Unit installation
Digital Locking System 3060 
Page 5 
cylinder, Smart Relay or activation unit. 
2.6 Network 3065 
The cable-free Network 3065 is an online access control system that administers, 
visualises and archives all System 3060 information in one central location, and all 
without manipulations at the door, door frame or the door hardware. 
It is especially recommended for medium-sized and large locking systems in order to 
be able to configure and administer the locking system from a central PC. The LON 
standard data transmission is done from the PC over the network wiring (twisted pair) 
and out to the network nodes (LockNodes), which are installed near a digital 
component. From the LockNode, the data is directed without wires over radio 
transmission to the digital unit. 
☺  While it is true that access to the network software is no longer possible if 
there is a power failure (unless the network has been protected by a no-break 
power supply), however, all of the locking system’s components that are 
equipped with a battery still function. 
2.7  Block Lock Function 3066 
SimonsVoss has the Block Lock Function 3066 in its product line as an option of the 
Digital Locking and Organization System. This function offers the possibility of 
activating your alarm system from a central point while at the same time preventing 
the monitored doors from being accidentally opened during this time. This rules out 
annoying and expensive false alarms right from the start. 
The Block Lock Function 3066 is also available as a VdS version
. 
3.0  Digital Components With Access Logging and 
Time Zone Control 
3.1 Access Logging 
The Plus versions of the digital locking cylinder, SmartRelay and activation unit record 
the access attempts of authorised transponders. The read-out of the access list from 
the lockings is done using the SmartCD or, in the case of a networked locking 
system, over the LockNodes. 
A total till 128 accesses (with Smart Relay 1.024), with date, time of day and 
transponder designation can be stored in the access lists of the separate 
components. After that, the complete file isn’t deleted, but instead the oldest access is 
always overwritten with the new one. 










