Viking K-1270-IP Series Product Manual Download Page 3

3

Definitions

Client: 

 A computer or device that makes use of a server.  As an example, the client might request a particular file from the server. 

DHCP: 

 Dynamic Host Configuration Protocol.  In this procedure the network server or router takes note of a client’s MAC address and assigns an IP address to allow 

the client to communicate with other devices on the network. 

DNS Server: 

 A DNS (Domain Name System) server translates domain names (ie: www.vikingelectronics.com) into an IP address. 

Ethernet: 

 Ethernet is the most commonly used LAN technology. An Ethernet Local Area Network typically uses twisted pair wires to achieve transmission speeds up 

to 1Gbps. 

Host: 

 A computer or device connected to a network. 

Host Name: 

 A host name is a label assigned to a device connected to a computer network that is used to identify the device in various forms of network communication. 

Hosts File:

  A file stored in a computer that lists host names and their corresponding IP addresses with the purpose of mapping addresses to hosts or vice versa. 

Internet:

  A worldwide system of computer networks running on IP protocol which can be accessed by individual computers or networks. 

IP:

  Internet Protocol is the set of communications conventions that govern the way computers communicate on networks and on the Internet. 

IP Address:

  This is the address that uniquely identifies a host on a network. 

LAN: 

 Local Area Network.  A LAN is a network connecting computers and other devices within an office or building. 

Lease:

  The amount of time a DHCP server reserves an address it has assigned.  If the address isn’t used by the host for a period of time, the lease can expire and 

the address can be assigned to another host. 

MAC Address: 

 MAC stands for Media Access Control.  A MAC address, also called a hardware address or physical address, is a unique address assigned to a device 

at the factory.  It resides in the device’s memory and is used by routers to send network traffic  to the correct IP address.  You can find the MAC address of your 

K-

1270-IP 

phone printed on a white label on the top surface of the PoE LAN port. 

Router:

  A device that forwards data from one network to another. In order to send information to the right location, routers look at IP Address, MAC Address and 

Subnet Mask. 

RTP: 

Real-Time Transport Protocol is an Internet protocol standard that specifies a way for programs to manage the real-time transmission of multimedia data over 

either unicast or multicast network services. 

Server:  

A computer or device that fulfills requests from a client. This could involve the server sending a particular file requested by the client. 

Session Initiation Protocol (SIP): 

Is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video 

calls over Internet Protocol (IP) networks.

 

The protocol defines the messages that are sent between endpoints, which govern establishment, termination and other 

essential elements of a call. 

 

Static IP Address:

  A static IP Address has been assigned manually and is permanent until it is manually removed. It is not subject to the Lease limitations of a Dynamic 

IP Address assigned by the DHCP Server. The default static IP Address is: 

192.168.154.1

 

Subnet: 

A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the 

same prefix. For example, all devices with IP addresses that start with 100.100.100. would be part of the same subnet. Dividing a network into subnets is useful for 
both security and performance reasons. IP networks are divided using a subnet mask. 

TCP/IP:

 Transmission Control Protocol/Internet Protocol is the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, 

the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data 
over networks.  

TISP: 

 Telephone Internet Service Provider 

WAN: 

 Wide Area Network. A WAN is a network comprising a large geographical area like a state or country. The largest WAN is the Internet. 

Wireless Access Point (AP):  

A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a 

router (via a wired network) as a standalone device, but it can also be an integral component of the router itself. 

Wireless Repeater (Wireless Range Extender):

 takes an existing signal from a wireless router or access point and rebroadcasts it to create a second network. When 

two or more hosts have to be connected with one another over the IEEE 802.11 protocol and the distance is too long for a direct connection to be established, a wireless 
repeater is used to bridge the gap.

Power:

  PoE powered from 

K-1270-IP

 PCB 

Maximum Cable Length:  

500 ft 24 Awg stranded shielded (Belden 9537) 

Frequency:  

125KHz

 

Format:  

26 bit Wiegand

 

Read Range:

  1.25” to 2.0”

 

Technologies Supported: 

Viking 

PRX-C

PRX-C-ISO

PRX-FOB

LRT-4

,certain legacy 

HID® proximity protocols* and certain AWID 125Khz proximity protocols**

Transducer:  

Beeps during card read

 

LED:  

Red, turns off during card read

 

Humidity:  

Up to 100% (fully potted EWP)

 

Operating Temperature: 

-34° C to 65° C (-30° F to 150° F) 

* HID and the HID logo are registered trademarks of HID Global Corporation, an ASSA 
ABLOY company. All other trademarks are the property of their respective owners. 
**       AWID is a  trademark of Applied Wireless Identification Group.

Proximity Card Reader Specifications

Summary of Contents for K-1270-IP Series

Page 1: ...single push auto dialing of a tenant s phone number or business extension When the K 1270 IP phone is connected to an apartment or business tenant a built in contact closure may be activated to contr...

Page 2: ...to www vikingelectronics com and enter 944 in the search box 2 Click Application Note DOD 944 to open and download the PDF Scan the QR code below to open and download the Viking VoIP SIP System Compat...

Page 3: ...s a signaling communications protocol widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol IP networks The protocol defines the messages t...

Page 4: ...Output Viking Model PRX 3 or LRR 4 See DOD 228 OR 226 Optional Long Range RFID Receiver Note The gel filled water tight butt connectors are designed for insulation displacement on 19 26 gauge wire wit...

Page 5: ...flush mount unit using the included rough in box or as a surface mount unit using an optional VE 5x10 or VE 5x10 SS The rough in box uses the inner set of four holes on the face plate while the VE 5x1...

Page 6: ...l Viking model RC 4A Secure Remote Relay Controller see page 6 DOD 582 Extends range of cable keeps 1 Gbps network speed for other equipment on network PC Programming IBM compatible personal computer...

Page 7: ...trouble shoot the failure B Connect Disconnect Open the Viking IP Programming software on the PC and the start screen shown below will appear Any Viking IP phones that are connected to the network wi...

Page 8: ...Settings tab Step 6 Select the appropriate value Static IP Settings or DHCP for Set Unit IP Address via Note changing the IP address will cause you to have to reconnect to the unit Enter the values fo...

Page 9: ...ld the key on keypad then reconnect the LAN Cable RJ45 plug Step 3 Continue to hold key until you hear 2 beeps approximately 6 seconds Continue to hold key until you hear 4 more beeps approximately 6...

Page 10: ...de must be set to Door Strike 22 17 In Band Audio Call Progress Enabled Disabled factory set to Enabled 23 17 In Band Audio Detect Sensitivity 1 9 1 minimum 9 maximum factory set to 5 power cycle unit...

Page 11: ...If Authentication ID is not required leave this field blank 2 SIP Server 1 Unit Name Up to a 31 character unit name can be assigned to the K 1270 IP Series Phone being programmed When registered to a...

Page 12: ...he PC and are not uploaded The Index Number is the single digit number visitors enter on the K 1270 IP s keypad for the unit to call the tenant 3 seconds after the number is entered the unit will then...

Page 13: ...ion which door gate was opened or closed entry code index and phone number index with tenant name The Event Log can store up to 4 095 events Events are stored in a first in first out format When the m...

Page 14: ...lity to change any of the programming parameters Once entered any of the Remote Access Operation Commands can be used The code can be 1 6 digits in length and cannot contain a Q or Simply call the K 1...

Page 15: ...ection is set to outbound the 26 bit Wiegand connections become an output and can be connected to the card reader input on the access control system Unprogrammed keyless entry codes dialed by the user...

Page 16: ...ng Disabled The relay activation tone is a buzzing sound that is heard at the Entry phone when the door strike relay is activated After the called party enters the correct relay activation command the...

Page 17: ...utomatically decrease When background noise decreases the mic gain will automatically increase The Auto mode is useful in applications where the background noise level can change drastically such as a...

Page 18: ...dialing 9 from the connected phone If enabled and a busy is detected the K 1270 IP phone will dial the Roll Over speed dial number Factory Setting Enabled Note If the busy signal is interrupted with...

Page 19: ...d like to update firmware An alternative method of updating can be done by clicking the IP firmware Update IP button You can then browse to the folder that contains the PIP file for updating the unit...

Page 20: ...one of the following actions based on the Relay Mode settings for each relay see section 22 Relay 1 Door Strike relay 2 other Relay 1 will be activated for the programmed Relay 1 Activation Time Rela...

Page 21: ...rogrammed to activate relay 1 and or 2 in four different relay modes Momentary Latch Un Latch and Toggle To use a proximity card the tenant simply presents a preprogrammed proximity card within 6 inch...

Page 22: ...netic Lock 120V AC Door near Entry Phone 4 1 IN1 C IN2 IN3 C IN4 2 3 4 5 6 Relay 1 Output Contacts 5A 30VDC 250VAC max Connect to Doorstrike Mag Lock Gate Controller etc Relay 3 Output Contacts 5A 30V...

Page 23: ...backboxes with a blank aluminum panel The user can customize the clear coated aluminum panel to mount an PRX 1 card reader PRX 2 keypad or switch The kits come complete with box gasket panel and scre...

Page 24: ...age across the network to activate one of the relays on the other unit Two levels of user access permit selected users to have full operational and programming rights while others have operational con...

Page 25: ...the dispatcher the reason for the call Perform such tests in off peak hours such as early morning or late evenings PART 15 LIMITATIONS This equipment has been tested and found to comply with the limi...

Reviews: