SICK RAM Security Systems Operating instructions

Type
Operating instructions
OPERATING INSTRUCTIONS
EN
RAM
Security Systems
Operating instructions
RFID Access Management
2 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
This work is protected by copyright. Any rights derived from the copyright shall be reserved for SICK AG.
Reproduction of this document or parts of this document is only permissible within the limits of the legal
determination of Copyright Law. Alteration or abridgment of the document is not permitted without the explicit
written approval of SICK AG.
Operating instructions
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 3
Subject to change without notice
Contents
Contents
1 About these operating instructions ............................................................................... 6
1.1 Function of this document .................................................................................... 6
1.2 Target group .......................................................................................................... 6
1.3 Information depth ................................................................................................. 7
1.4 Abbreviations used ............................................................................................... 7
1.5 Symbols used ........................................................................................................ 8
2 Safety ............................................................................................................................... 9
2.1 Qualified safety personnel .................................................................................... 9
2.2 Application of the system ...................................................................................10
2.3 Intended use .......................................................................................................10
2.4 General safety notes and protective measures ....................................................11
2.4.1 Safety notes and symbols.................................................................11
2.4.2 General safety notes .........................................................................12
2.4.3 Potential sources of danger .............................................................12
2.5 Protection of the environment ............................................................................14
2.5.1 Power consumption ..........................................................................14
2.5.2 Disposal after final decommissioning ..............................................14
3 System description ...................................................................................................... 15
3.1 Scope of delivery .................................................................................................15
3.2 Specific features .................................................................................................17
3.2.1 An overview of the system components ..........................................17
3.2.2 Operating principle of the management software ..........................20
3.2.3 Notes on the tags ..............................................................................23
3.3 Status indicators .................................................................................................24
3.3.1 RFU62x RFID interrogator .................................................................24
3.3.2 RFU63x RFID interrogator .................................................................25
3.3.3 CDB650 connection module ............................................................26
3.3.4 CMC600 cloning module ..................................................................27
4 Setup and mounting .................................................................................................... 28
4.1 RFU62x configuration device .............................................................................28
4.2 RFID interrogators at the access points ............................................................28
4.2.1 Notes on mounting the RFID interrogators ......................................28
4.2.2 RFU62x RFID interrogator .................................................................30
4.2.3 RFU63x RFID interrogator .................................................................31
4.2.4 Mounting the connection module ....................................................31
5 Electrical installation .................................................................................................. 32
5.1 Connecting the RFU62x configuration device ...................................................32
5.2 Connecting RFU6xx RFID interrogators ..............................................................33
5.2.1 Connecting the power supply/switching output ..............................34
5.2.2 Connection to the network ...............................................................35
5.3 Connecting RFID interrogators via a connection module .................................35
5.3.1 Connecting an RFID interrogator to a connection module .............35
5.3.2 Connecting the power supply/switching output in the
connection module ...........................................................................36
5.3.3 Inserting the cloning module ............................................................37
5.3.4 Connecting the additional switching output of the
connection module ...........................................................................38
Operating instructions
RFID Access Management
4 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
Contents
5.4 Connecting the configuration PC to the network .............................................. 38
5.5 SICK connection accessories ............................................................................. 39
6 Commissioning RFID Access Management ............................................................... 40
6.1 Switching on the system .................................................................................... 40
6.2 Installing ECS on the configuration PC .............................................................. 40
6.2.1 Installing ECS .................................................................................... 41
6.2.2 Installing the SOPAS configuration software .................................. 42
6.3 Altering the IP addresses of the RFID interrogators ......................................... 43
6.3.1 Connecting the configuration PC to RFID interrogators ................. 44
6.3.2 Altering the default IP address ........................................................ 46
6.3.3 Displaying devices in the project tree ............................................. 48
6.4 Inserting the microSD card into access point RFID interrogators ................... 49
6.5 Setting the transmitting power of the RFID interrogators at the access
points ................................................................................................................... 51
6.5.1 Loading the device in the project tree ............................................. 51
6.5.2 Setting the device parameters......................................................... 52
6.5.3 Testing RFU transmitting power ....................................................... 52
6.6 Changing the password to log in to devices ...................................................... 53
6.7 Saving the device configuration ........................................................................ 54
