background image

O P E R A T I N G   I N S T R U C T I O N S

 

EN

RAM

Security Systems

Summary of Contents for RAM620-10x01

Page 1: ...O P E R AT I N G I N S T R U C T I O N S EN RAM Security Systems ...

Page 2: ... is protected by copyright Any rights derived from the copyright shall be reserved for SICK AG Reproduction of this document or parts of this document is only permissible within the limits of the legal determination of Copyright Law Alteration or abridgment of the document is not permitted without the explicit written approval of SICK AG ...

Page 3: ... of the management software 20 3 2 3 Notes on the tags 23 3 3 Status indicators 24 3 3 1 RFU62x RFID interrogator 24 3 3 2 RFU63x RFID interrogator 25 3 3 3 CDB650 connection module 26 3 3 4 CMC600 cloning module 27 4 Setup and mounting 28 4 1 RFU62x configuration device 28 4 2 RFID interrogators at the access points 28 4 2 1 Notes on mounting the RFID interrogators 28 4 2 2 RFU62x RFID interrogat...

Page 4: ...ntegrator 54 6 8 2 Program overview 55 6 9 Making central settings 56 6 9 1 Information about the tag 57 6 9 2 Information about the time server 58 6 9 3 Storing the password for communication with the RFID interrogators 58 6 9 4 Configuring the RFID interrogator indicators 58 6 9 5 Saving settings 58 6 10 Recording access points 59 6 10 1 Recording the configuration device 60 6 10 2 Recording RFI...

Page 5: ...ing the RFU62x configuration device 92 8 2 2 Replacing the RFID interrogator at the access point 93 9 Fault diagnosis 95 9 1 Response to faults 95 9 2 Fault situations 95 9 3 SICK support 96 9 4 Fault indication on the RFID interrogator 96 9 5 System logs in RFID Access Management 97 9 6 Fault diagnosis in SOPAS 98 10 Technical data 99 10 1 Data sheets 99 10 1 1 RFID Access Management 99 10 1 2 RF...

Page 6: ...o give technical personnel instructions on the safe mounting configuration electrical installation commissioning operation and maintenance of RFID Access Management 1 2 Target group These operating instructions are intended for people who plan mount connect commission operate and maintain the access control systems Activities Target group Mounting electrical installation maintenance and replacemen...

Page 7: ...onfiguration software Please also refer to the information concerning RFID and building security that is available on the Internet at www sick com There you can find sample applications and a list of frequently asked questions about RFID and building security 1 4 Abbreviations used Entry Exit Configuration Software System components for managing the access rights of persons and vehicles and for as...

Page 8: ...f a certain function or technical measure Notes provide information about the features of a device application tips or other information that may come in useful Instructions that must be carried out in the described order are referred to as step by step instructions and are indicated by numbered lists Carefully read and follow the instructions for action Instructions for taking action are indicate...

Page 9: ...gulations in the workplace Electrical installation and replacement Practical electrical training Knowledge of current electrical safety regulations Knowledge of device control and operation in the particular application concerned e g logistics gate lock Commissioning operation and configuration Knowledge of the mechanical and electrical parameters of the access control that relate to operation and...

Page 10: ...rs of the access points via Ethernet and saved there RFID interrogators from the RFU6xx device families can be used as readers 2 3 Intended use RFID Access Management may only be used as described in section 2 2 Application of the system It may only be used by qualified personnel in the environment in which it was mounted and initially commissioned by qualified safety personnel in accordance with ...

Page 11: ...e here shows a risk of injury resulting from electrical current WARNING Denotes a potentially dangerous situation that may result in severe to fatal injuries The symbol shown on the left hand side of the note refers to the type of hazard in question the example here shows a risk of injury resulting from falling components CAUTION Caution note Denotes a potentially dangerous situation that may resu...

Page 12: ...regulations The manufacturer and user of the system are responsible for coordinating and complying with all applicable safety specifications and regulations in cooperation with the relevant authorities The checks must be carried out by qualified safety personnel or specially qualified and authorized personnel and must be recorded and documented to ensure that the tests can be reconstructed and ret...

Page 13: ...diately disconnect the system from the power supply Always use original fuses with the specified current rating Report any damaged cables to the maintenance team without delay Risks during commissioning and configuration WARNING Risk resulting from incorrect commissioning and configuration Do not commission without testing by qualified safety personnel Before you operate the system or a device for...

Page 14: ...he device is opened any warranty claims against SICK AG will be void The cover on the card slot can be removed to insert the microSD card 2 5 Protection of the environment RFID Access Management has been designed to minimize its environmental impact It consumes very little power Always act in an environmentally responsible manner at work For this reason please note the following information regard...

