EasyManua.ls Logo

HI Sec THOR - Page 6

Default Icon
206 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
THOR Access Control
October 1, 1995 18-006/081-04 GB
6
2.16 Power consumption
..........................................................................................................................
127
2.17 Cable length and dimension
............................................................................................................
127
2.18 Outdoor kit for Access or Intrusion terminals.
..............................................................................
128
3. PROGRAMMING
..............................................................................................................................................
131
3.1 General
..................................................................................................................................................
132
3.2 Initialization/start-up procedure
........................................................................................................
132
3.2.1 Stand-alone reader
.................................................................................................................
132
3.2.2 Multi-reader system
...............................................................................................................
134
3.2.3 THOR intrusion integrated reader
........................................................................................
135
3.3 Programming of inputs
.......................................................................................................................
136
3.4 Programming of outputs
....................................................................................................................
137
3.5 Card programming
..............................................................................................................................
138
3.5.1 Personnel groups
...................................................................................................................
138
3.5.2 Week time programming
.......................................................................................................
139
3.5.3 Holidays
...................................................................................................................................
140
3.6 Anti Passback programming.
............................................................................................................
141
4. OPERATING INSTRUCTIONS
.........................................................................................................................
143
4.1 Operating facilities
..............................................................................................................................
144
4.2 Operating in general
...........................................................................................................................
146
4.2.1 Door control
............................................................................................................................
146
4.2.2 Normal Passage Through a Door
.........................................................................................
146
4.2.3 Programming of PIN code
.....................................................................................................
147
4.2.4 Changing of PIN code
............................................................................................................
147
4.2.5 Hold Up Code
..........................................................................................................................
147
4.2.6 Alarm indication
.....................................................................................................................
147
4.2.7 Messages To The User
..........................................................................................................
149
4.2.8 Block/unblock reader without alarm system integration
..................................................
150
4.2.9 Open door by using code only.
............................................................................................
150
4.3 Set/unsetting a non-THOR alarm system from the THOR reader.
................................................
152
4.4 Set/unsetting the THOR Integrated System from the THOR Reader.
...........................................
154
4.4.1 Set/unsetting from the Indoor Reader 95T AC/M/W/P or 90T RKP AC/M/W.
..................
154
4.4.2 Set/unsetting from the Terminal 95T ERC or 90T RKP ERC with external reader
heads.
.....................................................................................................................................
157
4.4.3 Set/unsetting from an internal reader on a door including external reader.
..................
158
4.5 Survey of menus
..................................................................................................................................
160

Table of Contents