Controlled Electronic Management Systems TSR608V930 Emerald TM multi smart card reader User Manual

Controlled Electronic Management Systems Ltd Emerald TM multi smart card reader Users Manual

Users Manual

Download: Controlled Electronic Management Systems TSR608V930 Emerald TM multi smart card reader User Manual
Mirror Download [FCC.gov]Controlled Electronic Management Systems TSR608V930 Emerald TM multi smart card reader User Manual
Document ID2532175
Application ID5vfkPHj1bZe8dzJmZ8ceAw==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize339.86kB (4248293 bits)
Date Submitted2015-02-12 00:00:00
Date Available2015-02-12 00:00:00
Creation Date2015-02-10 09:34:54
Producing SoftwareAcrobat Distiller 10.1.10 (Windows)
Document Lastmod2015-02-10 09:34:54
Document TitleUsers Manual
Document CreatorFrameMaker 10.0.2
Document Author: stpicton

emerald TS100/200/300
Installation Manual
TSR-IM-0045-1.6
Notice
The information in this manual was current when published. The manufacturer reserves the right to revise and
improve its products. All specifications are therefore subject to change without notice.
Copyright
Under copyright laws, the contents of this manual may not be copied, photocopied, reproduced, translated or reduced
to any electronic medium or machine-readable form, in whole or in part, without prior written consent of © 2013 Tyco
Security Products. All Rights Reserved.
Trademarks
The trademarks, logos, and service marks displayed on this document are registered in the United States (or other
countries). Any misuse of the trademarks is strictly prohibited and Tyco Security Products will aggressively enforce its
intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary.
All trademarks not owned by Tyco Security Products are the property of their respective owners, and are used with
permission or allowed under applicable laws.
Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not
all products include all features. Availability varies by region. Contact your sales representative for more information.
Licence information
Your use of this product is governed by certain terms and conditions.
Support
If you require technical assistance using CEM products, please contact the CEM Support team using the following
telephone number:
Telephone:+44(0)2890 456656
Email: cem.support@tycoint.com
• Please provide our support engineers with as much information as possible. This may include:
• Site name
• Product name and model
• CEM software version
• Description of the problem
Publication Date
31st May 2014
emerald TS100/200/300 Installation Manual
Warning
This is a class A product. In a domestic environment this product may cause radio interference in which case the user
may be required to take adequate measures
Warning
English
Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum
(or lesser) gain approved for the transmitter by Industry Canada.
To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the
equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two
conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including
interference that may cause undesired operation of the device.
French
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne
d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie Canada.
Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type
d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité
nécessaire à l'établissement d'une communication satisfaisante.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence.
L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2)
l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en
compromettre le fonctionnement.
Warning - For FCC Labelled emerald Terminals
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept an interference received, including interference that may cause undesired operation.
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. End users must
follow the specific operating instructions for satisfying RF exposure compliance. This transmitter must not be colocated or operating in conjunction with any other antenna or transmitter.
Changes or modifications not expressly approved by the party responsible for compliance could void the user's
authority to operate the equipment.
Installation of this device shall be performed by a qualified person in accordance to all local regulations.
This system must be installed within the protected premise in accordance with the National Electrical Code (NFPA70),
and the local authorities having jurisdiction.
Equipment changes or modifications without the approval of the party responsible for compliance could void the user's
authority to operate the equipment and could create a hazardous condition.
iii
CHAPTER 1 :
iv
TSR-IM-0045-1.6
Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Terminal specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
CEM emerald product codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Terminal dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Part ratings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Onboard memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Terminal key component parts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Simplified AC2000 Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Hardware Installation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
2. Mounting the Terminal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Preparing for mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Recommended tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Opening the terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Mounting the terminal back casing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
3. Wiring the Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Cabling requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Ethernet host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
The Front Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
The Input/Output Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Wiring locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Wiring a voltage provided lock (internal power) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Wiring a voltage not provided lock (external power) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Output power switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Inputs not in use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Terminal with Request to Exit Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Terminal with 3rd Party Wiegand Read Head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Terminal with S610s Exit Reader. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Terminal with DIU 210 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Terminal with DIU 230. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
PoE+ Terminal with S610s Exit Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Tamper Detection on Reader Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Wiring the resistor network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Configuring software for tamper detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Re-assembling the terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4. Reader Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Checking emerald’s Network Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Accessing the Configuration Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Setting the terminal IP address, gateway and subnet mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Network routing - (advanced users) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Testing the connection with the AC2000 server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5. AC2000 Software Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Reader Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Adding the device to AC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configuring a 3rd party read head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring Device Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Adding an input alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Configuring 4 state tamper inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Editing emerald Entries in AC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Editing device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Editing a device input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Deleting a device input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Input alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Assigning Remote Applications (TS300 model only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Creating groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Adding remote applications to groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Assigning a remote application group to users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Next Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
6. The System Configuration Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Menu Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Accessing the system configuration menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Device settings menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
System Information menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Tests menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
7. Door Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Door Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Door mode timings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Multi-swipe access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Control Post Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Software configuration for control post mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Passenger Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Configuring passenger mode in the software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
The passenger mode cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Lobby mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Interlock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Wiring two terminals for interlock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
The interlock process in door mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
The interlock process in passenger mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Image on Swipe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Enabling Image on swipe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Configuring Image on swipe options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Random checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Checking the firmware version of the terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Loading the firmware onto the terminal(s). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Updating the terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Appendix I: Device Settings Remote Application . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Using the Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Configuring the options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Appendix II: Broadcast and Timezone Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Appendix III: Loading Card Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Appendix IV: Configuring a Third Party Reader as a Master . . . . . . . . . . . . . . . . . 85
Appendix V: User Defined Logo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Licensing the emerald logo change function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Enabling the emerald logo change function on the CDC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Uploading a user defined Card Logo in AC2000 WEB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Chapter 1
Introduction
emerald (TS100/200/300) is an intelligent access terminal that provides secure door control with
optional intercom and Remote Applications for reporting and configuration.
Used as part of the AC2000 system, emerald controls access to restricted areas while giving the user a
wide choice of information tools and applications at the door.
Microphone
Multi-colour
status LED
Passive IR
detector
Speaker
4.3” capacitive
screen
Figure 1 Photograph of the emerald terminal
CHAPTER 1 : Introduction
1.1 Terminal specifications
emerald is available in three models; the TS100, TS200 and TS300.
Feature
TS100
TS200
TS300









Door access reader
Maintenance information point
Intercom
Remote Applications terminal
Table 1: Terminal features
Door access reader
Configured on an AC2000 system to provide full
access control at the door, including monitoring
inputs and triggering alarms.
Maintenance information point
View terminal information including software version,
network settings, door mode and database details.
Intercom
This facility provides a voice link between the
terminal and AC2000 workstation via Voice over IP.
Remote Applications terminal
Remote Applications run on the AC2000 server and
include terminal, card swipe and alarm reports.
These Applications can be accessed by cardholders
with appropriate permissions.
1.1.1 CEM emerald product codes
Contact CEM sales for further information.
Card
technology
Available in FCC/IC
approved model
TS100
TS200
TS300
Mifare CSN
TSR/100/105
TSR/200/105
TSR/300/105
FCC: QABTSR105V910
IC: 12009A-TSR105V910
CEM Desfire
TSR/100/107
TSR/200/107
TSR/300/107
FCC: QABTSR105V910
IC: 12009A-TSR105V910
iClass/iClass SE
TSR/100/108
TSR/200/108
TSR/300/108
FCC: QABTSR608V930
IC: 12009A-TSR608V930
PicoPass
TSR/100/106
TSR/200/106
TSR/300/106
multi smart card
reader
TSR/100/608
TSR/200/608
TSR/300/608
FCC: QABTSR608V930
IC: 12009A-TSR608V930
Table 2: List of CEM emerald product codes
Note
The typical read range for the internal 13.56Mhz head is 3 – 5cm
Important
The appropriate card definitions must be loaded onto the CEM Central Database Computer (CDC). See Loading
Card Definitions on page 83. If using Desfire EV1 cards not provided by CEM, please refer to the User Defined
Keys manual to configure card keys.
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Using Desfire EV1
There are two different types of Desfire EV1 card. CEM can provide a personalised Desfire
EV1 card, with pre-defined attributes or non-personalised Desfire EV1 cards can be used. If
using non-personalised cards, the user should refer to the User Defined Keys manual to
configure card keys.
1.1.2 Terminal dimensions
Figure 2 Illustration of emerald including dimensions
1.1.3 Part ratings
emerald has been tested and will work within the ranges specified in the table below.
Part
Rating
emerald terminal
-20º to 70ºC (-4º to 158ºF) flame retardant polycarbonate, rated to IP65
DC power (unit only)
12V nominal (10V – 14V) @500mA peak. (typically 300 - 400mA)a
Power over Ethernet
(PoE+)
15W - power to the terminal only. Lock and/or exit reader power should
be supplied separately.
Inputs
Four analog inputs - voltage supplied
Comms to exit reader
RS485 serial comms
Comms to system host
10/100 Base-T TCP/IP CAT5/5e/6
Dry contact outputs
30vDC @ 5a
Table 3: Table of part ratings
a. If the power supply is less than 12V @ 500 mA a separate PSU is required to power the lock
CHAPTER 1 : Introduction
1.1.4 Onboard memory
128MB RAM, 256MB NAND Flash
•
Up to 250,000 cardholder records (off-line)
•
Up to 50,000 transactions (off-line)
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
1.1.5 Terminal key component parts
Back casing
I/O board
Back
Ribbon cable
Front casing
Front board
Front
Figure 3 Illustration of the key component parts
Note
All emerald models use the same component parts.
CHAPTER 1 : Introduction
1.2 Simplified AC2000 Network Topology
Figure 4 Basic illustration of a typical AC2000 network including emerald configurations
Important
The emerald terminal is only available as an ethernet device.
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
1.3 Hardware Installation Process
Figure 5 Hardware installation flow chart
CHAPTER 1 : Introduction
TSR-IM-0045-1.6
Chapter 2
Mounting the Terminal
The emerald terminal can be mounted on a variety of standard electrical back boxes:
•
UK single back box
•
US single back box
•
UK double back box mounted vertically
•
75mm VESA mount
2.1 Preparing for mounting
Care must be taken with the internal components when disassembling the terminal.
2.1.1 Recommended tools
•
3 mm flat head screwdriver for input / output connections and DC power
•
Wire cutters and strippers
• Security hex screwdriver
Product
CEM Product Code
Security screw driver handle
HTO/000/001
Security screw driver bit
HTO/000/000
Table 4: Security screwdriver product codes
CHAPTER 2 : Mounting the Terminal
2.1.2 Opening the terminal
Important
Take care not to strain the ribbon cable connecting the two halves of the terminal.
Figure 6 Opening the terminal
1. Set the terminal on a stable, level surface to reduce the risk of the front of the terminal
falling when it is disconnected.
2. Remove the four screws using a security hex screwdriver.
3. Carefully lift the top casing away from the back of the terminal, pivoting as shown.
4. Disconnect the ribbon cable from the I/O board before commencing wiring.
10
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
2.1.3 Mounting the terminal back casing
To access the mounting screw positions of the terminal the Input/Output board must first be
removed from the back box.
A - Back casing
B - I/O board
C - Spacers
D - Mounting screws
Figure 7 Exploded view illustration of the back casing and I/O board
1. Remove the four screws and spacers using a star head screwdriver.
2. Lift the I/O board away from the mountings.
3. Drill the back outer casing as required for cable access and back box mounting. (see
Figure 8)
4. Fit the back casing to the back box.
5. Re-attach the input/output PCB to the back casing ensuring to replace the spacers.
11
CHAPTER 2 : Mounting the Terminal
Drilling the back casing
Figure 8 emerald back casing drill hole dimensions
Mounting hole
Description
Generic positions for wall mounting. These holes are accessible when
the I/O board is in place.
UK single back box.
US Single back box.
UK double back box mounted vertically.
75mm VESA mount.
Table 5: emerald mounting descriptions
12
TSR-IM-0045-1.6
Chapter 3
Wiring the Terminal
3.1 Cabling requirements
Table 6 on page 13 outlines recommended cabling requirements for each of the connectors on
the emerald terminal.
Purpose
Recommended Cable
Connector
Power over Ethernet & ethernet
comms
Cat 5/5e/6
RJ45
12V power supplied separately
Recommend using a CEM Door
Interface Unit 210/230
14AWG Screw
Terminal
Inputs
Belden 95XX or equivalent (XX =
the number of pairs from 01 - 50)
14AWG Screw
Terminal
Outputs
Belden 9462 or equivalent
14AWG Screw
Terminal
Connection with exit reader or
DIU
Belden 8723 (AWG22 shielded
twisted 2-pair) or equivalent
14AWG Screw
Terminal
Wiegand
Belden 9514 (7 x 22AWG), Alpha
1229C(9 x 22AWG) or equivalent
14AWG Screw
Terminal
Table 6: Terminal installation cabling requirements
3.1.1 Ethernet host
Ethernet communications should be cabled & terminated for 100Base-T operation according
to IN ANSI/TIA/EIA-568-A / TIA/EIA-568-B.
Type
Cable
Connector
Location
Host
CAT5/CAT5e/CAT6 (PoE)
RJ45 Socket
Terminal board
Table 7: Ethernet host
Due to limited space, additional care should be taken when using CAT6 connectors or CAT5
connectors with a strain relief boot at the terminal. There should be enough spare cable left
within the enclosure/back box to allow a service engineer to open the terminal case without
straining the RJ45 connector. Where the cable is subject to movement or vibration, stranded
ethernet cable (and appropriate connectors) should be used.
13
CHAPTER 3 : Wiring the Terminal
3.2 The Front Board
The front PCB contains the main electronic components of the reader; it is also where ethernet
communications must be connected.
J. Tamper
switch
A. Reset button
I. Network
link speed
LED
H. Ethernet
activity LED
G. Battery
backed clock
link
B. PoE Indicator
LED
C. Optional
DC12V
D. RJ45
E. Ribbon
connector to
the I/O board
F. 12V power
LED
Figure 9 Illustration of the front board
Component
Description
A. Reset button
Used to hard reboot the terminal.
B. PoE Indicator LED
Green indicates that the terminal is using PoE.
C. Optional DC12V
12V power can be supplied to the terminal using this connector, however it is
recommended that power be supplied via the I/O board.
D. RJ45 connector
Used to ethernet communications and also for Power over Ethernet when
being used.
E. Ribbon connector
Links the front PCB to the I/O PCB.
F. 12V power LED
Red indicates DC12V power is being supplied to the board
G. Battery backed clock link
This link is fitted at the factory. If the link is removed the reader will not store
the current time & date; card transactions may fail die to a mismatch in
time/date.
H. Ethernet activity LED
Flashing green indicates ethernet activity
I. Network link LED
Orange indicates 100baseT connection speed. Unlit indicates 10baseT
connection speed.
J Tamper switch
Used to trigger an alarm when the case is opened.
Table 8: Description of front board components
14
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.3 The Input/Output Board
The input/output board provides connections points for terminal power, inputs, outputs,3rd
party Wiegand read heads, communications with exit readers and door interface units.
I. Input
connectors
A. Wiegand
read head
interface
H. Comms to
exit/DIU
B. Output 0
state switch
G. Output 1
state switch
C. DC12V
F. Output 1
(spare)
C. DC12V
D. Output 0
(lock)
E. Ribbon
connector
Figure 10 Illustration of the Input/Output board
Component
Description
A. Wiegand interface
Interface for third party exit heads using Wiegand protocol.
B. Output 0 switch
Switches output 0 between internal 12V provided and voltage not
provided relay that uses external power.
C. DC12V
12V power, either from a CEM Door Interface Unit or an appropriate
power source is supplied via this connector.
D. Output 0
Lock output, either 12V provided by the terminal or 12/24V provided
externally via the relay.
E. Ribbon connector
Links the I/O PCB to the front PCB.
F. Output 1
Spare output. The output is also used when configuring the reader in
interlock mode.
G. Output 1 switch
Switches output 1 between internal 12V provided and voltage not
provided relay that uses external power.
H. Comms to exit/DIU
Serial communications to a CEM exit reader such as the S610s or a Door
Interface Unit
I. Input connectors
Connection points for monitored inputs such as door position, lock sense
and request to exit switches.
Table 9: Description of I/O board components
15
CHAPTER 3 : Wiring the Terminal
3.4 Wiring locks
The terminal supports lock types rated 12-24V at 1.5A max current if using an external power
supply. It is recommended that the lock is powered by an external power supply as this
provides the most flexibility. However if required, internal power to a lock can be provided at
12V, 650mA max current.
3.4.1 Wiring a voltage provided lock (internal power)
Only12V locks can be wired to be powered internally by the terminal. When internal power is
utilised it is possible to connect locks in a fail safe or fail secure configuration.
Note
The maximum current that can be supplied is 1.5A using an external power supply or 650mA
from the internal supply.
Fail safe lock
The fail safe configuration means that in the event of a power loss to the terminal the lock will
open allowing free access. A lock that is constantly powered such as a maglock must be used.
Figure 11 Illustration of wiring for a fail safe lock
Fail secure lock
The fail secure configuration means that in the event of a power loss to the terminal the lock
will remain secure. A lock that requires power to open such as a shear lock must be used.
Figure 12 Illustration of wiring for a fail secure lock
16
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.4.2 Wiring a voltage not provided lock (external power)
Important
When using 24V power for a lock, it is imperative that the switch position is set to EXT. Setting the switch to INT
will result in 24V being supplied to the terminal which may cause irreversible damage.
This is the recommended wiring configuration when locks require 24V or more than 650mA.
Figure 13 Illustration of wiring for lock with external power provided
3.4.3 Output power switch
Each of the two outputs has a switch that allows power to be provided to the output from the
terminal’s internal power circuit or by an external power source.
External power
When the switch is set to EXT a separate DC12 - 24V power source must be used to provide
power for any locks or other devices such as sounders attached to the output.
Internal power
When the switch is set to INT, DC12V 650mA max current in total is provided to the lock or
other devices attached to the outputs from the terminal’s internal power circuitry.
Important
The terminal’s 12V connectors all link to the same circuit, powering the terminal and any outputs set to INT. It is
imperative that before attaching 24V to power an output checks should be made that the relevant output switch is
set to EXT. Applying 24V to an output with the switch set to INT will result in 24V being supplied to the common
power circuitry, potentially damaging the terminal.
3.4.4 Inputs not in use
Some inputs must be linked out when not in use, to prevent alarms being generated on the
system. These are:
•
Input 0 - door position sensor
•
Fire input on a Door Interface Unit
•
Tamper input on a Door Interface Unit
•
Break Glass input on a Door Interface Unit
17
CHAPTER 3 : Wiring the Terminal
3.5 Terminal with Request to Exit Switch
Figure 14 emerald master terminal with REX wiring diagram
18
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.6 Configuration information
Wiring an emerald terminal with a request to exit switch is the most basic wiring configuration
and is not recommended for use on high security doors.
Input configuration
The table below illustrates the configuration and operation of the inputs on the terminal when
configured with a Request to Exit switch.
Input number
Input function
Default input trigger state change
Door position
short => open
Lock position
short => open
Request to exit
switch open => momentary short => open
Spare/Interlock
short => open
Table 10: emerald and request to exit switch input configuration
Note
Wiring diagram is for the installation of the emerald terminal in Door Mode.
19
CHAPTER 3 : Wiring the Terminal
3.7 Terminal with 3rd Party Wiegand Read Head
Figure 15 emerald master terminal with Wiegand read head wiring
20
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.8 Configuration information
The emerald terminal facilitates the use of a third party exit Wiegand head with three LEDs.
Supported third party read heads
CEM support the use of HID R10 heads for reading Mifare and iClass cards.
Product
CEM Product Code
HID iClass SE R10 SmartCard Reader
HDS/053/010
HID iClass SE R30 SmartCard Reader
HDS/053/030
HID iClass SE R40 SmartCard Reader
HDS/053/040
Table 11: Read head product code
Note
The sounder functionality of third party read heads is not supported.
Typical Wiegand read head wiring
For specific read head wiring consult the third party manufacturer.
I/O board connection
Typical HID colour
GND
Black
Sounder
Not Supported
Green LED
Orange
Amber LED
Not fitted
Red LED
Brown
Data 1
White
Data 0
Green
Head 12V
Red
Table 12: Typical Wiegand head wiring
Important
For proper regulatory compliance, the drain wire should be disconnected at the power supplied end of the cable.
Input configuration
The table below illustrates the configuration and operation of the inputs on the terminal when
configured with a third party Wiegand read head.
Input number
Input function
Default input trigger state change
Door position
short => open
Lock position
short => open
Request to exit
switch open => momentary short => open
Spare / Interlock
short => open
Table 13: emerald and 3rd party read head input configuration
Note
To configure a Slave reader as the Master reader, refer to the Appendix on page 85.
21
CHAPTER 3 : Wiring the Terminal
3.9 Terminal with S610s Exit Reader
Figure 16 emerald master terminal with S610s exit reader
22
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.9.1 Configuration information
Using a CEM S610s exit reader provides a higher level of security at the door than using a
third party read head.
Product
CEM Product Code
S610s Card Reader (Mifare CSN)
RDR/612/105
S610s Card Reader (DESfire)
RDR/612/107
S610s Card Reader (iClass)
RDR/612/108
S610s Card Reader (Pico Pass)
RDR/612/106
Table 14: S610s product code
Input configuration
The S610s reader has four inputs and two relay outputs which are spare in this configuration.
Input
number
Input
location
Input function
Default input trigger state change
Master
terminal
Door position
short => open
Master
terminal
Lock position
short => open
Master
terminal
Request to exit
switch open => momentary short => open
Master
terminal
Spare / Interlock
short => open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
Table 15: emerald and S610s exit reader input configuration
23
CHAPTER 3 : Wiring the Terminal
3.10 Terminal with DIU 210
Figure 17 emerald master terminal with a DIU 210 wiring
24
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.10.1 Configuration information
Using a CEM DIU210 provides the highest level of security at a door, removing power for the
lock and input monitoring away from the door reader.
Product
CEM Product Code
DIU 200 (Compact board only DIU module)
DIU/700/200
DIU 210 Full DIU incl Enclosure/PSU (Does
not include backup batteries)
DIU/700/210
Table 16: Door Interface Units product code
Important
The DIU210 uses mains electricity and should only be installed by qualified personnel.
Input configuration
When a DIU210 is used with a terminal, the DIU controls the main CEM reserved inputs and
the inputs on the readers become spare. The exception to this is input three on the terminal
(input B in Table 6 on page 13) which maintains its status as being used for interlock mode.
Input
number
Input
location
Input function
Default input trigger state change
DIU
Door position
short => open
DIU
Lock position
short => open
DIU
Request to exit
switch open => momentary short => open
DIU
Break glass
short => open
DIU
Fire
short => open
DIU
Mains power fail
Internally triggered
DIU
Battery low
Internally triggered
DIU
DIU tamper
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare / Interlock
short => open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Table 17: emerald and DIU210 input configuration
Important
If a decision has been made not to connect a fire and break glass units to the DIU the inputs must be linked out to
ensure that the DIU functions normally. The tamper input must also be linked out when not in use to prevent
alarms being generated on AC2000.
25
CHAPTER 3 : Wiring the Terminal
3.11 Terminal with DIU 230
Figure 18 emerald terminal with DIU 230 wiring
26
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.11.1 Configuration information
Using a CEM DIU230 provides the highest level of security at a door, removing power for the
lock and input monitoring away from the door reader. The DIU is a PoE+ device and does not
require specialist electrical qualifications to install.
Product
CEM Product Code
DIU 230 PoE+ (board only)
DIU/700/230
DIU 230 PoE+ (with enclosure)
DIU/700/231
Table 18: DIU230 product codes
Input configuration
When a DIU230 is used with a emerald terminal, the DIU controls the main CEM reserved
inputs and the inputs on the readers become spare. The exception to this is input three on the
emerald terminal (input B in the table below) which maintains its status as being used for
interlock mode..
Input
number
Input
location
Input function
Default input trigger state change
DIU
Door position
short => open
DIU
Lock position
short => open
DIU
Request to exit
switch open => momentary short => open
DIU
Fire
short => open
DIU
Breakglass
short => open
DIU
Mains power fail
Internally triggered
DIU
Battery low
Internally triggered
DIU
DIU tamper
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare
short => open
Master
terminal
Spare / Interlock
short => open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Exit reader
Spare
normally open
Table 19: emerald and DIU230 input configuration
Important
If a decision has been made not to connect a fire and break glass units to the DIU the inputs must be linked out to
ensure that the DIU functions normally. The tamper input must also be linked out when not in use to prevent
alarms being generated on AC2000.
27
CHAPTER 3 : Wiring the Terminal
3.12 PoE+ Terminal with S610s Exit Reader
Figure 19 PoE emerald with S610s exit reader wiring
28
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.12.1 Configuration
Important
When powering the emerald terminal using PoE+, the total peak current draw of the attached door furniture must
not exceed 840mA.
Using a CEM S610s exit reader provides a higher level of security at the door than using a
third party read head.
Product
CEM Product Code
S610s Card Reader (Mifare CSN)
RDR/612/105
S610s Card Reader (DESfire)
RDR/612/107
S610s Card Reader (iClass)
RDR/612/108
S610s Card Reader (Pico Pass)
RDR/612/106
Table 20: S610s product code
Input configuration
The S610s reader has four inputs and two relay outputs which are spare in this configuration.
Input
number
Input
location
Input function
Default input trigger state change
Master
terminal
Door position
short => open
Master
terminal
Lock position
short => open
Master
terminal
Request to exit
switch open => momentary short => open
Master
terminal
Spare / Interlock
short => open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
S610s exit
Spare
normally open
Table 21: emerald and S610s exit reader input configuration
29
CHAPTER 3 : Wiring the Terminal
3.13 Tamper Detection on Reader Inputs
Terminal inputs can be monitored for four state tampering, open, close, tamper short and
tamper cut. If an input is tampered with an alarm will be triggered in the AC2000 software. The
alarm is a universal tamper alarm and does not distinguish between the four different states. In
order to monitor inputs for tamper short and tamper cut, a resistor network must be installed on
the input sensor wiring and the AC2000 software configured to monitor the input.
3.13.1 Wiring the resistor network
Figure 20 Illustration of the resistor network for four state tamper detection on inputs
Important
It is imperative that the tamper resistor network is wired as close to the sensor as possible.
3.13.2 Configuring software for tamper detection
1. From the Floatbar select Device Configuration | Devices.
2. Select the device on which inputs are to be configured for four state tamper detection.
3. Select the Configuration tab.
4. Select the Input Config tab.
5. Select each input element to be configured for four state and tick the 4 state checkbox.
6. Click Save.
30
A2SE67-UG-0011-1
AC2000 Getting Started Guide
3.13.3 Re-assembling the terminal
1. Ensure that there is adequate cable length available to reach the connectors comfortably
for each of the following:
– 12vDC
– Cat5e/6 cable for communications and / or PoE
– Output wiring for lock
– Wiring for inputs e.g. door position sensor, lock sense
Important
To maintain the terminal’s IP65 rating, the cable access hole should be adequately sealed before completing the
installation process.
2. Attach the front pane of the terminal via the ribbon connector.
3. Attach the front of the terminal to the back casing and fix in places with the screws.
4. Attach the protective side panels to the terminal.
Note
If the terminal needs to be open after installation, the side panels can be removed by inserting
a 5 mm flat head screwdriver into the slot under the centre of the panel and sliding along the
length of the panel.
31
This page is intentionally blank.
32
A2SE67-UG-0011-1
Chapter 4
Reader Network Configuration
The network settings are accessed via the installer configuration menu on the terminal.
4.1 Checking emerald’s Network Status
1. Tap the Reader Address. The network status indicator is displayed for eight seconds.
Network status indicator
Figure 21 Checking the network status
Each section of the status indicator represents a different aspect of the network connectivity.
The presence or absence of a block indicates whether or not the connection is good.
The top block indicates that
the terminal has received its
onboard database of
cardholders/timezones etc.
The bottom block indicates
that the terminal is connected
with the RTC.
The centre block indicates
that the terminal has received
its configuration settings from
the CDC
The TCP/IP indicator shows
ethernet connectivity.
Figure 22 The network status indicator
33
CHAPTER 4 : Reader Network Configuration
4.2 Accessing the Configuration Menu
1. Slowly swipe a finger across the date/time from left to right.
2. When prompted to enter passcode type 67679999.
Figure 23 Accessing the configuration menu
Note
Once the terminal has received a configuration from the server this passcode will be changed
to 67670000. The final four digits of this PIN are configurable for the terminal in the Devices
application, see section 6.3 Accessing the system configuration menu on page 48.
4.2.1 Setting the terminal IP address, gateway and subnet mask
1. From the Config Menu press Device settings | Network.
Cancel
Delete
Figure 24 Configuring the terminal network settings
2. Press the IP address field, type the address and press OK.
3. Press the SubNet mask field, type address and press OK.
4. Press the Gateway field, type the address and press OK.
5. Press Done to close the Network menu.
34
A2SE67-UG-0011-1
AC2000 Getting Started Guide
4.2.2 Network routing - (advanced users)
The emerald terminal needs to be able to communicate with the Central Database Computer
(CDC) and the Real Time Computer (RTC). If a network is fragmented, and the reader, CDC
and RTC are on different parts of the network it may be necessary to route communications to
the RTC. In this situation contact the site network administrator.
1. From the Configuration Menu press
Device Settings | Routing.
2. Press the Network field, type the
network IP address and touch OK.
3. Press the SubNet mask field, type
address and touch OK.
4. Press the Gateway field, type the
address and press OK.
5. Touch Done to close the menu.
Figure 25 The routing menu
4.2.3 Testing the connection with the AC2000 server
The terminal can be used to test the connectivity with the AC2000 server via a PING utility.
1. From the Configuration Menu press Tests | Network tests
2. Press the Ping address field below Ping Other.
Figure 26 Testing the connection with the AC2000 server
3. Type the IP address of the AC2000 server (CDC/RTC) and press OK.
4. Press Ping Any.
i.
If a response is received from the pinged address the Ping Any button will turn green.
ii.
If no response is received from the address the Ping Any button will turn red.
5. The PING utility can be used to check connectivity to any device on the network.
35
This page is intentionally blank.
36
A2SE67-UG-0011-1
Chapter 5
AC2000 Software Configuration
This section of the manual focuses on the initial addition and configuration of the device and input
alarms. All other advanced configuration options will be covered in the relevant function sections. The
emerald terminal is added to the AC2000 system and configured using the Devices application.
Note
This manual assumes access to the necessary AC2000 applications and should be performed
by person(s) trained in its use.
5.1 Reader Addressing
The AC2000 system communicates with all devices on the access control network using the
CEM reader addressing system.
All devices are allocated a five digit reader address, the address is displayed in the top right of
the terminal display.
Reader address
Figure 27 Location of the reader address on the screen
Each digit of the reader address signifies a position on the Devices application hierarchy.
Device group number 0 - F
Master / Exit
0 = Master reader
1 = Exit reader
RTC number ranges
from 00 - DE
Device number 0 - F
Figure 28 Illustration describing AC2000 reader addressing
37
CHAPTER 5 : AC2000 Software Configuration
5.2 Adding the device to AC2000
1. From the AC2000 Floatbar open Device Configuration | Devices.
2. Select the controller and device group to which the device is to be added.
3. Right click the device group and select Add Device.
Figure 29 The add device dialogue with example terminal information
4. Select the Device Type TS100, TS200 or TS300 from the drop down menu.1
5. Select the Configuration Mode TS 100/200/300 from the dropdown list.2
6. Select a Device Number for the device.
7. Enter a unique Device Location description for the device
8. Where a slave device has been included in the Device Type, enter a unique Slave
Location description for the Slave device.
9. Enter the unique Mac Address of the device.
– This is found in the System information | Network on the emerald terminal.
10. Enter the unique IP address of the device.
11. Click Add. The terminal is now added to the AC2000 system.
Note
Threat groups are only used if threat levels have been activated on AC2000. For further
information consult the AC2000 Threat Levels manual.
1.If an exit or auxiliary device is added to the master reader, ensure to select the correct type, i.e. A
TS100 device with an Exit Reader would have a Device Type of TS100+Slave. This will configure
the Master device with an attached slave device.
Any exit reader added to a master will appear as a child node in the Overview Pane of the master reader it is associated with.
2.The configuration mode contains default settings, however these can be user defined. To create a
configuration mode refer to the AC2000 User Guide.
38
A2SE67-UG-0011-1
AC2000 Getting Started Guide
5.2.1 Configuring a 3rd party read head
After following the instructions in Adding the device to AC2000 on page 38, a Slave added to a
master reader is configured as slave reader by default. To configure the Slave to be a read
head only, perform the following steps:
1. From the AC2000 Floatbar, open Device Configuration | Devices.
Configuration tab
Common
tab
Selected
device and
associated
slave
Slave
settings
Slave reader enabled
Figure 30 3rd party read head configuration
2. Select the device (with associated slave) to be configured.
3. Select the Configuration tab.
4. Select the Common tab.
5. Select Slave Settings from the list in the main pane.
6. In the Options pane at the bottom of the interface, make sure that the Slave reader
enabled checkbox is not ticked.
7. Select Save.
The Slave associated with the master device is now configured as a 3rd party read head and
not a Slave reader.
39
CHAPTER 5 : AC2000 Software Configuration
5.3 Configuring Device Inputs
If inputs are to be used to trigger alarms or events in the AC2000 software they must be first be
configured in the Devices application.
5.3.1 Adding an input alarm
1. From the AC2000 Floatbar select Device Configuration | Devices.
2. Select the device to configure from the overview pane.
3. Select the Inputs tab at the top of the main pane.
4. Click Add in the main pane.
Inputs
Alarm
type
Save
Figure 31 Adding inputs dialog with example input 0 configuration
5. Select the Input from the list on the left which is to be configured.
6. Check the box next to the State name, this will enable the associated fields.
7. Select the Alarm which will be triggered on the change of state.
8. Click Save to save the Device Inputs configuration.
5.3.2 Configuring 4 state tamper inputs
1. Select the Configuration tab.
2. Select the Input Config tab.
3. Select each input element to be configured for four state and tick the 4 state checkbox.
4. Click Save.
40
A2SE67-UG-0011-1
AC2000 Getting Started Guide
5.4 Editing emerald Entries in AC2000
The following instructions are only required if the settings need to be edited during or after
terminal installation.
5.4.1 Editing device properties
1. Select the master device in the overview pane.
2. Make the required changes and click Save.
5.4.2 Editing a device input
1. Select the Input and the Input State that is to be edited from the Device Inputs
2. Click Save when changes have been completed.
Note
Save is only displayed when a change has been made.
5.4.3 Deleting a device input
1. Select the input from the Device Inputs list.
2. Click Delete.
Note
Care should be taken when deleting an input as no warning message will appear.
5.4.4 Input alarms
The following section contains input tables describing the set-up for each of the emerald
configurations outlined in this manual, including the AC2000 alarms that should be selected for
each sensor state where appropriate:
Input table for emerald with REX and emerald with third party read head:
Input number
Input function
Sensor state
AED alarm
Door position
Open
Door forced
Closed
Door closed
Open
Lock not engaged
Closed
Lock engaged
Lock position
Request to exit
No default
Spare / interlock
No default
Table 22: emerald and REX / Third party read head input alarms
41
CHAPTER 5 : AC2000 Software Configuration
Input table for emerald with S610s exit reader:
Input number
Input function
Sensor state
AED alarm
Door position
Open
Door forced
Closed
Door closed
Open
Lock not engaged
Closed
Lock engaged
Lock position
Request to exit
No default
Spare / interlock
No default
Spare
No default
Spare
No default
Spare
No default
Spare
No default
Table 23: emerald and S610s exit reader input alarms
Input table for emerald with DIU210 and S610s exit reader:
Input number
Input function
Sensor state
AED alarm
Door position
Open
Door forced
Closed
Door closed
Open
Lock not engaged
Closed
Lock engaged
Lock position
Request to exit
Break glass
Fire
Mains power fail
No default
Open
Breakglass
Closed
Breakglass reset
Open
Fire alarm
Closed
Fire alarm reset
Open
Mains power fail
Closed
Mains OK
Battery low
Open
DIU battery low
DIU tamper switch
Open
DIU tamper
Spare
No default
Spare
No default
Spare
No default
Spare / interlock
No default
Spare
No default
Spare
No default
Spare
No default
Spare
No default
Table 24: emerald and DIU210 input alarms
42
A2SE67-UG-0011-1
AC2000 Getting Started Guide
Input table for emerald with DIU230 and S610s exit reader:
Input number
Input function
Sensor state
AED alarm
Door position
Open
Door forced
Closed
Door closed
Open
Lock not engaged
Closed
Lock engaged
Lock position
Request to exit
Fire
Break glass
Mains power fail
No default
Open
Fire alarm
Closed
Fire alarm reset
Open
Break glass
Closed
Break glass reset
Open
Mains power fail
Closed
Mains OK
Battery low
Open
DIU battery low
DIU tamper switch
Open
DIU tamper
Spare
No default
Spare
No default
Spare
No default
Spare / interlock
No default
Spare
No default
Spare
No default
Spare
No default
Spare
No default
Table 25: emerald with DIU230 and S610s input alarms
Input table for four state tamper configuration:
Input number
Input function
Sensor state
AED alarm
Door position
Open
Door forced
Closed
Door closed
Tamper
Input Tamper
Open
Lock not engaged
Closed
Lock engaged
Tamper
Input Tamper
Lock position
Table 26: Input table for four state tamper configuration
43
CHAPTER 5 : AC2000 Software Configuration
5.5 Assigning Remote Applications (TS300 model only)
To assign Remote Applications to users open AC2000 WEB by typing the IP address of the
AC2000 CDC into a browser and select System | Utilities | Remote Apps Allocation
Three steps must be taken in order to assign Remote Applications. First, a group or groups are
created by user type and then Remote Applications are added to the group. The final step is to
select the cardholder’s record in the AC2000 Personnel application and assign the Remote
Application Group to the user.
Note
For further information about setting up Remote Applications on the terminals consult the
AC2000 Web manual.
5.5.1 Creating groups
To create a Group of Remote Applications:
1. Select the Add Group button.
2. In the text box enter a Group Name and click the ADD button. (A Group Name could refer
to user types, e.g, Support, Managers, Engineers.) 
If appropriate tick the Default Group check box to make the group the default setting in
the Personnel Application.
3. Press the Return button.
5.5.2 Adding remote applications to groups
To add Remote Applications to a group ensure the group name is selected in the Group drop 
down list.
Figure 32 Adding Remote Applications to groups
1. Select a Remote Application or Applications by clicking on them in the blue pane (this
moves it to the grey pane, placing it in the selected Group).
2. Click Save.
44
A2SE67-UG-0011-1
AC2000 Getting Started Guide
5.5.3 Assigning a remote application group to users
To assign a Remote Application Group to a cardholder:
1. Open AC2000SE | Enrolment | Personnel
2. Edit the cardholder’s record and select the appropriate listing from the Remote App.
Group drop down list.
Remote
App Group
drop down
list
Figure 33 Assigning Remote Application Group in Personnel
Note
If the Remote App Group drop down list is not visible in the Personnel interface, the option
has not yet been enabled. To enable this option, open the Configured application and scroll to
remote_app_group_enabled in the main pane. Type Y in the Value field and click Save. The
Remote App Group will now display as an option in Personnel records.
3. Click Save Changes button. The cardholder can now access the Remote Applications on
the terminal.
5.6 Next Steps
Congratulations! The emerald terminal is now fully installed. The remainder of the manual
details how to perform more advanced, complex tasks with the terminal including:
•
Using the system configuration menu to view maintenance information and perform
terminal tests
•
Configuring the terminal in additional modes such as passenger mode and control post.
•
Upgrading terminal firmware
•
Configuring device settings using the Device Settings Remote Application
Important
Advanced configuration of the terminal should only be carried out by users that have completed CEM AC2000
installer training.
45
This page is intentionally blank.
46
A2SE67-UG-0011-1
Chapter 6
The System Configuration Menu
emerald utilises an intuitive Graphical User Interface to access terminal functionality. At the basic level,
the screen is used to display meaningful messages regarding the current card swipe transaction. The
more advanced options allow the user to access information and reports that are relevant to them.
The emerald touch screen is a high quality capacitive screen, which is highly responsive in
multiple weather conditions. The reader interface provides access to a variety of tools, reports
and information such as:
•
Terminal configuration options
•
Diagnostics and tests
•
Software and hardware versions
•
User specific Remote Applications
6.1 Menu Overview
Figure 34 Overview of the system configuration menu
47
CHAPTER 6 : The System Configuration Menu
6.2 Navigation
Menus on the Touchscreen terminal are accessed by touching the menu option to expand.
•
Menus are expanded and closed by pressing the menu name or the arrow.
Figure 35 Expanding and closing reader menus
6.3 Accessing the system configuration menu
To access the configuration menu:
1. Slowly swipe a finger across the date/time from left to right.
2. When prompted to enter passcode type 6767000.
Note
See Accessing the Configuration Menu on page 34 for more details on passcodes..
Figure 36 Accessing the configuration menu
Configuring the passcode
The final four digits of the passcode can be changed to a site or reader specific code.
1. Open the Device application and select the reader.
48
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
2. Select Configuration | Other | Diagnostic Pin.
3. Type the new PIN into the text field.
4. Click Save.
The system configuration menu has three sub-menus, each of which contains specific terminal
maintenance functions.
Access useful
information about the
terminal
Configure terminal
settings
Administer tests to
check terminal
functionality
Figure 37 The system configuration menu
6.3.1 Device settings menu
The Device Settings menu is used to configure network and LCD settings.
Configure routing
settings in disjointed
networks
Configure terminal
network settings
Configure terminal
options
Figure 38 The device settings menu
49
CHAPTER 6 : The System Configuration Menu
Network
The Network menu is used to configure the network settings for the terminal.
The IP address assigned to
the terminal
The SubNet mask of the
network that the terminal is
connected to
The IP address of the
Gateway server where
appropriate
Figure 39 The Network menu
Routing
The emerald terminal needs to be able to communicate with the Central Database Computer
(CDC) and the Real Time Computer (RTC). If a network is fragmented and the reader, CDC
and RTC are on different parts of the network, it may be necessary to route communications to
the RTC. In this situation, contact the site network administrator.
The IP address of the routing
network
The SubNet mask of the
routing network
The IP address of the
gateway server
Figure 40 The Routing menu
50
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Options
The Options menu is used to change the LCD brightness and update the terminal’s onboard
cardholder database.
Use the slider to adjust the
minimum brightness of the
LCD (left is lowest)
Use the slider to adjust the
maximum brightness of the
LCD (left is lowest)
Tap Reload to repopulate the
onboard database from the
CDC
Figure 41 The Options menu
51
CHAPTER 6 : The System Configuration Menu
6.3.2 System Information menu
This menu contains information about the device including network, firmware version,
database and configuration.
Important
When contacting CEM support with any issues, this information may be asked for.
View terminal network
information
View firmware, software and
UI versions
View information about the
onboard cardholder database
View information about the
terminal device configuration
View the status of terminal
connections, including
comms and tamper
Network
The Network information section details all of the terminal network settings.
Info
Description
CEM address
The CEM reader address of the terminal.
IP address
The IP address of the terminal.
Subnet mask
The subnet mask of the network hosting the terminal.
Default gateway
The IP address of the gateway server.
MAC address
The MAC address of the terminal.
RTC address
The IP address of the RTC controlling the terminal.
VOIP server
The IP address of the VOIP server for intercom functionality.
VOIP help station
Intercom station number. This number is used to allow an intercom
workstation to communicate with the terminal.
Table 27: Terminal network information descriptions
52
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Versions
The Versions information section details all hardware and software versions of the terminal.
Info
Description
TSR Version
Firmware version
UI Version
User interface version
S/W Date
Date of last firmware update
S/W Time
Time of last firmware update on the S/W Date
H/W Version
Version of the terminal hardware
H/W s/n
Serial number of the terminal
Linux
Linux kernel version, including date and time.
Qt
Version of Qt library used by the UI.
Table 28: Terminal versions information descriptions
Database
The Database information section details the information about the onboard card database.
Info
Description
CEM address
The CEM reader address of the terminal.
Coldstart count
Record of the number of times the terminal has been coldstarted.
Last coldstarted
Date and time of the terminal’s last coldstart.
Card count
Number of active cards held on the reader.
Last updated
Date and time of the last database update from the server.
Trans all count
Displays the number of buffered transactions and alarm events (in
offline mode). This is cleared when the terminal next goes online.
Trans card count
Displays the number of buffered transactions only (in offline mode).
This is cleared when the terminal next goes online.
Last configured
Displays the date and time that the terminal last received configuration
data from the server.
Table 29: Terminal database information descriptions
Configuration
The Configuration menu provides information about terminal door modes.
Info
Description
Door mode
Indicates the current door mode of the terminal. Standard Door,
Control Post, or Passenger mode.
PIN only TZ
Displays a number to indicate which timezone is allocated as a PIN
only timezone.
Card only TZ
Displays a number to indicate which timezone is allocated as a Card
only timezone
Door override TZ
Displays a number to indicate which timezone is allocated as a Door
override timezone
Locked out TZ
Displays a number to indicate which timezone is allocated as a Locked
out timezone
Table 30: Terminal configuration information descriptions
53
CHAPTER 6 : The System Configuration Menu
Unit information
The Unit information section provides information regarding the status of the terminal.
Info
Description
Tamper sensor
Describes the status of the internal tamper switch.
Run time
Information about the running time and load of the terminal.
Main comms
Indicates the status of the main comms.
Database engine
Indicates the status of the database engine.
Local inputs
Indicates the status of the local inputs such as door position, lock
sense etc.
Main reader
Indicates the status of the emerald master terminal.
Door interface
Indicates whether a door interface unit is currently connected to the
emerald terminal.
2nd reader
Indicates whether an exit reader is currently connected to the terminal.
Table 31: Terminal unit information descriptions
6.3.3 Tests menu
The emerald terminal has built in tests that can be performed to check specific functionality.
Important
When contacting CEM support with any issues, these tests may be requested.
Test the terminal inputs
Test network settings
Display card for testing
LCD brightness and
display settings
Figure 42 The tests menu
54
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Input tests
The default Input tests screen displays the four terminal input states. When peripherals such
as an exit reader or door interface unit are attached to the terminal, their inputs will also be
displayed on the screen.
Inputs. Each number
correlates with a
terminal input number
as detailed in chapter
3. e.g input 0 is door
position.
Input state. To test
the inputs, change the
state of the input e.g.
open and close the
door to test if the
terminal is registering
the state change.
The position of each
box corresponds with
an input state as
defined on the left of
the screen.
Figure 43 The input tests screen
Two state input test
When an input has been wired in a 2 state open and closed configuration only the Open and
Short tests can be administered.
Open - The input is opened.
Short - The input is closed.
Four state input test
When an input has been wired in a 4 state configuration as described in section 3.13.1 on
page 30, all four input state tests can be administered.
Open - Indicates a tamper cut condition.
Opened - The input is open.
Closed - The input is closed.
Short - Indicates a tamper short condition.
55
CHAPTER 6 : The System Configuration Menu
Network tests
The Network tests screen provides PING tests to check connectivity with the intercom server
and with any other provided IP address.
Press to PING the
intercom server
Press to Ping any to
PING the address
entered below
Type an IP address to
PING with the Ping
any button
Figure 44 Terminal network tests
There are two possible responses for the ping utilities:
56
Red:
No response received
Green:
Response received
TSR-IM-0045-1.6
Chapter 7
Door Modes
The emerald terminal can be configured to function in different modes other than the standard
door mode described in the main section of the manual. The door modes are:
•
Door mode including:
– Interlock
– Multi-swipe
•
Control post
•
Passenger mode including:
– Interlock
7.1 Door Mode
Door mode is the normal terminal configuration that is described in the main installation
section of this manual. It allows a terminal to control access to a door and monitor specific
inputs associated with that door.
7.1.1 Door mode timings
When a valid card is presented at a terminal in door mode, a chain of events takes place which
is dictated by specific settings in the Devices application. These timings are configurable in
the Devices application and also on the terminal itself.
The door open cycle.
Figure 45 Illustration of typical door timings
57
CHAPTER 7 : Door Modes
1. The card is swiped at the terminal and access granted.
2. Lock power is dropped for a period of time known as Lock open time. (Five second
default) If the door is not opened by the end of this time, the lock re-engages.
3. After the door is opened by the cardholder the lock power remains off for a period of time
to prevent the lock re-engaging and closing the door before it is fully opened. This is the
Lock open time 2. (One second default)
4. The door is closed. If the door remains open longer than the Door close after time a door
held alarm will be generated on the terminal and the AC2000 system. (Default 15 seconds)
Configuring the timings in the devices application
1. From the Floatbar open Device Configuration | Devices.
2. Select the terminal from the list and open the Configuration panel.
3. Open the Common panel.
Select the
timing which
is to be
amended
Update the
value
required in
seconds
Click Save
Figure 46 Updating the door cycle timings
Note
Configuration of other timings is covered in the appendices of this manual.
7.1.2 Multi-swipe access
The emerald terminal can be configured to require swipes from up to five valid cards before
granting access. This is configured using the Device application. Once this setting is
58
A2SE67-UG-0011-1
AC2000 Getting Started Guide
configured, an initial valid swipe will prompt a request for further valid swipes on the screen
before opening the door. Once all valid cards are swiped the terminal will grant access.
Figure 47 Multi-swipe request screen and access granted screen
The multi-card swipe screen will show the number of valid cards required to grant access, up
to a maximum of five cards. As each valid card is swiped a card image will move into the box
until all the required cards are swiped and access is granted.
Software configuration for multi-swipe access
1. From the Floatbar open Device Configuration | Devices.
2. Select the terminal from the list and open the Configuration panel.
3. Open the Other panel.
Select Multi
swipe mode
Place a tick
in Enable
options
Select the
maximum
wait time
between
swipes
Select the number
of swipes required
to open - max 5
Click Save
Figure 48 Configuring multi-swipe access
59
CHAPTER 7 : Door Modes
7.2 Control Post Mode
Control post mode places the terminal into a state where cards are swiped at a terminal with
no door equipment present. The terminal acknowledges the card but performs no other action.
Transaction logs are still maintained and all events can be observed in real time via the
Rolling Transaction Display application.
Note
All inputs may still be used as general purpose inputs and can be configured to trigger alarms
on the AC2000 software.
7.2.1 Software configuration for control post mode
1. From the Floatbar open Device Configuration | Devices.
2. Select the terminal from the list and open the Configuration panel.
3. Open the Common panel.
Select Door
mode
Place a tick
in Enable
options
Select
Control post
Click Save
Figure 49 Configuring control post mode
60
A2SE67-UG-0011-1
AC2000 Getting Started Guide
7.3 Passenger Mode
Passenger mode enables a door to stay open for a longer period of time when swiped with a
special usage card. This configuration is frequently used in airports to allow the free access of
passengers through the door.
7.3.1 Configuring passenger mode in the software
The terminal must be configured in passenger mode and cardholders allocated special usage.
Configuring the terminal as a passenger mode terminal
1. From the Floatbar open Device Configuration | Devices.
2. Select the terminal from the list and open the Configuration panel.
3. Select the Common tab.
Select Door
mode
Place a tick
in Enable
options
Select
Passenger
Click Save
Figure 50 Configuring passenger mode
Adding special access to a cardholder
1. From the Floatbar open Enrolment | Personnel.
2. Search for the cardholder to which the special access is to be applied.
3. Click the Edit button.
Special Usage
Figure 51 Adding special usage to a cardholder record
4. Place a tick in Special Usage.
5. Click Save.
61
CHAPTER 7 : Door Modes
7.3.2 The passenger mode cycle
Figure 52 Illustration of passenger mode timing
1. A card with special usage allocated is swiped at a passenger mode terminal.
2. The terminal prompts whether Staff Access is required or Passenger ops. Selecting staff
access causes the terminal to act as in Door Mode.
3. Cardholder selects Passenger ops.
Figure 53 Pressing the passenger ops button
4. Lock power is dropped for a period of time known as Lock open time. (Five sec default) If
the door is not opened by the end of this time the lock re-engages.
5. After the door is opened the lock power remains off for a period of time to prevent the lock
re-engaging and closing the door before it is fully opened. This is the Lock open time 2.
(One sec default)
6. The terminal now enters Passenger Mode and the door may be held open for the period
of time as defined in the Passenger time before an alarm sounds. (Three min default)
7. Passenger Mode is deactivate by either: closing the door or swiping a valid special usage
card and selecting Cancel Access. This places the terminal back into Door Mode.
7.3.3 Lobby mode
Lobby mode is a combination of passenger mode and interlocking terminals. Two terminals
may be interlocked directly or more than two terminals may be interlocked via a third party
logic controller or interposing relays.
In lobby mode, as long as one door is open in passenger mode, interlocked doors will be
locked down to passengers but may be accessed with a valid card swipe.
62
A2SE67-UG-0011-1
AC2000 Getting Started Guide
7.4 Interlock
Interlocking terminals are linked together so that only one terminal will open its door at any
given time. This is achieved using a combination of wiring and software configuration.
Interlocking between two terminals is achieved using a simple wiring configuration, however
interlocking more than two terminals requires the use of a third party logic controller or
interposing relay system.
7.4.1 Wiring two terminals for interlock
Figure 54 Wiring two terminals for interlock
Software configuration for interlock
1. From the Floatbar open Device Configuration | Devices.
2. Select the terminal from the list and open the Configuration panel.
63
CHAPTER 7 : Door Modes
3. Open the Input Config panel.
Select Input
3 - Config
(Input B
with DIU)
Remove the
check from
Normal Input
Click Save
Figure 55 Configuring input 3 for interlock
4. Open the Other tab.
Select
Second
swipe action
Place a tick
in Make relay
0 active
Place a tick in No
access on Interlock
Click Save
Figure 56 Configuring interlock functionality
64
A2SE67-UG-0011-1
AC2000 Getting Started Guide
7.4.2 The interlock process in door mode
Interlock is configured and works the same way in Passenger Mode and Door Mode, with
only a slight change to end functionality.
1. The spare outputs of terminals are linked to
input 3 of the other interlocked terminals.
2. When input 3 of the terminal is closed the
terminal remains idle.
3. When a valid card is swiped at an interlocked
terminal, both outputs on the terminal change
to the open state. This drops lock power at the
swiped terminal and simultaneously opens
input 3 on any interlocked terminals.
4. Interlocked terminals lock down and display
the lockdown message.
5. The interlock function ends when the original
swiped door is closed.
Figure 57 Interlock locked down display
message in door mode
7.4.3 The interlock process in passenger mode
1. The spare outputs of terminals are linked to input 3 of the other interlocked terminals.
2. When input 3 of the terminal is closed the terminal remains idle.
3. When a valid card is swiped at an interlocked terminal, both outputs on the terminal
change to the open state. This drops lock power at the swiped terminal and simultaneously
opens input 3 on any interlocked terminals.
4. The swiped terminal displays a countdown screen
showing the time that the doors will remain interlocked.
(Passenger time in the Devices application)
Figure 58 Passenger mode
countdown on the swiped
terminal
65
CHAPTER 7 : Door Modes
5. The interlocked terminals with input 3
now open will lock down, preventing
access until the swiped door is closed
or the mode ended. Interlocked
terminals will display a no passenger
access message. Normal card access
is allowed.
Figure 59 Interlock no passenger access
message in passenger mode
Important
If using a third party logic controller to control multiple doors, the interlock principles remain the same. The spare
output opens on a valid special usage swipe and input 3 is opened on interlock terminals to trigger lock down.
66
A2SE67-UG-0011-1
AC2000 Getting Started Guide
7.5 Image on Swipe
Image on swipe is enabled/disabled within Pre Door Mode configuration. When a cardholder
swipes a card on an emerald reader which has Image on swipe enabled, the cardholder’s
image is displayed on the screen. A security guard monitoring the reader will confirm if the
image on screen resembles the cardholder and select the green tick button to authorise
access or the red X button to deny access.
Important
If Image on swipe and Checklists are both enabled, Checklists can no longer be used.
7.5.1 Enabling Image on swipe
From the AC2000 Floatbar select Device Configuration | Devices.
1. Select the device from the list on the left that is to be configured.
2. Select the Configuration tab.
3. Select the Common tab.
4. Select Pre Door Mode from the list.
Pre
Door
Mode
Image on swipe option
Figure 60 Enabling/disabling Pre Door Mode
5. In the Configuration panel, select the Enable options tick box to enable Pre Door Mode.
Note
Enabling Pre Door Mode activates the associated Options.
6. From the Options, select the Image on swipe checkbox.
7. Press Save to save all changes.
67
CHAPTER 7 : Door Modes
7.5.2 Configuring Image on swipe options
When Image on swipe is enabled and a cardholder presents a valid card at the emerald
reader, their cardholder details are displayed below the image. The details displayed are
determined by settings in the Configured application in AC2000.
1. From the AC2000 floatbar select Advanced Configuration | Configuration.
Image time
Options
Max size
Random
message
Figure 61 Configuring Image on swipe settings
2. Select the image_on_swipe_image_time field. This is the length of time the image will
display on the emerald reader and it is counted in milliseconds.
3. Type a Value e.g. 2500 (2.5 seconds).
4. Select the image_on_swipe_max_size field. This is the maximum image size in MB that
can be uploaded to display on the emerald reader. If the image is larger than this value, an
image placeholder is displayed. To ensure the image displays correctly, use a lower value
on slower network connections.
5. Type a Value e.g. 100000
6. Select the image_on_swipe_options field.
7. Type a Value. The default value is 01011111. The following table displays an example of
the default Value for the Image_on_swipe_options field. If a value is enabled it will
display when the user swipes a card at the emerald reader. If the value is disabled it will
not appear on the reader when a card is swiped.
Example of the deafult value for the Image_on_swipe_options field
RC
COMP
EXP
JOB
FN
SN
YN
IMG
Random
check
Company
Expiry
date
Job title
First name
Surname
Confirmation
buttons
(Yes/No)
Image
display
Disabled
Enabled
Disabled
Enabled
Enabled
Enabled
Enabled
Enabled
Table 32: Example of the default value for the Image_on_swipe_options field
Note
For more information on random checks, see section 7.5.2 Random Checks in this manual.
8. Select the image_on_swipe_random_msg field. This is the message that is displayed
when the cardholder swipes a valid card on the emerald reader when they have been
selected for a random check.
9. Type a Value e.g. send for drugs test.
68
A2SE67-UG-0011-1
AC2000 Getting Started Guide
The next time that a card is swiped on the reader which has had the Image on Swipe function
activated, the image associated with that card will display on the emerald screen. Tapping the
green tick on the screen indicates that the image on screen resembles the cardholder and
access is granted. Tapping the red X indicates that the image does not resemble the
cardholder and access is denied.
Figure 62 Image on Swipe display on screen
Viewing cardholder details
There are several options available for viewing the cardholder information on the emerald
screen. Use a sequence of tapping the image to view the information as described below:
•
To view the image and cardholder details, tap the image once
•
To view a smaller image and a larger text display, tap the image twice
•
To view a larger image and minimal text display tap the image three times
•
To view more cardholder details in the list below the image, press and hold your finger on
the screen and drag the text area in a scrolling motion
69
CHAPTER 7 : Door Modes
7.5.3 Random checks
In certain situations, it may be necessary to perform other checks in addition to authenticating
a cardholder’s card and confirming their identity as previously described. If appropriate, your
system administrator should implement this procedure and configure the system accordingly.
Example: A system administrator configures the system to prompt security guards using an
emerald reader that some cardholders need to be tested for drugs. When a cardholder who
has been selected for a random check swipes on a reader, a message will display on the
emerald screen stating the required action.
Note
The prompt displayed can be configured to read something other than Drugs test. For
example a construction site may prompt a security guard to Check PPE (Personal protective
equipment) for adherence to company policy, or an airport might use the Search prompt to
manage search ratios. The system administrator will advise you regarding procedures for the
configured prompts.
Confirming the random check completion
When a cardholder is selected to receive a random check, the date when they are selected is
displayed in the Spare date1 field in the cardholder’s records in Personnel. A new set of
cardholders are selected for a random check every day and the date entry on the personnel
file indicates the date that each cardholder was selected.
Personnel
record
details
Spare Date1
Figure 63 Personnel record dislaying Spare Date1
The person who executes the random check (ie. security guard or medical nurse) must have
access to the Personnel application in AC2000 so that this date field can be cleared, upon
successful completion of the random check. Failure to do so will cause the random check
prompt to be displayed every time the cardholder swipes their card from that point in time on.
To clear the message prompt following successful completion of the random check:
1. Open a workstation and log in to AC2000.
2. From the Floatbar, select Enrolment | Personnel.
3. Locate the cardholder:
a. Select Search.
b. Enter any appropriate search criteria (eg. name).
c.
70
Select Query Database.
A2SE67-UG-0011-1
AC2000 Getting Started Guide
d. If no search criteria is entered, acknowledge the warning message that is
displayed by selecting Ignore.
e. Use the navigation arrows to locate the correct cardholder record from results
returned from the search (if required).
4. From the Database Toolbar, select Edit.
5. Click on the User Fields tab.
6. Delete the date entry in the Spare date1 field.
7. Select Save.
The random check prompt has now been cleared from the cardholder’s Personnel record.
71
This page is intentionally blank.
72
A2SE67-UG-0011-1
emerald TS100/200/300 Installation Manual
Appendix I: Updating Firmware
Updating the emerald terminal firmware (device defrosting) is accomplished by using the AC2000 web
pages to load the firmware pack on to the terminal and then manually updating the terminal.
Important
This process should only be carried out by an AC2000 administrator with relevant permissions.
Checking the firmware version of the terminal
Press and hold the reader address
The firmware version is
displayed for as long as
the press is held on the
reader address
Figure 64 Checking the terminal firmware version
Loading the firmware onto the terminal(s)
1. Obtain the firmware pack from CEM and save to an accessible location on the network.
2. Log into the web pages by opening a web browser.
3. Enter the Server IP Address, e.g.

https://192.168.1.10

If the IP address has been changed from the default, enter the new IP address.
4. Enter the username and password.
5. Click Login.
6. Select AC2000 WEB | Reader Setup | Device Defrost
7. Click Browse and select the device image file (.pak) that is to be loaded.
Note
This image will be provided by CEM support and should be saved in a secure location.
8. Click Upload
9. Click OK.
73
Select the firmware image
Select the device type to be
defrosted. This should match the
firmware file type
Select the devices to be defrosted.
Hold Ctrl + click multiple devices if
required.
Ensure that the selected devices
are of the correct type.
Click defrost to complete the process
Figure 65 Selecting devices to defrost
A message will appear similar to the following:
Initiating defrost to device:XXXX with firmware file:
Updating the terminal
Once the terminal has received the firmware file, the reader address will be displayed in cyan
instead of white.
Reader address
displayed in cyan
Figure 66 Cyan reader address
1. Access the terminal System Configuration menu.
2. Open Device settings | Options.
3. Press Upgrade.
Figure 67 Upgrading the terminal firmware
The reader will update and reboot.
Note
The reader will go offline momentarily whilst the upgrade takes place.
74
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Appendix II: Device Settings Remote
Application
The Device Settings Remote Application is used to adjust specific terminal settings that would
ordinarily be carried out in the Devices application of AC2000.
Note
For information about configuring Remote Applications see the emerald User Guide.
Using the Application
1. Using a card which has the relevant permissions to access the Device Settings Remote
Application, press the Remote Applications icon and swipe the card when requested.
2. Press the Device Settings icon to open the application.
The configurable options are displayed in a two page list. The user can navigate between
pages by tapping the Next page or Previous page buttons. The number of pages in the list
are indicated by the number of dots between the Next page and Previous page buttons. The
filled dot represents the one currently in view on the screen.
Back button
Tap any row
to edit
Previous
page
button
Next
page
button
Page navigation
indicator
Figure 68 The device settings remote application
3. Tap the option to be adjusted to open settings editor mode
4. Configure the settings as required (See Configuring the options).
5. Press the Save button to save changes made to each setting.
Note
In settings editor mode, a Save changes button is displayed at the top of the screen and the
symbol on the back button becomes red to indicate that going back without pressing Save
changes will cause any changes made to be lost.
75
Configuring the options
There are nine options that may be configured via this application. All changes made on the
terminal are saved on the AC2000 server. After changes are made, press the save button.
Lock open time
Lock open time sets the length of time in seconds that the lock power will drop when a valid
card is swiped.
Figure 69 Configuring the lock open time
Time in seconds
Adjust the time in one second
increments by tapping the
plus and minus buttons
Door close after
Door close after time sets the length of time in seconds that the door may be held open after a
valid card swipe before a door held alarm is generated.
Time in seconds
Adjust the time in one
second increments by
tapping the plus and minus
buttons
Figure 70 Configuring the door close after time
Passenger time
Passenger time sets the length of time in minutes that the door may be held open in passenger
mode before a door held alarm is generated.
Time in seconds
Adjust the time in one second
increments by tapping the
plus and minus buttons
Figure 71 Configuring the passenger time
76
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Lock open time 2
Lock open time 2 sets the length of time in seconds that the lock power remains off after the
door is opened to prevent the lock accidentally re-engaging.
Time in seconds
Adjust the time in one second
increments by tapping the plus
and minus buttons
Figure 72 Configuring the lock open time 2
Second swipe action
Second swipe action is used to enable an alternative action within a door mode e.g. If a reader
is in Passenger mode and Disable special door mode is enabled, using a special card as a
second swipe will disable interlock mode and the door will remain open for the specified time.
indicates that the setting is enabled
X indicates that the setting is disabled
Back button
(without saving
changes
made)
Save
changes
Tap to
enable/disable
Second swipe
action
Sub- elements
enabled when
main setting is
turned on
Sub- elements
disabled when
main setting is
turned off
Figure 73 Configuring second swipe action
Master PIN enable
Enable the PIN controlled access at the terminal.
indicates that the setting is enabled
X indicates that the setting is disabled
Tap to enable/disable master
PIN settings
Tap to enable/disable the
terminal keypad
Tap to enable/disable a
scrambled keypad as an
additional security measure
Figure 74 Configuring the master PIN settings
77
Slave settings
Toggle settings for any connected slave devices.
indicates that the setting is enabled
X indicates that the setting is disabled
Tap to save changed settings
Tap to enable/disable
slave settings
Tap to enable/disable
an attached DIU
Tap to enable/disable the
keypad the S610s slave
Tap to enable/disable an
attached S610s slave
Tap to use the slave as
the master reader
Figure 75 Configuring the slave settings
Door mode
The door mode option is used to toggle between the available door modes:
•
Door mode
•
Control post
•
Passenger mode
indicates that door setting mode is enabled
X indicates that door setting mode is disabled
Tap to enable/disable door
mode settings
Currently configured
door mode
Use the arrows to scroll
through available door modes
Figure 76 Configuring the door mode setting
Remote Applications
The Remote Applications option is used to enable/disable Remote Application functionality for
the terminal.
indicates that the setting is enabled
X indicates that the setting is disabled
Tap to enable/disable
Remote Applications on
the terminal
Tap to enable/disable Remote
Applications settings
Figure 77 Configuring the remote applications setting
78
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Workstation group
The workstation group option is used to assign an intercom workstation group to the terminal.
The terminal intercom function can only communicate with workstations assigned the same
workstation group number.
Current workstation
group number
Adjust the workstation
group by tapping the
plus and minus buttons
Figure 78 Configuring the workstation number setting
Pre Door Mode
The Pre Door Mode option is used to enable/disable Pre Door Mode functionality for the
terminal, including Image on Swipe.
indicates that the setting is enabled
X indicates that the setting is disabled
Tap to enable/disable
Image on Swipe mode
on the terminal
Tap to enable/disable Pre
Door Mode options
Figure 79 Configuring the Pre Door Mode setting
79
80
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Appendix III: Broadcast and Timezone
Priorities
A state machine is used to determine the priority that different events such as broadcast and timezone
changes have on the terminal. The order is listed below in descending priority:
1. Broadcast open
2. Interlock input
3. Locked out TZ (timezone)
4. Door override TZ (timezone)
5. Card only TZ (timezone)
6. PIN only TZ (timezone)
Example
If there is an overlap between the Locked out TZ and the Card only TZ, the Locked out TZ
will take priority due to it being higher up the list. Once the Locked out TZ ends the Card only
TZ will take over.
Regardless of which state the terminal is in, a Broadcast open will open the door, overriding
all other options.
Note
For more information on Timezones consult the AC2000 Setup Guide, and for information
about Broadcasts consult the AC2000 Operator Guide.
81
82
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Appendix IV: Loading Card Definitions
In order for AC2000 to correctly process the information encoded on the smart cards the correct card
definitions must be loaded onto the CDC. These are loaded via the AC2000 Web pages.
1. Log into the AC2000 client software. This is done to allow access to the definition files on
the CDC.
2. Log into the web pages by opening a web browser.
3. Enter the Server IP Address, e.g.

https://192.168.1.10

If the IP address has been changed from the default, enter the new IP address.
4. Enter the username and password.
5. Click Login.
6. Select AC2000 WEB |System | Software Update
7. Click Browse and navigate to Z:\\card_defs\patches.
8. Select the device image file (.cpio.bz) that is to be loaded.
Figure 80 Card definition file list
9. Click Upload
10. Click OK.
83
84
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Appendix V: Configuring a Third Party Reader
as a Master
It is possible to configure an emerald with a third party read head as a master reader. This
configuration may be used in a system where two card technologies are in use and it is
necessary to have two read head technologies on the same side of a door. An exit request
(REX) switch may be used to control egress via the same door.
Third party
master
reader and
REX
Figure 81 Possible system configurations
Hardware installation
For detailed wiring information, please refer to the following sections:
•
Terminal with 3rd Party Wiegand Read Head on page 20
•
Terminal with Request to Exit Switch on page 18
Software configuring
1. From the Floatbar open Device Configuration | Devices.
2. Follow the procedure for adding a TS100/TS200/TS300 device as described in Adding the
device to AC2000 on page 38.
Note
In the Configuration tab, ensure that the Door mode is set to Control Post.
85
3. Once the device is added, select it from the list and open the Configuration panel.
4. Open the Common panel.
Common
panel
Configuration
panel
Slave
settings
Use Slave
as Master
checkbox
Save
Figure 82 Setting slave as master reader
5. Select Slave settings from the panel list.
6. Check the option Use Slave as Master.
Note
If Use Slave as Master does not appear in the Options pane, please contact CEM Support to
obtain the relevant CDC patch file, which after application, will cause the Use Slave as Master
option to be displayed.
7. Click Save to save all changes made.
86
TSR-IM-0045-1.6
emerald TS100/200/300 Installation Manual
Appendix F: User Defined Logo
The Card Logo function is used to display a user defined logo on the emerald terminal. This logo
replaces the default CEM logo that appears on the dancing card on the main emerald screen.
Existing logo
on dancing
card
User defined
logo on
dancing card
Figure 83 Replacing existing dancing card logo with a user defined logo
To display a Card Logo on the emerald terminal, it must be uploaded using AC2000 WEB.
Licensing the emerald logo change function
1. Log into AC2000 Web.
2. Navigate to AC2000 Setup | Licensing.
Figure 84 Licensing code entry field
Note
If you do not have a license, contact CEM quoting your System ID number to receive a
emerald logo change license code.The System ID is displayed at the top right of the
Licensing application interface. (See Figure 85)
3. In the Licensing application, type the four part license code and click Add.
4. Once the license code has been applied, scroll the list of licenses to check that ‘Yes’ is
displayed beside the emerald Logo Change option.
System ID
emerald Logo
Change license
added
successfully
Figure 85 emerald Logo Change license added to the CDC
87
User Defined Logo
Enabling the emerald logo change function on the CDC
To enable the integration on the CDC:
5. Open an interface with the server, by either:
i.
Remotely opening a SSH terminal emulator connection (such as Putty) with the CDC.
ii.
Or, directly accessing the CDC console.
6. Login as user: root
7. Type I in the command line and press return to display the Integrations menu.
Figure 86 Integrations menu in a terminal emulator
8. Type the option number corresponding with emerald Logo Change (21 in the example
displayed in Figure 86) and press Return.
9. Press Return when prompted, to display the integrations menu again.
10. Type X and press Return to exit integrations menu.
11. Type L and press Return to log out of terminal emulator session.
Uploading a user defined Card Logo in AC2000 WEB
12. Log in to AC2000 WEB.
13. Select emerald Configuration | File Upload.
14. From the main File Upload page select the file Type as DISPLAY.
File Type
Group
Edit
Groups
Add
Content
Figure 87 Creating a user defined logo
15. Select a Group from the list. For more information on Groups, see Creating a Group in
the AC2000 WEB manual.
88
A2SE67-UG-0011-1
emerald TS100/200/300 Installation Manual
16. Click ADD CONTENT.
Browse to
file
Upload
Return to previous page
Figure 88 Uploading a logo
17. Click Browse.
18. Locate the required file and click Open.
Note
The image must be in PNG format. The recommended size is 287 pixels high by 143 pixels
wide and the maximum file size is 90kB.
19. Click UPLOAD.
20. Type a name for the logo in the content name field.
21. Click OK.
Logo
uploaded
successfull
Send logo
Figure 89 Verifying logo is uploaded
89
User Defined Logo
22. Click SEND.
Add additional logo
Figure 90 Confirming logo is ready to be displayed on the emerald terminal
23. Click OK when the confirmation prompt is displayed (See Figure 90). This displays a
confirmation message that the image has been sent to all emerald readers on the system.
Note
The logo will only update on each reader, following a car swipe.
The uploaded logo will replace the existing logo on the dancing card display on the emerald
terminal. To add an additional logo, click ANOTHER.
90
A2SE67-UG-0011-1
emerald TS100/200/300 Installation Manual
91
CEM Systems
195 Airport Road West
Belfast
BT3 9ED
United Kingdom
Tel: +44(0)2890 456767

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : Yes
Author                          : stpicton
Create Date                     : 2015:02:10 09:34:54Z
Modify Date                     : 2015:02:10 09:34:54Z
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26
Creator Tool                    : FrameMaker 10.0.2
Producer                        : Acrobat Distiller 10.1.10 (Windows)
Format                          : application/pdf
Title                           : TouchScreenReaderInstallManual.book
Creator                         : stpicton
Document ID                     : uuid:a755be58-642a-4524-b27e-389bdf8f9061
Instance ID                     : uuid:55b8bb10-b63f-4aca-bc72-bbafd14ded7f
Page Mode                       : UseOutlines
Page Count                      : 100
EXIF Metadata provided by EXIF.tools
FCC ID Filing: QABTSR608V930

Navigation menu