
Operating instructions
Chapter
3
RFID Access Management
8018582/2015-11-03
Operating instructions| SICK
17
Subject to change without notice
System description
Additional accessories
•
Mounting kits for mounting the RFID interrogators (see chapter
•
Network device for connecting the RFU62x configuration device and connecting cables
(see chapter
5.5 SICK connection accessories
•
CDB650 connection module for each RFID interrogator to cover extended distances
between the RFID interrogator and the connections.
•
CMC600 cloning module for enhanced protection against tampering in the CDB650
connection module.
Thorough check for completeness
It is recommended that you carefully check for and report transport damage of
any kind as soon as possible after receiving the components you have ordered.
Also verify that the delivery includes all components listed on the delivery note.
3.2
Specific features
3.2.1
An overview of the system components
To manage and configure access rights, RFID Access Management requires
a commercially available configuration PC and a type RFU62x RFID interrogator.
Type RFU62x and RFU63x RFID interrogators are used at the access points of the
access control system. Communication between the devices takes place via an
Ethernet connection.
Fig. 3: System components
Important note