i ls lock operation

126
PERPETUAL INNOVATION ILS Lock Operation User Guide

Upload: luciano-rodrigues-e-rodrigues

Post on 19-Feb-2016

23 views

Category:

Documents


2 download

DESCRIPTION

i Ls Lock Operation

TRANSCRIPT

Page 1: i Ls Lock Operation

PERPETUA

ILS Lock OperationUser Guide

L INNOVATION

Page 2: i Ls Lock Operation

Lenel OnGuard® 2010 ILS Lock Operation User Guide, product version 6.4.This guide is item number DOC-303E, revision 1.024, September 2010

Copyright © 2010 Lenel Systems International, Inc. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Lenel Systems International, Inc.

Non-English versions of Lenel documents are offered as a service to our global audiences. We have attempted to provide an accurate translation of the text, but the official text is the English text, and any differences in the translation are not binding and have no legal effect.

The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that agreement. Lenel and OnGuard are registered trademarks of Lenel Systems International, Inc.

Microsoft, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Integral and FlashPoint are trademarks of Integral Technologies, Inc. Crystal Reports for Windows is a trademark of Crystal Computer Services, Inc. Oracle is a registered trademark of Oracle Corporation. Other product names mentioned in this User Guide may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.

Portions of this product were created using LEADTOOLS © 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

OnGuard includes ImageStream® Graphic Filters. Copyright © 1991-2010 Inso Corporation. All rights reserved. ImageStream Graphic Filters and ImageStream are registered trademarks of Inso Corporation.

Page 3: i Ls Lock Operation

ILS Lock Operation User Guide

Table of Contents

Chapter 1: Introduction ...............................................................9

Other Referenced User Guides ....................................................................... 9

Conventions Used in this Documentation ....................................................... 9

Features and Functions ................................................................................ 12

Lock Installation .............................................................................................................. 13

Lock Configurations ........................................................................................................ 13

Lock Audit Trail ............................................................................................................... 16

Lock Attributes ................................................................................................................ 16

Users Settings ................................................................................................................. 17

Calendar .......................................................................................................................... 17

Timezones ....................................................................................................................... 17

Lock Operation Mode Changes ...................................................................................... 18

Emergency Operations (ILS Wireless Locks Only) ......................................................... 19

General Lock Characteristics ........................................................................ 21

Battery Life ...................................................................................................................... 21

Replace Lock Batteries ................................................................................................... 22

LED and Buzzer Indicators ........................................................................... 24

Micro-switches .............................................................................................. 28

Connections .................................................................................................. 28

Batteries and Privacy ...................................................................................................... 28

Mobile Configurator ......................................................................................................... 28

Card Reader Technologies .................................................................................................... 29

Magnetic .......................................................................................................................... 29

iCLASS ............................................................................................................................ 29

revision 15 — 3

Page 4: i Ls Lock Operation

Table of Contents

MIFARE ........................................................................................................................... 29

125 kHz Prox ................................................................................................................... 29

Lockcases .............................................................................................................................. 30

Mortise with Deadbolt ...................................................................................................... 30

Mortise, Latch Only ......................................................................................................... 30

Heavy Duty Cylindrical Latch BLA .................................................................................. 30

Mortise with Deadbolt/AFC ............................................................................................. 30

Mechanical Key Override .............................................................................. 30

State Changes ................................................................................................................ 31

Alternative Fire Code (AFC) .......................................................................... 32

Hardware ......................................................................................................................... 32

AFC Lock Settings .......................................................................................................... 32

Latch and Door Sensor Monitoring ................................................................................. 33

Maintenance .................................................................................................. 33

Clean the Reader Outer Cover ....................................................................................... 33

Clean the Magnetic Read Head (Magnetic Stripe Reader Only) .................................... 33

Door Position and Monitoring ........................................................................ 33

Door Sensor Contact ....................................................................................................... 33

Latch Monitoring .............................................................................................................. 34

Lock Operating Environment ......................................................................... 35

Lock Certifications ......................................................................................... 35

Chapter 2: System Commissioning .........................................37

Lock Installation ............................................................................................ 37

Test the Locks ............................................................................................... 38

Lock Commissioning ..................................................................................... 38

4 — revision 15

Page 5: i Ls Lock Operation

ILS Lock Operation User Guide

Wireless Gateway ........................................................................................................... 38

Assign the Locks ............................................................................................................. 38

Initialize the Locks ........................................................................................................... 39

Chapter 3: Mobile Configurator ................................................41

Description .................................................................................................... 41

Main Components ......................................................................................... 42

Connectors ...................................................................................................................... 42

Power Adapter ................................................................................................................ 42

Connections .................................................................................................. 42

To the Lock ..................................................................................................................... 42

To the Computer where OnGuard is Running ................................................................. 43

Setup and Configuration ............................................................................... 43

Download the Lock Configuration File to the Mobile Configurator .................................. 44

Upload the Mobile Configurator Lock Audits File to OnGuard ........................................ 44

Lock Operators .............................................................................................. 44

Operator Logon ............................................................................................................... 44

Using the Mobile Configurator ....................................................................... 45

Initialize ........................................................................................................................... 46

Update Lock .................................................................................................................... 47

Change Lock Mode ......................................................................................................... 48

Tests and Diagnostics ..................................................................................................... 48

Read Lock Audits (Events) .............................................................................................. 50

Open Lock ....................................................................................................................... 54

Power Up ........................................................................................................................ 54

Firmware Upgrade .......................................................................................................... 55

Network Join (ILS Wireless Lock Only) ........................................................................... 55

revision 15 — 5

Page 6: i Ls Lock Operation

Table of Contents

Send Heartbeats (ILS Wireless Locks Only) ................................................................... 55

Mobile Configurator Maintenance ................................................................................... 56

Wireless Functionality ................................................................................... 56

Wireless Connectivity ...................................................................................................... 56

Main Components ........................................................................................................... 56

Description ...................................................................................................................... 56

Lock Radio ...................................................................................................................... 56

ILS Wireless Lock Radio LED Indications ..................................................... 59

Wireless Features ......................................................................................... 60

Chapter 4: Site Planning for a Wireless Installation ...............61

ILS Wireless Components Overview ............................................................. 62

Installation Planning ...................................................................................... 63

Obtain a Floor Plan ......................................................................................................... 63

Identify the Wireless Lock Locations ............................................................................... 63

Determine Potential Wireless Gateway Locations .......................................................... 63

Power and TCP/IP Network Access for the Wireless Gateway ...................................... 64

Mounting Feasibility ........................................................................................................ 64

Wireless Gateway Antenna Orientation .......................................................................... 64

Wireless Gateway Mounting Height ................................................................................ 65

Relative Positioning of a Wireless Gateway and Its Locks ............................................. 67

Wireless Gateway Mounted in the Middle of the Associated Locks .............. 68

Wireless Gateway Mounted on an Exterior Wall ........................................... 68

Estimating Wireless Range ........................................................................... 69

Basic Propagation Mechanisms ...................................................................................... 69

Multipath Fading .............................................................................................................. 71

ILS Wireless Range Inside Buildings .............................................................................. 72

6 — revision 15

Page 7: i Ls Lock Operation

ILS Lock Operation User Guide

ILS Range in Hallways .................................................................................. 74

ILS Range with Wall Obstructions ................................................................. 74

Impact of Obstructions .................................................................................................... 75

Perform the Site Survey ................................................................................ 77

Visual Inspection of the Site ............................................................................................ 77

Scan the RF Spectrum on the Site .................................................................................. 78

Chapter 5: Wireless Gateway ...................................................83

Description .................................................................................................... 83

Wireless Gateway (Ethernet) ........................................................................ 84

Wireless Gateway (Wi-Fi) ............................................................................. 85

Commission the ILS Wireless Gateway ........................................................ 86

Assign a Wireless Gateway IP Address ........................................................ 86

Automatic IP Address Assignment (Ethernet Only) ........................................................ 86

Assign an IP Address (Wi-Fi and Ethernet) .................................................................... 87

Establish a Static IP Address (Ethernet Only) ................................................................. 89

Lock Table (Data) ............................................................................................................ 90

Configure the Wi-Fi Wireless Gateway ......................................................... 90

Connect Wi-Fi Wireless Gateway to the Computer via HyperTerminal .......................... 91

Lock Data ........................................................................................................................ 93

Wireless Gateway LEDs ............................................................................... 94

Wireless Gateway Power Supply .................................................................. 94

Wireless Gateway Certifications ................................................................... 94

Wireless Gateway Environmental Requirements .......................................... 95

revision 15 — 7

Page 8: i Ls Lock Operation

Table of Contents

Chapter 6: Troubleshooting ......................................................97

Chapter 7: Hardware Upgrade ................................................101

Description .................................................................................................. 101

Upgrade the Radio ...................................................................................... 102

Upgrade/Replace the Radio .......................................................................................... 103

Upgrade the Reader .................................................................................... 103

Upgrade/Replace the Reader ....................................................................................... 103

Replace the Wireless Gateway ................................................................... 104

Upgrade the Firmware or Software ............................................................. 104

Upgrade Components ................................................................................................... 104

Upgrade the Lock Using the Mobile Configurator ......................................................... 105

Upgrade the Lock via the Wireless Gateway ................................................................ 105

Upgrade the Mobile Configurator Application ............................................................... 105

Appendices ......................................................................107

Appendix A: Alarm/Events Table ...........................................109

Appendix B: Install Mechanical Key Override in ILS Locks 113

Installation Procedure ................................................................................. 113

Index ...............................................................................................121

8 — revision 15

Page 9: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 1: Introduction

The scope of this document is limited to the installation and commissioning of Wireless Gateways and ILS wireless locks from an RF coverage perspective. The intended audience for this document includes the installation and service technicians that would need to plan and install ILS wireless components on a site. The document does not include any OnGuard specific configuration procedures, as this information is provided in the OnGuard documentation.

Other Referenced User Guides

This user guide describes the operation of your Lenel Integrated Locking Solution (ILS) as well as providing an overview of the installation and configuration of the locks. In addition to this user guide, the following guides are provided on the OnGuard installation disc:

• System Administration User Guide. This guide is intended for system engineers and administrators who want to build, operate, and maintain the OnGuard access control system. Instructions for designing, installing, and configuring the OnGuard system for ILS locks are covered in this guide.

• ID CredentialCenter User Guide. This guide is a sub-set of the System Administration User Guide intended for operators of the OnGuard system who want to monitor and administrate the system.

• Installation Guide. This walks you through the installation of the OnGuard software with a SQL Server or SQL Server Express database. It also includes steps to install the browser-based applications.

• ILS Lock Component Installation & Upgrade Guide. This guide provides instructions for installing or upgrading the lock reader or radio in the field.

Conventions Used in this Documentation

• Where a term is defined, the word is represented in italics.

• Field names, menus, and menu choices are shown in bold.

• Keyboard keys are represented in angle brackets. For example: <Tab>, <Ctrl>.

• Keyboard key combinations are written in two ways:– <Ctrl> + <Z> means hold down the first key and press the second– <Alt>, <C> means press the first key, then press the second

revision 1 — 9

Page 10: i Ls Lock Operation

1: Introduction

• Window buttons on the screen are represented in square brackets. For example: [OK], [Cancel].

The vocabulary used:

• ACF. Refers to Access Control Format.

• ActiveSync. A data synchronization program developed by Microsoft for use with its Microsoft Windows line of operating systems. It provides users of Microsoft Windows a means of transporting information between their desktop computer and a mobile device, such as a Mobile Configurator, mobile phone, or any other portable devices that support the ActiveSync protocol. ActiveSync is available as a free download from Microsoft’s web site.

• ACU. Refers to the Access Control Unit.

• ADA. Refers to Americans with Disabilities Act. In order to be ADA-compliant, extended strike and extended open time is assigned to cardholders with disabilities who require it. The ADA information is configured on the Wiegand card format form. For more information, refer to Add a Wiegand Card Format in the System Administration User Guide.

• AFC. Refers to Alternative Fire Code that is also known as Ontario Fire Code 3.4.4.5. This mode requires presentation of the card to relock the door upon exit. Refer to Ontario Fire Code 3.3.4.5.

• ANSI. Refers to American National Standards Institute.

• Audit trail. A log of event information that is recorded at the lock. “Audit” is used interchangeably with “event” in this document.

• BLA. Refers to Bored Latch Adapter used in the BLA lock. This adapter fits into the standard cylindrical door prep, but is much more secure and robust than the standard 3500 latch on your doors at home. Refer to Prep.

• CE. Refers to Consultants Europe. These experts identify hazards, assess risks, carry out all applicable tests to determine the appropriate measures to meet with CE mark regulations.

• DHCP. Refers to Dynamic Host Configuration Protocol. This protocol is used for assigning dynamic IP addresses to devices on a network.

• DST. Refers to Daylight Saving Time.

• ESD. Refers to Electrostatic Discharge. ESD, is a single-event, rapid transfer of electrostatic charge between two objects, usually resulting when two objects at different potentials come into direct contact with each other. ESD can also occur when a high electrostatic field develops between two objects in close proximity. ESD is one of the major causes of device failures in the semiconductor industry.

• FCC part 15. Federal Communications Commission regulation of low power, non-licensed transmitter devices that could cause potentially harmful

10 — revision 1

Page 11: i Ls Lock Operation

ILS Lock Operation User Guide

interference to licensed transmitters and vice versa. Part 15 covers an assortment of electronic equipment that generates RF energy whether it is intentional, unintentional or incidental.

• Heartbeat. Predefined message used by wireless locks to communicate with the wireless access point.

• iCLASS. 13.56 MHz read or write, contactless, smart card technology that is compliant with ISO 15693.

• LED. Refers to Light Emitting Diode.

• MAC. Refers to the Media Access Control address; also known as the hardware address or physical address. The MAC address is a unique value given to each device on an Ethernet network that allows the device to identify itself on the network. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). IP networks maintain a mapping between the IP address of a device and its MAC address. DHCP also usually relies on MAC addresses to manage the unique assignment of IP addresses to devices.

• MC. Refers to the Lenel ILS Mobile Configurator. Use this portable device to initially configure and manage ILS offline and ILS wireless locks. The MC allows you to initialize, download card holders, download and upload events, download lock scheduling information, download firmware updates, and run lock diagnostics. You can also use the MC to unlock the lock and change reader modes as needed.

• NIST. Refers to the National Institute of Standards and Technology.

• Ontario Fire Code 3.3.4.5. Provisions of the Ontario, Canada, Building Code, Section 3.3.4.5. which requires that doors do not automatically lock when a person exits the room instead of relying on the key holder to relock the door themselves.

• Configurator adapter. The Mobile Configurator communicates with the ACU via the Configurator power adapter that can used to provide auxiliary power to the ILS offline and ILS wireless locks in case the battery power is low or has no power.

• PP. Refers to Portable Programmer also known as the “Mobile Configurator.”

• Prep. To prepare a door or frame for installation of a lock or other hardware.

• SCF. Refers to Smart Card Format. This card format describes to the lock how to retrieve access control data from the smart card credential and pertains to iCLASS and MIFARE locks, only.

• RTC. Refers to Real Time Clock.

• RoHS. Refers to Restriction of Use of Hazardous Substances. RoHS-compliant electrical and electronic equipment is tested for the presence of Lead (Pb), Cadmium (Cd), Mercury (Hg), Hexavalent chromium (Hex-Cr),

revision 1 — 11

Page 12: i Ls Lock Operation

1: Introduction

Polybrominated biphenyls (PBB), and Polybrominated diphenyl ethers (PBDE).

• SSL Certificate. Secure Sockets Layers are cryptographic protocols that provide security for communications over networks such as the Internet. SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely by using two keys to encrypt data; a public key known to everyone and a private or secret key known only to the recipient of the message. URLs that require an SSL connection start with https: instead of http:

• Trim. The portions of the lock the user can see when lock is installed on a closed door.

• UL10C. Underwriters Laboratories Standard for positive pressure fire tests of door assemblies.

• WAP. Acronym for a Wireless Access Point device that is also referred to as the ILS Wireless Gateway.

• Wi-Fi. Refers to Wireless Fidelity. Describes a method of obtaining Internet access using wireless technology. Most portable computers can add Wi-Fi connectivity using an adapter that plugs into a computer card slot or USB port.

• Wireless Gateway. This is an ILS-specific Wireless Access Point (WAP) device; not a common access point. The ILS Wireless Gateway is used to communicate with its associated locks on the 900Mhz frequency range. In this document, “Wireless Gateway” is also referred to as the “Wireless Access Point” or “WAP.”

• WLM. WLM - Refers to the Wireless Lock Module; the radio module of the wireless lock.

• UL294. Certifies that RFID devices and systems conform to the Underwriters Laboratories UL-294 Access Control Systems Standard of safety.

Features and Functions

The feature and function descriptions in this document are common to both ILS offline and wireless locks unless otherwise stated.

12 — revision 1

Page 13: i Ls Lock Operation

ILS Lock Operation User Guide

Lock Installation

Lock ConfigurationsWhen the lock is installed, it is configured with factory settings. After the lock is initialized with the Mobile Configurator, it has the settings that were configured in OnGuard and downloaded to the Mobile Configurator prior to initialization. Locks configured with factory settings support the use of the “standard” or “owner” construction cards.

Factory Configuration Mode

By default, every new lock comes pre-configured with factory settings and the Lock ID is zero (0). Such a lock is considered to be in the Factory Configuration Mode. When the lock is in Factory Configuration Mode, it provides basic lock/unlock functionality during the installation period and only supports the use of construction cards.

While in Factory Configuration Mode, the lock supports two (2) different card types “standard” and “owner” which support the Standard and Office Factory Modes, respectively. In addition, the lock supports the lookahead functionality with a default Codes look ahead value of 10. For more information, refer to Lock Attributes on page 16 or the System Administration User Guide.

Construction Cards

Construction cards are supported for magnetic, iCLASS, MIFARE, and proximity card technologies and are able to grant access when presented to a lock in the factory mode. For more information, refer to Card Reader Technologies on page 29.

• Standard construction card. When this card is presented, the lock will unlock and relock after six (6) seconds. This is the default value forStrike / Extended Open Time.

The Badge ID of a standard construction card is “43707.” This Badge ID has no special meaning after the lock is initialized and leaves the factory mode. Therefore, you can use this Badge ID for a normal user in the non-factory mode. If the lock is reset to factory mode, the lock treats this Badge ID as the special construction card once again.

• Office (lock owner) construction card. When this card is presented once, the lock will unlock and relock after 6 seconds. If this card is double-dipped within 6 seconds, the lock unlocks and remains unlocked until this card is doubled-dipped again, at which point the lock is relocked.

The Badge ID of an office construction card is “43708.” This Badge ID shall have no special meaning after the lock is initialized and leaves the factory mode. Therefore, you can use this Badge ID for a normal user in the non-factory configuration. If the lock is reset to factory mode, the lock treats this Badge ID as the special construction card once again.

WarningInstallation of ILS locks should only be performed by an Lenel ILS (Integrated Locking Solutions) certified installer. Be sure to completely read and understand the lock installation template and guide before installing the locks.

revision 1 — 13

Page 14: i Ls Lock Operation

1: Introduction

Note: Special purpose cards do not support factory configuration.

Standard Configuration Mode

After the lock is initialized, it enters the Standard Configuration Mode and its operation is then governed by the standard lock operational modes. For more information, refer to Lock Operation Mode Changes on page 18.

Note: When the lock has factory settings, the privacy state is ignored. If the deadbolt is engaged when door is unlocked, the lock will not relock. If the deadbolt is engaged when door is locked, both Construction and Standard cards will unlock the door. The deadbolt will disengage when the door handle is actuated during open time or during Unlocked mode. For more information, refer to Privacy (Monitor Deadbolt) on page 18.

Reset the Lock to Factory Configuration Mode

After a lock is in initialized, it may need to be re-initialized, for example, when the System code is changed or the door/lock is moved to a new location.

Important: A lock cannot be initialized unless it is in factory mode. If the lock is in standard mode, it must reset to factory mode first.

1. Remove the thumb turn after removing the thumb turn screw.

2. Remove the 12mm T-10 screw from the battery cover (upper inside escutcheon).

14 — revision 1

Page 15: i Ls Lock Operation

ILS Lock Operation User Guide

3. Remove the battery cover (upper inside escutcheon).

4. On the left facing battery circuit board, press the CLEAR button to reset the lock to the factory settings.

Important: To prevent accidentally resetting the lock to factory mode, the lock can only enter factory mode when the CLEAR button is depressed for approximately 15 seconds. To ensure the lock is reset, press the lock’s CLEAR button until the LED in front of the reader provides a visual indication.

Default Settings

Whenever the lock is reset to factory mode, all settings are reset to their default value.

CLEAR button

revision 1 — 15

Page 16: i Ls Lock Operation

1: Introduction

Any previous configuration of the lock is cleared, including the Lock ID (Record number), System code, cardholders, timezones, automatic changes, holidays, etc. The audit trail is also erased but certain settings are not cleared such as the total lock cycles counter.

The lock will retain the factory configuration until it is initialized by OnGuard via the Mobile Configurator.

Lock Audit TrailDuring standard operation, the lock can record the last 1000 events in its memory. However, the memory does not overflow when it becomes full. Instead, new events are added to the end of the audit log and the oldest record is removed in a “first-in, first-out” process.

Each recorded event includes the following information:

• Date

• Hour

• Minute

• User code (if applicable)

• Event type

• Access granted

• Access denied

• Invalid card

• Automatic lock state changes

• DST updates

• Blocking card

• Join card (Wireless)

• Test card

• Lock malfunction

For the list of events, refer to Appendix A: Alarm/Events Table on page 109.

Lock AttributesThe lock has several attributes that modify its behavior. These attributes are configured in OnGuard. Some of the attributes are global. If a global attribute is enabled, it applies to all locks in the system. Other attributes are configured on a lock-by-lock basis.

The following list includes attributes which apply on a lock-by-lock basis:

• Door unlock time (Strike Time) can be configured from 1 - 255 seconds

• Door unlock time for disabled users (Extended Strike) used for ADA can be configured from 1 - 255 seconds

• Is Lock when the handle is released feature used?

• Is the Unlock on deadbolt feature used?

• Is the Unlocked mode with card feature used?

Global attributes include the following:

16 — revision 1

Page 17: i Ls Lock Operation

ILS Lock Operation User Guide

• System code

• Lock or card date precedence?

• Store badge activate/deactivate dates?

• Codes lookahead - can be configured system-wide or on a lock-by-lock basis

• Clean up wireless diagnostics days (ILS wireless locks only)

• Are the AFC features used?

Note: For more information about all of the lock attributes, refer to the System Administration User Guide.

Users SettingsUser-specific settings allow the lock to function in a different manner for cardholders assigned with the following permissions within the system:

• ADA. An option that can be configured for the user who requires an extended amount of time to enter a door due to a handicap, injury, or other debilitating condition. If ADA is configured for the cardholder, it applies to every door the cardholder accesses.

• Device owner. An option that can be configured for a user who needs to override the privacy function of a given door, or needs to place a given door into the unlocked mode with the cardholder card. This option is configured as either ON or OFF for each cardholder in each door, so a cardholder may be the device owner of many doors, and a door may have many owners. Device owner is also referred to as the “lock owner.”

• Blocking override. When a blocking card is presented to the lock, the door is blocked, and the lock enters the blocked mode. An option can be enabled for a user who requires the ability to override a blocked door. The blocking override is typically enabled for security personnel. If the blocking override is enabled for a cardholder, it applies to every door to which the cardholder has access. For more information about the Blocked mode, refer to Lock Operation Mode Changes on page 18.

CalendarThe behavior of the lock with regard to the time of day (scheduled and automatic changes) can be different for every day of the week (Sunday - Saturday, and holidays). The calendar determines the days that will be specified as holidays. The lock supports up to 100 holidays. Splitting the holidays out and individually identifying the days of the week gives the system eight (8) different day types.

TimezonesTimezones are composed of time range/day intervals. Each interval is defined by the beginning hour and minute, the ending hour and minute and the day types to which the interval applies. Selectable “days” include any of the seven days of the week, plus any of up to eight (8) holiday types. For more information, refer to the System Administration User Guide.

revision 1 — 17

Page 18: i Ls Lock Operation

1: Introduction

You can configure ILS Offline/ILS Wireless timezones which are only downloaded to the ILS offline/wireless locks in the system. Each ILS offline/wireless timezone supports up to five (5) time range/day intervals. A maximum of 64 ILS offline/wireless timezones are allowed including the two (2) pre-defined timezones; Always and Never.

Lock Operation Mode ChangesThe lock may change modes of operation either by a user action or by an scheduled automatic change. The different operational modes include:

Unlocked

The lock is unlocked and cardholders may pass freely through the door.

First Card Unlock

The lock is placed in the Unlocked mode, but only after the first valid card is presented after the mode change.

Card Only

Each cardholder must present a valid card to open the door. Use of a card with the Device owner option allows the lock to change to the Unlocked mode (if enabled). “Device owner” is also referred to as the “lock owner.”

Facility Code Only

In Facility Code Only mode, the lock will only grant access to a card with valid credentials (facility code, authorization level, and card activate / deactivate date).

If the deadbolt is engaged and the lock is in Facility Code Only mode, the lock will ignore the privacy state; the lock will relock. However, only a card with valid credentials will unlock the door. For more information, refer to Privacy (Monitor Deadbolt) on page 18.

Blocked

This is a special state controlled by the use of the blocking card. When a door is blocked with the blocking card, the lock will reject all cards that do not have the Blocking override enabled. The state of the lock changes alternatively from blocked to not blocked each time the blocking card is presented. Cards that override a blocked lock will place the lock into the blocked state. Each of these actions, as well as a card rejection due to a blocked lock, is registered in the audit trail.

When in the blocked mode, the lock will ignore automatic scheduled changes unless these are initiated by OnGuard or a Mobile Configurator.

Privacy (Monitor Deadbolt)

When the cardholder engages the deadbolt (privacy knob) from inside the door, the door is considered to be in the privacy state. When the cardholder disengages the deadbolt, the door is no longer in the privacy state.

18 — revision 1

Page 19: i Ls Lock Operation

ILS Lock Operation User Guide

The privacy state of the lock is a combination of the OnGuard privacy setting (Monitor deadbolt) and the deadbolt position:

• When Monitor deadbolt is enabled:

If the door is locked with the deadbolt engaged, only the lock owner will be granted access; the door will then unlock and the deadbolt will disengage when the door handle is turned. For more information, refer to Device owner on page 17.

• When Monitor deadbolt is disabled:

If the door is locked with the deadbolt engaged, then anyone with a valid card will be granted access; the door will then unlock and the deadbolt will disengage when the door handle is turned.

Note: If you change the lock to Secured, Unsecured, or Blocked mode from OnGuard, the Mobile Configurator, or the card (Emergency Lock, Emergency Unlock, or Blocked) this will override the privacy state of the lock.

Emergency Operations (ILS Wireless Locks Only)The following commands can be issued by the lock operator from the Alarm Monitoring device view. For more information, refer to Secure/Unsecure All Locks from a Reader Device Group in the Alarm Monitoring User Guide.

Emergency Commands

• Secure All. When the Secure All command is issued from a reader device group, all locks within the reader device group are locked and operate in the security mode (no card will be granted access) until the mode is changed from OnGuard, the Mobile Configurator, or a special purpose card. For adding locks to a reader device group, refer to the System Administration User Guide.

• Unsecure All. When the Unsecure All command is issued from a reader device group, all locks within the reader device group will remain unlocked and operate in the unsecured mode until the mode is changed from OnGuard, the Mobile Configurator, or a special purpose card.

The following emergency lock operation modes can be set by the lock operator in the Alarm Monitoring system tree or by presenting one of the emergency special purpose cards. For more information, refer to ILS Special Purpose Cards in the System Administration User Guide.

Emergency Operation Modes

• Secured. The lock operator can change the lock’s mode to secured from the Alarm Monitoring system tree or by presenting the Emergency Lock card. During Emergency Lock mode the door locks, no card will be granted access, and the lock will operate in the security mode until the lock operator changes the mode from OnGuard or a Mobile Configurator, or presents the

revision 1 — 19

Page 20: i Ls Lock Operation

1: Introduction

Emergency Lock card again, at which point the lock will enter the Card Only mode.

• Unsecured. The lock operator can change the lock’s mode to Unsecured from the Alarm Monitoring system tree or by presenting the Emergency Unlock card. The lock will remain unlocked and operate in the Unsecured mode until the lock operator changes the mode from OnGuard or the Mobile Configurator, or presents the Emergency Unlock card again, at which point the lock will enter the Card Only mode.

Note: Scheduled automatic changes are not applied when the lock is in the security or unsecured mode.

Note: When lock operation modes are changed from Alarm Monitoring, the change request waits at the Wireless Gateway to be sent on the heartbeat cycle of each lock. Lock operation mode changes cannot be pushed down to the lock until the lock wakes up and executes the change. For more information, refer to section Lock Heartbeat on page 56.

Scheduled (Automatic) Changes

The lock can be configured to automatically change state on a scheduled basis which is configured in OnGuard. This function allows the lock to automatically change operational mode up to 20 times per day type. Each change is registered in the lock audit trail.

Optionally, you can configure up to 25 scheduled changes per ILS offline/wireless lock. For information on configuring Timezone/Reader Modes, refer to the System Administration User Guide.

Examples of possible ILS offline/wireless configurations:

• 5 timezones containing 5 intervals each

• 10 timezones containing 2 intervals each and 1 timezone containing 5 intervals

• 25 timezones containing 1 interval each

Daylight Saving Time

Locks can automatically adjust for daylight saving time. Each lock can store the dates of the next four (4) changes (two years). The lock will adjust one (1) hour forward or backward as dictated by the programming.

20 — revision 1

Page 21: i Ls Lock Operation

ILS Lock Operation User Guide

General Lock Characteristics

Battery LifeThe lock is powered by three (3) alkaline type AA or LR4 batteries located under the battery cover (upper-inside escutcheon). When ILS offline and wireless locks are sleeping (not in use), they consume approximately 0.02mA. When the lock circuit is active, it consumes approximately 10mA. The motor consumes 150mA when it is active.

Battery life estimates for wireless locks vary depending on the configurable radio heartbeat interval. Battery consumption is reduced for longer heartbeat intervals in conjunction with the number of openings per day. For more information, refer to Lock Heartbeat on page 56.

New batteries provide 4.5 volts (100%). As the batteries are consumed, the lock will begin to indicate the low battery power condition starting when the batteries have 18% (3.5 volts) of usable power remaining. When the battery power level drops below 5% (3.3 volts), the lock will continue to signal the low battery condition but will refuse to grant access (unlock).

You can monitor lock battery level in Alarm Monitoring. For more information, refer to “View Wireless Lock Status” in the Alarm Monitoring User Guide.

Battery

Voltage

4.5 V

Lock Status Event

4.5 V No event

Low Battery

Access Denied - Low Battery

100%

<18%

Percentage< = 3.5 V

< = 3.3 V 0%

0 V

revision 1 — 21

Page 22: i Ls Lock Operation

1: Introduction

Replace Lock Batteries

Important: If you replace the lock batteries due to a very low battery, the battery has no power, or you power off the lock by removing, and then replacing the batteries, the lock’s real-time clock (RTC) must be updated using the Mobile Configurator.

To replace the lock batteries, complete the following steps:

1. Remove the thumb turn after removing the thumb turn screw.

2. Remove the battery cover.

3. Remove the batteries.

4. Install the new batteries, and replace the battery cover and thumb turn.

5. Connect the power adapter to the lock by inserting the plug into the jack on the bottom of the lock. Ensure the adapter is connected to the Mobile Configurator. For more information, refer to Using the Mobile Configurator on page 45.

6. Power on the Mobile Configurator and the power adapter, and then log onto the Mobile Configurator application. For more information, refer to Operator Logon on page 44.

22 — revision 1

Page 23: i Ls Lock Operation

ILS Lock Operation User Guide

7. Update the lock’s clock time (RTC). From the Tools menu, select Update Lock Clock, and then click [Update].

Important: Make sure to verify the date and time displayed on the Mobile Configurator. If the Mobile Configurator has the wrong date and time, the lock will be updated with the wrong date and time and will not function as intended.

8. Disconnect the power adapter, and power off both the power adapter and the Mobile Configurator.

revision 1 — 23

Page 24: i Ls Lock Operation

1: Introduction

LED and Buzzer Indicators

Notes: Automatic scheduled changes do not produce LED or buzzer indications.

When a card is presented twice (after access is granted), and the mode or state of the lock changes, the access granted indication (solid GREEN) will be followed by a mode change indication (blinks GREEN or solid RED).

For mode changes generated by presenting special purpose cards, only the mode change indication will be shown.

For access granted events, the LED remains solid GREEN for the duration of the open lock timer.

The lock uses two (2) LED indicators (RED and GREEN) to communicate with users or lock operators as shown in the following tables:

Buzzer Behavior

LED or Buzzer Indication

Description

High Beep The buzzer double-beeps continuously within a 50 ms interval.

Low Beep The buzzer single-beeps continuously within a 50 ms interval for the time specified in OnGuard for the Door Held Open Alarm.

LED Behavior

LED or Buzzer Indication

Description

Solid GREEN LED is solid GREEN for two (2) seconds

Solid RED LED is solid RED for two (2) seconds

Blinks GREEN LED blinks GREEN four (4) times within two (2) seconds

Blinks RED LED blinks RED four (4) times within two (2) seconds

Access Granted (Solid GREEN)

Event Description

Access Granted Access granted when no latch monitoring or door sensor

Access Granted Entry Made Access granted and door opened; used when latch monitoring or door sensor are present

Access Granted No Entry Made Access granted but door not opened; used when latch monitoring or door sensor are present

Door Open Lock opened via Mobile Configurator or OnGuard

24 — revision 1

Page 25: i Ls Lock Operation

ILS Lock Operation User Guide

Access Denied (High Beep and Blinks RED Only for Magnetic Locks)

Event Description

Inactive Badge Card not yet active

Access Denied: Card Expired Card has expired

Invalid Badge User information is not on the lock

Denied, Not Authorized Authorization for access is missing

Invalid Issue Code Card is cancelled

Denied, Invalid Timezone User is not enabled in this hour

No Privacy Override User does not have privacy override privilege

Access Denied: Secured Mode Lock is in Security (Emergency Lock) mode; no users allowed access

No Blocking Override User does not have Blocked Override privilege

Access Denied: Invalid Access Control Data Failed to process Integra card data

Invalid Facility Code Facility code for selected ACF did not match facility code retrieved from the card

Access Denied: Invalid Access Control Data Parity Parity calculations for retrieved data failed for selected ACF

Access Denied: Invalid Access Control Data Length Length of retrieved data did not match length specified in selected ACF

Access Denied: Invalid Access Control Data Type The type of retrieved data (Wiegand/Integra) did not match ACF type

Access Denied: Access Control Format Not Found No ACFs stored at the lock

Access Denied: Invalid Smart Card Data Invalid header, invalid data length, failed to retrieve HID App data.

Access Denied: Invalid Smart Card Authentication Failed to authenticate to application specified by selected SCF

Access Denied: Invalid Smart Card Location Application data could not be located on the card based on the selected SCF (Smart Card Format)

Access Denied: Invalid Smart Card Type Either the card was not found in the field, or the card failed to respond to the requested RF protocol

Access Denied: Smart Card Format Not Found No SCFs stored at the lock

Test or Join Failed Event (Blinks RED and High Beep)

Event Description

Test failed Blinks red, only.

Join failed Blinks red, only.

revision 1 — 25

Page 26: i Ls Lock Operation

1: Introduction

Solid GREEN, Blinks RED

Event Description

Denied Low Battery Door open/close failed due to low batteries

Unlocked Mode Change Denied: Low Battery Lock cannot enter office mode due to low battery

Unlocked Under First Card Unlock Recorded after power up by Mobile Configurator

Power Up (Solid green blinks red for 2 seconds) Lock powered by batteries

Mode Change Events (Blinks GREEN)

Event Description

Reader Mode Unlocked Lock entered Unlocked mode

Reader Mode Unsecured Lock entered Security (Emergency Lock) mode

Unlocked Under First Card Unlock First Card unlock

Unlocked Under AFC Lock entered AFC mode

Test pass

Join pass

Access Granted when lock is already unlocked Unlocked, unlocked in First Card Unlock

Mode Change Events (Solid RED)

Mode Change Event Description

Locked Under First Card Unlock First card relock

Unlocked Under AFC End of AFC mode

Reader Mode Secured Lock entered Unsecured (Emergency Unlock) mode

Reader Mode Blocked Lock entered Blocked mode

Reader Mode Facility Code Only Lock entered Facility Code Only mode

Reader Mode First Card Unlock Lock entered First Card Unlock mode

Reader Mode Card Only Lock entered Card Only mode

LED Alternate Solid RED and Solid GREEN

Lock is reset; LED solid green and solid red for 5 seconds

Lock is reset to Construction mode.

Low Beep Only (Not Supported by Magnetic Locks)

Door Held Open Alarm when door is left open; used when latch monitoring or door sensor are present.

26 — revision 1

Page 27: i Ls Lock Operation

ILS Lock Operation User Guide

Events Which Do Not Generate LED or Buzzer Indications

Event Description

ACU Firmware Upgraded Lock firmware update.

Audit Trail Cleared Recorded when audit trail (event log) is cleared.

Audit Trail Limit Reached Informs OnGuard when the audit log is becoming full and is about to be overwritten.

Card Only Mode Change Denied: Blocked Mode Automatic change to Card Only mode denied since lock is in Blocked mode.

Card Only Mode Change Denied: Security Mode Automatic change to Card Only mode denied since lock is in Security (Emergency) mode.

Daylight Savings Time Audit DST start or DST end occurred.

Door Forced Open Alarm when door is forced open.

Door Forced Open Restored Cleared state of Door Forced Open event.

Door Held Open Restored Cleared state of Door Held Open event.

Door Open by Key Mechanical key override is on.

Door Open by Key Off Mechanical key override is off.

Door Open from Inside Door opened from inside, only when not in Unlocked mode.

Facility Code Only Mode Change Denied: Blocked Mode

Automatic change to Facility Code Only mode denied since lock is in Blocked mode.

Facility Code Only Mode Change Denied: Security Mode

Automatic change to Facility Code Only mode denied since lock is in Security (Emergency) mode.

First Card Unlock Mode Change Denied: Blocked Mode

Automatic change to First Card Unlock first mode denied since lock is in Blocked mode.

First Card Unlock Mode Change Denied: Security Mode

Automatic change to Unlocked mode denied since lock is in Security (Emergency) mode.

Internal Deadbolt Privacy knob (deadbolt) turned (engaged) from inside.

Internal Deadbolt Off Privacy knob turned back (disengaged) from inside.

Lock Initialized Lock initialized via the PP application.

Lock Updated Lock was updated.

Low Battery Lock battery has reached 18% of usable capacity.

Low Battery Restored Cleared state of Low Battery event.

Reader Module Firmware Upgraded Update to reader firmware.

Real-time Clock Updated Real-time clock updated.

Unlocked Mode Change Denied: Blocked Mode Automatic change to Unlocked mode denied since lock is in Blocked mode.

Unlocked Mode Change Denied: Security Mode Automatic change to First Card Unlock mode denied since lock is in Security (Emergency) mode.

WLM Firmware Upgraded Radio module firmware updated.

revision 1 — 27

Page 28: i Ls Lock Operation

1: Introduction

With ILS offline locks, the reason for card rejection may be discovered by reading the lock with the Mobile Configurator, and then examining the readout either directly on the Mobile Configurator or at the computer. For instructions, refer to section Using the Mobile Configurator on page 45.

In addition, audits can be requested from wireless locks from OnGuard. For more information, refer to Retrieve Events from Wireless Locks in the Alarm Monitoring User Guide.

Micro-switches

The lock uses micro-switches to detect different operations. Some micro-switches are included on every lock, and some are only included as special options. The switches are listed as follows and notated as to whether they are Standard (S) or Optional (O):

• Card Insertion Micro-switch (S). •This micro-switch is located within the card slot and is used to detect the presence of a card. (magnetic cards, only).

• Handle Micro-switch (S). •This switch is located within the internal clutch mechanism and is used to detect the position of the inside and outside handle.

• Privacy Micro-switch (O). •This switch is located on the inside subassembly below the battery pack and is used to indicate whether the privacy indicator is on or off.

• Mechanical Key Override Micro-switch (O). •This switch is located within the internal clutch mechanism and is used to indicate the use of a mechanical key to open the lock.

Connections

Batteries and PrivacyThe ILS lockset is a self-contained unit that requires no wires to be pulled from a central processor or power supply for lock operation. The lock electronic module receives power from batteries located in the inside escutcheon. Also located in the inside escutcheon is the Privacy Micro-switch. The lock is connected to these items by a single 4-conductor wiring harness. This harness is attached to the outside escutcheon and plugs into CN1 on the inside subassembly.

Mobile ConfiguratorILS offline and wireless locks require initial programming (Initialization), periodic updates, and a channel to retrieve the lock audit data. This may be accomplished by downloading the data from OnGuard to the Mobile

28 — revision 1

Page 29: i Ls Lock Operation

ILS Lock Operation User Guide

Configurator and then using the Mobile Configurator to perform the necessary programming or audit operation. The Mobile Configurator is connected to the lock by connecting the power adapter cable to the jack at the bottom of the lock.

Note: After ILS wireless locks are initialized, most Mobile Configurator functions can then be performed wirelessly from OnGuard. ILS offline locks will always require the use of the Mobile Configurator for any updates or queries of the lock.

Card Reader Technologies

Based on the hardware configuration of the lock, OnGuard supports the card reader technologies described in this section.

Note: ILS readers can be upgraded easily from one card reader technology to another. For instructions on upgrading the reader, refer Upgrade the Reader on page 103 and the ILS Lock Component Installation & Upgrade Guide.

MagneticThe magnetic reader uses secure proprietary encoding that is stored on track 3.

iCLASSThis 13.56MHz contactless, smart card reader supports 15693 CSN, 14443 A CSN, the HID access control application, and the Lenel access control application on 2k, 16k, and 32k iCLASS credentials.

MIFARE(Depending on your version of OnGuard, this card technology may not be available.)

The MIFARE 13.56MHz contactless, smart card reader supports14443 A CSN and the Lenel access control application on MIFARE Classic 1K and 4K credentials.

125 kHz ProxThis 125 kHz proximity reader supports HID Prox, AWID Prox, and Lenel proximity credentials.

revision 1 — 29

Page 30: i Ls Lock Operation

1: Introduction

Lockcases

Mortise with DeadboltThis is a UL approved, ANSI Grade 1 standard full mortise lock with a 1” deadbolt. A unique feature of the deadbolt is that it can be projected from either inside or outside by lifting the handle. Projection from the outside requires a valid card. When the deadbolt is projected, a micro-switch signals this condition to the micro-processor. The deadbolt may be retracted by using the inside handle upon exit or the outside handle when a valid card is presented. ILS Integra CT30 locks are available with or without the deadbolt.

Mortise, Latch OnlyThis is a UL approved, ANSI standard mortise lock without a deadbolt. The privacy feature is not supported with this lockset.

Heavy Duty Cylindrical Latch BLAThis is a UL approved latch which installs in a standard prep for a cylindrical lock. Door thicknesses must be between 1-3/8” and 1-3/4”. Latches are available for 2-3/8”, 2-3/4”, 3-3/4”, and 5” backsets.

Mortise with Deadbolt/AFCThis is a UL approved, ANSI standard full mortise lock with a 1-inch25.4 mm deadbolt. This lockcase contains a monitor switch which connects directly to the AFC lockset inside trim. The deadbolt is projected by use of a thumb turn from the interior. The deadbolt may be retracted by the inside handle upon exit or the outside handle when a valid card is presented.

Mechanical Key Override

Important: This feature is not intended for everyday use. The basic philosophies of a access control system are key control and security. Provision for the mechanical key override is intended for limited usage by emergency and maintenance personnel. It is the responsibility of the site to maintain key issuance records and key control if this feature is implemented.

ILS locks offer the option of installing a mechanical key override in the lever. ILS locks currently support a 6-pin Schlage® knob-lock cylinder that is supplied by the customer.

Important: The mechanical key override should only be installed by qualified locksmiths. Before these cylinders can be used, the tail piece shipped with

30 — revision 1

Page 31: i Ls Lock Operation

ILS Lock Operation User Guide

the lock must be installed on the cylinder. For more information, refer to Appendix B: Install Mechanical Key Override in ILS Locks on page 113.

When the cylinder is operated by a mechanical key, the outside handle is unlocked in the same manner that a card unlocks it. The lock will record the use of the key in the audit trail.

Note: No cardholder data will be recorded in the audit trail when the key override is used.

To operate the key cylinder, rotate the key in a clockwise direction 1/4 (one-quarter) of a turn until it stops. Hold the key in this position, and then operate the handle. Release the key, return it to the original position, and then remove it from the cylinder.

State ChangesWhen the key is inserted in the lock, and turned to the unlocked position, the lock enters the Mechanical Key Override state and the Door Open by Key event is generated.

During the Mechanical Key Override state, the lock continues normal operation according to its mode, scheduled automatic changes, commands from the Mobile Configurator, OnGuard, special purpose cards, lock owner cards, standard cards, and the privacy switch (deadbolt position) with the following exceptions:

These events will be suppressed:

• Door Open From Inside

• Door Held Open

• Door Forced Open

These events are replaced by the Access Granted event:

• Granted Access Entry Made

• Granted Access No Entry Made

When the key is turned to the locked position, the lock exits the Mechanical Key Override state, an event is generated, and the lock continues normal operation according to its current mode.

Note: When the key is turned to the locked position, the door needs to be closed within the Door Held Open time. If door remains open, the Door Held Open event will be generated.

Warning ILS locking systems offer a high degree of security against surreptitious entry. Therefore the selection of the key cylinder hardware should include only high security cylinders that are resistant to picking and unauthorized key duplication. Failure to observe this rule will compromise the security of your lock system

revision 1 — 31

Page 32: i Ls Lock Operation

1: Introduction

Note: The mode of the lock may have changed during the Mechanical Key Override state. For example, if the lock is in the Mechanical Key Override state in the Card Only mode, and Latch monitoring is enabled.

Alternative Fire Code (AFC)

AFC is not a specific mode, but rather a set of configurable settings. These settings are used in countries such as Canada and Norway where the local fire code specifies that the lock must not lock automatically when the user enters or exits the room.

Important: Be sure to check with the local authorities to verify if this option is allowed within your jurisdiction.

HardwareAFC functionality is only available on locks specifically ordered for with this feature. The lockset used for AFC functionality utilizes a specific inside trim that includes a thumb turn. The mortise lockcase has a latch monitoring switch and detects when the door is opened. The circuit for this lock contains firmware specific to this functionality. AFC functionality, stated in the simplest terms, forces the trim to unlock any time the door is opened; the trim will not relock until the user takes a specific action to relock it, either by presenting a valid card (from outside the door) or by using the thumb turn (from inside the door).

AFC Lock SettingsThe following describes how the lock will behave based on these AFC settings in System Administration (OnGuard):

• If Unlock when exit is enabled, the lock will not automatically lock the door after user exits the room. The user must use the authorized credential in order to lock the door.

• If Unlock when enter is enabled, the lock will not automatically lock the door after the user enters the room.

• If the door is unlocked, the door will relock after a specified amount of time as configured in the Relock timer field.

• If Relock on deadbolt is enabled, and the door is unlocked, the lock will relock the door if deadbolt is engaged.

Note: If Relock on deadbolt is enabled, this does not alter the lock behavior associated with deadbolt monitoring.

32 — revision 1

Page 33: i Ls Lock Operation

ILS Lock Operation User Guide

Latch and Door Sensor MonitoringLatch or door sensor monitoring hardware must be present and monitored for the AFC settings to take effect.

• In order for lock to remain unlocked under AFC, the door must actually be opened (and remain open for specified period of time) first.

• In order for the Unlock on exit AFC function to take effect, the inside handle must be actuated followed by the latch or door sensor detecting the opening of the door.

• In order for the Unlock on enter AFC function to take effect, the door must be unlocked, then the outside handle must be actuated, following by the latch or door sensor detecting the opening of the door.

Maintenance

Clean the Reader Outer CoverThe proper way to clean the outer surface of the reader is to use a wet cloth and simply wipe the dirt away. The use of solvents, thinners, polishes, or abrasive cleansers may damage the reader finish, and possibly the reader electronics and mechanical components. Some chemicals may weaken or damage the plastic reader housing. If the facility is to be pressure washed with a chemical agent, it is recommended that the reader be completely covered prior to this task, such that the chemical agents will not damage the reader.

Clean the Magnetic Read Head (Magnetic Stripe Reader Only)

The read head is the internal portion of the reader that reads the signal from a magnetic stripe card.

To clean the read head, use a cleaning card made specifically for this purpose. Insert the cleaning card in the reader, and then remove the card. Repeat this process as necessary. This will remove dirt and minor oxidation from the surface of the read head, and improve performance. It is recommended the readers be cleaned as part of a regular maintenance cycle at least twice per year. If the area where the reader is installed is subject to extreme amounts of dust, humidity, or airborne debris, the reader may require cleaning more often.

Door Position and Monitoring

Door Sensor ContactDoor contact hardware may be installed to report the open or closed position of the door. For ILS offline and wireless locks these door states are recorded in the lock audit trail.

revision 1 — 33

Page 34: i Ls Lock Operation

1: Introduction

For ILS wireless locks this information is reported directly to OnGuard.

The door contact sensor connection accepts three (3) wire (C/NC/NO) door contacts.

Latch MonitoringA mortise equipped with the latch monitor will be able to report that the latch has engaged and the door is secure. For ILS offline and wireless locks, this status is recorded in the lock audit trail.

For ILS wireless locks this information is reported directly to OnGuard.

Note: Latch monitoring within ILS is supported only when it is installed with a latch monitoring mortise.

34 — revision 1

Page 35: i Ls Lock Operation

ILS Lock Operation User Guide

Lock Operating Environment

The lock operates with three (3) AA alkaline batteries. Operational parameters for AA alkaline batteries may vary. For more information, refer to the battery manufacture's standard for operating environment.

The operating temperature of a lock equipped with a magnetic card reader is from -35° C to + 75° C.

The operating temperature of a lock equipped an iCLASS reader is from -35° C to +65° C.

Lock Certifications

• FCC part 15

• RoHS

• CE

• UL10C

• IP46 iClass and 125Khz reader

• IP23 MAG readers

• Ontario Fire Code 3.3.4.5

• UL294 (pending)

revision 1 — 35

Page 36: i Ls Lock Operation

1: Introduction

36 — revision 1

Page 37: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 2: System Commissioning

Lock Installation

Door Preparation

For instructions to prepare doors and frames and the template on door preparation, refer to the template instructions specific to the type of lock you are installing.

Instructions are provided specific to the type of lock purchased, either ANSI mortise, BLA, or reader (magnetic or iCLASS proximity).

Important: Using an incorrect template can result in improper lock installation.

For pre-existing locks, depending on the condition of the previous lock, cover plates and/or wrap plates may be required to cover the existing door preparation.

Installation

After the door has been properly prepped, the lock can be installed.

Important: ILS locks should only be installed by technicians certified to install ILS locks.

Wireless Radio and Reader

Important: The batteries should not be installed into the lock until after all wiring connections have been done. The wireless radio module, readers, and rosette motor should all be connected before the batteries are installed. When you un-install these components, be sure to remove the batteries first.

When installing iCLASS or proximity readers (locks), be sure to allow 30 seconds for the lock to power up.

When installing the radio and reader, refer to the to the ILS Lock Component Installation & Upgrade Guide for proper installation practices and safety precautions.

revision 1 — 37

Page 38: i Ls Lock Operation

2: System Commissioning

Test the Locks

After you have connected all of the components and installed the batteries, test the lock for proper operation.

To verify proper lock operation, present an ILS construction card to the lock. For more information, refer to Construction Cards on page 13. The reader LED indication should turn green, the lock motor should actuate, and the motor actuation should be audible and distinctive. Make sure you can hear the motor actuate as this allows the handle to turn and engage the latch.

Lock Commissioning

Wireless GatewayFor ILS wireless locks, the wireless access points should be installed and commissioned using the instructions in Commission the ILS Wireless Gateway on page 86.

After the Wireless Gateway is installed and commissioned, you can add the Wireless Gateway to the OnGuard database.

Important: In order to preserve battery life, download the initial full lock configuration from OnGuard via the Mobile Configurator. Verifying all cardholders and access levels assigned to the lock prior to bringing the lock online will prevent lengthy downloads to the locks as the system is being brought online. This may also result in higher than normal battery drain in the initial stages of use.

Assign the LocksLocks can be assigned to either a Wireless Gateway for the ILS wireless locks or to an offline Mobile Configurator for the ILS offline locks.

All ILS locks should be configured in System Administration (OnGuard) with the following minimal settings prior to downloading to the lock.

• Lock name

• Reader type

• Card formats

• Cardholders

• Access levels

• Lock heartbeat (ILS wireless locks, only)

For ILS offline locks, all information is mandatory in order to ensure proper lock operation and cardholder experience.

38 — revision 1

Page 39: i Ls Lock Operation

ILS Lock Operation User Guide

Initialize the LocksRefer to Using the Mobile Configurator on page 45 for instructions on downloading the database to the Mobile Configurator and lock initialization.

After being initialized, the locks will join the associated Wireless Gateway. If the join process does not occur, and locks are not visible within OnGuard, refer to the section for Troubleshooting on page 97.

revision 1 — 39

Page 40: i Ls Lock Operation

2: System Commissioning

40 — revision 1

Page 41: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 3: Mobile Configurator

Description

The Mobile Configurator (MC) is the portable communication device used to transfer data between the OnGuard computer and the electronic lock. The Mobile Configurator is a maintenance and security tool that provides lock diagnostics and on-screen lock audit trail data. Use the Mobile Configurator to initially program all of the ILS offline and ILS wireless locks with a lock ID (Record number), clock time, and locking plans.

The Mobile Configurator application runs on Microsoft Windows Mobile 5.0 or later.

Note: Make sure to download and install the latest Windows Mobile Device Center Driver Update from the Microsoft web site.

The Mobile Configurator supports:

• 300 doors

• 100 ILS offline lock operators with unique passwords

• 1000 events per lock

• 5000 PP (Portable Programmer) events

• Languages: English, French and Spanish

29

revision 1 — 41

Page 42: i Ls Lock Operation

3: Mobile Configurator

Main Components

ConnectorsFor basic Mobile Configurator features and connections, refer to the Motorola MC70 User Guide.

Power AdapterThe power adapter is used to physically connect the Mobile Configurator to the lock. The Mobile Configurator communicates to the adapter via the serial port and the adapter plugs into the jack at the bottom of the keypad on the locks. The power adapter uses a Motorola MC70 serial cable to connect to the Mobile Configurator and a 2-wire communicator to connect to the lock.

The power adapter requires three (3) AA batteries to power up the lock when the lock battery is very low or has no power.

Connections

To the LockThe Mobile Configurator communicates with the lock serially using the Motorola MC70 pre-wired connector plug.

To connect the Mobile Configurator to the lock, complete the following steps:

1. Insert the power adapter plug into the jack on the bottom of the lock. Ensure the power adapter is connected to the Mobile Configurator.

2. Power on the Mobile Configurator and the power adapter, and then log onto the Mobile Configurator application.

3. Select the appropriate menu option. For more information, refer to Operator Logon on page 44.

42 — revision 1

Page 43: i Ls Lock Operation

ILS Lock Operation User Guide

To the Computer where OnGuard is RunningThe workstation running OnGuard must be installed with Active Sync version 4.0 which acts as communication interface between the computer and the Mobile Configurator. For the computer system requirements, refer to the Installation Guide.

All data files are transferred from the computer to the Mobile Configurator, and vice versa, using Active Sync.

For information on installing Active Sync, refer to the Motorola MC70 User Guide.

Setup and Configuration

Complete the instructions provided in your Mobile Configurator guide to configure the operating system and initialization settings. The following three (3) Mobile Configurator setup files are provided on the installation disc in the PP Application folder:

• Two (2) of the files have names beginning with “sqlce30.” These are the database files.

• One (1) of the files has a name that begins with “PPApp.”

To install these files, complete the following steps:

1. Copy the files into the synchronization folder of your Mobile Configurator using the ActiveSync application.

Important: Wait for ActiveSync to sync the files to the Mobile Configurator.

2. Click on the “sqlce30” files to install the database.

3. When the database installation is completed, click on the “PPApp” file to install the Mobile Configurator application.

You are now ready to download the lock configuration files from OnGuard.

revision 1 — 43

Page 44: i Ls Lock Operation

3: Mobile Configurator

Download the Lock Configuration File to the Mobile Configurator

OnGuard generates a PP application configuration data file containing the lock parameters. When a new lock configuration file has to be loaded to the Mobile Configurator, complete the following steps:

1. Connect the Mobile Configurator to a vacant USB port at a workstation where Microsoft ActiveSync, OnGuard, and Communication Server are running.

Important: If you are using the Mobile Configurator with OnGuard on a Windows XP or Windows 2003 system, the Communication Server must be run as an application.

2. Perform the appropriate steps in OnGuard to download and transfer the PPdata.txt file into the My Document folder (\My Document) on the Mobile Configurator.

Upload the Mobile Configurator Lock Audits File to OnGuard

When the Mobile Configurator lock operator executes the Upload operation, the Mobile Configurator application generates the PP and lock audits file in its My Document folder (\My Document). OnGuard automatically reads the audit file from the Mobile Configurator when it is connected to workstation running Communication Server. The files created on the Mobile Configurator are uploaded to OnGuard including:

• PPAudits.txt. •This is the PP (Portable Programmer) audit file containing the Mobile Configurator events.

• LockAudits.txt. •This is the lock audit file containing the lock events.

OnGuard deletes these files from the Mobile Configurator when the upload operation successfully completes in order to avoid the possibility of reading the same audit files again.

For more information about downloading or uploading from the Mobile Configurator, refer to the System Administration User Guide.

Lock Operators

Each lock operator can operate the Mobile Configurator application depending on the privileges specified for that operator in OnGuard.

Operator LogonWhen the PP data has been copied to the Mobile Configurator, start the PP Application (ILSPPApp) on the Mobile Configurator. If you are starting the

44 — revision 1

Page 45: i Ls Lock Operation

ILS Lock Operation User Guide

application for the first time, or after the data has been deleted, you must enter the unlock password into the system. The unlock password is “ilsppapp.”

Note: This is an additional security measure in case your Mobile Configurator is lost or stolen. The operator password is also required before the system can be used.

After entering the unlock password, the operator must enter their user name and password.

This user name is configured in OnGuard. For more information, refer to the System Administration User Guide to assign Mobile Configurator operators, passwords, and privileges.

If invalid operator logon information is entered a number of times, the software will deactivate itself and erase all data other than the PP database. If this occurs, a new PPData.txt file must be loaded onto the Mobile Configurator before another logon attempt can be made.

Using the Mobile Configurator

After logging onto the Mobile Configurator, select from the following menu options by using the touch screen to highlight the desired function:

• Initialize on page 46

• Update Lock on page 47

• Change Lock Mode on page 48

• Check Lock Mode on page 48

• Tests and Diagnostics on page 48

• View Lock Information on page 49

• Read Lock Audits (Events) on page 50

• Audits (Events) Menu Options on page 50

• Read Lock Audits on page 51

revision 1 — 45

Page 46: i Ls Lock Operation

3: Mobile Configurator

• View Lock Audits on page 51

• Open Lock on page 54

• Power Up on page 54

• Firmware Upgrade on page 55

• Network Join (ILS Wireless Lock Only) on page 55

• Send Heartbeats (ILS Wireless Locks Only) on page 55

InitializeThe lock can only be initialized when it is in factory mode. If the lock is in standard mode, it must be reset to factory mode. For more information, refer to Reset the Lock to Factory Configuration Mode on page 14. After it is initialized, all factory mode settings will be erased.

During the initialization process, a new System code and Lock ID (Record number) are written in the lock followed by the lock configuration parameters.

To initialize a lock, complete the following steps:

1. From OnGuard, download the required information to the Mobile Configurator. For more information, refer to the System Administration User Guide. Disconnect the Mobile Configurator and take it to the lock that needs to be initialized.

2. Connect the power adapter to the lock by inserting the plug into the jack on the bottom of the lock. Ensure the power adapter is connected to the Mobile Configurator.

3. Power on the Mobile Configurator and the power adapter, and then log onto the Mobile Configurator application. For more information, refer to Operator Logon on page 44.

4. Select Initialize from the Lock menu. The Initialize option is used to program the locks when they are first installed on the doors or when system settings have changed in OnGuard. During this process, the Mobile Configurator will download the lock identifier and system data, as well as the cardholder information, and time data.

5. All locks loaded into the Mobile Configurator will be displayed in the list; use the cursor keys to scroll through the list. Locks that have been initialized

46 — revision 1

Page 47: i Ls Lock Operation

ILS Lock Operation User Guide

or updated display with a check mark. Select the appropriate lock from the list, and then press <Enter>. When the data has been transferred to the lock, a message will be displayed confirming the lock was initialized successfully.

Important: Ensure you select the correct lock name from the list because the Mobile Configurator will then assign this name to the lock. Failure to select the correct lock name may result in unauthorized personnel having access to this area.

Update LockThe Update Lock function is used when changes have been made to the locking plan, the real-time clock (RTC) needs adjusting, or any other settings have changed which need to be communicated to the lock. This feature is different from the Initialize function in that it does not set the Lock ID (Record number), but reads the ID from the lock, and then loads the relevant information.

1. Connect the Mobile Configurator to a vacant USB port at a workstation where OnGuard is running.

2. Download the lock data from OnGuard to the Mobile Configurator. For more information, refer to the System Administration User Guide.

3. When the download is completed, disconnect the Mobile Configurator and take it to the lock you want to update.

4. Connect the power adapter to the lock by inserting the plug into the jack on the bottom of the lock. Ensure the adapter is connected to the Mobile Configurator. For more information, refer to Using the Mobile Configurator on page 45.

5. Power on the Mobile Configurator and the power adapter, and then log onto the Mobile Configurator application. For more information, refer to Operator Logon on page 44.

6. Select Update from the Lock menu, and then click [Update].

7. Disconnect the power adapter, and power off the power adapter and the Mobile Configurator.

revision 1 — 47

Page 48: i Ls Lock Operation

3: Mobile Configurator

Change Lock ModeThe Mobile Configurator allows the lock operator to change the mode of the lock. From the Lock menu, select Change Mode. On the Change Lock Mode window, select the mode of operation, and then click [Change].

Available lock operation modes include the following:

• Unlocked

• First Card Unlock

• Card Only

• Blocked Mode

• Facility Code Only

• Secured

• Unsecured

Check Lock Mode

The Mobile Configurator application can display the current operational mode of the lock. From the Lock menu, select Change Mode. On the Change Lock Mode window, click [Check].

Tests and DiagnosticsThe Mobile Configurator application allows you to perform several tests and diagnostics on the lock. System code and Lock ID validation is not available.

Prerequisite: Before running the tests, connect the power adapter to the lock.

• Battery Level . Use the Mobile Configurator to test the battery level of the lock. To run this test: Connect the power adapter to the lock. Select Battery Level from the menu. Click [Test Battery]. The Mobile Configurator will run the battery test and display the results. When the battery level is 18% or less, you should replace the batteries.

• LED. From the Lock menu, select Tests > LED. On the LED Test window, select Red LED or Green LED radio button, and then click [Test] to start the LED test.

48 — revision 1

Page 49: i Ls Lock Operation

ILS Lock Operation User Guide

• Buzzer. From the Lock menu, select Tests > Buzzer. On the Buzzer Test window, select the High Beep or Low Beep radio button, and then click [Test] to start the Buzzer test.

Note: Magnetic card readers do not support the buzzer test.

• Switch Test. From the Lock menu, select Tests > Switch. From the Switch Test window, click [Test] to start the switch tests.

The ILS lock has several switches that are used in their operation. These switches should be tested periodically to ensure proper function. To test the switches, connect the power adapter to the lock, and then select Switch Test from the menu. Choose from the following switch tests:

– Card - This test is used for locks with magnetic readers, only. Test by inserting a card.

– Latch Monitor - This test is used for ANSI Mortise units that have the latch monitoring feature. To test, press the latch monitor on the side of the mortise.

– Handle - Test this switch by turning the inside lever on the lock.– Privacy - Test this switch is tested by turning the thumb turn on the

inside trim if applicable. For more information, refer to Privacy (Monitor Deadbolt) on page 18.

– Clear - Test this switch by pressing the CLEAR button on the circuit board of the lock. Typically, this test is not required after the lock is installed and working.

– Key Override - Used to test the functionality of the key override switch if applicable to your installation. To test this switch, engage the key override to make the button available. For more information, refer to Mechanical Key Override on page 30.

– Door Sensor - This tests the magnetic sensor between the door and the frame. To test this, you must close and open the door.

View Lock Information

The View Info option displays the lock information. Ensure the power adapter is connected to the lock and then power on the Mobile Configurator. From the Lock

revision 1 — 49

Page 50: i Ls Lock Operation

3: Mobile Configurator

menu, select Tests > View Info. On the View Lock Info window, click [View Info].

Lock information includes:

• Manufacturing date and time

• Lock ID

• Firmware Version

• Hardware Version

• Serial No - serial number of the circuit board

• Lock Name

Read Lock Audits (Events)The Mobile Configurator communicates with the lock and gets the lock audit trail (lock events). At the end of data transfer, the Mobile Configurator application updates the RTC of the lock.

Audits (Events) Menu Options

Use the Audits menu options to read the lock or Mobile Configurator events, view the collected lock or Mobile Configurator events, and upload the events to OnGuard.

50 — revision 1

Page 51: i Ls Lock Operation

ILS Lock Operation User Guide

Read Lock Audits

To read the events at the lock or wall reader, connect the power adapter to the lock, power on the Mobile Configurator. From the Audits menu, select Read Audits, and then click [Read] to perform the operation.

When read audits operation is completed, you can view the lock events on the Mobile Configurator or upload the events from the Mobile Configurator to OnGuard.

View Lock Audits

This option allows for fast viewing of the events that have been read from the lock directly onto the Mobile Configurator. From the Audits menu, select View

revision 1 — 51

Page 52: i Ls Lock Operation

3: Mobile Configurator

Audits > View Lock Audit Filter. You can filter the date range to show only the lock events for the period of time you want to view.

Click [View Audits] to perform the operation.

View PP (Mobile Configurator) Audits

After the audits are read, use the View Lock Audit option to fast view the Mobile Configurator events that have been collected from the lock directly onto the Mobile Configurator. From the Audits menu, select View Audits > View PP

52 — revision 1

Page 53: i Ls Lock Operation

ILS Lock Operation User Guide

Audits. You can filter the date range to show only the Mobile Configurator events for the period of time you want to view.

Upload Lock Audits

From the Audits > Upload Audits menu, select Upload Lock Audits. Click [Upload] to perform the operation.

Upload PP Audits

From the Audits > Upload Audits menu, select Upload PP Audits. Click [Upload] to perform the operation.

revision 1 — 53

Page 54: i Ls Lock Operation

3: Mobile Configurator

Open LockThe Mobile Configurator is able to open the lock from outside in case there is a low battery or battery dead condition.

Power UpThe Mobile Configurator is able to power up the lock from outside in case there is a low battery or battery dead condition.

54 — revision 1

Page 55: i Ls Lock Operation

ILS Lock Operation User Guide

Firmware UpgradeThe Mobile Configurator is able to upgrade the lock firmware. Select Device Type ICLASS, ACU, MIFARE, AWID, or WLM. Click [Browse] to navigate to the lock you want to upgrade. Click [Upgrade].

• Lock information

When this option is selected, the Mobile Configurator reads the number of cardholders stored in the lock, the firmware version of the ACU, and the current date and time of the lock.

– Read Openings– Update RTC

The Production test key will be read from the lock and displayed on the Mobile Configurator.

Network Join (ILS Wireless Lock Only)The Network Join option sends the command to the radio module of the ILS wireless lock signaling the radio module to join its associated Wireless Gateway. For more information, refer to Network Join on page 57.

1. From the Tools menu, select WLM Diagnostics > Network Join.

2. Click [Join].

Send Heartbeats (ILS Wireless Locks Only)When the heartbeat command is issued by the lock operator, the application communicates with the lock and sends the command to lock.

After successful communication with the lock, a message is displayed on the Mobile Configurator, communication with lock is ended, and a Mobile Configurator event is recorded.

If there is any communication error before the end of the operation, or the configurable timeout period occurs, the Mobile Configurator will display an error message. For more information, refer to Lock Heartbeat on page 56.

revision 1 — 55

Page 56: i Ls Lock Operation

3: Mobile Configurator

Mobile Configurator MaintenanceFor information on maintaining the Mobile Configurator, refer to the Mobile Configurator owner’s manual.

Wireless Functionality

Wireless ConnectivityThe ILS wireless lock can operate and communicate back to the OnGuard system wirelessly. Wireless communication to the OnGuard requires an ILS Wireless Gateway, also know as the Wireless Gateway, and an ILS lock equipped with an ILS 900 MHz radio module.

Main Components• Lock Radio

• Wireless Gateways:

– Wireless Access Point (Ethernet 10/100)– Wireless Access Point (Wi-Fi 802.11)– Power-over-Ethernet (PoE) Wireless Access Point (Ethernet 10/100))

DescriptionA proprietary 900 MHz radio module is used to provide communication from the ILS wireless lock through the Wireless Gateway to the OnGuard.

Lock Radio

Installation

For more information on the installation the wireless lock radio, refer to section Upgrade/Replace the Radio on page 103 or refer to the ILS Lock Component Installation & Upgrade Guide.

Lock Heartbeat

A lock heartbeat is the amount of time each lock remains in non-host communication. During this time the lock ACU does not receive updates from OnGuard.

After the lock heartbeat interval elapses, the lock radio will wake up and poll the Wireless Gateway for any updates. If updates are present, the information is transferred to the lock ACU and stored.

Each heartbeat of the lock is configurable on a per-lock basis in OnGuard and can be selected from 1 minute to 24 hours.

56 — revision 1

Page 57: i Ls Lock Operation

ILS Lock Operation User Guide

Note: Optimum heartbeat time has been established to be approximately five (5) minutes providing maximum battery life, quick response, and updates to the locks.

For more information on configuring the lock heartbeat, refer to the System Administration User Guide.

Wireless Connectivity

Prior to each lock radio joining the network, the wireless access points must be commissioned and configured. For more information, refer to Wireless Gateway on page 83.

Network Join

After the lock data has been downloaded to each Wireless Gateway, all locks can be initialized via the Mobile Configurator (if not done so previously) with the appropriate Lock ID (Record number). Each lock must then be commanded to join the Wireless Gateway it has been assigned to using the Network Join command. The Network Join command can be sent by performing any of the following actions:

1. From the Mobile Configurator, send the Network Join command to lock. For more information, refer to Network Join (ILS Wireless Lock Only) on page 55.

2. Present the Network Join card.

3. Press the Reset button on the lock radio unit for approximately three (3) seconds.

4. Perform a Power Cycle/Reset.

Note: Power Cycle/Reset occurs when the lock power source is removed and then replaced.

Visual Feedback

• Successful Join

Visual feedback indicating a successful join to the network is provided to the user in the following location:

– On the inside trim, the radio module - flashing green LED. The inside trim must be removed for these LEDs to be visible.

• Failed Join

Visual feedback indicating a successful join to the network is provided to the user in the following location:

– On the inside trim, the radio module - flashing red LED. The inside trim must be removed for these lights to be visible.

revision 1 — 57

Page 58: i Ls Lock Operation

3: Mobile Configurator

• Connectivity Loss

The lock may use communication to the access point due to the Wireless Gateway going offline. The Wireless Gateway going offline may be caused by an extended power loss to the access point or some other issue. The lock will attempt to rejoin the wireless access point for a period of two (2) heartbeat cycles. If the lock is unsuccessful in rejoining its wireless access point, the lock will enter the offline state. After the wireless access point has been restored, the lock must rejoin the network via the actions described in Network Join on page 57.

• Poor/No Connectivity

A RF site survey should be performed prior to the installation of the wireless access point to verify its connectivity level to each lock position. The survey should confirm the ability of each lock radio, in its install position, to join the wireless access point. If the lock radio continues to experience poor or no connectivity, you may need to install and test an additional wireless access point to improve the network connectivity of each radio.

58 — revision 1

Page 59: i Ls Lock Operation

ILS Lock Operation User Guide

ILS Wireless Lock Radio LED Indications

The ILS wireless lock radio has two (2) LEDs that are used for indicating the joining status:

• LED 1 is located next to the 8-pin connector J4 on the antenna side of the board.

• LED 2 is located next to the push button SW 1 on the antenna side of the board.

ILS Wireless Lock Radio LED Indicators

Description Only Occurs If Wireless Gateway is Found

LED 1 LED 2 Lock Front LED

Lock radio is searching for a Wireless Gateway.

Flashes ORANGE RED

Lock radio was able to find its associated Wireless Gateway.

GREEN RED

Lock radio was unable to find its associated Wireless Gateway.

RED RED Flashes RED. This indication occurs if the lock radio is unable to find a Wireless Gateway on any of the 26 RF channels. Prior to this, lock radioLED 1 will have flashed ORANGE approximately 55 times.

Lock radio and Wireless Gateway link quality is good.

GREEN Flashes GREEN

Lock radio and Wireless Gateway cannot establish link quality.

RED Flashes RED

Join was successful.

GREEN

Stays ON for approximately 3 seconds, and then turns OFF.

GREEN

Stays ON for approximately 3 seconds, and then turns OFF.

Flashes GREEN indicating “Join success.”

revision 1 — 59

Page 60: i Ls Lock Operation

3: Mobile Configurator

Wireless Features

All ILS Mobile Configurator functions can be performed from OnGuard with the addition of a Wireless Gateway and a lock radio. Each lock must have its own wireless radio installed to communicate with OnGuard via the Wireless Gateway. Each Wireless Gateway supports up to 32 locks equipped with a wireless radio.

For the Mobile Configurator functionality available through wireless connectivity, refer to Using the Mobile Configurator on page 45.

Join failed - Poor RF quality.

RED

Stays ON for approximately 3 seconds, and then turns OFF.

RED

Stays ON for approximately 3 seconds, and then turns OFF.

Flashes RED indicating “Join failure.”

ILS Wireless Lock Radio LED Indicators

Description Only Occurs If Wireless Gateway is Found

LED 1 LED 2 Lock Front LED

60 — revision 1

Page 61: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 4: Site Planning for a Wireless Installation

This section provides guidelines for planning the installation of ILS wireless components on a site. For more information, refer to ILS Wireless Components Overview on page 62. It outlines a step-by-step procedure for site planning, giving you pointers on how to determine the number of Wireless Gateways required, and where to locate them, to yield adequate wireless coverage to the desired areas on a site.

1. Obtain a Floor Plan on page 63.

2. Identify the Wireless Lock Locations on page 63.

3. Determine Potential Wireless Gateway Locations on page 63.

a. Power and TCP/IP Network Access for the Wireless Gateway on page 64.

b. Mounting Feasibility on page 64.

c. Wireless Gateway Antenna Orientation on page 64.

d. Wireless Gateway Mounting Height on page 65.

e. Relative Positioning of a Wireless Gateway and Its Locks on page 67.

4. Perform the Site Survey on page 77.

a. Visual Inspection of the Site on page 77.

b. Scan the RF Spectrum on the Site on page 78.

When the determining the location of the Wireless Gateway and its locks, several other factors should be considered:

• Basic Propagation Mechanisms on page 69

• Multipath Fading on page 71

• ILS Wireless Range Inside Buildings on page 72

• Impact of Obstructions on page 75

In addition, specialized tools may be used during the site survey to identify any sources of RF interference on the site. For more information, refer to Scan the RF Spectrum on the Site on page 78.

Finally, information is provided for choosing the RF-related configuration settings such as the ILS Wireless Channel Plan table on page 79.

revision 1 — 61

Page 62: i Ls Lock Operation

4: Site Planning for a Wireless Installation

ILS Wireless Components Overview

62 — revision 1

Page 63: i Ls Lock Operation

ILS Lock Operation User Guide

Installation Planning

The objective of RF installation planning is to arrive at a preliminary ILS wireless network layout for the site. The preliminary layout should provide the following information:

• Areas on the site where you want wireless coverage

• Number of Wireless Gateways required to provide the wireless coverage

• Placement of Wireless Gateways to facilitate the wireless coverage

• Mapping between the wireless locks and Wireless Gateways

• Wireless configuration settings

The preliminary layout can then be used for either of the following:

• Quoting an ILS wireless installation job

• As a baseline for the actual installation of an ILS wireless system

Obtain a Floor PlanThe first step in planning the installation is to obtain a copy of the site floor plan. A good floor plan is:

• Drawn to a known scale.

• Depicts position of rooms, hallways, stairwells, etc.

• Identifies equipment rooms, elevator hoists, IT closets, steel doors, firewalls, and HVAC ducts.

• Specifies wall finishes and composition.

Note: If a detailed floor plan is not available for the site, you can use a copy of the site fire escape plan; many commercial building have these. Expand the fire escape plan by filling in the details described here for a good floor plan.

Identify the Wireless Lock LocationsOn the floor plan, mark all doors where the ILS wireless locks are to be installed, including doors which can potentially be upgraded to wireless locks at a later stage. These identified locations define the desired coverage area for low-power wireless communication.

Determine Potential Wireless Gateway LocationsTo facilitate the desired wireless coverage to the locks, as identified in the previous step, determine the Wireless Gateway locations based on the following factors:

• Power and TCP/IP Network Access for the Wireless Gateway on page 64

• Mounting Feasibility on page 64

• Relative Positioning of a Wireless Gateway and Its Locks on page 67

• ILS Wireless Range Estimates on page 72

revision 1 — 63

Page 64: i Ls Lock Operation

4: Site Planning for a Wireless Installation

Power and TCP/IP Network Access for the Wireless Gateway

ILS Wireless Gateways are available in three (3) variations and, depending the on the Wireless Gateway type, the following should be ensured:

• Ethernet Wireless Gateway: Ensure that both Ethernet and AC power outlets are accessible.

• PoE Wireless Gateway: Ensure that a PoE compliant network outlet is accessible. The PoE Wireless Gateway derives power from a PoE outlet, so there is no need for a separate power wiring.

• Wi-Fi Wireless Gateway: Ensure there is Wi-Fi infrastructure on the site and AC power outlets.

Mounting FeasibilityWireless Gateways are designed such that they can be mounted either on a ceiling, wall, or vertical post. However, the selected Wireless Gateway locations should allow for the mounting of Wireless Gateways such that the Wireless Gateway antennae are clear of metal obstructions near-by. If a particular building code mandates protective enclosure (such as NEMA enclosures) for electronic equipment, make sure that Wireless Gateway antennae are fully exposed. Preferably, a Wireless Gateway antenna should be in the line of sight of as many associated doors as possible.

Wireless Gateway Antenna OrientationAntenna orientation determines the polarization of radio waves. Polarization refers to the direction of the electric field, and is an important characteristic that affects the signal reception. In case of ILS wireless components, polarization is simply the orientation of the antenna whip. An antenna whip that is perpendicular to the earth’s surface produces vertically polarized waves. In order to achieve maximum range the transmitter and receiver antennas should be oriented with the same polarization. If they are not oriented in the same polarization, a certain amount of power is lost due to this mismatch.

The radio module on an ILS wireless lock is mounted with fixed vertical polarization. Therefore, to achieve maximum range between wireless locks and a Wireless Gateway, the antenna on the Wireless Gateway should always be positioned such that it is perpendicular to the earth’s surface.

Wireless Gateways come equipped with a ½-wave dipole antennae with articulating base. This allows the antenna to tilt 90º and rotate 360º. Because of this feature, a Wireless Gateway can be mounted with the optimal antenna orientation (vertical) on a wall, ceiling, or vertical post. Wireless Gateways mounted just below ceiling girders or just above a drop ceiling, with antenna protruding outside the drop ceiling, usually provide the best coverage.

64 — revision 1

Page 65: i Ls Lock Operation

ILS Lock Operation User Guide

Ceiling-mounted Wireless Gateway

Wall-mounted Wireless Gateway

Wireless Gateway Mounting HeightThe Wireless Gateway mounted on the ceiling, with vertically oriented antenna visible from associated locks is an ideal Wireless Gateway placement. However this may not always be feasible. If a Wireless Gateway needs to be mounted on a wall, special attention should be paid to mounting height, the higher the height of a wall mounted Wireless Gateway the better. A Wireless Gateway mounted at a higher elevation would have longer line-of-sight distance, and reduced effects of obstructions on the floor, resulting better wireless coverage.

An exception to the recommendation is a building with a very high ceiling. In such buildings, Wireless Gateway elevation should not exceed 20 – 25 feet.

revision 1 — 65

Page 66: i Ls Lock Operation

4: Site Planning for a Wireless Installation

Otherwise, if the Wireless Gateway elevation is too high, it may cause higher free space propagation loss, which in turn may degrade the overall wireless coverage.

At the minimum, a wall mounted Wireless Gateway should be at an elevation higher than that of locks on the same floor.

66 — revision 1

Page 67: i Ls Lock Operation

ILS Lock Operation User Guide

Relative Positioning of a Wireless Gateway and Its Locks

Wireless Gateways come equipped with Omni-directional antennae. This means the antenna radiates RF signals with equal gain in all directions. The following diagram shows the radiation pattern of an Omni-directional antenna:

Due to the Omni-directional radiation pattern, it is preferable to place the Wireless Gateway in the middle of its associated locks to maximize the usage of the available wireless coverage from a Wireless Gateway. For the same reason, placing a Wireless Gateway along an exterior wall is not preferred because a too much of the antenna energy will be radiated outside of the building.

revision 1 — 67

Page 68: i Ls Lock Operation

4: Site Planning for a Wireless Installation

Wireless Gateway Mounted in the Middle of the Associated Locks

Wireless Gateway Mounted on an Exterior Wall

68 — revision 1

Page 69: i Ls Lock Operation

ILS Lock Operation User Guide

Estimating Wireless Range

Achievable wireless range is the most important factor in determining Wireless Gateway locations. Even though the theoretical radiation pattern is Omni-directional, the achievable range, in practice, in different directions will be different and will depend on manifold factors. Below are some of the factors that affect wireless range in indoor environments:

• Free-space propagation loss

• Attenuation due to building materials

• Attenuation due to occupants (transient)

• Multipath fading

In-building wireless propagation is notoriously difficult to predict. Because of the above mentioned factors, every building presents a unique RF propagation environment, and the achievable wireless range can vary significantly from one building to another. The following subsection presents the guidelines that can be used for estimating the wireless range, for planning purposes, within a building for which a detailed floor plan is available. Note that the range estimates derived by the use of these guidelines are for planning purposes only and the actually range can vary widely from these estimates.

Basic Propagation MechanismsThe following describes basic mechanism for radio wave propagation:

Free-Space Propagation

A fundamental model of radio wave propagation is the free-space propagation model, which is used to predict range when the transmitter and receiver have a clear, unobstructed line-of-sight path between them. According to free-space model, propagation loss is proportional to the square of the distance from the transmitter, and also to the square of the frequency of radio signal. Because ILS operates on 902-928MHz band, losses due to frequency will be same for the whole band. Satellite communication systems and microwave line-of-sight radio links typically undergo free-space propagation.

The indoor radio propagation rarely follows the simple free-space model. The indoor propagation is impacted by three basic mechanisms:

Reflection

Reflection occurs when a propagating radio wave strikes upon an object which has very large dimensions, as compared to the wavelength (33cm for the ILS lock radios) of the propagating wave. Inside buildings reflection may occur from walls, floor, ceiling, doors, etc. Reflection is prominent from metallic materials as they reflect back all incident energy. Non-conducting materials reflect back

revision 1 — 69

Page 70: i Ls Lock Operation

4: Site Planning for a Wireless Installation

only part of the incident energy, absorb and dissipate (as heat) part of the energy, and transmit across the remaining energy.

70 — revision 1

Page 71: i Ls Lock Operation

ILS Lock Operation User Guide

Diffraction

Diffraction occurs when the path between the transmitter and the receiver is obstructed by a sharp edge such as door edges. Diffraction (bending of wave) happens when a radio wave strikes the door surface edge.

Scattering

Scattering occurs when the medium through which the wave travels consists of objects with dimensions that are smaller compared to the wavelength of the propagating wave. Scattered waves are produced by small objects, rough edges, and other irregular obstructions.

Multipath FadingIn an indoor environment, all the above described mechanisms combine, in some form, with the free-space propagation and determine the overall propagation loss between the transmitter and receiver.

The impact of different propagation mechanisms is that radio waves from the transmitter reach the receiver via multiple paths. These multiple RF signals then combine in the receiver antenna to produce the signal received and processed by

revision 1 — 71

Page 72: i Ls Lock Operation

4: Site Planning for a Wireless Installation

the receiver. The received signal strength varies from point to point because it depends on phases and amplitude of the arriving signals.

Multipath fading is observed pre-dominantly in confined spaces with smooth metal walls and other reflective surfaces. Typical examples include small enclosed rooms, stairwell, underground pathways, and tunnels. The implication of multipath fading is that it may result in “dead spots” where signal is non-existent. Also, these dead spots cannot be predicted by analyzing a detailed floor plan. However, during the actual installation, moving the Wireless Gateway only a few inches can change the reception from no signal to a full signal.

ILS Wireless Range Inside BuildingsILS radios, on the lock and the Wireless Gateway, can be configured for one of the four available RF output power settings. The following table shows the range estimates for the different power levels. 10dBm setting is the default value and recommended power level for the lock radios, as it offers the best trade-off between battery life and wireless range. For the Wireless Gateway, the power level default is the maximum level, 15dBm because the Wireless Gateway does not operate on batteries.

ILS Wireless Range Estimates

RF Output Power Settings

Open Space (line-of-sight) in Feet

In-building (line-of-sight) in Feet

0 dBm 100 35

5 dBm 160 55

10 dBm 320 100

15 dBm 470 150

72 — revision 1

Page 73: i Ls Lock Operation

ILS Lock Operation User Guide

Note: These range estimates are theoretical and do not account for the complex propagation mechanisms discussed above. It is not possible to arrive at a single estimate for the indoor range while accounting for various propagation effects that are highly dependent upon the path between the transmitter and the receiver. Nonetheless, they provide decent baseline estimates for planning purposes.

The potential Wireless Gateway mounting location should be inspected for accessibility in case of servicing.

Important: The location of the Wireless Gateways and ILS wireless and offline locks should always be updated on the building and site floor plans.

Examples follow of indoor range numbers for ILS wireless system in real world deployments:

• ILS range in hallways: With RF output power at the lock radio set to 10dBmand the building constructed of sheetrock with steel studs, the observed range was 92 feet. Refer to the diagram ILS Range in Hallways on page 74.

• ILS range with wall obstructions: With RF output power at the lock radio set to 10dBmand the building constructed of sheetrock with steel studs, the observed range with six (6) intervening walls was 54 feet. Refer to the diagram ILS Range with Wall Obstructions on page 74.

revision 1 — 73

Page 74: i Ls Lock Operation

4: Site Planning for a Wireless Installation

ILS Range in Hallways

ILS Range with Wall Obstructions

74 — revision 1

Page 75: i Ls Lock Operation

ILS Lock Operation User Guide

Impact of ObstructionsWhen a radio wave encounters an obstruction, part of its energy is absorbed by the obstruction, a portion of it is reflected back, and the remaining energy is allowed to pass thorough the obstruction. In effect, a radio signal gets attenuated by the obstruction. The level of the signal attenuation depends on the type and thickness of the material that obstructs the wave.

Note: This document assumes that the obstructions extend up to a building's ceiling.

The following table provides the amount of attenuation induced by different types and thicknesses of commonly used building materials. The attenuation caused by the obstructions will reduce the wireless range. A range reduction factor (Fr) is also included which can be multiplied with either the range

observed in a corridor of the same building (if available) or the theoretical indoor range estimates given in the ILS Wireless Range Estimates table on page 72 to obtain the estimate of the range with obstructions.

Attenuation Caused by Building Materials

Obstruction Material (t)

Thickness (mm)

Attenuation (dB)

Range Reduction Factor (Fr)

DryWall 6 -0.3 0.96

13 -0.3 0.96

16 -0.3 0.96

revision 1 — 75

Page 76: i Ls Lock Operation

4: Site Planning for a Wireless Installation

When there is more than one type of obstruction, and more than one obstruction of each type, use the following equation to obtain the estimate for range with obstructions:

Where:

RO is the estimated range with obstructions.

Plywood dry 6 -0.4 0.95

13 -0.5 0.94

19 -0.7 0.91

32 -1.3 0.85

Glass 6 -0.7 0.91

13 -2.0 0.77

19 -3.0 0.68

Lumber dry 38 -2.7 0.71

76 -2.5 0.73

114 -3.4 0.65

152 -5.7 0.48

Brick 89 -3.3 0.66

178 -5.1 0.52

267 -6.4 0.44

Masonry block 203 -11.3 0.24

406 -16.9 0.12

610 -27.7 0.03

Plain concrete 102 -13.0 0.18

203 -26.3 0.03

305 -39.3 0.01

Reinforced concrete (1%) 203 -26.5 0.03

Non-reinforced concrete 203 -26.8 0.03

Reinforced concrete (2%) 203 -29.5 0.03

Attenuation Caused by Building Materials

Obstruction Material (t)

Thickness (mm)

Attenuation (dB)

Range Reduction Factor (Fr)

76 — revision 1

Page 77: i Ls Lock Operation

ILS Lock Operation User Guide

RNO is the range with no obstructions. This could either be a range estimate from

the ILS Wireless Range Estimates table on page 72 or the measured range in a corridor of the same building.

Fr (ObsTypt) is the range reduction factor for the obstruction of type t. So if t is

Drywall (16mm), then look up the range reduction factor (Fr) for Drywall

(16mm), and then substitute this variable with that value.

nt is the number of obstructions of type t. If there are 3 Drywalls (16mm), then nt

for t = Drywall (16mm) will be 3.

Obstructions to Avoid

As seen in the Attenuation Caused by Building Materials table on page 75, the following types of obstructions cause significant signal attenuation:

• Masonry block

• Plain concrete

• Non-reinforced concrete

• Reinforced concrete (1%)

• Steel

Important: Wherever possible, Wireless Gateway locations should be chosen such that the obstructions that present significant attenuation of signals do not fall in between the Wireless Gateway and its associated locks. It is important to avoid these obstructions whenever possible, not only because they unnecessarily dissipate a lot of RF energy, but also because the actual range in such situations can vary widely from the estimates.

Perform the Site Survey

After arriving at the preliminary network layout through the off-site installation planning, a site survey must be performed for fine tuning each Wireless Gateway's placement and wireless configuration settings.

The following subsection outlines the steps that should be performed during the site survey.

Visual Inspection of the SiteBefore proceeding with the RF spectrum scanning, visually inspect the site for validating the preliminary layout. Below are some of the considerations that should be made during the visual inspection:

Walk through the building to take note of RF obstacles that are usually not depicted by floor plans. Below are some of the examples:

• Metal racks

• Filing cabinets

revision 1 — 77

Page 78: i Ls Lock Operation

4: Site Planning for a Wireless Installation

• Metal partitions

• Refrigerators

• HVAC ducts

• Transformers and other heavy electrical equipment should be avoided altogether

• Inspect the potential Wireless Gateway mounting locations for accessibility.

Update the preliminary network layout based on the findings from visual inspection.

Scan the RF Spectrum on the SiteFor reliable operation of any kind of wireless system, RF interference from other external wireless systems should be avoided. It is therefore important to identify and locate other 900 MHz wireless systems operating on the site.

The following includes examples of wireless devices that may interfere with ILS wireless operation:

• 900 MHz cordless phones

• 900 MHz wireless headsets - such as wireless headsets from Plantronics

• Fire and security alarm systems operating at 900 MHz band

• Wireless Meter Reading systems operating at 900 MHz band

The following includes examples of wireless devices that do not interfere with the ILS wireless system:

• Microwave ovens operating at 2.4GH

• Wi-Fi network and access points operating at 2.4 GHz

• Cordless phones operating at 2.4 GHz and 5 GHz - Most of the cordless phones in use today.

• Security and fire detection systems operating at 315, 433 MHz - Many wireless fire and security systems operate at this frequency.

Important: If Wi-Fi Wireless Gateways are used in the system, care must be taken to avoid interference from 2.4 GHz wireless devices. Wi-Fi Wireless Gateways operate at 2.4GHz.

To find the channels occupied by other wireless systems, or any other RF interference that may be present, use a hand-held RF signal strength analyzer at

78 — revision 1

Page 79: i Ls Lock Operation

ILS Lock Operation User Guide

the site.The Protek 3290N is an example of a hand-held RF signal strength analyzer:

Some of the key specifications for this analyzer include:

• Hand-held and battery operated

• 100 KHz - 2900 MHz measurement range

• High sensitivity (-117dBm maximum)

• Detects wide-band and narrow-band FM, AM, and single side-band signals

• Detachable antenna

The signal strength analyzer can be programmed to scan multiple channels at a time to detect the presence of an external RF device. For information on programming the analyzer to scan the ILS wireless channels for interference, refer to the analyzer’s instruction manual. The following table presents the channel plan for the ILS wireless devices:

ILS Wireless Channel Plan

ISM Band 902 - 928 MHz

Maximum RF output power 15 dBm

Maximum duty cycle No restriction

6 dB BW > 500 KHz

Baud rate 76 Kbps

Channel spacing (KHz) 1000

revision 1 — 79

Page 80: i Ls Lock Operation

4: Site Planning for a Wireless Installation

After programming the analyzer with the center frequencies for the ILS channels, the RF spectrum in the vicinity of all potential Wireless Gateway locations should be scanned for the presence of an interference. Channels on which the signal level is found to be above 70dB should be marked as occupied.

Frequency Band 902 MHz - 928 MHz

Channel Center Frequency

1 902.500

2 903.500

3 904.500

4 905.500

5 906.500

6 907.500

7 908.500

8 909.500

9 910.500

10 911.500

11 912.500

12 913.500

13 914.500

14 915.500

15 916.500

16 917.500

17 918.500

18 919.500

19 920.500

20 921.500

21 922.500

22 923.500

23 924.500

24 925.500

25 926.500

26 927.500

80 — revision 1

Page 81: i Ls Lock Operation

ILS Lock Operation User Guide

In the following example, a signal analyzer was used to detect RF interference. The red indicates the -75dBm interference threshold.

Important: To avoid RF interference, the ILS Wireless Gateways should not use channels that are occupied.

revision 1 — 81

Page 82: i Ls Lock Operation

4: Site Planning for a Wireless Installation

82 — revision 1

Page 83: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 5: Wireless Gateway

Description

In OnGuard, the ILS Wireless Gateway is treated as an access panel. The ILS Wireless Gateway is a special type of Wireless Access Point (WAP) used to facilitate communication between a wireless-enabled ILS lock and OnGuard.

Communication from the Wireless Gateway is bi-directional as information is passed from the ILS lock through the Wireless Gateway to OnGuard and from OnGuard through the Wireless Gateway to the ILS lock.

There are two (2) versions of the Wireless Gateway:

• Ethernet 10/100

• Wi-Fi

Each Wireless Gateway supports up to 32 ILS wireless locks. Support of 32 ILS wireless locks is dependent on the placement of the Wireless Gateway in relationship to the wireless lock and the building construction.

revision 1 — 83

Page 84: i Ls Lock Operation

5: Wireless Gateway

Wireless Gateway (Ethernet)

The wireless Ethernet Wireless Gateway transfers TCP/IP packets to OnGuard on the network using wired (10/100 BaseT) communications.

1. 900Mhz antenna

2. Ethernet Wireless Access Point

3. 5V power cable

4. 900Mhz antenna connection

5. OnGuard Communication - Wireless Gateway has established connection to OnGuard.

6. Wireless Network Traffic - Denotes data transfer to and from the lock and the Wireless Gateway.

7. Ethernet Traffic - Denotes data transfer to and from the Wireless Gateway and OnGuard.

8. Ethernet Link - Denotes Wireless Gateway connection to the network.

9. Power

10. Connection for 5V power

11. Connection for RS-485

12. Connection for USB cable

13. Connection for Ethernet cable

84 — revision 1

Page 85: i Ls Lock Operation

ILS Lock Operation User Guide

Wireless Gateway (Wi-Fi)

The wireless (Wi-Fi) Wireless Gateway transfers TCP/IP packets to OnGuard on the user's network using wireless (802.11b/g) communications.

1. 900Mhz antenna

2. Wi-Fi antenna

3. Wi-Fi wireless gateway

4. 5V power cable

5. 900Mhz antenna connection

6. OnGuard communication

a. Wireless Gateway has established connection to head end software

7. Wireless network traffic

a. Denotes the data transfer to and from the lock and the Wireless Gateway

8. Wi-Fi Traffic

a. Denotes the data transfer to and from the Wireless Gateway and OnGuard

9. Wi-Fi Link

a. Denotes the Wireless Gateway connection to the network

10. Power

11. Connection for 5Vpower

12. Connection for RS-485

13. Connection for USB cable

14. Wi-Fi antenna connection

revision 1 — 85

Page 86: i Ls Lock Operation

5: Wireless Gateway

Commission the ILS Wireless Gateway

Each ILS Wireless Gateway ships from the factory with an installed SSL certificate and DHCP enabled.

The Wireless Gateway must be commissioned with a unique IP address to allow OnGuard to configure the Wireless Gateway on the network.

Commissioning of the Wireless Gateway requires the following components:

• Computer with terminal emulation software that can access the USB port

Note: HyperTerminal is available with Windows Server 2003 or earlier. If you are using a later version of Windows, you can download a terminal emulation program. Free are available that emulate most common terminals.

• USB cable

• The proper serial port emulator (driver) - A serial port emulator (CDM20600.exe) is provided on the Supplemental Materials disc. Install the emulator to recognize the Wireless Gateway by mapping the USB connection to the USB serial port.

• Power supply to the Wireless Gateway (provided with the Wireless Gateway)

• Network connection to the Wireless Gateway

Assign a Wireless Gateway IP Address

All Wireless Gateways are shipped from the factory with DHCP enabled.

Prerequisites:

The method used to assign Wireless Gateway IP addresses depends on the type of network where the Wireless Gateway is being installed:

• If the network uses static IP addressing (non-DHCP), follow the instructions in Assign an IP Address (Wi-Fi and Ethernet) on page 87.

• If the network uses DHCP, follow the instructions in Automatic IP Address Assignment (Ethernet Only) on page 86.

Automatic IP Address Assignment (Ethernet Only)

1. Contact your site network administrator to request a DHCP reservation based on each of the Wireless Gateway MAC addresses. The MAC address

86 — revision 1

Page 87: i Ls Lock Operation

ILS Lock Operation User Guide

is a 12-digit physical address on the label attached to the bottom of the Wireless Gateway. In this example: 00:40:9d:3c:54:7d

Note: Compile a list of the each Wireless Gateway MAC address and its associated IP address assigned in the reservation. You will need this information in order to configure the IP address for each Wireless Gateway in OnGuard.

2. Install the Wireless Gateway by connecting the Wireless Gateway to the network using a standard Ethernet cable.

3. Apply power to the Wireless Gateway by connecting the power supply to the Wireless Gateway, and then plug the power supply into an AC outlet. The network will automatically assign the Wireless Gateway to the IP address.

Assign an IP Address (Wi-Fi and Ethernet)

Note: The Wireless Gateway can be installed in place prior to commissioning provided the power and the network connections are also installed, and the computer’s USB connection can reach the Wireless Gateway at its installed location.

Prerequisite: Each unit must be assigned an IP address. Assigning IP addresses requires a computer with HyperTerminal or other terminal emulation software.

1. Connect each Wireless Gateway to the network via the Ethernet cable.

2. Connect the Wireless Gateway to the configuring computer via USB connection.

3. Power on the Wireless Gateway.

4. Launch HyperTerminal.

revision 1 — 87

Page 88: i Ls Lock Operation

5: Wireless Gateway

5. Assign a Name to the connection and then click [OK].

6. Connect the Wireless Gateway to the computer or laptop using the USB cable.

7. Select the appropriate COM port. The COM port location can be determined from the computer’s Device Manager. Click [OK].

88 — revision 1

Page 89: i Ls Lock Operation

ILS Lock Operation User Guide

8. Configure the COM port setting as shown:

9. From HyperTerminal, type ifconfig and then press <Enter>. The MAC address, IP Address, and gateway for the access point will be displayed.

10. Make a note of the IP address and location of the access point because you will need to configure these in OnGuard.

11. For Ethernet, only: Continue to the instructions in section Establish a Static IP Address (Ethernet Only) on page 89.

Establish a Static IP Address (Ethernet Only)Static IP addressing is set up via HyperTerminal.

Prerequisites:

• Ensure the serial port emulator (CDM20600) is installed.

• Contact the site network administrator and request DHCP reservations based on the Wireless Gateway MAC addresses as well as the network submask and gateway for the static IP addresses.

revision 1 — 89

Page 90: i Ls Lock Operation

5: Wireless Gateway

Note: Compile a list of the Wireless Gateway MAC addresses and their associated IP addresses assigned in the reservations. You will need this list to configure the IP address for each Wireless Gateway in OnGuard.

1. Start the Wireless Gateway. During Wireless Gateway startup, you will have approximately five (5) seconds to press any key, and then the program will guide you through a series of setup prompts to configure the device.

2. When the configuration is complete, disconnect from the Wireless Gateway.

3. Ping the unit from a network connected computer to verify that the Wireless Gateway is active with the assigned IP address.

Lock Table (Data)After the Wireless Gateway have been commissioned in OnGuard, the associated locks can then be assigned to the Wireless Gateway. The associated locks are known as the Wireless Gateway lock table.

Refer to the System Administration User Guide or online Help for the appropriate menu options to download the lock table data to each Wireless Gateway.

Configure the Wi-Fi Wireless Gateway

Prior to the configuration of the Wi-Fi Wireless Gateway, the following information must be identified by the site network administrator:

• Wireless IP address

• Wireless subnet mask

• Wireless IP address of default gateway

• Wireless country name configured is United States

• Wireless protocol mode is for access point (infrastructure) networks, only

• Wireless SSID

• Frequency band is band b, only

• Wireless channel is (search)

• Wireless transmit rate is 11 (Default)

• Wireless transmit power is 16dbm (Default)

• Wireless multi domain capability (802.11d) disabled (Default)

• Authentication type

Hardware Parameters

• Serial channel baud rate: 9600 (Default)

• Board serial number (specific to the Wireless Gateway)

90 — revision 1

Page 91: i Ls Lock Operation

ILS Lock Operation User Guide

• Board Wireless Gateway MAC Address (specific to the wireless access point)

• Start-up code: After the board is reset, the start-up code will be available in approximately five (5) seconds (Default)

Connect Wi-Fi Wireless Gateway to the Computer via HyperTerminal

1. After the connections are made, re-start the Wireless Gateway by typing the following and then press <Enter>:reboot pwd=Netsilicon

“Netsilicon” is the initial password; it can be reset during the following configuration process.

2. After the system has started again, press any key to change the default settings. The current setting can either be accepted or modified. Press “m” to modify, and then press <Enter>.

3. Re-enter the password, and then choose to reconfigure the settings.

4. The following message is then displayed in HyperTerminal. This allows the previously saved settings to remain in the Wireless Gateway configuration.

Press any key in 5 seconds to change these settings.

Press A to Accept the settings, or M to Modify?m

Enter the root password: ********

Reset configuration to default values [N]? Y

For each of the following questions, you can press <Return> to select the value shown in the braces, or you can enter a new value.

revision 1 — 91

Page 92: i Ls Lock Operation

5: Wireless Gateway

5. If you are assigning a static IP address, disable DHCP.

6. Input your IP address (if DHCP is disabled).

7. Enter the network Subnet mask.

8. Enter the network Gateway address.

9. MAC Address [assigned at the factory] - does not need an input.

10. Country name [United States].

11. Network type:

12. Enter the Network name (SSID).

13. Select the maximum transmit power [16dbm].

14. Select the wireless authentication settings.

WIRELESS INTERFACE SETTINGS:

Obtain IP settings automatically using DHCP for WIFI interface [Y]? N

Network type [1]?

0 for any available wireless network

1 for access point (infrastructure) networks only

2 for peer-to-peer (ad hoc) networks only

3 do not join a BSS

4 start Wi-Fi Protected Setup

Maximum transmit power [16 dbm]?

0 for 16dbm

1 for 14dbm

2 for 12dbm

3 for 10dbm

4 for 8dbm

5 for 6dbm

Authentication type [4]?

0 for Any available authentication

1 for Shared Key

2 for WEP (802.1x)

3 for WPA Personal (WPA-PSK)

92 — revision 1

Page 93: i Ls Lock Operation

ILS Lock Operation User Guide

15. User name and password are required for WEP, WPA, Cisco LEAP, and Cisco EAP FAST:

16. Select wireless network encryption type.

17. Serial port connection should remain at 9600.

18. The Wireless Gateway password can now be reset. This password is Wireless Gateway-specific, but can be assigned to multiple Wireless Gateways.

19. After the configuration is complete, the Wireless Gateway can be disconnected from the commissioning computer.

Lock DataIn OnGuard, after the Wireless Gateway is configured, the OnGuard, the Wireless Gateway’s associated locks are then assigned to the Wireless Gateway.

4 for WPA Enterprise (802.1x)

5 for Cisco LEAP

6 for Open System

7 for Cisco EAP FAST

For WEP (802.1x), WPA (802.1x), Cisco LEAP and Cisco EAP FAST authentication:

Username [no change]?

