
Operating instructions
RFID Access Management
4
Operating instructions | SICK
8018582/2015-11-03
Subject to change without notice
Contents
Connecting the configuration PC to the network .............................................. 38
Installing the SOPAS configuration software .................................. 42
Altering the IP addresses of the RFID interrogators ......................................... 43
Connecting the configuration PC to RFID interrogators ................. 44
Altering the default IP address ........................................................ 46
Displaying devices in the project tree ............................................. 48
Inserting the microSD card into access point RFID interrogators ................... 49
Loading the device in the project tree ............................................. 51
Setting the device parameters......................................................... 52
Testing RFU transmitting power ....................................................... 52
Changing the password to log in to devices ...................................................... 53
Logging in as an Integrator .............................................................. 54
Program overview ............................................................................. 55
Information about the tag ................................................................ 57
Information about the time server ................................................... 58
Configuring the RFID interrogator indicators .................................. 58
Recording the configuration device ................................................. 60
Recording RFID interrogators for the access control system ......... 61
The access points in the System Overview ..................................... 63
Modifying an access point ............................................................... 64
Participants and registered tags in the System Overview ................................ 73
Sorting/filtering the participant list ................................................. 75
Adding participants ........................................................................... 77
Deleting participants who leave the company ................................ 77
Deactivating a lost tag ...................................................................... 78
Displaying the access authorization for a tag ................................. 80
Modifying the access authorization of a participant ...................... 81
Checking the access authorization validity ..................................... 82
Reading the update status of the access points .............................................. 83