6.8 Launching ECS .................................................................................................... 54
6.8.1 Logging in as an Integrator .............................................................. 54
6.8.2 Program overview ............................................................................. 55
6.9 Making central settings ...................................................................................... 56
6.9.1 Information about the tag ................................................................ 57
6.9.2 Information about the time server ................................................... 58
6.9.3 Storing the password for communication with the RFID
interrogators ..................................................................................... 58
6.9.4 Configuring the RFID interrogator indicators .................................. 58
6.9.5 Saving settings .................................................................................. 58
6.10 Recording access points .................................................................................... 59
6.10.1 Recording the configuration device ................................................. 60
6.10.2 Recording RFID interrogators for the access control system ......... 61
6.10.3 The access points in the System Overview ..................................... 63
6.10.4 Modifying an access point ............................................................... 64
6.11 Creating access profiles ..................................................................................... 65
6.12 Creating a participant with access profiles ....................................................... 68
6.13 Assigning tags to participants ............................................................................ 71
6.14 Participants and registered tags in the System Overview ................................ 73
6.15 Testing access control ........................................................................................ 73
7 Working with RFID Access Management ................................................................... 74
7.1 Modifying an access profile ............................................................................... 75
7.2 Editing access authorizations ............................................................................ 75
7.2.1 Sorting/filtering the participant list ................................................. 75
7.2.2 Adding participants ........................................................................... 77
7.2.3 Deleting participants who leave the company ................................ 77
7.2.4 Deactivating a lost tag ...................................................................... 78
7.2.5 Displaying the access authorization for a tag ................................. 80
7.2.6 Modifying the access authorization of a participant ...................... 81
7.2.7 Checking the access authorization validity ..................................... 82
7.3 Reading the update status of the access points .............................................. 83
Operating instructions
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 5
Subject to change without notice
Contents
7.4 Viewing access logs ............................................................................................85
7.4.1 Opening the list of access logs .........................................................85
7.4.2 Filtering the list of access logs .........................................................86
7.4.3 Closing the access control display ...................................................87
7.5 Managing RFID Access Management ................................................................88
7.5.1 Performing a data backup/restoring the database ........................88
7.5.2 Changing passwords for user roles ..................................................89
7.5.3 Changing the user language .............................................................90
7.5.4 Defining the access of the Information Security Officer to
access logs using the four eyes principle ........................................91
8 Maintenance and repairs ............................................................................................ 92
8.1 Maintenance tasks .............................................................................................92
8.2 Replacing components .......................................................................................92
8.2.1 Replacing the RFU62x configuration device ...................................92
8.2.2 Replacing the RFID interrogator at the access point ......................93
9 Fault diagnosis ............................................................................................................. 95
9.1 Response to faults ..............................................................................................95
9.2 Fault situations ....................................................................................................95
9.3 SICK support........................................................................................................96
9.4 Fault indication on the RFID interrogator ..........................................................96
9.5 System logs in RFID Access Management ........................................................97
9.6 Fault diagnosis in SOPAS ....................................................................................98
10 Technical data .............................................................................................................. 99
10.1 Data sheets .........................................................................................................99
10.1.1 RFID Access Management................................................................99
10.1.2 RFU63x RFID interrogator data sheet ........................................... 100
10.1.3 RFU62x RFID interrogator data sheet ........................................... 101
10.1.4 CDB650 connection module data sheet ...................................... 102
10.1.5 CMC600-101 cloning module data sheet .................................... 102
10.1.6 Configuration PC system requirements ........................................ 103
10.2 Dimensional drawings ..................................................................................... 104
10.2.1 RFU63x dimensional drawing ........................................................ 104
10.2.2 RFU62x dimensional drawing ........................................................ 105
10.2.3 CDB620 connection box dimensional drawing ............................ 106
11 Annex .......................................................................................................................... 107
11.1 List of tables ..................................................................................................... 107
11.2 List of figures .................................................................................................... 108
11.3 Keywords index ................................................................................................ 109
Chapter 1 Operating instructions
RFID Access Management
6 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
About these operating
instructions
1 About these operating instructions
Please read this chapter carefully before you begin working with this documentation and
RFID Access Management (RAM for short).
1.1 Function of this document
These operating instructions are designed to give technical personnel instructions on
the safe mounting, configuration, electrical installation, commissioning, operation, and
maintenance of RFID Access Management.
1.2 Target group
These operating instructions are intended for people who plan, mount, connect,
commission, operate, and maintain the access control systems.
Activities Target group
Mounting, electrical installation,
maintenance, and replacement of
system components
Qualified personnel, such as service technicians
or industrial electricians
Commissioning and configuration Qualified personnel, such as service technicians
or engineers
Tab. 1: Target group
Operating instructions Chapter 1
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 7
Subject to change without notice
About these operating
instructions
1.3 Information depth
These operating instructions contain information on the following topics:
• System description
• Setup and mounting
• Electrical installation
• Commissioning and operation
• Maintenance and repairs
• Fault diagnosis and troubleshooting
• Technical data and dimensioned drawings
When planning and using RFID systems, technical skills are required that are not covered
by this document.
The official and legal regulations for operating the RFMS Access Management must always
be complied with.
The IP addresses are assigned using the SICK SOPAS configuration software.
Please also refer to the information concerning RFID and building security that is available
on the Internet at www.sick.com.
There, you can find sample applications and a list of frequently asked questions about
RFID and building security.
1.4 Abbreviations used
Entry Exit Configuration Software = System components for managing the access rights
of persons and vehicles and for assigning tags.
Entry Exit Management Software = System components for communication between RFID
Access Management and the RFID interrogators at the access points
Light Emitting Diode
Radio Frequency Identification = Identification of objects by means of electromagnetic
waves
Radio Frequency Unit = Writer and reader for RFID system
RFID Access Management = System for managing access rights based on RFID
SICK OPEN PORTAL for APPLICATION and SYSTEMS Engineering Tool = SICK configuration
software
Note
ECS
EMS
LED
RFID
RFU
RAM
SOPAS
Chapter 1 Operating instructions
RFID Access Management
8 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
About these operating
instructions
1.5 Symbols used
Recommendations are designed to assist you in the decision-making process with respect
to the use of a certain function or technical measure.
Notes provide information about the features of a device, application tips, or other
information that may come in useful.
Instructions that must be carried out in the described order are referred to as step-by-step
instructions and are indicated by numbered lists. Carefully read and follow the instructions
for action.
Instructions for taking action are indicated by an arrow. Carefully read and follow the
instructions for action.
Recommendation
Note
1. / 2. ...

Operating instructions Chapter 2
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 9
Subject to change without notice
Safety
2 Safety
This chapter concerns your own safety and the safety of the system operator.
 Please read this chapter carefully before you begin working with RFID Access
Management.
2.1 Qualified safety personnel
RFID Access Management must only be mounted, commissioned, and maintained by
properly qualified personnel.
The following qualifications are necessary for the various tasks:
Activities Qualification
Mounting and
maintenance
• Practical technical training
• Knowledge of the current safety regulations in the
workplace
Electrical installation and
replacement
•
Practical electrical training
• Knowledge of current electrical safety regulations
• Knowledge of device control and operation in the
particular application concerned (e.g., logistics gate
(lock))
Commissioning, operation,
and configuration
• Knowledge of the mechanical and electrical parameters
of the access control that relate to operation and use
• Knowledge of the software and hardware environment
in the particular application
• Basic knowledge of the Windows operating system
used
• Basic knowledge of data transmission
• Basic knowledge of the design and setup (addressing)
of Ethernet connections when connecting the RFID
interrogators to the Ethernet
• Basic knowledge of how to use an HTML browser
(e.g., Internet Explorer) to access the online help
Tab. 2: Qualified safety personnel
Chapter 2 Operating instructions
RFID Access Management
10 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
Safety
2.2 Application of the system
RFID Access Management is a system for the flexible management and configuration of
access rights in an access control system based on RFID.
Rights are assigned and revoked quickly and conveniently directly at the PC with the aid
of Entry Exit Configuration Software. The tabletop RFU62x RFID interrogator allows tags
to be managed with ease.
The permissions are passed on to the RFID interrogators of the access points via Ethernet
and saved there. RFID interrogators from the RFU6xx device families can be used as
readers.
2.3 Intended use
RFID Access Management may only be used as described in section 2.2 Application of
the system. It may only be used by qualified personnel in the environment in which it was
mounted and initially commissioned by qualified safety personnel in accordance with
these operating instructions.
The equipment may only be operated in an industrial environment.
RFID Access Management must not be used in an explosion-protected environment.
If used in any other way or if alterations are made to the system or the devices are opened
– including in the context of mounting and installation – this will void any warranty claims
directed to SICK AG.
Operating instructions Chapter 2
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 11
Subject to change without notice
Safety
2.4 General safety notes and protective measures
2.4.1 Safety notes and symbols
The following safety and hazard symbols are used for your own safety, for the safety of
third parties, and for the safety of the system. You must therefore observe these symbols
at all times.
HAZARD
Denotes an immediate hazard that may result in severe to fatal injuries.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of injury resulting from electrical current).
WARNING
Denotes a potentially dangerous situation that may result in severe to fatal injuries.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of injury resulting from falling components).
CAUTION
Caution note
Denotes a potentially dangerous situation that may result in minor personal injury or
possible material damage.
The symbol shown on the left-hand side of the note refers to the type of hazard in question
(the example here shows a risk of damage to the eye by laser beams).
NOTE
Denotes a potential risk of damage or functional impairment to the device or the devices
connected to it.
This symbol includes a reference to supplementary technical documentation.
Chapter 2 Operating instructions
RFID Access Management
12 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
Safety
2.4.2 General safety notes
General, recognized safety-related rules and regulations were taken into account in the
design and manufacture of the system. Risks for the user resulting from the system cannot
however be completely ruled out. The safety notes below must therefore be strictly
observed.
WARNING
Safety notes
Observe the following to ensure the safe use of the system as intended.
• The notes in these operating instructions (e.g., regarding use, mounting, installation,
and commissioning) must be observed.
• All official and statutory regulations governing the operation of the system must be
complied with.
• National and international legal specifications apply to the installation and use of the
system, to its commissioning, and to recurring technical inspections, in particular:
– The work safety regulations and safety regulations.
– Any other relevant safety regulations.
• The manufacturer and user of the system are responsible for coordinating and
complying with all applicable safety specifications and regulations in cooperation with
the relevant authorities.
• The checks must be carried out by qualified safety personnel or specially qualified and
authorized personnel, and must be recorded and documented to ensure that the tests
can be reconstructed and retraced at any time.
• These operating instructions must be made available to the operator of the system.
The system operator has to be instructed by qualified safety personnel and has to read
the operating instructions.
WARNING
RFID Access Management is intended solely for use in industrial environments. Radio
interference may result when used in residential areas.
2.4.3 Potential sources of danger
RFID Access Management has been designed and implemented in a way that allows for
safe operation. Potential hazards are virtually eliminated. However, a certain level of risk
will always remain.
Awareness of potential sources of danger in the system will help you to work in a safer
manner and thus prevent accidents.
To avoid risks, please also observe the special warnings in each of the individual chapters.
Operating instructions Chapter 2
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 13
Subject to change without notice
Safety
Risks during electrical installation
HAZARD
Risk of injury due to electrical current
 Standard safety requirements must be met when working on electrical systems.
 The power supply must be disconnected when attaching and detaching electrical
connections.
 Select and implement wire cross-sections and their correct fuse protection in
accordance with the applicable standards.
HAZARD
Risk of injury and damage caused by electrical current
Improper handling of live devices may lead to severe personal injury or death by electric
shock.
 Electrical installation and maintenance work must always be carried out by personnel
authorized to do so.
 Do not touch any live components.
 In the event of danger, immediately disconnect the system from the power supply.
 Always use original fuses with the specified current rating.
 Report any damaged cables to the maintenance team without delay.
Risks during commissioning and configuration
WARNING
Risk resulting from incorrect commissioning and configuration
Do not commission without testing by qualified safety personnel!
Before you operate the system or a device for the first time, you must have it checked and
approved by qualified safety personnel.
WARNING
Risk of ground potential equalization currents
The RFID interrogators are designed to be operated in a system with professional
grounding of all connected devices and mounting surfaces to the same ground potential.
Due to equipotential bonding currents between the RFID interrogator and other grounded
devices in the system, incorrect grounding of the RFID interrogator can charge the metal
housing to a dangerous voltage, cause malfunction and destruction of devices as well as
damage to the cable shielding through heating, and thus cause cable fires.
Chapter 2 Operating instructions
RFID Access Management
14 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
Safety
Risks during maintenance and repair work
HAZARD
Disconnect the power to the system
 Make sure the power supply for the entire system is disconnected throughout the entire
time that you are carrying out maintenance and repair work.
HAZARD
Risk of injury due to electrical current
Only a qualified electrician or trained person working under the guidance and supervision
of a qualified electrician is permitted to work on electrical systems or equipment and they
must comply with the electrical regulations.
NOTE
Claims under the warranty rendered void
Do not open the housing of the RFID interrogator. The device is sealed.
If the device is opened, any warranty claims against SICK AG will be void.
The cover on the card slot can be removed to insert the microSD card.
2.5 Protection of the environment
RFID Access Management has been designed to minimize its environmental impact.
It consumes very little power.
Always act in an environmentally responsible manner at work. For this reason, please note
the following information regarding disposal.
2.5.1 Power consumption
At full transmitting power, an RFU62x RFID interrogator consumes approx. 8 watts of
power; an RFU63x RFID interrogator approx. 20 watts.
2.5.2 Disposal after final decommissioning
 Always dispose of unusable or irreparable devices in an environmentally safe manner in
accordance with the relevant national waste disposal regulations.
 Dispose of all electronic assemblies as hazardous waste. The electronic assemblies are
easy to dismantle.
See also section 7.2 Disposal.
SICK AG does not take back devices that are unusable or irreparable.
Note
Operating instructions Chapter 3
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 15
Subject to change without notice
System description
3 System description
This chapter provides information on the special features of RFID Access Management. It
describes the design and operating principle of the system solution.
3.1 Scope of delivery
RFID Access Management is available in various system configurations.
RAM620-10x01
The RAM620-10x01 system variant is used to monitor one access point.
Fig. 1: RAM620-10x01 scope of delivery
Part no. Quantity Description
1077596 RAM620-10001
1 RFU620-10100 RFID interrogator (radio equipment approval
for Europe/South Africa)
1 microSD card with system components ECS610-10000
(Entry Exit Configuration Software) – ECS for short, and
EMS610-00000 (Entry Exit Management Software) – EMS
for short
1
Adapter for microSD card
1
Sample tag
1
Operating instructions
1077598 RAM620-10101
1 RFU620-10101 RFID interrogator (radio equipment approval
for USA/Canada)
1 microSD card with system components ECS610-10000
(Entry Exit Configuration Software) – ECS for short, and
EMS610-00000 (Entry Exit Management Software) – EMS
for short
1
Adapter for microSD card
1
Sample tag
1
Operating instructions
Chapter 3 Operating instructions
RFID Access Management
16 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
System description
RAM630-10x01
The RAM630-10x01 system variant is used to monitor one access point.
Fig. 2: RAM630-10x01 scope of delivery
The RAM630-10x01 system variant is used to monitor one access point.
Part no. Quantity Description
1077597 RAM630-10001
1 RFU630-13100 RFID interrogator (radio equipment approval
for Europe/South Africa)
1 microSD card with system components ECS610-10000
(Entry Exit Configuration Software) – ECS for short, and
EMS610-00000 (Entry Exit Management Software) – EMS
for short
1
Adapter for microSD card
1
Sample tag
1
Operating instructions
1077599 RAM630-10101
1 RFU630-13101 RFID interrogator (radio equipment approval
for USA/Canada)
1 microSD card with system components ECS610-10000
(Entry Exit Configuration Software) – ECS for short, and
EMS610-00000 (Entry Exit Management Software) – EMS
for short
1
Adapter for microSD card
1
Sample tag
1
Operating instructions
Additional components required
To manage the access points and access rights, you will need the following components:
• An RFU62x RFID interrogator configuration device to read the tags.
• A configuration PC with Entry Exit Configuration Software to manage the access rights
of persons and vehicles and to assign tags.
• An Ethernet switch.
Operating instructions Chapter 3
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 17
Subject to change without notice
System description
Additional accessories
• Mounting kits for mounting the RFID interrogators (see chapter 4 Setup and mounting).
