User's Manual

Table of Contents
1: BEFORE YOU BEGIN ............................................................................................................................ 5
1.1: GENERAL REQUIREMENTS: ...................................................................................................... 5
1.2: POWERNET READER-CONTROLLER SPECIFICATIONS: .................................................. 6
1.3: INSTALLATION LOCATION GUIDELINES .............................................................................. 7
2: WIRING AT THE DOOR AND READER-CONTROLLER ............................................................ 11
2.1: POWERING THE READER-CONTROLLERS ......................................................................... 11
2.1.1: POWER OVER ETHERNET (PoE) OPTION .......................................................................... 11
2.1.2: ADDITIONAL POWER OPTIONS ........................................................................................... 13
2.2: WIRING THE DOORS .................................................................................................................. 16
2.2.1: READER-CONTROLLER CONTROL-LEADS DESCRIPTION ......................................... 17
2.2.2: LOCK WIRING -- BASIC .......................................................................................................... 19
2.2.3: WIRING THE REX BUTTON ................................................................................................... 22
2.2.4: WIRING THE AUX INPUT ....................................................................................................... 22
2.2.5: WIRING THE DOOR SENSE .................................................................................................... 23
2.2.6: LOCK WIRING -- LOW-VOLTAGE 12VDC POWER OPTION ......................................... 24
2.2.7: LOCK WIRING -- EXTERIOR DOOR KIT ............................................................................ 25
2.2.8: LOCK WIRING -- 2 READERS TO 1 LOCK .......................................................................... 27
2.2.9: USING THE TTL LEADS .......................................................................................................... 28
2.2.10: USING THE POWERNET’S RS-232 INPUT ......................................................................... 28
2.2.11: WIRING THE WIEGAND INTERFACE MODULE ............................................................ 29
2.2.12: WIRING THE DUAL-SRM ...................................................................................................... 31
2.2.13: WIRING THE QUAD-SRM...................................................................................................... 33
2.2.11: MANAGING INDUCTIVE LOAD CHALLANGES .............................................................. 35
2.2.12: MANAGING IN-RUSH CURRENT LOADS .......................................................................... 36
2.3: CONFIGUATION EXAMPLES ........................................................................................................ 37
2.3.1: PoE --- ELECTRIC STRIKE ...................................................................................................... 37
2.3.2: PoE --- EXTERNAL PWR FOR ELECTRIC STRIKE ........................................................... 38
2.3.3: 12VDC ELECTRIC STRIKE .................................................................................................. 39
2.3.4: PoE --- MAGNETIC LOCK ........................................................................................................ 40
2.3.5: PoE --- MAGNETIC LOCK & PIR ........................................................................................... 41
2.3.6: PoE --- MAGNETIC LOCK, EDK & PIR ................................................................................. 42
2.3.7: DUAL POWER SOURCES ......................................................................................................... 43
3: CONFIGURING THE READER-CONTROLLER’S COMMUNICATIONS ................................ 44
3.1: ETHERNET-BASED TCP/IP READER-CONTROLLERS ...................................................... 44
3.2: SECURING MESSAGES ON YOUR NETWORK ..................................................................... 47