Password [no change]?

Encryption type [4]?

1 for WEP

2 for TKIP

3 for CCMP (AES)

4 for Open System (no encryption)

SERIAL CONSOLE PORT SETTINGS:

Set the baud rate of the serial console port [9600]?

9600, 19200, 38400, 57600, 115200

SECURITY SETTINGS:

Would you like to update the Root Password [N]?

revision 1 — 93

Page 94: i Ls Lock Operation

5: Wireless Gateway

Refer to the System Administration User Guide or online help for the appropriate menu options to download the lock data to each Wireless Gateway.

Wireless Gateway LEDs

The Wireless Gateway unit has five (5) LEDs for user feedback. These LEDs provide the following information:

• OnGuard Connection. Connection to OnGuard is established.

• Wireless Network Traffic. Data transmission from the lock to its associated Wireless Gateway.

• Ethernet (or Wi-Fi) Traffic. Data transmission between the Wireless Gateway and OnGuard.

• Ethernet (or Wi-Fi) Link. Connection established to the network via either Ethernet or Wi-Fi.

• Power.

Wireless Gateway Power Supply

Both the wired and wireless access points operate on a single external 5V DC power supply.

The Wireless Gateway has over-voltage protection up to 28V that prevents equipment damage if an incorrect power supply is used. In the event of a fault condition, the Wireless Gateway will be completely powered down. There will be no indication that the Wireless Gateway is in a fault condition other than it is non-functional.

Wireless Gateway Certifications

The Wireless Gateway device complies with part 15 of the FCC Rules. Its operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

FCC ID: R32-WLMWWM01

IC ID: 5059A-WLMWWM01

• FCC part 15

• UL

94 — revision 1

Page 95: i Ls Lock Operation

ILS Lock Operation User Guide

• CSA

• RoHS

• CE

• ICES-001, CAN/CSA C108.6-M91

Wireless Gateway Environmental Requirements

The Wireless Gateway shall adhere to following environmental requirements:

• Temperature:

– Operational: 0°C to 49°C– Storage: -40°C to +70°C

• Humidity:

– Operational: 95% at 49°C– Storage: 95% at 70°C

• Vibration:

– Operational: 2 Grms per 1 hr. on each axis– Transportation: 0.0075 G2/Hz per 3 hrs on each axis

• Shock (if applicable):

– Operational: 10G– Transportation: 100G

revision 1 — 95

Page 96: i Ls Lock Operation

5: Wireless Gateway

96 — revision 1

Page 97: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 6: Troubleshooting

Lock Troubleshooting

Symptom Cause Action

Lock LED is GREEN, but there is no motor activation.

The motor is not connected to the lock control board.

Check that the lock rosette cable is properly connected to the CN6 connection on the lock control board.

Lock LED is RED. Invalid cardholder data.

Check the system settings for valid cardholder authorization, access level, timezone, and deactivate/activation dates.

The cardholder is not in the lock database.

Verify that the lock has been initialized with the correct database and time.

Lock LED gives no indication.

The lock is not initialized.

Verify that the lock has been initialized.

The lock batteries are exhausted.

Replace with new AA batteries.

Lock is in the Security mode

The lock may be in Secure mode; change the lock operation mode to Card Only.

Mobile Configurator Troubleshooting

Symptom Cause Action

Mobile Configurator will not communicate with the lock.

Lock communication timeout.

Verify that the power adapter is powered on.

Check the power adapter batteries.

Database cannot be downloaded to the Mobile Configurator.

Communication Server is not running as an application.

Start the Communication Server.

OnGuard does not recognize the Mobile Configurator.

Communication Server is not running as an application.

Start the Communication Server.

ActiveSync is not installed/running.

Install Microsoft ActiveSync.

Mobile Configurator is not connected to the computer.

Check the USB connection from the Mobile Configurator to the computer running Microsoft ActiveSync and Communication Server.

Database cannot be loaded onto the Mobile Configurator.

Invalid CSV file. Download the database to the Mobile Configurator from OnGuard

Check for correct password “ilsppapp” and user name and password combination.

revision 1 — 97

Page 98: i Ls Lock Operation

6: Troubleshooting

Lock Join Troubleshooting

Symptom Cause Action

There is no LED activity on the radio module board.

Lock is in the factory mode.

Initialize the lock using the Mobile Configurator.

Lock is not initialized properly.

Initialize the lock using the Mobile Configurator following the specified procedure, and then wait for at least 20 seconds.

WLM-ACU identification may have failed.

Re-initiate the Join command using the Mobile Configurator or the Join card.

Lock Communication Troubleshooting

Symptom Cause Action

Cannot find Wireless Gateway; LED 2 flashes approximately 50 times and both LEDs go solid RED.

There is a site ID mismatch.

Ensure that the lock was initialized using a Mobile Configurator configured from the same OnGuard as the Wireless Gateway.

Wireless Gateway is offline.

Refer to Wireless Gateway Troubleshooting on page 98.

The Wireless Gateway lock table is out of date.

Ensure that the Wireless Gateway is online and the Wireless Gateway status information is correct.

The lock drops offline and does not come back online on its own.

The lock was unable to join after an ACU, WLM, or reader firmware upgrade.

Re-initiate the lock join operation.

Verify the lock battery level using the Mobile Configurator.

Replace the lock batteries.

Wireless Gateway Troubleshooting

Symptom Cause Action

The Wireless Gateway is not properly powered.

The power LED is off or blinking.

Check that the AC power supply is properly plugged in.

Ensure that the network supports PoE for a PoE Wireless Gateway.

Network connection problem

Check that the Ethernet connection is properly plugged in.

Wi-Fi/Ethernet link LED is blinking.

Check the Wi-Fi configurations at the router and the Wireless Gateway.

Ensure the Wi-Fi access point supports IEEE 802.11b.

Prerequisites: The following symptoms require the use of HyperTerminal or terminal emulation software as well as the ability to FTP onto the Wireless Gateway.

Wireless Gateway does not remain connected to OnGuard; the connection is intermittent.

Check network connectivity/speed/strength (Wi-Fi)

Ensure the SSL communication is correct.

If the SSL communication is incorrect, this problem will manifest itself in regularly scheduled connectivity interval of approximately every 20 - 30 seconds showing online briefly. For more information, refer to the Knowledge Base article on setting up SSL.

98 — revision 1

Page 99: i Ls Lock Operation

ILS Lock Operation User Guide

The Wireless Gateway does not connect to OnGuard.

The IP address is not correct.

Wireless Gateways are configured for DHCP by default.

Issue one of the following commands from the HyperTerminal connection to resolve:

• For Ethernet Wireless Gateways: setnetwork

• For Wi-Fi Wireless Gateways: setwireless

This will report if DHCP is enabled or not, and also the current IP address. Verify the Wireless Gateway IP address with the Wireless Gateway IP address configured in OnGuard.

If necessary, issue the command: setnetwork pwd=password dhcp=off

In order to set a static IP address, complete the following steps:

1. Issue the command: setnetwork pwd=password ip=<your.IP.address.here>

2. After the IP address is set, start the Wireless Gateway again. <your.ip.addr.here> should display immediately after “NETWORK INTERFACE PARAMETERS” in the startup window in HyperTerminal.

The network configuration is not correct.

The Wireless Gateway is connecting to the wrong Wi-Fi network.

Specify the correct SSID in the configuration settings instead of “Search.”

The memory is corrupted.

The Start window in the terminal emulation displays an indication that the application image has been corrupted:

WAP_BACKUP_APPLICATION READY

Contact Technical Support for further assistance.

Wireless Gateway Troubleshooting

Symptom Cause Action

revision 1 — 99

Page 100: i Ls Lock Operation

6: Troubleshooting

100 — revision 1

Page 101: i Ls Lock Operation

ILS Lock Operation User Guide

Chapter 7: Hardware Upgrade

Description

ILS locks are designed for quick and easy modification and upgrade. Depending on the current lock version, the ILS lock can be upgraded to or from any available ILS reader technology.

WarningAll individuals must take sufficient steps to reduce the possibility of ESD during installation, upgrade, and servicing of the ILS components.

Standard Door Preparation with Offline Lock Versions

Current Lock Version ILS Reader Technology After Upgrade

Magnetic offline iCLASS offline

MIFARE offline

eProx offline

Magnetic online

iCLASS online

MIFARE online

eProx online

iCLASS offline Magnetic offline

MIFARE offline

eProx offline

Magnetic online

iCLASS online

MIFARE online

eProx online

MIFARE offline (Depending on your version of OnGuard, this option may not be available.)

Magnetic offline

iCLASS offline

eProx offline

Magnetic online

iCLASS online

MIFARE online

eProx online

revision 1 — 101

Page 102: i Ls Lock Operation

7: Hardware Upgrade

Upgrade the Radio

Offline ILS locks can be upgraded to wireless functionality with the addition of a radio module. A radio module upgrade kit is available that includes the following components:

• Wireless radio module

• Hybrid battery cover for the lock

• Mounting screws

• Connection cable

eProx offline Magnetic offline

iCLASS offline

MIFARE offline

Magnetic online

iCLASS online

MIFARE online

eProx online

Standard Door Preparation with Online Lock Versions

Current Lock Version ILS Reader Technology After Upgrade

Magnetic online iCLASS online

MIFARE online

eProx online

iCLASS online Magnetic online

MIFARE online

eProx online

MIFARE online (Depending on your version of OnGuard, this option may not be available.)

Magnetic online

iCLASS online

eProx online

eProx online Magnetic online

iCLASS online

MIFARE online

Standard Door Preparation with Offline Lock Versions

Current Lock Version ILS Reader Technology After Upgrade

102 — revision 1

Page 103: i Ls Lock Operation

ILS Lock Operation User Guide

Note: The hybrid battery cover must be used in conjunction with the radio module for proper signal transmission to occur.

Upgrade/Replace the RadioPrerequisites: Before you perform the lock radio upgrade, the Wireless Gateway that will communicate with the lock must be updated first by associating the lock ID (Record number) to the Wireless Gateway. For information about assigning the lock to the Wireless Gateway, refer to the System Administration User Guide.

1. Remove the existing battery cover.

2. Power down the lock by removing the three (3) AA batteries.

3. Position the radio module on the top bracket of the lock back plate.

4. Secure the radio module with two (2) screws.

5. Attach the connection cable to the radio module and the ACU control board.

6. Replace the three (3) AA batteries.

a. After the batteries have been replaced, the lock will go through a power cycle in which the radio module will automatically attempt to join the wireless access point.

b. Complete the steps in section Network Join on page 57.

Upgrade the Reader

When you replace or upgrade the reader head, power down the lock by removing the batteries. The lock configurations will remain in memory.

Upgrade/Replace the Reader

1. (Optional) If the lock is equipped with a thumb turn, remove the thumb turn from inside of the lock.

2. Remove the top battery cover of the lock inside trim by removing the torx screw.

3. Remove the batteries.

4. Uninstall the two (2) screws from the reader.

5. Depress the ribbon cable connector to release the reader connector. Make sure to note how the cable is routed through the door interior.

6. Remove the old ILS reader and replace it with the new reader. Ensure the reader connection cable is rerouted properly as it was previously installed.

7. Reconnect the ribbon cable connection and secure them in place by properly closing the contacts.

revision 1 — 103

Page 104: i Ls Lock Operation

7: Hardware Upgrade

8. Power the lock by replacing the batteries. The lock should automatically rejoin its Wireless Gateway after power up. For more information, refer to Network Join on page 57.

9. Replace the back cover and thumb turn.

Replace the Wireless Gateway

When you are replacing an existing ILS Wireless Gateway with a new one, follow the configuration process in section Commission the ILS Wireless Gateway on page 86.

The Wireless Gateway ID should remain unchanged in OnGuard unless a new access point with new lock table is being installed.

1. Disconnect the power source of the existing Wireless Gateway.

2. The new Wireless Gateway should only be installed after it has been commissioned.

3. After Wireless Gateway has been installed, reconnect the power source.

4. All locks associated with the original Wireless Gateway must rejoin the new Wireless Gateway using the steps in Network Join on page 57.

Upgrade the Firmware or Software

Upgrading the firmware for most of the hardware and components can be accomplished via the Mobile Configurator or through OnGuard via the Wireless Gateway. For the appropriate menu options to begin the wireless firmware download operations, refer to the System Administration User Guide and the Alarm Monitoring User Guide.

Upgrade ComponentsThere are six (6) system components available for firmware/software upgrades:

Firmware Upgrades

1. Lock ACU (Access Control Unit board)

2. Lock reader

3. WLM (Wireless Lock Module) This is the lock’s radio.

4. Wireless Gateway

Software Upgrades

5. Mobile Configurator application

6. OnGuard

104 — revision 1

Page 105: i Ls Lock Operation

ILS Lock Operation User Guide

Upgrade the Lock Using the Mobile ConfiguratorThere are no constraints for the firmware upgrade procedure via the Mobile Configurator. The components can be upgraded in any order unless otherwise defined.

Upgrade the Lock via the Wireless Gateway

1. Log onto OnGuard and Alarm Monitoring.

2. From Alarm Monitoring system status tree, download the Wireless Gateway firmware (WWM/WMC). For more information, refer to the Alarm Monitoring User Guide.

3. Download the wireless reader/lock firmware:

a. Download ACU firmware.

b. Download the WLM firmware.

c. Download the reader firmware.

Important: Do not attempt to access the lock until the updated firmware version is shown in the lock information and the upgrade events confirm the firmware upgrade is completed.

Upgrade the Mobile Configurator ApplicationFrom the installing computer, complete the following steps:

1. Connect the Mobile Configurator device to the installing computer via the appropriate USB cable.

2. On the computer, navigate to the folder containing the Mobile Configurator .CAB file.

3. Copy the .CAB file from the folder to the Mobile Configurator.

4. In Microsoft Active sync, click Explore and paste the file to the device.

Microsoft ActiveSync Connection

revision 1 — 105

Page 106: i Ls Lock Operation

7: Hardware Upgrade

Mobile Configurator Device Directory

Install the Application File on the Mobile Device

On the Mobile Configurator, complete the following steps:

1. After the files have been copied to the Mobile Configurator they can then be installed on the device.

2. To install the file on the device navigate to the files.

a. Start the Mobile Configurator file explorer (from Start, select File Explorer).

b. Click the appropriate Mobile Configurator .CAB file to install the application. The file will run and begin the installation.

3. After the installation is complete, click [OK] in the top right corner of the Mobile Configurator screen.

106 — revision 1

Page 107: i Ls Lock Operation

Appendices

Page 108: i Ls Lock Operation
Page 109: i Ls Lock Operation

ILS Lock Operation User Guide

Appendix A: Alarm/Events Table

Event Name Description

Access Denied: Access Control Format Not Found No ACFs (Access Control Formats) stored at the lock.

Access Denied: Blocked Mode User does not have blocked override privilege.

Access Denied: Card Expired Card has expired.

Access Denied: Invalid Access Control Data Failed to process Integra card data.

Access Denied: Invalid Access Control Data Length Length of retrieved data did not match length specified in selected ACF (Access Control Format).

Access Denied: Invalid Access Control Data Parity Parity calculations for retrieved data failed for selected ACF (Access Control Format).

Access Denied: Invalid Access Control Data Type Retrieved data type (Wiegand/Integra) did not match the ACF (Access Control Format) type.

Access Denied: Invalid Smart Card Authentication Failed to authenticate to application specified by the selected SCF (Smart Card Format).

Access Denied: Invalid Smart Card Data Due to invalid header, invalid data length, failed to retrieve HID application data.

Access Denied: Invalid Smart Card Format Not Found No SCFs (Smart Card Formats) are stored at the lock.

Access Denied: Invalid Smart Card Location Application data could not be located on the card based on the selected SCF (Smart Card Format).

Access Denied: Invalid Smart Card Type Either the card was not found in the field or the card failed to respond to the requested RF (Radio Frequency) protocol.

Access Denied: Secured Mode Lock is in security mode; no users allowed access.

Access Granted Access granted, when no latch or door sensor monitoring is present.

Access Granted Entry Made Access granted and door opened when latch or door sensor monitoring is present.

Access Granted No Entry Made Access granted but door not opened when latch monitoring or door sensor is present.

ACU Firmware Upgraded Lock firmware was updated.

Audit Trail Cleared Recorded when the event log is cleared.

Audit Trail Reached Limit Informs OnGuard when the event log is becoming full and will be overwritten.

Card Only Change Denied: Security Mode Automatic change to Card Only mode denied because lock is in the security mode.

revision 1 — 109

Page 110: i Ls Lock Operation

A: Alarm/Events Table

Card Only Mode Change Denied: Blocked Mode Automatic change to Card Only mode denied because lock is in Blocked mode.

Daylight Saving Time Audit DST (Daylight Saving Time) start or DST end has occurred.

Denied Low Battery Door open/close failed due to low batteries.

Denied, Invalid Timezone User is not enabled for this timezone.

Denied, Not Authorized Authorization for access is missing.

Door Forced Open Alarm when door is forced open.

Door Forced Open Restored Generated when a “Door Forced Open” condition has been restored.

Door Held Open Alarm when door is left open when latch monitoring or door sensor is present.

Door Held Open Restored Generated when a “Door Held Open” condition was restored.

Door Open Lock opened through the Mobile Configurator or OnGuard.

Door Open by Key Mechanical key override on.

Door Open by Key Restored Mechanical key override off.

Door Open from Inside Door opened from inside, only when not in Unlocked mode.

Facility Code Only Mode Change Denied: Blocked Mode Automatic change to Facility Code Only mode denied because lock is in Blocked mode.

Facility Code Only Mode Change Denied: Security Mode Automatic change to Facility Code Only mode denied because lock is in Secured mode.

First Card Unlock Mode Change Denied: Blocked Mode Automatic change to First Card Unlock mode denied because lock is in Blocked mode.

First Card Unlock Mode Change Denied: Security Mode Automatic change to Unlocked mode denied because lock is in Secured mode.

Inactive Badge Generated when access was denied because the badge was inactive.

Internal Deadbolt Off Privacy knob (deadbolt) disengaged from inside.

Internal Deadbolt On Privacy knob (deadbolt) engaged from inside.

Invalid Badge Generated when access was denied because the badge ID was unknown to the controller.

Invalid Facility Code Facility code for selected ACF (Access Control Format) did not match facility code retrieved from the card.

Invalid Issue Code Card is cancelled.

Event Name Description

110 — revision 1

Page 111: i Ls Lock Operation

ILS Lock Operation User Guide

Lock Initialized Lock was initialized using the PP (Portable Programmer) application.

Lock Powered Up by Portable Programmer Recorded after a power up to the lock via the portable programmer.

Lock Updated Lock was updated.

Locked Under AFC End of AFC mode.

Locked Under First Card Unlock First Card Unlock relock.

No Privacy Override User does not have privacy override privilege.

Low Battery Lock battery level has reached 18% or less of its usable power.

Low Battery Restored Generated when the lock battery has been restored.

Reader Mode Blocked Lock entered Blocked mode.

Reader Mode Card Only Lock entered Card Only mode.

Reader Mode First Card Unlock Lock entered First Card Unlock mode.

Reader Mode Secured Lock entered Secured mode.

Reader Mode Unlocked Lock entered Unlocked mode.

Reader Mode Unsecured Lock entered Unsecured mode.

Reader Mode Facility Code Only Lock entered Facility Code Only mode.

Reader Module Firmware Upgraded Reader firmware was updated.

Realtime Clock Updated Real-time clock was updated.

Unlocked Mode Change Denied: Blocked Mode Automatic change to Unlocked mode denied because lock is in Blocked mode.

Unlocked Mode Change Denied: Low Battery Lock cannot go to Unlocked mode due to low battery.

Unlocked Mode Change Denied: Security Mode Automatic change to First Card Unlock mode denied because lock is in security mode.

Unlocked Under AFC Lock entered AFC mode.

Unlocked Under First Card Unlock First Card Unlock mode; door is unlocked.

WLM Firmware Upgraded Radio module firmware updated.

Event Name Description

revision 1 — 111

Page 112: i Ls Lock Operation

A: Alarm/Events Table

112 — revision 1

Page 113: i Ls Lock Operation

ILS Lock Operation User Guide

Appendix B: Install Mechanical Key Override in ILS Locks

Installation Procedure

Prerequisites:

• Clear the lock. For more information, refer to Reset the Lock to Factory Configuration Mode on page 14.

• Remove the batteries. For more information, refer to Replace Lock Batteries on page 22.

1. Replace the Standard Tailpiece with the ILS-supplied Tailpiece.

a. The Cylinder has a small Brass Pin that restricts the Cap Nut from turning.

Components

Keys and Key Cylinder

Parts package including the Tailpiece

revision 1 — 113

Page 114: i Ls Lock Operation

B: Install Mechanical Key Override in ILS Locks

b. Insert a small-tipped screwdriver into the Pin, and then softly push down while turning the Cap Nut counter-clockwise to remove.

Tailpiece removed.

ILS Tailpiece installed.

114 — revision 1

Page 115: i Ls Lock Operation

ILS Lock Operation User Guide

2. (Optional) If the Handle is on the Rosette, remove the Handle by inserting a small-pointed device (such as an awl) into the Handle Hole This action can only be performed with the Cylinder removed or the Cylinder and Key installed with the Key in the “Open” position.

Cylinder Orientation

Door Locked - Tailpiece and Key positioned horizontally to the Pins

Door Open - Tailpiece and Key positioned vertically (90 degrees) to the Pins

revision 1 — 115

Page 116: i Ls Lock Operation

B: Install Mechanical Key Override in ILS Locks

3. Prepare to install the Key Cylinder. Use the construction card to place the lock into the Unlocked mode. The Slot at the bottom of the Handle Shaft will be able to be turned counter-clockwise into the vertical position, and then remain in the vertical position. However, if the lock is not placed into the Unlocked mode, the Slot will spring back to the horizontal position.

Note: The construction card will only work if the lock has not been initialized.

Handle Shaft Inside View

Note: The Slot at the bottom of the Handle Shaft is horizontal.

116 — revision 1

Page 117: i Ls Lock Operation

ILS Lock Operation User Guide

4. Install the Cylinder on the Rosette by completing the following steps:

a. Place the Key in the Cylinder.

b. Turn the Key 90 degrees counter-clockwise.

Key Cylinder Installed

Key Cylinder installed

Key Cylinder with the Key in the “Open” position

revision 1 — 117

Page 118: i Ls Lock Operation

B: Install Mechanical Key Override in ILS Locks

c. Insert the Handle with the Cylinder into the Handle Shaft. Use the tip of the screwdriver to push the Side Pin in while sliding the Handle on.

5. Wire the Key Switch. The Key Cylinder Rosettes have two (2) wires, one (1) for the Clutch (Motor), and one (1) for the “key has been used” audit trail. Wire White-to-White and Red-to-Red.

6. Initialize the lock using the Mobile Configurator. For more information, refer to Using the Mobile Configurator on page 45.

118 — revision 1

Page 119: i Ls Lock Operation

ILS Lock Operation User Guide

The completed installation:

Key in

Key out

revision 1 — 119

Page 120: i Ls Lock Operation

B: Install Mechanical Key Override in ILS Locks

120 — revision 1

Page 121: i Ls Lock Operation

ILS Lock Operation User Guide

Index

Numerics

125 kHz proximity card readers.......................... 29900 MHz radio module ....................................... 56

A

ADA............................................................. 16, 17Alarm/events table ............................................ 109Alternative Fire Code (AFC) .............................. 32Assign IP address on DHCP network .......... 86, 87Assign static IP address on non-DHCP network 87Assign the locks .................................................. 38Attenuation caused by building materials........... 75Audit trail ............................................................ 16Auditor menu ...................................................... 50Automatic lock state changes ............................. 16

B

Batteries and privacy .......................................... 28Battery

cover .......................................................... 103life ................................................................ 21test level of................................................... 48

Battery low or dead condition............................. 22Battery replacement ............................................ 22Blocked mode (state) .......................................... 18Blocking card ...................................................... 16Buzzer general behavior ..................................... 24

C

Calendar .............................................................. 17Card Insertion Micro-switch ............................... 28Card Only mode.................................................. 18Card reader technologies .................................... 29

125 kHz Prox ............................................... 29iCLASS........................................................ 29magnetic....................................................... 29MIFARE ...................................................... 29

CE ....................................................................... 35Change lock mode .............................................. 48

Blocked ........................................................ 48Card Only..................................................... 48Facility Code Only....................................... 48First Card Unlock ........................................ 48Secured ........................................................ 48Unlocked...................................................... 48Unsecured .................................................... 48

Change lock operation mode .............................. 18Channel plan for ILS wireless devices ............... 79Check mode ........................................................ 48

Cleanmagnetic read head ...................................... 33outer cover ................................................... 33

Commission the ILS Wireless Gateway ...... 38, 86Commission the locks

assign the locks............................................ 38initialize the locks........................................ 39

ConfigureWi-Fi Wireless Gateway ............................. 90

Configure blocking override............................... 17Configure the Wi-Fi Wireless Gateway

hardware parameters.................................... 90Connect the Wi-Fi Wireless Gateway to the

computer via HyperTerminal....................... 91Connection cable............................................... 102Connections ................................................. 28, 42

to the computer ............................................ 43to the lock .................................................... 42to the Mobile Configurator .......................... 28

Connectivityloss ............................................................... 58poor/none ..................................................... 58

Connectors .......................................................... 42Construction card

owner ........................................................... 13standard........................................................ 13

Construction cards .............................................. 13

D

Lock when the handle is released. ...................... 16Database files ...................................................... 43Daylight Saving Time......................................... 20Device owner ...................................................... 17Diffraction........................................................... 71Door names ......................................................... 47Door position and monitoring............................. 33Door sensor contact ............................................ 33Door sensor test .................................................. 49Door unlock time ................................................ 16

for disabled users (ADA)............................. 16Download lock configuration file to the Mobile

Configurator................................................. 44DST updates........................................................ 16

E

Emergency lock and unlock features .................. 20Emergency operations......................................... 19

unlock wireless locks................................... 19wireless locks............................................... 20

revision 1 — 121

Page 122: i Ls Lock Operation

Index

Establish static IP Address (Ethernet Wireless Gateway)...................................................... 89

Estimating wireless range ................................... 69Event Type .......................................................... 16Events

access denied ............................................... 16access granted .............................................. 16

Events that do not produce LED/buzzer alarms . 27

F

Facility/Foyer...................................................... 18Factory configuration mode................................ 13Failed join ........................................................... 57FCC part 15......................................................... 35Firmware

upgrade ...................................................... 104version of ..................................................... 50

First Card Unlock mode...................................... 18Free-space propagation ....................................... 69

G

General lock characteristics ................................ 21

H

Handle Micro-switch .......................................... 28Hardware

upgrade ...................................................... 101version of ..................................................... 50

Hardware parameters of the Wi-Fi Wireless Gateway ....................................................... 90

Hardware upgrade............................................. 101Heartbeat time..................................................... 57Heavy-duty cylindrical latch BLA...................... 30Hybrid battery cover ................................ 102, 103

I

iCLASS card readers .......................................... 29ILS locks

features and functions .................................. 12ILS wireless cluster components ........................ 62ILS Wireless Gateway commissioning of .......... 38ILS wireless lock radio LED indications ............ 59Initialize the lock ................................................ 46Initialize the locks ............................................... 39Install

lock .............................................................. 13lock radio ..................................................... 56

Install application file on the mobile device ..... 106Install Mechanical Key Override ...................... 113Installation planning ........................................... 63

ceiling-mounted Wireless Gateway............. 65determine potential Wireless Gateway

locations................................................ 63identify wireless Lock locations .................. 63mounting feasibility ..................................... 64obtain floor plan........................................... 63power and network access for Wireless

Gateways .............................................. 64relative positioning of the Wireless Gateway

and its locks .......................................... 67wall-mounted Wireless Gateway................. 65Wireless Gateway antenna orientation ........ 64Wireless Gateway mounted in the middle of

locks...................................................... 68Wireless Gateway mounted on exterior wall 68Wireless Gateway mounting height............. 65

Introduction........................................................... 9Invalid card ......................................................... 16IP23 MAG readers .............................................. 35IP46 IClass & 125Khz reader ............................. 35

J

Join card (wireless) ............................................. 16Join network........................................................ 57

K

Key override ....................................................... 31Key Override Micro-switch ................................ 28

L

Languages ........................................................... 41Latch monitoring................................................. 34

mortise ......................................................... 34LED and buzzer indications................................ 24

behavior ....................................................... 24LEDs

general behavior .......................................... 24ILS wireless lock radio indications ............. 59Wireless Gateway ........................................ 94

Lockattributes ...................................................... 16audit file ....................................................... 44audit trail...................................................... 16certifications ................................................ 35configurations .............................................. 13default settings of......................................... 15factory configuration mode ......................... 13firmware....................................................... 55heartbeat....................................................... 56maintenance ................................................. 33malfunction.................................................. 16operating environment ................................. 35operators ...................................................... 44Power Cycle/Reset....................................... 57power up ...................................................... 54

122 — revision 1

Page 123: i Ls Lock Operation

ILS Lock Operation User Guide

radio ............................................................. 56reset.............................................................. 14standard configuration mode ....................... 14update........................................................... 47

Lock data............................................................. 93Lock ID ............................................................... 50Lock information ................................................ 55

timestamp..................................................... 50Lock installation ................................................. 13Lock Name.......................................................... 50Lock operation mode changes ............................ 18Lock operation modes

Card Only..................................................... 18First Card Unlock ........................................ 18Unlocked...................................................... 18

Lock radio installation ........................................ 56Lock table ........................................................... 90Lockcases............................................................ 30

heavy-duty cylindrical latch BLA ............... 30mortise latch only ........................................ 30mortise with deadbolt .................................. 30mortise with deadbolt (AFC) ....................... 30

Log onto Mobile Configurator............................ 44

M

Magnetic card readers ......................................... 29Magnetic read head ............................................. 33Main components

wired access points ...................................... 56wireless lock radio ....................................... 56

Maintenance................................................. 33, 56Mechanical key override..................................... 30

state changes ................................................ 31Micro-switches.................................................... 28MIFARE card readers ......................................... 29Mobile Configurator

Auditor menu............................................... 50description.................................................... 41languages ..................................................... 41main components of..................................... 42maintenance ................................................. 56operator logon.............................................. 44power adapter............................................... 42what it supports............................................ 41

Mobile Configurator filesLockAudits.txt ............................................. 44PPApp.......................................................... 43PPAudits.txt ................................................. 44sqlce30 ......................................................... 43

Mortise latch only ............................................... 30Mortise with deadbolt ......................................... 30Mortise with deadbolt (AFC).............................. 30Mounting screws for radio upgrade .................. 102

Multipath fading ................................................. 71

N

Network join ....................................................... 57Network join key ................................................ 55

O

Obstructionsattenuation caused by building materials..... 75equation for estimating range ...................... 76impact of ...................................................... 75

Obstructions to avoid .......................................... 77Office with card function.................................... 16Ontario Fire Code 3.3.4.5 ................................... 35Open lock............................................................ 54Optimum heartbeat time ..................................... 57Other referenced user guides ................................ 9Outer cover ......................................................... 33Override blocking ............................................... 17Owner construction card..................................... 13

P

Perform site survey ............................................. 77channel plan................................................. 79scan RF spectrum on site ............................. 78visual inspection of site ............................... 77

Portable Programmer (Mobile Configurator) ..... 41Power adapter ..................................................... 42Power Cycle/Reset .............................................. 57Power supply....................................................... 94Power up the lock ............................................... 54PP (Portable Programmer) audit file................... 44Privacy function.................................................. 16Privacy Micro-switch.......................................... 28Privacy state ........................................................ 18Privacy with factory settings............................... 14Production test key.............................................. 55Propagation ......................................................... 69

diffraction .................................................... 71free-space propagation................................. 69multipath fading........................................... 71reflection...................................................... 69

Protek 3290N ...................................................... 79

R

Radio................................................................... 56module ....................................................... 102upgrade ...................................................... 102

Range in buildingshallway diagram .......................................... 74hallways ....................................................... 73with wall obstruction diagram ..................... 74

revision 1 — 123

Page 124: i Ls Lock Operation

Index

with wall obstructions.................................. 73Read audit trail events......................................... 50Read lock audit ................................................... 51Read lock openings ............................................. 55Reflection............................................................ 69Replace lock batteries ......................................... 22Replace the Wireless Gateway ......................... 104Reset lock to factory mode ................................. 14RF output power settings .................................... 72RF signal strength analyzer................................. 79RF untapped coverage

Wireless Gateway on exterior wall.............. 68RoHS................................................................... 35

S

Scan RF spectrum on site.................................... 78Scheduled (automatic) changes .......................... 20Send heartbeats ................................................... 55Serial number ...................................................... 50Setup and configuration ...................................... 43Site planning

overview ...................................................... 61Standard configuration mode.............................. 14Standard construction card.................................. 13Successful join .................................................... 57Switch tests ......................................................... 49

Door sensor.................................................. 49how to test the switches ............................... 49

T

Terms used in this document .............................. 10Test and diagnostics............................................ 48

Switch Test .................................................. 49Test buzzer .......................................................... 49Test card.............................................................. 16Test LEDs ........................................................... 48Timestamp .......................................................... 50Timezones ........................................................... 17Troubleshooting .................................................. 97

U

UL10C ................................................................ 35UL294 (pending)................................................. 35Unlock wireless locks ......................................... 19Unlocked mode ................................................... 18Update RTC ........................................................ 55Update the lock ................................................... 47Upgrade

firmware..................................................... 104from offline lock version ........................... 101from online lock version............................ 102hardware .................................................... 101Mobile Configurator Application .............. 105

radio ........................................................... 102reader ......................................................... 103

Upgrade components ........................................ 104Upgrade firmware

lock information .......................................... 55Upgrade lock

using the Mobile Configurator .................. 105using the Wireless Gateway ...................... 105

Upgrade lock firmware ....................................... 55Upgrade or replace

radio ........................................................... 103reader ......................................................... 103

Upload PP lock audits file to OnGuard .............. 44User code ............................................................ 16Users settings ...................................................... 17Using the Mobile Configurator........................... 45

V

View lock audit ................................................... 51View lock information ........................................ 49

serial number ............................................... 50Visual feedback................................................... 57Visual inspection of site...................................... 77

W

When key override is used.................................. 31Wired Access Point (Ethernet) .................... 84, 85Wireless connectivity................................... 56, 57Wireless device that do not cause interference ... 78Wireless device that may cause Interference ...... 78Wireless features................................................. 60Wireless functionality ......................................... 56Wireless Gateway ............................................... 83

assign IP address on DHCP network.... 86, 87assign static IP address on non-DHCP

network................................................. 87certifications ................................................ 94description of ............................................... 83environmental requirements ........................ 95LEDs............................................................ 94Omni-directional antenna ............................ 67power supply................................................ 94

Wireless GatewaysEthernet 10/100............................................ 56Power-over-Ethernet (Ethernet 10/100) ...... 56Wi-Fi 802.11................................................ 56

Wireless lock systemmain components of..................................... 56send heart beats............................................ 55

Wireless radio module ...................................... 102Wireless range estimates inside buildings .......... 72

124 — revision 1

Page 125: i Ls Lock Operation

ILS Lock Operation User Guide

revision 1 — 125

Page 126: i Ls Lock Operation

Lenel Systems International, Inc.1212 Pittsford-Victor RoadPittsford, New York 14534 USATel 585.248.9720 Fax [email protected]