background image

 

 

  

 
 
 
 
 
 
 
 
 
 

UNC100 

 
 
 
 
 
 
 
 
 

HARDWARE MANUAL 

Revision 1.4 

 

 

 

    WWW. RBH-ACCESS.COM 

© RBH Access Technologies, Inc. 2021

 

new generation 
building security 

Summary of Contents for UNC100

Page 1: ...UNC100 HARDWARE MANUAL Revision 1 4 WWW RBH ACCESS COM RBH Access Technologies Inc 2021 new generation building security...

Page 2: ...of their respective owners Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Disclaimer This book is provided as is without warranty of any k...

Page 3: ...m u n i c a t i o n 12 Networks 12 RS485 Applications 12 DIP Switch Settings 13 Controller Addressing 13 Master Controller 14 Slave Controller 14 Ethernet Secure Mode 14 RS485 HOST Port Baud Rate Sel...

Page 4: ...P Reader connection 26 Enabling the OSDP Feature in UNC 100 28 Unencrypted OSDP settings 28 Encrypted OSDP settings 28 Extended use of OSDP Channel 29 Configuration 29 Inputs 30 Input Circuit Types 30...

Page 5: ...ne location Moved all input specs to one location Moved all output specs to one location Reduced the number of pages 03 19 2014 DM 1 1 Minor editing of text 03 24 2014 RB 1 2 Changing output voltage f...

Page 6: ...32 models come equipped with IEEE 802 3at compliant PoE capability further increasing this UNC series award winning efficiency POE Features are IEEE 802 3at Compliant 30 Watt power rating Built in bat...

Page 7: ...lso be sure to mount the panel in a protected area Declaration Performance level Definitions of UNC 100 under evaluations in the table below according to UL 294 Ed7 section 8 Performance level Definit...

Page 8: ...ile flash memory This information includes configuration data cardholder records access levels schedules and all other records necessary for the operation of the system The controller operates indepen...

Page 9: ...he system supports a static IP address only default address is 192 168 168 125 and Port 3002 UNC 100 uses AES 256 bit encryption for secure communication over Ethernet This encrypted communication can...

Page 10: ...play under Edit Mode an edit button When pressed the software will allow the editing of the following items Location Text IP data LIF LAN application parameters Channel Application and Encryption AES...

Page 11: ...when a signal is received or transmitted Host Comms LED is a bicolour LED when red indicates receiving data from the host and when green indicates transmission of data Run LED will flash slowly when c...

Page 12: ...6 controllers and PC100 3 Controller Communications for controllers such as additional UNC500s or for UNC100s via a UNC NET a protocol designed for RS485 communications between UNC100 s and UNC500s b...

Page 13: ...r address The address is binary coded and the switch settings for all fifteen possible addresses are given below Controller Addressing Switch 1 Switch 2 Switch 3 Switch 4 Address On Off Off Off 1 Mast...

Page 14: ...Secure Mode When dip switch 5 is ON the IP locator program cannot locate the unit on the Ethernet and therefore cannot make any changes or reset the unit RS485 HOST Port Baud Rate Selection Master Onl...

Page 15: ...trollers UNC 100 can be linked together and feed into a single communication port on the PC Controller number 1 is designated the master controller and connected to the PC using TCP IP communications...

Page 16: ...UNC NET of the UNC500 If host connection is made through the RS485 port then only one panel can be connected UNC NET Cable Use 20 to 22 AWG shielded stranded twisted pair cable for all UNC NET connec...

Page 17: ...Configuration ENET option needs to be enabled in device locator as well Once checked only E NET communications will be used The IP address has to fall in the range of the subnet mask in order for UNC...

Page 18: ...he following steps have to be followed In the advanced tab of Network Configurations of AxiomXA software select E Net as Slave Protocol In Master and Slave UNC 100s configuration enter serial number a...

Page 19: ...00 Hardware Manual V1 4 RBH Access Technologies Inc Page 19 of 36 Using the IP Device Discovery Program check the AES box and enter the same four character customer key matching the one added in softw...

Page 20: ...r RC 2 reader controllers The UNC100 is configured for 1 then you can connect 3 physical RC2s and up to sixteen IOC 16 input output controllers may be connected to each network controller in the UNC N...

Page 21: ...quential device controller addressing is recommended as this makes your cabling diagrams easier to follow and simplifies troubleshooting as the devices are in the correct numerical sequence UNC100 D N...

Page 22: ...UNC100 Hardware Manual V1 4 RBH Access Technologies Inc Page 22 of 36 D NET Device Network Connection Example...

Page 23: ...otal length cannot exceed 15 000 feet 4600 meters D NET Cable Use 20 to 22 AWG shielded twisted pair cable for all D NET connections Shielded cable is recommended to minimize problems that can arise i...

Page 24: ...it will report a reader tamper alarm whenever the input is opened 3 LED and beeper outputs are open collector current limited to 100ma Reader Connection RC 2 to 12 Volt Reader Connection Diagram1 Cabl...

Page 25: ...to indicate the door is unlocked Tamper The Buzzer sounds continuously Lockout Alarm The Buzzer beeps rapidly A lockout alarm occurs when a user defined number of Access Denied messages occur These m...

Page 26: ...BH Blue Line can be connected in daisy chain or in star configuration Star configuration will reduce the communication distance over RS 485 Locks should be powered from separate power supply The commu...

Page 27: ...ot possible to connect with this reader in secure mode At present Readers from manufacturers that have been integrated with RBH Firmware are HID RBH blue LINE UNC 100 can be set to installation mode u...

Page 28: ...the UNC 100 using APP setting feature of utility program IP Device Discovery Unencrypted OSDP settings In order to make UNC 100 communicate to PD in unencrypted mode from The IP Device Discovery sele...

Page 29: ...rollers in this case will only use their respective input output infrastructure for access control all the indications raw card data read are done at OSDP readers OSDP can control up to 8 readers Assu...

Page 30: ...s connected to a push button mounted on the door or to a motion detector mounted near the door A normally open or normally closed button can be used and the circuit type can be programmed from the PC...

Page 31: ...e Short Trouble 1k Restore Open Circuit Alarm Normally Closed Two Resistor Loop Resistance State Short Trouble 1k Restore 2k Alarm Open Circuit Trouble This circuit provides a high degree of supervisi...

Page 32: ...tor Loop Resistance State Short Trouble 1k Alarm 2k Restore Open Circuit Trouble Normally Open And Normally Closed One Resistor Loop Resistance State Short Alarm 1k Restore Open Circuit Alarm This cir...

Page 33: ...e PC as On State de energized for fail safe operation If power fails AC and battery the power to the magnetic lock is removed and the door is opened Forced Tamper The Forced Tamper output turns on if...

Page 34: ...UNC100 Hardware Manual V1 4 RBH Access Technologies Inc Page 34 of 36...

Page 35: ...internal IOC 16 connections 16 UNC NET Communication speed 156250 baud DNET Communication speed 38400 baud HOST Ethernet speed 10 100 TCP IP Ethernet RS485 4 wire HOST RS485 Speed 9600 38400 57600 115...

Page 36: ...100 meters PC To Controller RS485 Twisted pair shielded stranded 18 to 22 AWG 4000 feet 1200 meters UNC NET Twisted pair shielded stranded 20 to 22 AWG 2500 feet 750 meters D NET 1 twisted pair shiel...

Reviews: