
Operating instructions
RFID Access Management
8018582/2015-11-03
Operating instructions| SICK
3
Subject to change without notice
Contents
Contents
General safety notes and protective measures ....................................................11
Safety notes and symbols.................................................................11
General safety notes .........................................................................12
Potential sources of danger .............................................................12
Power consumption ..........................................................................14
Disposal after final decommissioning ..............................................14
An overview of the system components ..........................................17
Operating principle of the management software ..........................20
Notes on the tags ..............................................................................23
RFU62x RFID interrogator .................................................................24
RFU63x RFID interrogator .................................................................25
CDB650 connection module ............................................................26
CMC600 cloning module ..................................................................27
Notes on mounting the RFID interrogators ......................................28
RFU62x RFID interrogator .................................................................30
RFU63x RFID interrogator .................................................................31
Mounting the connection module ....................................................31
Connecting the RFU62x configuration device ...................................................32
Connecting the power supply/switching output ..............................34
Connection to the network ...............................................................35
Connecting RFID interrogators via a connection module .................................35
Connecting an RFID interrogator to a connection module .............35
Inserting the cloning module ............................................................37