associated extended functions and of the communication with the host system (access hub). The Remotereader supports the online and
offline operating types.
Online operation:
Offline operation:
For the online and offline operation of the device, a minimum of the following hardware settings must be carried out before putting into operation:
System usedMinimum hardware settings
Kabaexos9300
The Remotereader communicates with the system.
If a Remotereader connected with the system is disconnected from the system, then the Remotereader switches
to the offline mode.
In online operation, the Remotereader communicates with the host system. The system makes the access decision on the basis of badges, time-dependent authorization
and verification. The system controls the access points. If communication between
Remotereader and system is interrupted, then the Remotereader independently
switches into offline operation. If the Remotereader is queried by the system again,
then the Remotereader switches back into online operation.
4.8.3Offline Operation
Even in offline operation, i.e. without communication with the host system, an access
point is monitored and controlled by the Remotereader. For access decisions,
site keys are used under MIFARE and
segment search keys are used under LEGIC.
The Remotereader controls access points in accordance with the operating mode,
door configuration and the corresponding 'extended functions' (offline configuration).
In order to ensure fault-free offline operation, the Remotereader should be operated
with a secure power supply (e.g. UPS).
Offline operation can be turned off in the system and/or using the 'Mode' rotary
switch (F = off). This means that the offline behavior defined in the hardware settings
is deactivated and the access point remains blocked if there is an interruption in
communication.
Behavior in the event of an interruption to communication
•The access point goes to the basic status (possibly alarm if the access point is not
closed)
•Relays which are not involved in a door process (according to DIP switch) deacti-
4.8.3.1 Offline Access Decision
The customer determines the nature of the offline access decision which is parameterized in the system. We differentiate the following offline access decisions:
Parameter settings in the system: no offline access decision
The Remotereader rejects all bookings in offline operation.
Parameter settings in the system:
Checking site key (MIFARE)/segment search key (LEGIC)
In the online mode, the site key (MIFARE)/segment search key (LEGIC) is sent to the
Remotereader by the system and saved in the Remotereader. During the offline
mode, the Remotereader only checks the site key (MIFARE)/segment search key
(LEGIC). The time zone is not considered for this kind of access decision.
Logbook
The logbook records and saves a maximum of 2000 events during the offline operation. Once the Remotereader is online again, the saved data is sent to the host system and deleted from the memory of the Remotereader.
The following events are logged:
•Authorized accesses (incl. type of authorization)
•Tampering, door forced open, door opener key
vate; the same is true for the connected Kaba extension module 9030.
If there are more than 2000 entries, the oldest will be overwritten (ring memory).
The operating mode of the Remotereader must be selected on the basis of the door
configuration.
The operating mode is set using the rotary switch, see Chapter Set Operating Mode.
The extended functions of a selected operating mode are set using the DIP switch
Extended functions of the operating modes [}5.7.6.1].
Possible operating modes:
•Electric strike; for doors with electrical blocking elements
•Motor bolt; for doors with electrical blocking elements
•Automatic doors; for doors with their own electronic control system (control with
enable pulse; e.g. sliding door)
•Turnstile; for turnstiles/tripod turnstiles with their own electronic control system
(control with direction-dependent enable pulses)
•Night lock; for doors with the two elements electronic strike and motor bolt
•Kaba exos lock; for doors with self-locking Kaba panic locks;
•Cylinder interface LI-EL; for doors with mechatronic Kaba elolegic cylinders
•Motor bolt with panic function; for doors with electrical blocking elements and
additional mechanical panic opening
•Motor bolt type II with panic function (two outputs); for doors with electrical
blocking elements and additional mechanical panic opening. 1 output each for
the pulses 'unlock' and 'lock'.
•Motor bolt type III with panic function (1 output); for doors with electrical blocking elements and additional mechanical panic opening. 1 output for the pulses
'unlock' and 'lock'.
•Electric lock with panic function; for doors with electrical blocking elements and
additional mechanical panic opening
•Automatic door with night lock for doors with their own electronic control system and additional night lock
Authorised booking,
door opener key or
door handle trigger
a door opening
Frame contact
Access allowed
Pre-alarm time
Alarm time
Access control
Door open
Access control
Door closed
Electric strike (not used
with a door handle)
Relais operation time
4.9.1'Electric strike' operating mode
The 'Electric strike' operating mode is mainly used to operate doors with electric locking elements (strike, magnet).
The access authorised signal is triggered by authorised booking, the door opener key
or the door handle. So that subsequent door opening does not trigger an alarm, the
'Access authorised' signal activates the alarm bypass.
Then the electric strike is triggered. The door is now released for opening and the set
relay operating time starts to run. When the door is opened the pre-alarm and alarm
time start to run ('Door open too long').
Authorised booking
or door opener key
trigger a door
opening
Frame contact
Access allowed
Pre-alarm time
Alarm time
Access control
Door open
Access control
Door closed
Motor bolt
Bold monitoring
Relay operation time
Access control
Door unlocked
Access control
Door locked
4.9.2'Motor Bolt' Operating Mode
The 'motor bolt' operating mode mainly operates doors with electrical locking elements.
The 'authorized access' signal is generated through being triggered by an authorized
booking or the door opener key. So that subsequent door opening does not generate an alarm, the 'authorized access' signal activates the alarm bypass.
Then the motor bolt is activated. The door is now released for opening and the set relay operation time starts to run. When opening the door, the pre-alarm and alarm
time start to run ('Door open too long').
The motor bolt is activated until the frame contact signals that the door is closed
again. Only then will the lock of the motor bolt be extended again. If the motor bolt
is not extended (e.g. in the event of a defect or tampering), then an alarm ('Bolt position incorrect') is triggered.
Authorised booking,
door opener key or
door handle trigger
a door opening
Frame contact
Access allowed
Pre-alarm time
Alarm time
Access control
Door open
Access control
Door closed
Release pulse (not used
with a door handle)
Relais operation time
1s
4.9.3'Automatic door' operating mode
CAN)
The 'Automatic doors' operating mode is mainly used to operate doors with their
own control electronics (e.g. sliding doors). The control is carried out using a release
pulse.
The 'Access authorised' signal is generated triggered by an authorised booking or the
door opener key. So that subsequent door opening does not trigger an alarm, the
'Access authorised' signal activates the alarm bypass.
The release pulse (approx. 1s) is then sent to the control electronics. The set relay operation time starts to run. If the door is opened within the relay operation time, then
the pre-alarm and alarm time start to run ('Door open too long').
If the door is opened outside of the relay operation time, then unauthorised door
opening is present.
Authorised booking,
door opener key
trigger a door
opening
Access allowed
Direction-dependent
release puls
Relais operation time
1s
4.9.4'Turnstile' operating mode
The 'Turnstile' operating mode is mainly used to operate turnstiles/tripod barriers
with their own control electronics (triggered with direction-dependent release
pulses). The turnstile is an access point in which the access point sides (outside/inside) are released in a direction-dependent manner. Therefore two opposite directions of rotation are possible.
The 'access authorised' signal is triggered by authorised booking or the door opener
key. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
Then the direction-dependent release pulse (approx. 1s) is sent to the control electronics and the set relay operation time starts to run. If the door is opened outside of
the relay operation time, then unauthorised door opening is present.
The 'Night lock' operating mode is mainly used to operate doors with the two elements electric strike and motor bolt. Therefore during the day only the door opener
relay needs to be enabled, and the door can be additionally locked at night (e.g. XLock motor lock with control unit; but without bolt monitoring).
The 'access authorised' signal is triggered by authorised booking or the door opener
key. So that subsequent door opening does not trigger an alarm, the Access authorised signal activates the alarm bypass.
Then the motor bolt is triggered. As soon as the motor bolt is retracted (motor bolt
monitoring), the electric strike is triggered and the door is released for opening. The
set relay operation time starts to run. When the door is opened the pre-alarm and
alarm time start to run ('Door open too long').
•The time profile saved for the night lock only works in online mode.
•Offline mode always corresponds to the night setting. Motor bolt and door
opener relay are controlled.
Authorised booking
or door handle
trigger a door
opening
Frame contact
Access allowed
Pre-alarm time
Alarm time
Access control
Door open
Access control
Door closed
Motor bolt (not used
with a door handle)
Bolt monitoring (not used
with a door handle)
Relay operation time
Access control
Door unlocked
Access control
Door locked
4.9.6'Motor bolt with panic function' operating mode
The 'Motor bolt with panic function' operating mode is implemented in the same
way as the 'Motor bolt' operating mode. Instead of the door opener key, the door
handle contact is assessed for mechanical panic opening.
The 'access authorised' signal is triggered by an authorised booking or the door handle. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
The door is now released for opening and the set relay operating time starts to run.
When the door is opened the pre-alarm and alarm time start to run ('Door open too
long').
The motor bolt is controlled until the frame contact signals that the door is closed
again. Only then will the bolt of the motor lock be extended again. If the motor bolt
is not extended (e.g. in the event of a defect or tampering), then an alarm ('Bolt position incorrect') is triggered.
4.9.7'Motor bolt type II with panic function' operating mode (2 outputs)
The 'Motor bolt type II' operating mode is implemented in the same way as the 'Motor bolt with panic function' operating mode. In place of the static 'Motor bolt' signal,
there is one line each for 'Motor bolt unlocking' and 'Motor bolt locking' connected
to the lock (e.g. MIWA AL-02/AL-3M).
The 'access authorised' signal is triggered by an authorised booking or the door handle. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
Then the motor bolt is retracted with the 'unlock' pulse. The door is now released for
opening. When the door is opened the pre-alarm and alarm time start to run ('Door
open too long').
If the frame contact signals that the door is closed again, then the bolt of the motor
lock is extended again via the 'lock' pulse. If the motor bolt is not extended (e.g. in
the event of a defect or tampering), then an alarm ('Bolt position incorrect') is triggered. If the unlocked door (bolt monitoring) is opened again, no alarm will be generated.
Unlock motor bolt
Lock motor bolt
(not used with a door handle)
Authorised booking or
door handle trigger a
door opening
Frame contact
Access allowed
Pre-alarm time
Alarm time
Access control
Door open
Access control
Door closed
Access control
Door unlocked
Access control
Door locked
Bolt monitoring (not used
with a door handle)
4.9.8'Motor bolt type III with panic function' operating mode (1 output)
The 'Motor bolt type III' operating mode is implemented in the same way as the 'Motor bolt with panic function' operating mode. Instead of the static 'Motor bolt' signals, the 'Motor bolt unlocking' pulse is generated on one output and the 'Motor bolt
locking' pulse is generated on the other output.
The 'access authorised' signal is triggered by an authorised booking or the door handle. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
Then the motor bolt is retracted with the 'unlock' pulse. Now the door is released for
opening. When the door is opened the pre-alarm and alarm time start to run ('Door
open too long').
If the frame contact signals that the door is closed again, then the bolt of the motor
lock is extended again via the 'lock' pulse. If the motor bolt is not extended (e.g. in
the event of a defect or tampering), then an alarm ('Bolt position incorrect') is triggered.
4.9.9'Electric lock with panic function' operating mode
The 'Electric lock with panic function' operating mode is implemented in the same
way as the 'Motor bolt with panic function' operating mode. An electric lock (e.g. XLock electric lock, MIWA AUTA/ALTA) is controlled instead of the motor bolt.
The 'access authorised' signal is triggered by an authorised booking or the door handle. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
Then the electric lock is triggered. The door is now released for opening and the set
relay operating time starts to run. When the door is opened the pre-alarm and alarm
time start to run ('Door open too long').
The 'Access authorised' signal is enabled during the alarm time until the door is
locked.
If the door is opened again during this alarm time, then no alarm is generated.
4.9.10'Automatic door with night lock' operating mode
The 'Automatic door with night lock' mode is used to operate automatic doors with
the two elements release pulse and motor bolt. This means that during the day only
the release pulse is active and at night the door is additionally locked.
The 'access authorised' signal is triggered by authorised booking or the door opener
key. So that subsequent door opening does not trigger an alarm, the 'Access authorised' signal activates the alarm bypass.
Then the motor bolt is triggered. As soon as the bolt is retracted (bolt monitoring),
the release pulse (approx. 1s) is sent to the control electronics. The set relay operation time starts to run. If the door is opened within the relay operation time, then the
pre-alarm and alarm time start to run ('Door open too long').
If the door is opened outside of the relay operation time, then unauthorised door
opening is present.
•The time profile saved for the night lock only works in online mode.
•Offline mode always corresponds to the night setting. Motor bolt and door
opener relay are controlled.
Authorised booking
or door handle
trigger a door
opening
Frame contact
Access allowed
Access control
Door open
Motor bolt (not used
with a door handle)
Bolt monitoring (not used
with a door handle)
Access control
Door unlocked
Release pulse (not used
with a door handle)
Pre-alarm time
Alarm time
Access control
Door closed
Relay operation time
Access control
Door locked
4.9.11'Online Operation' Operating Mode
The 'Online operation' operating mode is used for purely online operation. If communication to the host system is interrupted, then no locking elements will be activated.
All connected outputs and relays drop off.
An accurate installation of all components is a basic requirement for a properly functioning device. The following installation instructions must be adhered to.
5.2.2Installation site
The device is assembled on a DIN rail in a housing or IT cabinet.
The device should be installed in a tamper-proof location within the area to be secured.
Electromagnetic fields
The device must not be installed in the area of strong electromagnetic fields caused
by switching power supply, power lines, phase controllers, etc.!
5.2.3Connections
The following connections must be available at the location where the access manager is to be installed:
•Power supply for the device
•RS-485 cable to the host device
•Cables to door openers and switches
•Coaxial cable to registration units
The installation lines have to be flush with the surface or be laid in the vandal-proof
area.
The chapter Connections describes the assignment of connections and switch settings.
Only connect the terminals when the power is switched off.
5.4.1Power supply line
The device can be supplied with power in the following ways:
•From the host control device (power supply and data line in one cable)
•From a separate power supply
NOTICE
Voltage drops, caused by line resistance, must be taken into consideration for
long lines.
The given cable types and diameters are examples and serve as recommendations.
The technical specifications of the cable manufacturer are authoritative for the precise determination of the cable diameter/cross section and the resulting maximum
cable lengths. The voltage drop across the cable length is decisive in this case. As
such, the voltage that is available at the end of the cable may, under no circumstances, be less than the minimum permitted supply voltage of the connected components. This always applies in consideration of the maximum power consumption
of the connected components.
Only connect the terminals when the power is switched off.
The device may only be supplied with SELV (Safety Extra Low Voltage) and LPS (Limited Power Source), according to IEC/UL/CSA 60950-1.
Only connect the terminals when the power is switched off.
The device is connected to the host control device via a two-wire party line connection (RS-485).
For information on permissible cable lengths and cable types, please see:
•
•
5.4.2.1 Cable
NOTICE
Local legal provisions (e.g., VDE) must be observed during installation of components.
For notes on structured cabling, see the standard EN 50173.
The cables recommended in the chapter have a foil screen and are designed based
on S-UTP (screened unshielded twisted pair). The wire pairs are not individually
shielded against each other (unshielded). Each pair comprises two color-coded wires
that are twisted together (twisted pair).
5.4.2.2 Connection RS-485
NOTICE
It must be ensured that the screen is applied with the aid of the drain wire. The drain
wire must be insulated to avoid short circuits on the circuit boards of the connected
devices using a shrink-on tube or similar.
Lines A and B are arranged as a twisted wire pair.
Lines A and B must not be crossed.
1Host control device2Kaba remote reader 91 25
Connecting shielding
1. On the host device connect the shielding of the RS-485 cable (blue) to the
ground.
Do not ground the Kaba remote reader 91 25.
2. Connect all shieldings pertaining to the RS-485 cables used (blue) to each other.
A maximum of eight devices can be operated on a party line.
Maximum total length of data lines (incl. stubs): 1200m
A stub itself may be a maximum of 100m in length.
The length of the party line can be increased using a repeater.
5.4.2.5.1 Bus wiring with 1 bus
1Host control device (Kaba access manager)
2Kaba remote reader 91 25
3Terminating resistors
See also
Connection RS-485 [}5.4.2.2]
Set RS-485 termination resistances
Set peripheral addresses [}5.7.4]
5.4.2.5.2 Bus wiring with two buses
1Host control device (Kaba access manager)
2Kaba remote reader 91 25
3Terminating resistors
See also
Connection RS-485 [}5.4.2.2]
Set RS-485 termination resistances
Set peripheral addresses [}5.7.4]
5.4.3Line to the door opener and door contacts
Line requirements: Cable diameters from 0.5 mm to 0.8 mm.
CAN)
Recommended cable: CAT.5 S-UTP 4 x 2 AWG 24 or AWG 22 (according to EIA/
TIA568) or higher.
The functions and connections of the interfaces, inputs, relay outputs, rotary and DIP
switches are described in the chapterConnecting.
5.6.1Connections, General
Only connect the terminals when the power is switched off.
Connection TypeConnection Occupancy
Pluggable screw terminalsThe occupancy of the connection termi-
nals can be taken from the following tables
5.6.2Power Supply
2 x 2 clamps are available for the power supply. These are connected in parallel.
TerminalMeaning
Supply Vs+10–34VDC Current consumption max. 330mA, without
external wiring
Supply Vs-0VDC
Supply voltage for
RS-232 and extension
modules at 25°C
5VDC, max. 1A
The device may only be supplied with SELV (Safety Extra Low Voltage) and LPS (Limited Power Source), according to IEC/UL/CSA 60950-1.
5.6.3RS-485 interface
The device communicates with the host system (access hub) via the RS-485 interface.
TerminalMeaning
ARS-485 wire A
BRS-485 wire B
CRS-485 wire C (Common)
Set RS-485 termination resistances
Set peripheral addresses [}5.7.4]
5.6.4'Ant. A' and 'Ant. B' Connections
The connections 'Ant. A' and 'Ant. B' are for the connection of the registration units to
the device. Coaxial cables are used for the connection. LED and acoustic signal transmitter of the registration unit are controlled via the coaxial cable.
The logic (normally open/normally closed) of the inputs can be changed by the host
system.
If the Kaba remote reader 91 25 needs to behave in the same way in both online and
offline operation, the inputs and relay outputs must be connected according to the
operating mode and configured with the DIP switches.
IN1 and IN4 can, when necessary, be used as line-monitored inputs.
5.6.8.1 Inputs IN1 – IN4 (Without Line Monitoring)
If no inputs with line monitoring are used, no additional resistors need to be connected.
The input tamper is connected as a line-monitored input. Its logical status is enabled
open. If the Kaba remote reader 91 25 is offline and the tamper enabled, this event is
entered in the logbook of the Kaba remote reader 91 25.
5.6.8.4 Input IN5 (only in the Kaba exos lock operating mode)
Input 5 is an internal input for the door handle contact of the Kaba exos lock. The signal is transferred via the coaxial cable and evaluated in the Kaba remote reader 91 25
as input 5.
1. Set address of the Kaba remote reader 91 25, see chapter
Addressing.
Note down the address. It is required for the configuration in the host system.
2. Set termination resistance on the RS-485 bus as per the bus topology, see chapter
Bus termination RS-485
3. Set operating mode according to the door configuration, see chapter
Set Operating Mode
4. Set extended functions for the selected operating mode, see chapter
Extended functions of the operating modes [}5.7.6.1]
5. Activate or deactivate monitoring of all inputs, see chapter
Activate monitoring of all inputs (DIP switch 7)
5.7.2Change Settings
Jumper, DIP switch and rotary switch settings must only be made when the power is
switched off.
Changes of jumper-, DIP switch- and rotary switch settings are only activated after
turning on the power supply (cold start).
The door configuration determines the operating mode of the Kaba remote reader
91 25.
The operating mode is set with the rotary switch (15).
In order to define the offline behavior of the device, the "extended functions" must
be set in addition to the operating mode. The Chapter [}5.7.6.1] explains the ex-
tended functions.
Kaba remote reader 91 25
Position
Rotary switch
0Electric strike
1Motor bolt
2Automatic door
3Turnstile
4Night lock
5Kabaexos lock
6Cylinder interface LI-EL
7Motor bolt with panic function
8Motor bolt type II with panic function (2
9Motor bolt type III with panic function (1
AElectric lock with panic function
BAutomatic door with night lock
C–ENot used
FOnline operation
The chapter Operating modes [}4.9] describes the operating modes.
The following functions can be set with the DIP switches (14):
DIP switch
Number
1–6Extended functions (according to operating modes)
7Not used
8ONService mode
5.7.6.1 Extended functions of the operating modes
The DIP switches 1–6 (14) are used to set the extended functions of the operating
modes.
The chapter Operating modes describes the operating modes.
If the Kaba remote reader 91 25 needs to behave in the same way in both online and
offline operation, the inputs and relay outputs must be connected according to the
operating mode and configured with the DIP switches.
The parameterization of the access point must match the selected configuration in
the host system. See also chapter Operating Types [}4.8]
NOTICE
The DIP switches should only be put to ON if the relevant component is also connected to the device.
The following chapters describe the individual operating modes with their connections and configurations.
In hold-open mode, the door remains open upon an authorized access (identification) for as long as the badge remains within range of the antenna (field). The holdopen mode only works without PIN entry. Kaba exos lock and cylinder interface LI-EL
are not supported.
ON
-
door
•Hold-open mode applies for antenna A and antenna B
1. Reset device to its basic state.
Factory Reset/Reset Device to the Basic Status
2. Connect the power supply to the Kaba remote reader 91 25, see chapter
Power Supply [}5.6.2]
ð LED state illuminates green – LED state flashes green as soon as the RS-485
interface is in the receive or send mode (online).
3. Put the device into operation in accordance with the following chapter.
6.2"Standalone Access Control without Host System" Commissioning
(Construction site mode)
6.2.1Using LEGIC
The Remotereader can already be used on a host system even before connection.
This allows for the use of the remote reader, e.g., during the construction phase.
By connecting the remote reader to a host control device (host system), the functions of the remote reader described in this chapter are replaced by parameterization of the system.
Also see about this
2 1.4Supplementary Documents [}8]
If using "Standalone access control (without host system)", only the LEGIC stamp
(segment search key) is checked. To authorize access, the user medium's stamp must
match the stamp of the remote reader.
•If using "Standalone access control (without host system)" the remote reader can
only be used with one stamp (segment search key).
Preparation
1. Use security cardC1 (IAM) to define the stamp of masterA (only LEGIC ISO
14443A) (see RM_LEGIC_advant_Media_Definition).
Putting into operation
1. Carry out factory reset on the remote reader, see Chapter
2. Present Master A (only LEGIC ISO 14443A) to the connected registration unit.
ð In the event of successful transfer of the stamp: 3x short beep
ð The stamp (segment search key) was transferred onto the remote reader.
–The time and date stamps are incorrect/invalid because the clock on the re-
mote reader has not been set yet.
Book
1. Present a LEGIC user medium (LEGIC prime, ISO 14443A or ISO 15693) to the connected registration unit.
ð If the stamp (segment search key) of the remote reader matches a stamp of
the user medium: Access authorized
Connection to the host control device (host system)
After connecting the remote reader to the host control device (host system), the
saved events are sent to the control device. The time and date stamps are not correct/invalid because the clock of the remote reader had not yet been set (at the time
the events were saved).
6.2.2Using MIFARE
If using "Standalone access control (without host system)", only the site key/fabrication key is checked. During the check, the medium's fabrication key is not replaced.
To authorize access, the user medium's site key must match one of the remote
reader's site keys.
•A security cardC, a masterA, or a masterB medium can contain up to eight site
keys.
•On the medium, the site key's identification file must match the "default ARIOS
configuration"; the applicationID, fileID, and coding of the identification number
must match. Media with changed applicationIDs or non-standard identification
number coding will not be recognized.
Putting into operation
1. Carry out factory reset on the remote reader, see Chapter
2. Hold security card C, a master A or a master B medium in front of the connected
registration unit.
ð In the event of successful transfer of the stamp: 3x short beep
ð A maximum of eight site keys are transferred onto the remote reader.
ð The remote reader is now ready for bookings.
Functions
•Book
CAN)
•Save the following events (max. 2000):
–Door forced open
–Doors opened using the button/door handle
–Door open too long
•Not saved:
–Access events
–The time and date stamps are incorrect/invalid because the clock on the re-
1. Present a MIFARE user medium (MIFARE DESFire or MIFARE Classic) to the connected registration unit.
ð If the user medium's site key matches one of the remote reader's site keys:
Access authorized
Connection to the host control device (host system)
After connecting the remote reader to the host control device (host system), the
saved events are sent to the control device. The time and date stamps are not correct/invalid because the clock of the remote reader had not yet been set (at the time
the events were saved).
•Remote reader is installed and connected, see Chapter Installing and Connecting
•Remote reader is configured, see Chapter Configuring
•Remote reader is parameterized, see Chapter Parameterizing
•Remote reader is connected to the power supply, see Chapter Connect Power
Supply
Functions
If the requirements listed above are met, then the parent control unit informs the remote reader which units are connected to the RS-232 interface. The remote reader
communicates with the connected units according to the settings. The remote
reader stores the settings of the connected units. The Chapter Factory Reset/Reset
Device to the Basic Status describes the deletion of this stored settings.
Commissioning Hyper X
•For the commissioning of a Hyper X, the distributor code must be scanned with a
booking in service mode.
A write/read authorization is required in the following cases:
•If the Remotereader needs to write on a write-protected segment of a medium,
e.g. in the case of CardLink applications, validate write-protected CardLink segments
•If the Remotereader needs to read a read-protected segment of a medium
In this chapter, the term "Write authorization" will be used for the terms "Write authorization" and "Read authorization".
Write authorization with a LEGIC prime SAM 63 card is only valid for LEGIC prime.
Write authorization with a LEGIC advant SAM 63 card is only valid for LEGIC prime
and LEGIC advant 15693 and 14443A.
In this chapter, the designation "Security card C2" will be used for the card designations "SAM 63" and "Security card C2 (SC-C2)".
The signaling is carried via the registration unit on which the card is presented.
Requirement
•For the write authorization, a security card C2 with corresponding segment area
is required.
•ISO standard 14443A must have been activated using security card C2.
•The ISO standard of the SAM 63 card must match the parameterized ISO standard.
•The device should be in regular operation and waiting for an RFID entry.
Procedure
1. Present the security card C2 to the connected registration unit without interruption (approx. 15s).
ð The Registration unit illuminates green during the process.
ð Signaling after successful write authorization: 3x beeps
If the Remotereader has previously been granted write authorization using
the same security card C2, this will be signaled immediately by 3x beeps
No indications are made on the exos lock or cylinder interface LI-EL following
successful write authorization.
ð No signaling: Write authorization has not been granted.
Possible reasons
- The security card C2 was removed from the RFID field too early
- ISO 14443A is not activated in the system
- If SAM+ media are being used: No credit is available
A 3-pin connection (16) to connect to the Kaba programmer 1460 is located on the
front of the Kaba remote reader 91 25. The connection (16) is used to update the
firmware.
7.2Restart
Consequences of the restart
•Duration approx. 3 seconds
•The access point is blocked during the restart.
•The saved parameter settings and data remain in place.
•The device is restarted.
1. Switch the power supply off and on again.
ð The LED state goes out.
ð The access point is blocked.
2. After the restart, the LED state changes back to green.
ð Offline mode: If the device is parameterized for offline mode, the access
point is now ready for bookings.
ð Online mode: After the connection has been set up with the host control
device, the remote reader is ready for operation in online mode.
Restarting resets the internal clock. After restarting, the clock will read 01/01/2010
00:00. Logbook entries will be saved with an incorrect date stamp as a result until the
next online operation.
•Using the access manager service tool via access manager (via Ethernet and the
RS-485 interface)
•Using the Kaba EAC service tool and programmer 1460
NOTICE
Consequences of the firmware update:
•Device is reset to the factory settings(basic status)
•The parameterization is deleted
•The data is deleted
•The stamps are deleted
7.5.1Firmware update/LEGIC OS update via access manager
The firmware/LEGIC OS is updated using the access manager service tool via access
manager (via Ethernet and the RS-485 interface). The access manager reference manual describes the process.
7.5.2Firmware Update / LEGIC OS Update with programmer 1460
The firmware update/LEGICOS update lasts around 120 seconds.
Requirements
•The firmware has been transferred from the Kaba EAC service tool to the programmer 1460 (the LEGIC OS is integrated into the firmware).
•The user is familiar with the handling of the programmer and the Kaba EAC service tool.
•Kaba EAC service tool ≥ V 2.6.1 is installed.
•FTDI driver (using the operating system) for Kaba programmer 1460 is installed (FTDI CDM supports D2XX and
VCP functionality) http://www.ftdichip.com/FTDrivers.htm
•Microsoft .Net Framework 4 Client Profile is installed http://www.microsoft.com/net/
ProcedureSignaling
Remote reader
1.Disconnect the device from the power
supply.
(Switching DIP switch 8 when the
power supply is connected has no effect.)
Signaling
Registration unit
•The access point is blocked during
the firmware update.
A crossgrade can be used to amend the functional type of a device. For example, a
device with the functional type access manager (AM) can be turned into a device
with the functional type AMC.
The process for changing the functional type is described in the user manual for Kaba
programmer1460, document nok1evo809.
7.6.1Device with Bxxx firmware (MRD)
Remote reader type before
crossgrade
Functional
type
MRD
(multi RFID device)
Illustrative example
Only Bxxx firmware (MRD) can be transferred to a device with Bxxx firmware (MRD).
It is possible to change functional type.
It is possible to change between LEGIC and MIFARE.
Incorrectly packaged assemblies and devices may cause expenses due to damage
during transport.
Please observe the following information when sending Kaba products.
Kaba shall not be liable for damage to products which can be attributed to insufficient packaging.
9.1Complete Devices
The original packaging is specially adapted for the device. It offers the greatest possible protection against transport damage.
Always use the original packaging for returns.
If this is not possible, then ensure the packaging prevents damage to the device.
•Use a stable, thick-walled transport crate or a box. The transport crate should be
large enough that there is 8–10cm space between the device and the container
wall.
•Wrap the device in suitable film or put in a bag.
•Pad generously around the device e.g. using foam padding or bubble wrap. It
•Only use dust-free environmentally-friendly filling material.
9.2Electronic Assemblies
Electronic assemblies sensitive to ESD, such as circuit boards, readers, etc., must be
stored, transported and sent in suitable ESD protective packaging. The packaging of
electronic assemblies may only be carried out in ESD-protected workplaces by persons who are familiar with and follow the general ESD protective regulations.
The return of electronic assemblies in packaging with sufficient ESD protection is a
condition for
•making guarantee claims in the event of malfunctions of any kind.
•replacement delivery of electronic circuit boards and components when an ex-
In order to guarantee a high quality standard, electronic components supplied in
packaging without sufficient ESD protection will be neither analyzed nor repaired,
but instead disposed of directly.
9.3Marking
Complete return papers and correct labeling allow us to process matters quickly.
Please ensure that a delivery note is included with the package. The delivery note
should include the following information:
must be ensured that the device does not move within the packaging.
In the event of returns from outside of the EU, a customs invoice with the real customs value will also be required. In some countries (e.g. Switzerland) a preference will
be required.
This chapter provides important information on disposal.
10.1Decommissioning
The following steps should be executed for the decommissioning of the device in an
access control system:
1. For online operation: Check configuration of the host system
2. Disconnect the device from the power supply
3. Disconnect RS-485 connection from the host system
10.2Dismantling
ü The device has been decommissioned.
1. If available, unplug extension modules
2. Disconnect relay outputs from the device
3. Disconnect inputs from the device
10.3Disposal
4. Disconnect RS-232 interface and/or keypads, biometrics or system-dependent
functions from the device
5. Disconnect registration units from the device
6. Remove device from the rail
This product meets the requirements of the WEEE Directive and, in accordance with
DIN standard EN 50419, is labeled with the WEEE crossed-out garbage can symbol.
The symbol indicates the separate disposal of electric and electronic equipment in
EU countries.
Do not dispose of the device with household waste under any circumstances.
Used devices contain valuable recyclable materials that should be recycled. Used devices should therefore be disposed of via the collection system used in your country.
Disposal in Germany:
After use, Kaba GmbH undertakes to carry out the proper disposal of the supplied
goods in line with legal requirements (such as the ElektroG law in Germany). All costs
incurred for the transport of goods to the manufacturer's plant will be borne by the
owner of the used electronic equipment.
Disposal in Switzerland:
Send the device to an electronic equipment collection facility as per the VREG regulation.
In the EU, electrical devices should be disposed of in accordance with national waste
disposal and environmental directives.
The erasure of personal data before disposal must be carried out self-dependent.