This work is protected by copyright. Any rights derived from the copyright shall be reserved for SICK AG.
Reproduction of this document or parts of this document is only permissible within the limits of the legal
determination of Copyright Law. Alteration or abridgment of the document is not permitted without the explicit
written approval of SICK AG.
2 Operating instructions | SICK 8018582/2015-11-03Subject to change without notice
Operating instructions
Contents
RFID Access Management
Contents
1 About these operating instructions ............................................................................... 6
1.1 Function of this document .................................................................................... 6
1.2 Target group .......................................................................................................... 6
1.3 Information depth ................................................................................................. 7
1.4 Abbreviations used ............................................................................................... 7
1.5 Symbols used ........................................................................................................ 8
11.1 List of tables ..................................................................................................... 107
11.2 List of figures .................................................................................................... 108
11.3 Keywords index ................................................................................................ 109
8018582/2015-11-03 Operating instructions| SICK 5
Subject to change without notice
Chapter 1 Operating instructions
About these operating
instructions
RFID Access Management
1 About these operating instructions
Please read this chapter carefully before you begin working with this documentation and
RFID Access Management (RAM for short).
1.1 Function of this document
These operating instructions are designed to give technical personnel instructions on
the safe mounting, configuration, electrical installation, commissioning, operation, and
maintenance of RFID Access Management.
1.2 Target group
These operating instructions are intended for people who plan, mount, connect,
commission, operate, and maintain the access control systems.
Activities Target group
Mounting, electrical installation,
maintenance, and replacement of
system components
Commissioning and configuration Qualified personnel, such as service technicians
Tab. 1: Target group
Qualified personnel, such as service technicians
or industrial electricians
or engineers
6 Operating instructions | SICK 8018582/2015-11-03Subject to change without notice
Operating instructions Chapter 1
About these operating
instructions
RFID Access Management
1.3 Information depth
Note
These operating instructions contain information on the following topics:
• System description
• Setup and mounting
• Electrical installation
• Commissioning and operation
• Maintenance and repairs
• Fault diagnosis and troubleshooting
• Technical data and dimensioned drawings
When planning and using RFID systems, technical skills are required that are not covered
by this document.
The official and legal regulations for operating the RFMS Access Management must always
be complied with.
The IP addresses are assigned using the SICK SOPAS configuration software.
Please also refer to the information concerning RFID and building security that is available
on the Internet at www.sick.com.
There, you can find sample applications and a list of frequently asked questions about
RFID and building security.
1.4 Abbreviations used
ECS
EMS
LED
RFID
RFU
RAM
SOPAS
Entry Exit Configuration Software = System components for managing the access rights
of persons and vehicles and for assigning tags.
Entry Exit Management Software = System components for communication between RFID
Access Management and the RFID interrogators at the access points
Light Emitting Diode
Radio Frequency Identification = Identification of objects by means of electromagnetic
waves
Radio Frequency Unit = Writer and reader for RFID system
RFID Access Management = System for managing access rights based on RFID
SICK OPEN PORTAL for APPLICATION and SYSTEMS Engineering Tool = SICK configuration
software
8018582/2015-11-03 Operating instructions| SICK 7
Subject to change without notice
Chapter 1 Operating instructions
About these operating
instructions
RFID Access Management
1.5 Symbols used
Recommendation
Note
1. / 2. ...
Recommendations are designed to assist you in the decision-making process with respect
to the use of a certain function or technical measure.
Notes provide information about the features of a device, application tips, or other
information that may come in useful.
Instructions that must be carried out in the described order are referred to as step-by-step
instructions and are indicated by numbered lists. Carefully read and follow the instructions
for action.
Instructions for taking action are indicated by an arrow. Carefully read and follow the
instructions for action.
8 Operating instructions | SICK 8018582/2015-11-03Subject to change without notice
Operating instructions Chapter 2
Safety
•
RFID Access Management
2 Safety
This chapter concerns your own safety and the safety of the system operator.
Please read this chapter carefully before you begin working with RFID Access
Management.
2.1 Qualified safety personnel
RFID Access Management must only be mounted, commissioned, and maintained by
properly qualified personnel.
The following qualifications are necessary for the various tasks:
Activities Qualification
Mounting and
maintenance
Electrical installation and
replacement
Commissioning, operation,
and configuration
• Practical technical training
• Knowledge of the current safety regulations in the
workplace
Practical electrical training
• Knowledge of current electrical safety regulations
• Knowledge of device control and operation in the
• Knowledge of the mechanical and electrical parameters
of the access control that relate to operation and use
• Knowledge of the software and hardware environment
in the particular application
• Basic knowledge of the Windows operating system
used
• Basic knowledge of data transmission
• Basic knowledge of the design and setup (addressing)
of Ethernet connections when connecting the RFID
interrogators to the Ethernet
• Basic knowledge of how to use an HTML browser
(e.g., Internet Explorer) to access the online help
Tab. 2: Qualified safety personnel
8018582/2015-11-03 Operating instructions| SICK 9
Subject to change without notice
Chapter 2 Operating instructions
Safety
RFID Access Management
2.2 Application of the system
RFID Access Management is a system for the flexible management and configuration of
access rights in an access control system based on RFID.
Rights are assigned and revoked quickly and conveniently directly at the PC with the aid
of Entry Exit Configuration Software. The tabletop RFU62x RFID interrogator allows tags
to be managed with ease.
The permissions are passed on to the RFID interrogators of the access points via Ethernet
and saved there. RFID interrogators from the RFU6xx device families can be used as
readers.
2.3 Intended use
RFID Access Management may only be used as described in section 2.2 Application of
the system. It may only be used by qualified personnel in the environment in which it was
mounted and initially commissioned by qualified safety personnel in accordance with
these operating instructions.
The equipment may only be operated in an industrial environment.
RFID Access Management must not be used in an explosion-protected environment.
If used in any other way or if alterations are made to the system or the devices are opened
– including in the context of mounting and installation – this will void any warranty claims
directed to SICK AG.
10 Operating instructions | SICK 8018582/2015-11-03Subject to change without notice
Operating instructions Chapter 2
Safety
RFID Access Management
2.4 General safety notes and protective measures
2.4.1 Safety notes and symbols
The following safety and hazard symbols are used for your own safety, for the safety of
third parties, and for the safety of the system. You must therefore observe these symbols
at all times.
HAZARD
Denotes an immediate hazard that may result in severe to fatal injuries.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of injury resulting from electrical current).
WARNING
Denotes a potentially dangerous situation that may result in severe to fatal injuries.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of injury resulting from falling components).
CAUTION
Caution note
Denotes a potentially dangerous situation that may result in minor personal injury or
possible material damage.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of damage to the eye by laser beams).
NOTE
Denotes a potential risk of damage or functional impairment to the device or the devices
connected to it.
This symbol includes a reference to supplementary technical documentation.
8018582/2015-11-03 Operating instructions| SICK 11
Subject to change without notice
Chapter 2 Operating instructions
Safety
RFID Access Management
2.4.2 General safety notes
General, recognized safety-related rules and regulations were taken into account in the
design and manufacture of the system. Risks for the user resulting from the system cannot
however be completely ruled out. The safety notes below must therefore be strictly
observed.
WARNING
Safety notes
Observe the following to ensure the safe use of the system as intended.
• The notes in these operating instructions (e.g., regarding use, mounting, installation,
and commissioning) must be observed.
• All official and statutory regulations governing the operation of the system must be
complied with.
• National and international legal specifications apply to the installation and use of the
system, to its commissioning, and to recurring technical inspections, in particular:
– The work safety regulations and safety regulations.
– Any other relevant safety regulations.
• The manufacturer and user of the system are responsible for coordinating and
complying with all applicable safety specifications and regulations in cooperation with
the relevant authorities.
• The checks must be carried out by qualified safety personnel or specially qualified and
authorized personnel, and must be recorded and documented to ensure that the tests
can be reconstructed and retraced at any time.
• These operating instructions must be made available to the operator of the system.
The system operator has to be instructed by qualified safety personnel and has to read
the operating instructions.
RFID Access Management is intended solely for use in industrial environments. Radio
interference may result when used in residential areas.
2.4.3 Potential sources of danger
RFID Access Management has been designed and implemented in a way that allows for
safe operation. Potential hazards are virtually eliminated. However, a certain level of risk
will always remain.
Awareness of potential sources of danger in the system will help you to work in a safer
manner and thus prevent accidents.
To avoid risks, please also observe the special warnings in each of the individual chapters.
WARNING
12 Operating instructions | SICK 8018582/2015-11-03Subject to change without notice
Loading...
+ 27 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.