• Network device for connecting the RFU62x configuration device and connecting cables
(see chapter 5.5 SICK connection accessories).
• CDB650 connection module for each RFID interrogator to cover extended distances
between the RFID interrogator and the connections.
• CMC600 cloning module for enhanced protection against tampering in the CDB650
connection module.
Thorough check for completeness
 It is recommended that you carefully check for and report transport damage of
any kind as soon as possible after receiving the components you have ordered.
 Also verify that the delivery includes all components listed on the delivery note.
3.2 Specific features
3.2.1 An overview of the system components
To manage and configure access rights, RFID Access Management requires
a commercially available configuration PC and a type RFU62x RFID interrogator.
Type RFU62x and RFU63x RFID interrogators are used at the access points of the
access control system. Communication between the devices takes place via an
Ethernet connection.
Fig. 3: System components
Important note
Chapter 3 Operating instructions
RFID Access Management
18 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
System description
The RFID interrogators at the access points are connected to the power supply and, via I/O
connection, to the access control system.
Fig. 4: Operation without connection module
Managing access rights
The Entry Exit Configuration Software system component is installed on the configuration
PC. This manages the access rights of persons and vehicles as well as the assignment of
tags. It communicates with the RFID interrogators at the access points and configures the
switching operations for the controlling the access points.
The configuration device for reading the tags is a type RFU62x RFID interrogator with
integrated antenna and a scanning range of up to 1 m. The tag that has been read in is
assigned to a participant in the configuration software. Existing assignments are displayed
in the software's Tag Management view.
Transferring access rights
The access rights managed in ECS are transferred to the RFID interrogators of the access
points via Ethernet and saved there. Communication between the configuration PC and
RFID interrogators takes place via the EMS system component. This is installed as
a counterpart to the ECS management software in the relevant RFID interrogator via
a microSD card.
If the RFID interrogator delivers a positive read result, this is reported to the access control
system via a digital switching output.
The microSD card also acts as a form of copy protection. It must be inserted into each
RFID interrogator that is managed with RFID Access Management.
Tags
The RFU62x and RFU63x RFID interrogators used in RFID Access Management process all
standard passive tags in accordance with ISO-/IEC-18000-6C and EPCglobal UHF C1G2 in
the regional UHF carrier frequency range.
Note
Operating instructions Chapter 3
RFID Access Management
8018582/2015-11-03 Operating instructions| SICK 19
Subject to change without notice
System description
Using a CDB650 connection module (optional)
Optionally, the RFU6xx RFID interrogators can be operated at the access points via
a connection module. The connection module connects the RFID interrogator to the
power supply and, via a digital switching output, to the electronic access control system.
It helps to bridge extended distances between the RFID interrogator and the connections.
The RFID interrogator is connected to the connection module via a pre-assembled cable.
The connection module is wired to the power supply and control system via corresponding
terminals inside the housing.
Fig. 5: Operation with connection module
As the connection module is generally mounted at a location that is not accessible to
outsiders, it is also ideally protected against tampering.
If the switching operations are not to take place directly in the RFID interrogator, but in the
connection module instead in order to provide increased protection against tampering, the
CMC600-101 cloning module must also be connected there. The cloning module supports
the connected RFID interrogator with two additional inputs and outputs.
Fig. 6: Operation with connection module and cloning module
Tamper protection
Chapter 3 Operating instructions
RFID Access Management
20 Operating instructions | SICK 8018582/2015-11-03
Subject to change without notice
System description
3.2.2 Operating principle of the management software
The ECS management software is responsible for managing all parameters that are
relevant for access control and for transferring these to the RFID interrogators of the
access points.
Managing the access points
All points at which only authorized persons or vehicles are to be admitted access to
a defined area are recorded in RFID Access Management as access points.
An access point is how an RFID interrogator is shown in the ECS management software.
Fig. 7: Managing the access points
Access authorizations for up to 20 access points can be managed in one RFID Access
Management.
Managing the access profiles
Access authorizations are defined in ECS as access profiles. An access profile is created
for one or more access points. The period during which access is permitted is stored by
means of corresponding time frames. Access profiles are initially defined without reference
to persons or vehicles.
Note
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112

SICK RAM Security Systems Operating instructions

Type
Operating instructions

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI