Table of Contents
iv
AYC-x6355 (Rev. B) Installation and User Manual
Controller Functionality............................................ 37
Normal, Secure, and Master Users .......................................... 37
Modes of Operation .............................................................. 38
Normal Mode ............................................................................... 38
Bypass Mode ................................................................................ 38
Secure Mode ................................................................................ 39
Changing the Modes of Operation ............................................... 39
Auxiliary Input and Output..................................................... 40
Door Alarms ......................................................................... 40
Internal Case and Back Tamper .............................................. 41
Lockout Feature (Keypad/Card Tamper) .................................. 41
REX Function ........................................................................ 41
Secured Intelligent Power Supply ........................................... 42
Programming as a Controller ................................................. 42
Entering Programming Mode ........................................................ 44
Exiting Programming Mode .......................................................... 44
Changing Lock Strike Code .......................................................... 45
Changing Auxiliary Code .............................................................. 46
Changing the Programming Code ................................................ 47
Changing the Normal/Secure Code .............................................. 47
Changing the Normal/Bypass Code and Door Chime Settings ...... 48
Defining the Auxiliary Input and Output ....................................... 50
Setting the Lockout Feature .......................................................... 54
Setting the Backlight Behavior ...................................................... 55
Setting the Bell Button (*) Behavior .............................................. 55
Selecting Credential Technology ................................................... 56