RF290R
Configuration Manual, 09/2014, C79000-G8976-C377-01
43
Protocols for the configuration of the reader
6
With the aid of the protocols for configuring the reader, this can be adapted to individual
conditions of various applications within a wide framework.
You can only access the configuration parameters after executing the "[0xA0] Reader-Login
(Page 59)" command with the correct READER-ID.
Since your data needs to be protected from unauthorized access, the reader is equipped
with the following protection mechanism:
●
Configuration protection:
Access to the configuration data stored in the EEPROM of the reader is locked.
6.1
[0x80] Read Configuration
You can determine the current configuration of the reader with "Read Configuration". To
achieve this, the configuration is read in blocks of 14 bytes and addressed by CFGn in the
CFG-ADR byte.
Table 6- 1
Host
→ reader
Byte
1
2
3
4
5
6
7, 8
Content
STX
MSB
ALENGTH
LSB
ALENGTH
COM-ADR
[0x82]
CFG-ADR
CRC16
Default
0x02
-
-
-
-
-
-
Table 6- 2
Reader → host
Byte
1
2
3
4
5
6
7 ... 20
21, 22
Content
STX
MSB
LSB
ALENGTH
COM-ADR
[0x82]
STATUS
1)
CFG-REC
CRC16
Default
0x02
-
-
-
-
-
-
-
1)
You will find further information in the Appendix (Page 103).
Name
Description
CFG-
ADR
2)
Bit
7
6
5
4
3
2
1
0
Function
LOC
0
CFGn: Address of the configuration block
Function
Description
CFGn
Memory address of the required configuration block