i
Operations Guide 931423B CyberData Corporation
Contents
Chapter 1 Product Overview 1
1.1 How to Identify This Product .....................................................................................................1
1.2 Typical System Installation .......................................................................................................2
1.3 Features ...................................................................................................................................4
1.4 Supported Protocols .................................................................................................................5
1.5 Supported SIP Servers .............................................................................................................5
1.6 Specifications ...........................................................................................................................6
1.7 Compliance ..............................................................................................................................7
1.7.1 CE Testing ......................................................................................................................7
1.7.2 FCC Statement ..............................................................................................................7
Chapter 2 Installing the SIP RFID Secure Access Control Endpoint 8
2.1 Parts List ..................................................................................................................................8
2.2 SIP RFID Secure Access Control Endpoint Components ........................................................9
2.3 Optimal orientation of the RFID tags and location against the RFID unit ...............................10
2.4 Device Setup ..........................................................................................................................11
2.4.1 SIP RFID Secure Access Control Endpoint Connections ............................................11
2.4.2 Using the On-Board Relay ...........................................................................................12
2.4.3 Wiring the Circuit ..........................................................................................................13
2.4.4 SIP RFID Secure Access Control Endpoint Connectors ..............................................17
2.4.5 Activity and Link LEDs .................................................................................................21
2.4.6 Restoring the Factory Default Settings .........................................................................22
2.5 Configure the SIP RFID Secure Access Control Endpoint Parameters .................................23
2.5.1 Factory Default Settings ...............................................................................................23
2.5.2 SIP RFID Secure Access Control Endpoint Web Page Navigation ..............................24
2.5.3 Using the Toggle Help Button .......................................................................................25
2.5.4 Log in to the Configuration Home Page .......................................................................27
2.5.5 Configure the Device ....................................................................................................31
2.5.6 Configure the Network Parameters .............................................................................33
2.5.7 Configure the SIP (Session Initiation Protocol) Parameters .........................................35
2.5.8 Configure the RFID Configuration Parameters .............................................................40
2.5.9 Enrollment Procedure ..................................................................................................45
2.5.10 Configure the Sensor Configuration Parameters ........................................................61
2.5.11 Configure the Audio Configuration Parameters ..........................................................64
2.5.12 Configure the Events Parameters ..............................................................................68
2.5.13 Configure the Door Strike Relay .................................................................................74
2.5.14 Configure the Autoprovisioning Parameters ...............................................................76
2.6 Upgrade the Firmware ............................................................................................................88
2.7 Reboot the Device ..................................................................................................................91
2.8 Command Interface ................................................................................................................92
2.8.1 Command Interface Post Commands ..........................................................................92
Appendix A Mounting the SIP RFID Secure Access Control Endpoint 93
A.1 Mounting Components ...........................................................................................................93
A.2 Dimensions ............................................................................................................................94
A.3 Network Cable Entry Restrictions ..........................................................................................97
A.3.1 Conduit Mounting Restrictions (Side Entry) .................................................................97
A.4 Service Loop Cable Routing ..................................................................................................98
A.5 Securing the Intercom ..........................................................................................................100
A.6 Additional Mounting Options ................................................................................................101
A.6.1 Goose Neck Mounting Option (Not Provided) ............................................................101
Appendix B Setting up a TFTP Server 102
B.1 Set up a TFTP Server ..........................................................................................................102
B.1.1 In a LINUX Environment ............................................................................................102
B.1.2 In a Windows Environment .......................................................................................102
Appendix C Troubleshooting/Technical Support 103