Operating instructions
RFID Access Management
4 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
5.4 Connecting the configuration PC to the network .............................................. 38
5.5 SICK connection accessories ............................................................................. 39
6 Commissioning RFID Access Management ............................................................... 40
6.1 Switching on the system .................................................................................... 40
6.2 Installing ECS on the configuration PC .............................................................. 40
6.2.1 Installing ECS .................................................................................... 41
6.2.2 Installing the SOPAS configuration software .................................. 42
6.3 Altering the IP addresses of the RFID interrogators ......................................... 43
6.3.1 Connecting the configuration PC to RFID interrogators ................. 44
6.3.2 Altering the default IP address ........................................................ 46
6.3.3 Displaying devices in the project tree ............................................. 48
6.4 Inserting the microSD card into access point RFID interrogators ................... 49
6.5 Setting the transmitting power of the RFID interrogators at the access
points ................................................................................................................... 51
6.5.1 Loading the device in the project tree ............................................. 51
6.5.2 Setting the device parameters......................................................... 52
6.5.3 Testing RFU transmitting power ....................................................... 52
6.6 Changing the password to log in to devices ...................................................... 53
6.7 Saving the device configuration ........................................................................ 54
6.8 Launching ECS .................................................................................................... 54
6.8.1 Logging in as an Integrator .............................................................. 54
6.8.2 Program overview ............................................................................. 55
6.9 Making central settings ...................................................................................... 56
6.9.1 Information about the tag ................................................................ 57
6.9.2 Information about the time server ................................................... 58
6.9.3 Storing the password for communication with the RFID
interrogators ..................................................................................... 58
6.9.4 Configuring the RFID interrogator indicators .................................. 58
6.9.5 Saving settings .................................................................................. 58
6.10 Recording access points .................................................................................... 59
6.10.1 Recording the configuration device ................................................. 60
6.10.2 Recording RFID interrogators for the access control system ......... 61
6.10.3 The access points in the System Overview ..................................... 63
6.10.4 Modifying an access point ............................................................... 64
6.11 Creating access profiles ..................................................................................... 65
6.12 Creating a participant with access profiles ....................................................... 68
6.13 Assigning tags to participants ............................................................................ 71
6.14 Participants and registered tags in the System Overview ................................ 73
6.15 Testing access control ........................................................................................ 73
7 Working with RFID Access Management ................................................................... 74
7.1 Modifying an access profile ............................................................................... 75
7.2 Editing access authorizations ............................................................................ 75
7.2.1 Sorting/filtering the participant list ................................................. 75
7.2.2 Adding participants ........................................................................... 77
7.2.3 Deleting participants who leave the company ................................ 77
7.2.4 Deactivating a lost tag ...................................................................... 78
7.2.5 Displaying the access authorization for a tag ................................. 80
7.2.6 Modifying the access authorization of a participant ...................... 81
7.2.7 Checking the access authorization validity ..................................... 82
7.3 Reading the update status of the access points .............................................. 83