User Manual

46/68 Revision 2.1 December 2009
In the “Chips Options” section:
Select the detection method to be used in the drop-list, i.e. “Use AFI”, “Use EAS”, or “Use
both EAS and AFI”.
Select “Read UID” to have the pedestal trying to read the UID of stolen items.
Select “Read Memory” to have the pedestal trying to read the memory contents of stolen items. If
“Read Memory” is selected, you must specify the first block and number of blocks to be read in the
corresponding fields. You must also specify which blocks should be reported first (lowest or
highest) by selecting/unselecting the “Lowest Blocks First”
Configuring / Testing alarm duration
In the “Alarm Duration” section:
Select the alarm duration in the drop-list.
Click “Test” to trigger an alarm (this is useful either to test alarm duration, or to identify the
pedestal you’re connected to).
Configuring inter-pedestal RF synchronization
In the “Synchro” section:
Select whether the pedestal is to be configured as the Master or as a Slave (1…8).
Select the total number of pedestals (master and slaves) operating in close proximity and
sharing the same ID.
Select ID (master and slaves of one system installation must share the same ID)
For example, in the library configuration shown below we have:
System A with ID = 1 (M1 Master, S1, S2, S3 Slaves).
System B with ID = 2 (M2 Master, S1, S2 Slaves).
The Masters are disposed as far as possible from each other not to perturb themselves (Please
refer to section 4.3.2 “Placement of Pedestals").
Two different IDs are used to be sure that each slave will be synchronized with the master from its
own system.
Only one Master can be selected with several slaves.