Page 15: ... 1 RAM620 10x01 scope of delivery Part no Quantity Description 1077596 RAM620 10001 1 RFU620 10100 RFID interrogator radio equipment approval for Europe South Africa 1 microSD card with system components ECS610 10000 Entry Exit Configuration Software ECS for short and EMS610 00000 Entry Exit Management Software EMS for short 1 Adapter for microSD card 1 Sample tag 1 Operating instructions 1077598 ...

Page 16: ...and EMS610 00000 Entry Exit Management Software EMS for short 1 Adapter for microSD card 1 Sample tag 1 Operating instructions 1077599 RAM630 10101 1 RFU630 13101 RFID interrogator radio equipment approval for USA Canada 1 microSD card with system components ECS610 10000 Entry Exit Configuration Software ECS for short and EMS610 00000 Entry Exit Management Software EMS for short 1 Adapter for micr...

Page 17: ...d protection against tampering in the CDB650 connection module Thorough check for completeness It is recommended that you carefully check for and report transport damage of any kind as soon as possible after receiving the components you have ordered Also verify that the delivery includes all components listed on the delivery note 3 2 Specific features 3 2 1 An overview of the system components To ...

Page 18: ...t has been read in is assigned to a participant in the configuration software Existing assignments are displayed in the software s Tag Management view Transferring access rights The access rights managed in ECS are transferred to the RFID interrogators of the access points via Ethernet and saved there Communication between the configuration PC and RFID interrogators takes place via the EMS system ...

Page 19: ...ected to the connection module via a pre assembled cable The connection module is wired to the power supply and control system via corresponding terminals inside the housing Fig 5 Operation with connection module As the connection module is generally mounted at a location that is not accessible to outsiders it is also ideally protected against tampering If the switching operations are not to take ...

Page 20: ...d persons or vehicles are to be admitted access to a defined area are recorded in RFID Access Management as access points An access point is how an RFID interrogator is shown in the ECS management software Fig 7 Managing the access points Access authorizations for up to 20 access points can be managed in one RFID Access Management Managing the access profiles Access authorizations are defined in E...

Page 21: ...an access profile One participant may have several access profiles Participants with the same access profiles have the same access rights for the specified period A tag is assigned to each authorized participant The tag is read by the RFU62x configuration device The tag grants a person or vehicle access to the relevant area for the defined time frame Fig 9 Managing authorized participants and tags...

Page 22: ...8018582 2015 11 03 Subject to change without notice System description RFID interrogators that are not permanently connected to the configuration PC have to be updated manually by means of a direct connection between the configuration PC and RFID interrogator Fig 10 Updating access rights ...

Page 23: ...n vehicles otherwise there is a risk of frequency interference The tags are not included with delivery Therefore please observe the notes below when selecting tags Recommended tags Fig 11 Recommended tags No Type Explanation SICK part no No 1 ISO card tag For use as a personnel badge 6051820 2 On metal tag For mounting on the metal surface of the vehicle 6052346 Tab 3 Recommended tags Sample tag R...

Page 24: ...Ready Green Device ready Red Hardware fault Result Green Read or write successful RF Green UHF field activated Data Green Data output via host interface CAN Green Data traffic via CAN bus LNK TX Green Data traffic via Ethernet microSD Green microSD card inserted and ready for operation not with RFU62x configuration device Tab 4 Status indicators on the RFU62x RFID interrogator LEDs for indicating ...

Page 25: ...aning Ready Green Device ready Red Hardware fault Result Green Read or write successful RF Green UHF field activated Data Green Data output via host interface CAN Green Data traffic via CAN bus LNK TX Green Data traffic via Ethernet microSD Green microSD card inserted and ready for operation Tab 5 Status indicators on the RFU63x RFID interrogator LEDs for indicating the read response In the defaul...

Page 26: ...nterrogator via CMC600 is activated RES OUT 1 RES OUT 4 Orange Lights up if the corresponding output of the RFID interrogator is present and activated EXT OUT 1 EXT OUT 2 Orange Lights up if the corresponding additional output of the RFID interrogator via CMC600 is activated Tab 6 Status indicators on the CDB650 connection module Relevant configuration switches Switch Function Default S1 Power S1 ...

Page 27: ...ng LED Behavior Meaning Flashing slowly The cloning module has launched and is waiting for commands from the RFID interrogator Flashing rapidly The cloning module was switched to transparent mode 0 The RFID interrogator cannot access the cloning module Tab 9 Yellow monitoring LED in the cloning module Behavior of the green monitoring LED Behavior Meaning Flashing briefly on mainly off The RFID int...

Page 28: ...ng procedure and position depend on the antenna field of the RFID interrogator and the tags used Mounting position The RFID radio field must point in the direction of the tag Ideally you should mount the RFID interrogator on the side where the tags are identified Alternatively the RFID interrogator can be mounted above the entry lane of a gate The RFID interrogator must be mounted at an angle so t...

Page 29: ...ig 16 Lobar send and receive characteristic of the internal antenna For optimum reading accuracy and in turn reliability the tag should be located in the axis of the RFID interrogator in front of the read area and the tag should be parallel to the RFID interrogator i e the angle should be as small as possible Fig 17 Ideal positions for tag RFID interrogator Approach angle in the case of a large me...

Page 30: ...it points to the center of the anticipated reading position For further details on mounting please refer to the operating instructions for the RFU62x Order no Description 2061737 Mounting bracket incl mounting material for attaching to the RFU62x 2071773 Frame bracket incl mounting material for attaching to the RFU62x 2016110 Quick action lock system in combination with 2071067 mounting bracket fo...

Page 31: ...f the anticipated reading position For further details on mounting please refer to the operating instructions for the RFU63x Order no Description 2060912 Mounting kit 1 incl mounting material for wall mounting the RFU63x 2071862 VESA adapter plate incl mounting material for attaching to the RFU63x 2061737 Pivot mounting bracket incl mounting material for attaching to the RFU63x Tab 12 Mounting kit...

Page 32: ...ty requirements must be met when working on electrical systems The power supply must be disconnected when attaching and detaching electrical connections Select and implement wire cross sections and their correct fuse protection in accordance with the applicable standards 5 1 Connecting the RFU62x configuration device Only the RFU62x RFID interrogator is used as a device to configure the access con...

Page 33: ...m If the devices are operated without a connection module connection to the power supply and digital switching output is established via a connecting cable with an M12 plug connector and one open end The connection to the configuration PC is established via a pre assembled Ethernet cable Fig 20 Connection of the RFID interrogators overview The switching output is configured via ECS If you download...

Page 34: ...ing RFID interrogators to the power supply switching output 2 Connect the wires of the open cable end as per the following pin assignment Pin Signal Function Wire color 1 Ground Brown 2 Supply voltage Blue 3 CAN bus IN OUT White 4 CAN bus IN OUT Green 5 Host interface receiver Pink 6 Host interface receiver Yellow 7 AUX interface sender Black 8 AUX interface receiver Gray 9 Common ground for all i...

Page 35: ...on to the PC 5 3 Connecting RFID interrogators via a connection module The connection between the RFID interrogator and connection module is established via a 17 pin connecting cable All other cables power supply switching outputs etc are connected to the terminals via cable glands For details of the terminal pin assignment see the cover of the connection module The connection of the RFID interrog...

Page 36: ...ws on the cover and remove it from the CDB650 connection module 2 Run the supply cable through the PG connector into the inside of the CDB650 housing and connect the wires of the power supply to terminals 1 and 2 Fig 23 Connection of the power supply in the connection module Terminal strip Connection 1 U IN Supply voltage for RFID interrogator 2 GND GND for RFID interrogator Tab 13 Terminals for p...

Page 37: ... it from the connection module 2 Set switch S1 Power to OFF to ensure that the connection module is isolated from the supply voltage 3 In the connection module set switch S4 CMC to the bottom position to operate the CMC600 4 Insert the cloning module into the connection module at the designated slot The housing nose of the CMC600 then automatically interlocks the S4 CMC switch Fig 25 Inserting the...

Page 38: ...eral the configuration PC containing the management software is connected to the RFID interrogators via a network switch Fig 28 Connecting the configuration PC to the network Connection via Ethernet switch Connect the PC to the Ethernet switch Direct network connection between the PC and RFID interrogator A direct network connection between the RFID interrogator and the configuration PC is require...

Page 39: ...box Power SerialData CAN I O 03 m 05 m 6042772 6042773 Ethernet connecting cable Connecting cable with M12 male connector 4 pin RJ45 6034414 Ethernet connecting cable Connection type with RJ45 RJ45 male connector 03 m 6026083 CDB650 204 connection module Basic connection module for connecting a sensor with 2 A fuse 5 cable glands and RS 232 interface to the sensor via M12 17 pin female connector A...

Page 40: ...s ready for operation Operational readiness of the connection module The Power LED lights up in the CDB650 connection module The LED is visible through the cover 6 2 Installing ECS on the configuration PC The microSD card contains the two system components Entry Exit Configuration Software and Entry Exit Management Software The microSD card is delivered in an adapter Insert the adapter containing ...

Page 41: ...n by double clicking the ECS exe file The file is located in the root directory of the microSD card 2 Select the user language and click OK to confirm The Setup Wizard opens 3 Follow the Wizard s instructions and perform the installation Depending on the configuration a program group is created and an icon is placed on the desktop 4 The Setup Wizard reports that the installation has been completed...

Page 42: ... search field 4 Download the software and save this in a temporary directory on the configuration PC 5 Launch the ECS exe file and install the software as described 6 2 2 Installing the SOPAS configuration software Install SOPAS on the configuration computer 1 Open the www sick de website in the browser 2 Enter SOPAS in the search field and start the search 3 Download the SOPAS Engineering Tool so...

Page 43: ...rrogator is 192 168 0 1 This IP address must be altered during commissioning Usually you will alter the IP addresses of the RFID interrogators to an address within the configuration PC s number range This change can be made conveniently in the SOPAS configuration software Launching SOPAS All RFID interrogators are connected to the configuration PC either directly or via the company network Launch ...

Page 44: ... interrogators Establish a link to the connected RFID interrogators 1 Click the Connect to new device button The Connection Wizard starts This helps you to establish a link to the connected devices 2 Select the Connect to specific device option and then choose the RFU6xx device type from the list This restricts the search for connected devices to just RFID interrogator type devices 3 Click Next to...

Page 45: ...which interface is to be used for the configuration work 2 If you are carrying out the configuration work via an Ethernet cable as in the example check the Internet Protocol IP box 3 Click Next to confirm your selection All connected RFID interrogator type devices are shown with their default IP address The red status of the connector symbol indicates a discrepancy between the IP address number ra...

Page 46: ...evice or manually if configuration is taking place over the configuration PC If a firewall stops you from establishing the connection a message will be output accordingly Consult your system administrator for information on how to proceed 6 3 2 Altering the default IP address Alter the IP addresses of the connected device 1 Select the RFID interrogator in the list of devices that have been found 2...

Page 47: ...the other RFID interrogators The RFID interrogator uses two ports like all SICK devices Ports are part of the network address and can be used to establish various connections between the devices Port 2112 is freely configurable but port 2111 is a fixed port for outputting data It is used for device configuration 5 Select fixed port 2111 for each device Tick the corresponding checkboxes and click N...

Page 48: ...devices are combined and edited in a single project You can open the individual functional areas of the configuration via the project tree structure Click the plus symbol to expand the tree Saving a project Save the devices and device settings in a corresponding project file on your configuration PC You will import these settings later when you set the transmitting power for the individual RFID in...

Page 49: ...anaged with RFID Access Management The RFU62x configuration device is operated without a microSD card NOTE Damage to the memory card To avoid damaging the memory card make sure there is no power to the RFID interrogator when you insert or remove it NOTE Risk of damage due to moisture and dust The RFID interrogators must be protected against moisture and dust when the cover is open The cover must b...

Page 50: ...nto place 4 Reattach the cover and tighten the two Allen screws 5 Switch the supply voltage on again Inserting the microSD card into an RFU62x type RFID interrogator The card slot can be accessed on the RFU62x behind the folding plastic cover Fig 31 Card slot cover RFU62x 1 Switch off the supply voltage for the RFID interrogator 2 Undo the two screws Torx T8 and lift up the plastic cover 3 Making ...

Page 51: ...the close proximity of the tag to the RFID interrogator 6 5 1 Loading the device in the project tree 1 With the configuration PC go to the RFID interrogator and establish a direct Ethernet connection between the PC and RFID interrogator 2 Launch the SOPAS configuration software The devices connected to the network are found 3 If you saved the project when you set up SOPAS retrieve it now by clicki...

Page 52: ...ndow takes the form of a tab 3 Set the optimum transmitting power using the slider To configure the access control system you simply have to adjust the Read transmitting power Specify a power value that will provide reliable detection of the tags 6 5 3 Testing RFU transmitting power Test the settings under conditions that are as realistic as possible and modify them if necessary The Quickstart win...

Page 53: ...er 6 9 4 Configuring the RFID interrogator indicators 6 6 Changing the password to log in to devices A password is required to log in to the devices in the SOPAS configuration software Default passwords are supplied for the three user levels Service Maintenance Technician and Authorized Client User level Password Maintenance Technician main Authorized Client client Service servicelevel Change thes...

Page 54: ...con The configuration is transferred to the device and saved there in the non volatile memory 2 The configuration that is saved permanently in the device is loaded whenever the device is restarted 6 8 Launching ECS 6 8 1 Logging in as an Integrator The Integrator user role is used to complete the initial set up and commissioning of RFID Access Management In contrast to the Operator user role only ...

Page 55: ...pants persons and vehicles and assigned tags Tag Management Central view of RFID Access Management This view is used to manage all participants and their access profiles Tag Management enables tags to be assigned conveniently Access Profiles Used to manage access profiles An access profile contains all access points and the time frame during which access is permitted Access logs Logs the access of...

Page 56: ...agement menu From here you can also set the language of the program interface and quit the program 6 9 Making central settings Before you create access points and define participants and access authorizations you need to make several basic system settings Getting started Click the Configuration icon The settings are managed via four tabs These are located at the bottom of the work window The windo...

Page 57: ...Define the required ID As the UII is written to the tag when the tags are assigned to the participants you must not change the location ID If you do all of the tags that have already been assigned will have to be reformatted Any UII of a tag is overwritten automatically by Entry Exit Configuration Software when the tag is assigned Using card numbers Tick the Use Card Numbers checkbox if the tag sh...

Page 58: ...t the time zone that applies to the access control system 6 9 3 Storing the password for communication with the RFID interrogators In the Registration of device section enter the password that you have stored in the SOPAS configuration software for the Service user level see chapter 6 6 Changing the password to log in to devices The password protects access to the RFID interrogators 6 9 4 Configur...

Page 59: ...makes a basic distinction between Devices that are permanently accessible to the configuration PC and can be configured automatically Devices that do not have a permanent network connection and are managed locally via a direct connection to the configuration PC Please note All access points that you record in RFID Access Management must be accessible to the configuration PC via their IP address at...

Page 60: ...Management Permanent is entered in the Connection Type field and cannot be changed The Time Management Use Output Output Logic and Switch output duration fields also do not need to be completed for the configuration device and are likewise disabled Click the Find Me button If the configuration device is addressed correctly via Ethernet the four process feedback LEDs in the corners of the antenna c...

Page 61: ...e configuration device 2 If the RFID interrogator is permanently accessible to the configuration PC select Permanent in the Connection Type field otherwise select Temporary Activating time management Tick the Time Management checkbox so that the RFID interrogator uses the time stamp from the specified time server The IP address of the time server is defined on the Integrator tab If time management...

Page 62: ... cloning module If you select the entry Digital Output 1 or Digital Output 2 the digital output is activated directly in the RFID interrogator If you select the entry External Output 1 or External Output 2 the contact is activated in the connection module If you have selected a switching output the fields Output Logic and Switch output duration are enabled so you can make an entry Configuring the ...

Page 63: ...s points are listed with their name and an image of the device type used The connection type of the access point is also displayed for each device This allows you to quickly identify which devices are permanently accessible to the configuration PC Permanent connection type and can be configured automatically and which can only be managed manually via a direct connection between the RFID interrogat...

Page 64: ...lease note You can only modify access points that have not yet been used in an access profile If the access point is already in use you cannot save the changes In such cases you will receive a notification informing you of this 1 Log in to RFID Access Management with the Integrator user role 2 Click the Configuration icon and switch to the Access Point tab 3 Select the access point that you wish t...

Page 65: ...an only be assigned to access points for which time management has been activated and which are linked to a time server Access points with the Temporary connection type only permit either unlimited access or no access at all When an access profile with specified times is saved the system checks whether the access points it contains are permitted If any of them do not you will receive a notificatio...

Page 66: ...ns that access is permitted on every day of the week at any time of the day or night No further entries need to be made If you wish to restrict access to certain days of the week and times you must untick the All Week Access checkbox You can then enter the times using the slider The slider appears when you click the clock symbol You can also enter the time manually in HH MM format Press the Tab ke...

Page 67: ...st day and in the Interval 2 column enter the time frame for the next day Saving an access profile To finish creating an access profile click Save The access profile appears in the list of access profiles in the top section of the window When an access profile with specified times is saved a check is carried out to ensure that Time management has been activated for all access points The second tim...

Page 68: ...ss authorization is saved the system checks whether the access profiles contains only access points with time management If any of them do not you will receive a notification informing you of this Getting started Click the Tag Management icon on the toolbar The view is divided into the following areas The top section of the window contains the list of all participants irrespective of whether they ...

Page 69: ...thorization the Unlimited checkbox is therefore ticked The Validity From field contains the current system date You can change this date if you wish to give the access authorization a date in the future If the access authorization is to only be temporary you must untick the checkbox You can then record the validity period for the authorization in the From Until fields Participants with temporary a...

Page 70: ... participants If the access profile is valid at the current point in time this is indicated by means of the corresponding entry in the Validity column At the same time the access information for the participant is automatically transferred to each relevant access point and saved in the database there The red X symbol in the column indicates that the participant has a valid access authorization but...

Page 71: ...articipant does not yet have a tag the entry reads Without Tag The Tag Search section displays the tag that is currently being read by the RFU62x configuration device If there is no tag within reading range of the configuration device this section will be empty If a tag is being read the section states New Tag or the name of the cardholder and depending on the setting the card number Selecting par...

Page 72: ... menu 2 Click Save to confirm and perform the assignment Displaying an assignment Assigning the tag makes the authorized participant a tag holder The Assigned Tag section contains the assigned card number and the name of the corresponding participant In the row for the selected participant in the list the red X symbol has been replaced by a green tick Take the tag out of the reading range The assi...

Page 73: ...t have tags yet 6 15 Testing access control Test the access authorizations of the tags in live mode at every relevant access point and every relevant time Initial situation Establish the initial situation of the access control Access to the area that is to be protected against unauthorized entry is barred Performing a test 1 At the access point place the tag within the reading range of the RFID in...

Page 74: ...eed to be deactivated you wish to display the access authorizations for tags access authorizations for participants are modified you wish to check the validity of the access authorizations The tasks described are generally carried out using the Operator user role This user role has similar rights to the Integrator However the Operator is not permitted to create and edit access points The Operator ...

Page 75: ... profile has been assigned 1 Click the Access Profiles icon on the toolbar 2 Select the access profile in the list and click Modify 3 The fields at the bottom of the window are enabled so you can make the entry 7 2 Editing access authorizations 7 2 1 Sorting filtering the participant list Access authorizations and tags are managed in Tag Management Getting started Click the Tag Management icon on ...

Page 76: ...d Expired are available for selection Several filter criteria can be selected The filter becomes active immediately Access Profile Restricts the list of participants to the assigned access profiles All access profiles recorded in RFID Access Management are available for selection as a filter criterion Several filter criteria can be selected The filter becomes active immediately Tab 14 Filter crite...

Page 77: ...d the participant in the Tag Management view and define the applicable access profiles 2 Assign a tag to the participant 7 2 3 Deleting participants who leave the company If an employee leaves the company they can be deleted from the list of participants 1 Select the participant in the list 2 Click the Delete button at the bottom of the window After confirming the prompt the participant is then de...

Page 78: ...d 1 Select the participant that has lost the tag Tag Management on the right hand side shows the card number of the tag that is currently assigned 2 Click the Remove button in Tag Management After confirming the prompt the link between the participant and the tag is deleted 3 The participant retains its assigned access rights but now does not have a tag This is indicated by the red X symbol In Tag...

Page 79: ...hat is currently assigned is shown in the Assigned Tag section The Tag Search section is empty 2 Hold a tag that has not yet been formatted within reading range of the configuration device The Tag Search section now states New Tag 3 Click the Replace button Following the confirmation prompt the window for entering the card number appears 4 Once you have confirmed this the new tag is assigned to th...

Page 80: ...The different scenarios are as follows If the read tag belongs to the participant selected in the list this is indicated by a green circle in the Assigned Tag section The Tag Search section remains empty If the read tag belongs to a participant other than the one that is currently selected this is indicated in the Tag Search section In addition the card number of the tag is listed If you click the...

Page 81: ...ant If the position of an employee within the company changes the access authorization of the participant may need to be modified 1 Select the participant in the list 2 Click the Modify button The fields at the bottom are enabled so you can make the entry 3 Modify the access authorization by selecting and deselecting the access profiles 4 Click Save The modified access authorization is transferred...

Page 82: ... type only permit unlimited access In the Tag Management view use the Validity column to check the current status of the access authorizations Status Meaning Valid The access authorization has been assigned with the Unlimited setting OR The time frame between the current date and the specified Until date is more than 3 days About To Expire The time frame between the current date and the specified ...

Page 83: ...nd easily 1 Select the participant in the list 2 Click the Modify button 3 Adapt the Until date accordingly 4 Click Save The extended access authorization is transferred to each relevant access point 7 3 Reading the update status of the access points The System Overview presents every RFID interrogator recorded as an access point along with its current device status The device status is indicated ...

Page 84: ...All the access information for an RFID interrogator is retrieved continuously by RFID Access Management Retrieval of system logs The same applies to actions reported by an RFID interrogator Meaning of status LEDs Status LEDs and notes have the following meaning Color Note Meaning Green Updated connection type Permanent and Temporary The RFID interrogator is up to date No update is required Yellow ...

Page 85: ...st of access logs The access logs can only be viewed by the Information Security Officer ISO user role or in the presence of the Information Security Officer using the four eyes principle In this case the view has to be activated by entering the password which is only known to the Information Security Officer The Information Security Officer ISO user role is set up solely to provide authorized acc...

Page 86: ...er role to be entered 3 Once the Information Security Officer has entered the password and clicked OK to confirm it the Access Log view opens 7 4 2 Filtering the list of access logs The Access Log view is a type of logbook that records every access made by the authorized participants The access is listed along with all the access related information This includes the time it was called up the name...

Page 87: ... the access logs to a single participant in order to analyze its access behavior Enter the name or the personnel number Use the drop down menu if you wish to focus on access events at selected access points In the list select the access points that you wish to view Resetting filters Click the Reset Filters icon to delete the applied filters The list will then contain all the recorded access logs a...

Page 88: ... in user role are available again 7 5 Managing RFID Access Management 7 5 1 Performing a data backup restoring the database Perform a regular data backup to protect all RFID Access Management data and settings against damage and loss A data backup for example serves to protect against hardware damage to the configuration PC inadvertent deletion of data or attacks by computer viruses With the Save ...

Page 89: ... backup The data backup is imported into the current database NOTE Please be aware that the existing database will be overwritten when you use the restore function 7 5 2 Changing passwords for user roles On delivery the default password password123 is used for all user roles This password is used to log in to the system with a user role for the first time You should change the password for your us...

Page 90: ... 4 Click Change Password A separate window opens to confirm that the password has been changed successfully 7 5 3 Changing the user language The user language of the program interface is available in the languages German and English The change to the language applies to all user roles 1 Open the Access Management menu 2 Use the Language command to select the required user language You will receive...

Page 91: ...Information Security Officer The Information Security Officer can then only access the access logs when another person has already logged in as an Operator or Integrator In this case the Login window only allows the user to log in as an Operator or Integrator Access to the access logs is granted by the Information Security Officer entering the password directly when the user wishes to open the acc...

Page 92: ...asks to be performed as and when required 8 2 Replacing components HAZARD Risk of injury due to electrical current Only a qualified electrician or trained person working under the guidance and supervision of a qualified electrician is permitted to work on electrical systems or equipment and they must comply with the electrical regulations HAZARD Disconnect the power to the system Make sure the pow...

Page 93: ...he microSD card into the corresponding slot 3 Reattach the cover and screw it in place Mounting the replacement device 1 Mount the replacement device back in its mounting location 2 Connect the connecting cables and screw together the M12 plug connectors 3 Switch the power supply back on Configuring the replacement device The device parameters saved on the microSD card are used to transfer the IP ...

Page 94: ...ED remains yellow start the update manually 1 To do this select the device in the System Overview 2 Click the Modify button 3 Then click Save to confirm Replacement devices with the connection type Temporary are also updated as soon as a connection has been established with RFID Access Management The update may also have to be confirmed here by clicking Modify and Save Device with Temporary connec...

Page 95: ... interrogators are unable to obtain any up to date time information from the time server The time in the devices is reset to 01 01 1970 As a result tags cannot be used to gain access As soon as the network is available again the devices are connected to the saved time server automatically Mains voltage failure If the power supply for an RFID interrogator is interrupted at the access point it is al...

Page 96: ... access point remaining open Tag is not read by the configuration device If the tag cannot be read by the configuration device this may be because the tag is being held too close to the reading range or has been placed directly on the device Hold the tag at an appropriate distance within the reading range 9 3 SICK support If you cannot remedy the fault with the help of the information provided in ...

Page 97: ...nt For this the RFID interrogators must be connected to the configuration PC If a device is using the Temporary connection type the information is retrieved as soon as it is connected to the configuration PC Click the System Log icon The list containing the messages opens Sorting the list You can sort the list of system logs by column by clicking one of the column headings Clicking repeatedly on a...

Page 98: ...e 1 Select the message in the list 2 Click the icon with the green tick You will receive a notification informing you that the status of the message has been changed 3 Click OK to confirm The Confirmed column now states true for the message Resetting filters Click the Reset Filters icon to delete the applied filters The list will then contain all the reported system logs again 9 6 Fault diagnosis ...

Page 99: ...ID interrogator at the access point RFU62x RFU63x Configuration device RFU62x 2 1 1 21 20 1 Tags ISO IEC 18000 6c EPC C1G2 1 1000 Configuration PC 1 1 Authorized participants 1 1 000 Users user roles Operator Integrator Information Security Officer ISO 3 1 1 1 3 1 1 1 1 tag per participant From the point of view of the system users are all persons who log in to RFID Access Management with one of t...

Page 100: ...ng range Typ 5 m Antenna Integrated circular polarized axial ratio 2 dB 72 aperture angle front to back ratio 17 dB additionally 3 external antenna ports Service functions Parameter cloning via integrated microSD memory card slot or externally via CMC module in CDB62x Other functions Cloning function SD card or system diagnostics updateable firmware flexible data output format freely configurable ...

Page 101: ...ing range Max 1 m Antenna Integrated circular polarized axial ratio typ 2 dB 100 aperture angle front to back ratio 7 dB Service functions Parameter cloning via integrated microSD memory card slot or externally via CMC module in CDB62x Other functions Cloning function SD card or system diagnostics updateable firmware flexible data output format freely configurable heartbeat triggering Data interfa...

Page 102: ...V DC 30 V DC Power consumption 1 W Enclosure rating IP 65 DIN 40 050 Protection class III VDE 0106 Rel air humidity 90 non condensing Operating temperature 40 C to 50 C Weight 265 g without optional CMC600 Tab 22 CDB650 connection module data sheet 10 1 5 CMC600 101 cloning module data sheet Description External parameter memory for integration in CDB620 CDB650 CDM42x Additional switching inputs 2...

Page 103: ...B of available memory on the hard drive Graphics card with a resolution of at least 1 280 x 800 Hardware recommended Dual Core processor with at least 4 GHz Tab 24 Configuration PC system requirements Supported operating systems Windows Server 2008 R2 x64 Service Pack 1 Windows Server 2012 R2 x64 Windows Vista x86 Service Pack 2 Windows 7 x86 Service Pack 1 Windows 7 x64 Service Pack 1 Windows 8 x...

Page 104: ...drawing Fig 34 RFU63x RFID interrogator dimensional drawing 3 x antenna connection external TNC reverse Power Serial Data CAN I O connection Ethernet connection 7 x LED for status indicators 3 x M5 threaded mounting hole 8 mm deep 4 x M6 threaded mounting hole 11 mm deep 1 x LED multi colored process feedback Function buttons Micro USB female connector and slot for microSD memory card behind threa...

Page 105: ...mensional drawing Power Serial Data CAN I O connection 17 pin M12 male connector A coded Ethernet connection 4 pin M12 female connector D coded PoE connection 8 pin M12 female connector X coded Power HOST AUX CAN I O connection 15 pin D Sub HD male connector 0 9 m cable 4 x LED multi colored process feedback 7 x LED for status indicators Cover with integrated antenna Screw Torx T8 captive 2x for s...

Page 106: ...or micro B type Slot for microSD memory card M5 blind hole thread 9 mm deep 4x alternatively for mounting Pressure compensation valve ventilation element M6 blind tapped holes 7 mm deep 2 x for mounting 10 2 3 CDB620 connection box dimensional drawing Fig 36 CDB620 connection box dimensional drawing 5 x cable gland 17 pin M12 female connector A coded Max screw diameter 4 mm ...

Page 107: ... Green monitoring LED in the cloning module 27 Tab 11 Mounting kits for the 62x RFID interrogator 31 Tab 12 Mounting kits for the 63x RFID interrogator 31 Tab 13 Terminals for power supply in the connection module 36 Tab 14 Filter criteria for participant list in ECS 76 Tab 15 Validity criteria for access authorizations in ECS 82 Tab 16 Indication of update status in ECS 84 Tab 17 Maintenance task...

Page 108: ... Fig 18 Selecting the approach angle of the RFID interrogators in the case of a large metal surface on the front 29 Fig 19 Connection of the RFU62x configuration device 32 Fig 20 Connection of the RFID interrogators overview 33 Fig 21 Connecting RFID interrogators to the power supply switching output 34 Fig 22 Connecting RFID interrogators via a connection module 35 Fig 23 Connection of the power ...

Page 109: ...5 Mounting 31 Changing the password 89 Cloning module 19 CMC600 19 Inserting 37 Components 17 Cloning module 19 Configuration PC 18 Connection module 19 RFID interrogator access point 18 RFID interrogator configuration 18 Configuration PC 18 Connecting 38 Connection module 19 D Data backup 88 Data restoration 88 Dimensional drawings 104 E ECS 18 Installing 41 Launching 54 Electrical installation 3...

Page 110: ...ng 92 RFU63x 18 Connecting 33 Mounting 31 Recording 61 Replacing 93 S Safety 9 Safety notes 11 Scope of delivery 15 Settings 56 SICK support 96 SOPAS Installing 42 Status indicators CDB650 26 CMC600 27 RFU62x 24 RFU63x 25 Switching on 40 Switching on the system 40 Switching output Configuring 62 In connection module 19 Symbols used 8 System description 15 System logs RAM 97 T Tag Management 71 Tag...

Page 111: ...Operating instructions Chapter 11 RFID Access Management 8018582 2015 11 03 Operating instructions SICK 111 Subject to change without notice Annex ...

Page 112: ...ck it Japan Phone 81 0 3 3358 1341 E Mail support sick jp Magyarország Phone 36 1 371 2680 E Mail office sick hu Nederlands Phone 31 0 30 229 25 44 E Mail info sick nl Norge Phone 47 67 81 50 00 E Mail austefjord sick no Österreich Phone 43 0 22 36 62 28 8 0 E Mail office sick at Polska Phone 48 22 837 40 50 E Mail info sick pl România Phone 40 356 171 120 E Mail office sick ro Russia Phone 7 495 ...

Reviews: