NexSentry 41xx A&E Specs

NexSentry™ 4100 Series Controller
8-door controller and peripherals
A/E Guideform Specification
Version 1.1
NOTES:
•
The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to
include Westinghouse Security Electronics products in their specifications.
•
The Specifier should carefully select the portions of this document that fit the intended application.
•
Feel free to consult with your Westinghouse Security Electronics Systems Integrator regarding your
particular application.
•
Optional feature choices are represented by items enclosed in brackets [ ].
•
This document is considered accurate through the date on the cover. For updated specifications, call
Westinghouse Security Electronics at 408 727-6521, or visit the WSE Web page at http://www.wseinfo.com.
•
The following individuals and organizations contributed to this document:
Editor/project team leader:
- Brent A. Duncan, Marketing Services Manager
Core team members:
- Joe Bridgman, Area Sales Manager
- Brian Giampaoli, Area Sales Manager
- Joe Oesterle, US Sales Manager
With contributions by:
- Frank Binzoni, VP Sales & Marketing
- James Collins, Senior Design Engineer
- Dana Frischer, Area Sales Manager
- Susan Goldin, Technical Writer
- Steve Lever, Field Service Engineer
- Jim Reeve, Software Engineer
- Bill Richardson, Technical Instructor
- Ping Saye, Design Engineering Manager
- Tony Smith, Software Engineer
- George Sousa, Project Team Director
- Matt Wenzel, Field Service Manager
With special thanks to:
- John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants
- Construction Services Institute
WSE • 8/28/97
16720 — ii
NexSentry Access Control System
Table of Contents
PART I GENERAL ................................................................................................................................................................1
.1 SECTION INCLUDES ........................................................................................................................................1
.2 SYSTEM DESCRIPTION ...................................................................................................................................1
A. Security Management System .......................................................................................................1
B. Description of work ..........................................................................................................................1
.3 SUBMITTALS .....................................................................................................................................................1
A. Product Data......................................................................................................................................1
B. Shop Drawings. .................................................................................................................................1
C. One Line Diagram ............................................................................................................................2
D. Operator’s Manual. ..........................................................................................................................2
.4 QUALITY ASSURANCE .....................................................................................................................................2
A. Manufacturer ....................................................................................................................................2
B. Systems Integrator............................................................................................................................2
C. System Checkout ..............................................................................................................................2
D. Regulatory Requirements ..............................................................................................................2
E. Warranty ............................................................................................................................................2
PART II PRODUCT ..............................................................................................................................................................3
.1 MATERIALS & COMPONENTS .......................................................................................................................3
A. System Description. .........................................................................................................................3
B. System Hardware Features ............................................................................................................3
1. Access Controller (NexSentry 4100) ................................................................................3
2. Monitor Input/Relay Output Board for 4100 (MIRO 16/8) .........................................4
3. Digital Proximity Key Reading Sensor (DigiReader) ..................................................5
4. Keypad (VIP-2) ....................................................................................................................6
5. Magnetic Stripe Pass Through Reader (MSR)..............................................................7
6. QuadraKey Digital Proximity Command Card............................................................8
7. NexKey Digital Proximity Command Card ..................................................................9
8. DuraKey Digital Proximity Command Card ................................................................9
9. Radio Frequency Identification (RFID) Tag (KeyMate Digital Key Fob) ............10
10. Radio Frequency Identification (RFID) Tag (DuraTag Digital Key) ..................10
11. Magnetic Stripe Card - ISO/ABA Format ...................................................................11
12. Power Supply (PI-1) Power Inserter............................................................................11
13. Accessories........................................................................................................................12
C. Controller Software Features .......................................................................................................13
PART III EXECUTION .......................................................................................................................................................17
.1 EQUIPMENT INSTALLATION AND DOCUMENTATION .........................................................................17
A. Installation .......................................................................................................................................17
B. Telephone Lines .............................................................................................................................17
C. Documentation ...............................................................................................................................17
.2 SERVICE AND SUPPORT................................................................................................................................17
A. Startup ..............................................................................................................................................17
B. Training ............................................................................................................................................17
C. Warranty Support ..........................................................................................................................18
PART IV APPENDIX ............................................................................................................................................................A
.1 READ RANGE MATRIX................................................................................................................................. A
.2 WIRING DIAGRAMS ........................................................................................................................................B
A. NexSentry Controller and MIRO 16/8 ..........................................................................................B
.3 MOUNTING DIAGRAMS ................................................................................................................................. C
A. NexSentry Module Enclosure ....................................................................................................... C
B. MIRO 16/8 Module Enclosure ...................................................................................................... D
C. NexSentry/MIRO 16/8 Enclosure ..................................................................................................E
.4 SAMPLE SYSTEM DIAGRAMS ....................................................................................................................... F
A. NexSentry Digital Proximity with Keypad................................................................................. F
B. NexSentry Magnetic Stripe/Keypad Combination................................................................... G
WSE • 8/28/97
16720 — iii
NexSentry Access Cont rol System
NexSentry® 4100 Series Controller
A/E Specification Summary
4100 Series Controller
•
Access Control Ports:
[8]
•
Monitor Inputs
32 maximum via MIRO 16/8
•
Relay Outputs, Lock and Auxiliary:
16 maximum via MIRO 16/8
•
Keys without names:
•
Keys with names:
•
Access Codes:
•
Event Report Schedules:
•
Transaction Buffers:
•
Key Technology:
11,200
4,400
120
32
100 for terminal port; 4,000 for host
port
- Digital Proximity
- Keypad
- Magnetic Stripe
•
Operator Interface Methods:
- Terminal: 1 RS-232
- Host: 1 RS-232 or 1- 20mA connector
•
Communications to keypads and
readers:
•
Regulatory Approval:
•
Environmental:
- 2 RS-485 Ports (S-Net)
FCC, UL-1012, CSA, UL 294
- Humidity: 0% to 90% non-condensing
Temperature: 20° to +120° F
(-7° to +49° C)
MIRO 16/8
•
Monitor Inputs
16
•
Relay outputs
8
•
S-Net Communications
WSE • 8/28/97
- 2 RS-485 Connectors
16720 — iv
NexSentry Access Control System
PART I
.1
SECTION INCLUDES
A.
.2
GENERAL
Section includes specifications for an integrated security management system which shall perform
the following general services:
1.
Access control
2.
Alarm monitoring
3.
Reporting functions
4.
Security office management functions
SYSTEM DESCRIPTION
A.
B.
Security Management System:
1.
Security management system (System) shall monitor and control access to areas defined herein.
2.
System shall be capable of supporting multiple access control technologies at each door, as well
as alarm inputs and control outputs.
3.
System shall consist of a microprocessor based controller, [digital proximity] [and/or] [magnetic
stripe,] [and/or] [magnetic stripe readers,] [and host software].
4.
System shall be capable of operating with or without host software station.
5.
Specific types of devices and their functions shall be addressed in relevant sections.
6.
[System shall be capable of being wired to support a Wiegand physical interface.]
Description of work:
1.
The Systems Integrator shall include all necessary labor, tools, equipment, and ancillary
materials required to furnish and install a complete and operational access control and alarm
monitoring system.
2.
The security management system will manage access to [building] [and] [selected areas] using
[encoded cards,] [and/or coded keypads] [and/or magnetic stripe cards].
3.
The extent of access management system work is defined to include, but not by way of limitation:
4.
.3
a.
[_____ wall mounted central controllers.]
b.
[_____ external keyboard and printer (directly or via central host).]
c.
[_____ digital proximity card reading sensors.]
d.
[_____ keypads.]
e.
[_____ magnetic stripe readers.]
f.
[_____ monitor input/relay output (MIRO) modules.]
g.
Wiring, power supplies, switches and ancillary equipment.
Requirements are indicated elsewhere in these specifications for work including, but not limited
to, raceways and electrical boxes and fittings required for installation of control equipment and
wiring: not the work of this section.
SUBMITTALS
A.
Product Data: Submit for prior approval, [__________] copies of manufacturer’s data on digital
proximity or magnetic stripe access control system and components.
B.
Shop Drawings: Submit dimensioned drawings of [digital proximity] [and/or] [magnetic stripe]
[and/or] [keypad] access control system and accessories including, central controller, external
keyboard and printer, [digital proximity card readers] [or magnetic stripe card readers,] [keypads,]
power supplies switches and ancillary equipment.
WSE • 8/28/97
16720 — 1
NexSentry Access Control System
C.
One Line Diagram : Submit a one line diagram of the system configuration proposed if it differs from
that illustrated in the riser diagram included in these specifications. Submittals indicating typical riser
diagrams are not acceptable.
D. Operator’s Manual: Submit for prior approval, [__________] copies of manufacturer’s manual for
programming and operating the NexSentry system and its related components.
.4
QUALITY ASSURANCE
A.
B.
C.
Manufacturer: Manufacturer of products defined in this section must have:
1.
Industry experience: Company must have at least 25 years experience in manufacturing and
serving access management systems.
2.
ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO
9001 Certification.
Systems Integrator:
1.
Company with a minimum of [5 (five)] years system design, engineering supervision, and
installation experience in the alarm, building automation, or access control industry.
2.
Company that is trained and authorized to install manufacturer products.
System Checkout:
1.
Pre-testing: All components and assemblies of the control unit are to be pre-tested at the factory
prior to shipment.
2.
Burn-in: 1,000 hours at normal operating conditions or equivalency.
3.
On-site testing: Manufacturer-trained and authorized Systems Integrator shall functionally test
each component in the system after installation to verify proper operation and confirm that the
panel wiring and addressing conform to the wiring documentation.
4.
Service facility: Systems Integrator shall have service facilities within [_____] miles of the
installation.
D. Regulatory Requirements:
1.
NEC Compliance: All electrical wiring work shall comply to NEC.
2.
NEMA Compliance: Electrical equipment shall comply with applicable portions of NEMA.
3.
FCC Emissions: All assemblies shall be in compliance with FCC emission standards.
4.
E.
a.
Microprocessor-based controller: Part 15, Subpart F, Class A.
b.
Digital proximity card-reading sensors: Part 15, Subpart F.
c.
Dial-up modems: Part 68.
UL-1012 and CSA: All power supplies shall be in compliance with Underwriters Laboratories
standard 1012 and CSA standards for power supplies.
Warranty:
1.
Digital Command Keys: No less than 1 (one) year.
2.
Magnetic Stripe Cards: No less than 1 (one) year.
3.
System Components: 15 (fifteen) months from shipment date or 12 (twelve) months from date of
purchase by Systems Integrator, whichever comes first.
WSE • 8/28/97
16720 — 2
NexSentry Access Control System
PART II
.1
PRODUCT
MATERIALS & COMPONENTS
A.
System Description: The access control and security management system (System) within the
building shall consist of Microprocessor-based Controller[s] (NexSentry), Monitor Input/Relay Output
module[s] (MIRO 16/8), [reader types], Controller software, [and host hardware and software] and
[accessories ]. To accommodate growth and to facilitate implementation of future technologies, System
components shall be modular and expandable.
B.
System hardware features:
1.
Access Controller (NexSentry 4100):
a.
b.
General: The NexSentry Controller (Controller) shall be an 8 (eight) door controller with an
onboard INTEL 32-bit microprocessor, battery backup, database, user defined reports, and
several communication ports. Controller shall have two S-Net communication channels to
which a variety of S-Net devices can be connected. Controller shall support one hardware
module daughterboard for additional memory and/or for future feature enhancements.
Functions provided by Controller shall be as follows:
1)
Provides central control for all devices attached.
2)
Makes decisions for access.
3)
Responds to monitor activity.
4)
Receives input to control its decision making.
5)
Reports activity to other devices.
Capacities:
1)
Addressable devices:
(i) Digital proximity sensors: up to 8 (eight).
(ii)
Keypads: up to 8 (eight).
(iii) Magnetic stripe readers: up to 8 (eight).
(iv) Combination magnetic stripe and keypad readers: up to 8 (eight).
c.
d.
e.
f.
2)
Monitor inputs: Station switch, tamper, power fail, and alarm.
3)
Relay outputs: Building Mode and Alarm.
4)
MIRO module: System shall connect with up to 2 (two) monitor input/output module via
S-Net.
5)
Expansion Bus: Controller shall support 1 (one) hardware module daughterboard for
memory expansion and/or for future feature enhancements, including: LON controller,
Ethernet controller, ISA Bus interface.
Specifications:
1)
Controller card dimensions: 7 X 15 X 1.5 in. (17.78 X 38.1 X 3.81 cm).
2)
[Controller enclosure dimensions: 7.574 X 16.778 X 1.993 in. (19.24 X 42.64 X 5.06 cm.)]
Environmental:
1)
Humidity: 0 to 95% non-condensing:
2)
Temperature: 20° to 120° F (-7° to 49° C).
Mounting:
1)
The Controller shall be available [as a board-only option.] [in an enclosure.]
2)
If enclosure is used, the front cover shall contain 4 (four) snap fasteners which shall
remove for easy access to internal switches and parts.
3)
See PART IV.3 for enclosure options.
Power:
1)
WSE • 8/28/97
Source: Power is provided via twisted pair (shielding optional) wiring from a Power
Supply unit (see PART II.B.8.)
16720 — 3
NexSentry Access Control System
g.
2)
Consumption: Less than 5 (five) watts with 17 to 28 volts d.c.
3)
[Battery: A low voltage battery (such as a lithium cell) shall maintain the internally stored
database setup when no power is available to the controller.]
Wiring:
1)
Connectors: Twisted pair (shielding optional) wiring shall supply both power and
communications to system devices using the following connectors:
(i) Host: 9-pin D-sub DTE. Also includes a passive 20mA loop.
(ii)
Terminal port: 9-pin D-sub DCE.
(iii) Reader: Phoenix-type.
(iv) Power supply: Phoenix-type.
(v)
MIRO: Phoenix-type.
(vi) Monitor Inputs and Relay Outputs: Phoenix-type.
2)
Cable limitations:
(i) S-Net data channel shall not exceed 4,000 feet.
(ii)
Every S-Net device requires 16 VDC minimum for power.
(iii) S-Net power cable length shall be limited by the cable losses, the length of the cable,
and the devices to which it is connected.
h.
1)
S-Net devices: RS-485 through the system’s twisted pair (shielding optional) wiring.
2)
Host or printer: SEEP Protocol through RS-232 port or 20mA current loop interface.
3)
Terminal: ASCII through Terminal Port.
i.
Feedback: To facilitate trouble-shooting, LED indicators shall be included for every serial
port.
j.
Diagnostics: LED status lights shall indicate:
k.
l.
2.
Communications:
1)
Operational status of the controller.
2)
Lock status of controlled entries.
Self-protection: The Controller shall have inputs to detect:
1)
Power input failures.
2)
Controller tampering.
Manufacturer: Westinghouse Security Electronics, Model: NexSentry 4100 Controller.
Monitor Input/Relay Output Board for 4100 (MIRO 16/8):
a.
General: Module that monitors inputs that occur over the S-Net and sends them to the
Controller. Executes relay commands received from the controller out to S-Net devices.
b.
Capacities:
c.
d.
WSE • 8/28/97
1)
Relay Outputs: 8 (eight) Normally opened (NO) or Normally Closed (NC) via strap
position.
2)
Monitor Inputs: 16 (sixteen) four-state monitor points.
Specifications:
1)
Board dimensions: 5 X 15 X 1.25 in.
(12.7 X 38.1 X 3.175 cm)
2)
[Enclosure dimensions: 16.788 X 4.6 X 5.474 in. (42.64 X11.68 X 13.9 cm)]
Environmental:
1)
Humidity: 0 to 95% non-condensing.
2)
Temperature: 19° to 120° F (-7° to 49°C).
16720 — 4
NexSentry Access Control System
e.
Mounting: MIRO 16/8 shall be mounted in an enclosure with the Controller or standalone in
a controlled area.
f.
Power:
g.
1)
Source: Twisted pair (shielding optional) connected to Controller.
2)
Consumption: Less than 3 watts with 16 to 28 volts d.c.
Wiring:
1)
Connectors: Twisted pair (shielding optional) wiring shall supply both power and
communications to system devices using the following connectors:
(i) Monitor Inputs: Phoenix-type.
(ii)
3.
Relay Outputs: Phoenix-type.
h.
Communication: S-Net Communications through 2 (two) RS-485 connectors via the twisted
pair (shielding optional) wiring.
i.
Manufacturer: Westinghouse Security Electronics, Model: MIRO 16/8.
Digital Proximity Key Reading Sensor (DigiReader):
***********
Note: There are currently five models of DigiReader digital proximity readers. Each reader provides
different read ranges. When compiling Specifications, use the “Read Range Matrix” (Part IV.1,
Appendix) to determine the reader and card that best suit the specific application.
***********
a.
b.
General:
1)
DigiReader (DR) shall read digital proximity keys and send signal to Controller for
processing.
2)
DR 4226 shall comply with the Americans with Disability Act (ADA).
3)
DR 4238 shall comply with the Americans with Disability Act (ADA).
4)
DR 4205K shall have an integrated weatherized keypad for additional security and shall
comply with the ADA.
5)
DR 4205GM shall feature a glass-mount kit for status display on front and back of reader.
Capacities:
1)
DR shall read digital proximity keys supporting phase shift signals to a distance of [_____]
(optimum read range as defined in DigiReader/Prox Card Read Range Matrix) inches and
does not require contact with the sensor.
2)
DR shall be capable of reading up to 3 (three) cards in field at the same time.
c.
Specifications: Material shall be high-impact Lexan with 94V-2 UL flame class rating, and
shall be UV resistant, sealed, water and weather resistant, and tamperproof.
d.
Environmental:
e.
f.
g.
WSE • 8/28/97
1)
Humidity: 10% to 90% non-condensing.
2)
Temperature: -4° to +140° F (-20° to +60° C).
Regulatory: Controller shall be designed to meet the following regulatory requirements:
1)
UL294 Listing Standard for Safety.
2)
FCC EMI and EMC Class A.
3)
EN55022 EMI and EMC Class A.
Mounting:
1)
DR shall have the capacity to be mounted and operated behind any non-metallic, nonconductive surface, including glass.
2)
(DR 4204 only) DR shall have the capability to be mounted on any metal door frame.
Power:
1)
Source: Via the network twisted pair (shielding optional) wiring.
2)
Consumption:
16720 — 5
NexSentry Access Control System
(i)
[DR 4204: Less than 5 watts.]
(ii)
[DR 4205: Less than 2 watts.]
(iii) [DR 4205K: Less than 2 watts.]
(iv) [DR 4205 GM: Less than 2 watts.]
(v)
[DR 4205E: Less than 2 watts.]
(vi) [DR 4208: Less than 6.5 watts.]
(vii) DR 4226: Less than 17 watts.]
(viii) DR 4238: Less than 17 watts.]
h.
Wiring: Twisted pair (shielding optional) with 4,000 foot maximum recommended length.
i.
Feedback:
1)
Single tri-color LED (green/amber/red) shall provide capability for diagnostic feedback.
2)
Tri-color LED shall be programmable.
3)
An audio tone shall indicate successful digital proximity card read and access granted.
j.
Diagnostics: DR and data-line integrity shall be monitored continuously and shall alarm if
failure is detected and indicate device and location of fault.
k.
Self-protection:
l.
1)
Physical damage, including breaking open sensor housing, shall not allow access to any
circuitry which would allow the system to be compromised.
2)
Transmission of any frequency (or set of frequencies) into the sensor at any power level
shall not compromise the system.
Manufacturer: Westinghouse Security Electronics.
m. Model:
4.
1)
[Model DR 4204]
2)
[Model DR 4205]
3)
[Model DR 4205K]
4)
[Model DR 4205GM]
5)
[Model DR 4205E]
6)
[Model DR 4208]
7)
[Model DR 4226]
8)
[Model DR 4238]
Keypad (VIP-2):
a.
b.
WSE • 8/28/97
General:
1)
The system shall have the means to utilize a numeric keypad for entry of a Personal
Identification Number (PIN).
2)
The Keypad shall provide information to the Controller, either alone or in conjunction
with a card reading device, thereby providing an additional level of security.
3)
The system shall have the means to recognize special duress codes which can be entered
into the Keypad to be available to any user during an emergency.
4)
System administrator shall have capability to program a reaction based on keypad duress
code input.
Capacities:
1)
Keypad shall provide a standard 10-digit numeric entry pad organized in the standard
telephone pad layout.
2)
The user shall be able to enter either a 4- to 8-digit Personal Identification Number (PIN).
16720 — 6
NexSentry Access Control System
c.
Specifications: The keypad unit shall be housed in a double gang metal utility box, 4.50 H X
4.56 W X 2.19 D in. (11.43 X 11.58 X 5.56 cm).
d.
Environmental:
e.
f.
5.
1)
Temperature: 20° F to 120° F (-7° C to +49° C).
2)
Humidity: 10% to 95% non-condensing.
Regulatory: The unit shall meet the following regulatory requirements:
1)
FCC class A computing device when installed in the system.
2)
ANSI/NEMA Standard 250 for Type 4x enclosures.
Mounting:
1)
Keypad shall be mounted on the outside of a building, in a wall, or against it.
2)
After the keypad is installed and operations have been verified, decal shall be placed over
the cover plate to conceal mounting plate and to provide a weather seal.
g.
Power: Keypad receives power from the network twisted pair wiring.
h.
Wiring: Twisted pair cable with a maximum recommended cable length of 4,000 feet.
i.
Feedback: Keypad shall provide three LED status for awaiting card presentation, awaiting
keypad entry and acknowledgment of successful access granted and door unlock.
j.
Self-protection: Keypad is protected against the circuitry being removed from the outlet box
or the box being forcibly removed from the wall by means of a strategically placed internal
tamper switch.
k.
Manufacturer: Westinghouse Security Electronics, Model: [VIP-2] [VIP-2W (weatherized)].
Magnetic Stripe Pass Through Reader (MSR):
a.
b.
c.
d.
e.
WSE • 8/28/97
General:
1)
MSR shall read magnetic stripe cards that have been encoded with standard ISO/ABA
Track II card numbering format.
2)
Magnetic stripe cards shall be read in either direction while being swiped through the
MSR.
Capacities:
1)
The readers shall read all forty (40) digits of the swiped magnetic stripe card.
2)
(MSRK only ) Readers with integral keypad shall provide a standard 10-digit numeric
entry for additional security.
Specifications:
1)
Dimensions: 1.95 X 1.30 X 5.50 in. (5 X 3.3 X 14 cm)
2)
Card accommodation: Credit-card sized magnetic stripe card (2.125 X 3.375 X .030 in., +/.003 in.; 75 bip; ANSI X 4.16).
3)
Read speed: 3 to 50 ips.
Environmental:
1)
Humidity: 0% to 95% RHNC (weatherized option to 100%).
2)
Temperature: -31° F to 150° F (-35°C to +66°C).
Mounting: Wall-mounted either horizontally or vertically on a standard single-gang handy
box (preferred method), on any flat surface, on a structured door frame (mullion), or as a
Wiegand (Sensor Model 30387) reader replacement using matching hot holes on the adapter
plate.
1)
[MSR only] is designed for indoor use, but can be used for most sheltered outdoor
applications.
2)
[MSRK only] MSRK is weatherized for outdoor use and can withstand direct exposure to
the elements.
16720 — 7
NexSentry Access Control System
f.
g.
Power:
1)
Source: Powered from the system twisted pair (shielding optional) wiring connected to
the Controller.
2)
Current: 50mA.
3)
Wiring: Twisted pair cable with maximum recommended length of cable being 4,000 feet.
Feedback:
1)
MSR shall provide a two state LED that indicates door status as follows:
(i) A red light indicates active but locked;
(ii)
2)
6.
A green light indicates unlocked.
MSR shall sound an alarm upon improper card entry.
h.
Diagnostics: MSR performs a power-up self test, which indicates the success or failure of the
test.
i.
Self-protection:
1)
Physical damage, including breaking open reader housing, shall not allow access to any
circuitry which would allow the system to be compromised.
2)
A special latch release tool to access concealed latches provides additional tamper
resistance.
j.
Manufacturer: Westinghouse Security Electronics.
k.
Model:
1)
[MSR42-G, Magnetic Stripe Card Reader.]
2)
[MSR42-GW, Weatherized Magnetic Stripe Card Reader.]
3)
[MSRK42-G, Magnetic Stripe Card Reader with Keypad.]
4)
[MSRK42-GW, Weatherized Magnetic Stripe Card Reader with Keypad.]
QuadraKey Digital Proximity Command Card:
a.
b.
c.
d.
General:
1)
QuadraKey Digital Proximity Command Key (card) is an ISO-compliant, single-coil
passive digital proximity card that supports multiple technologies on one card, including:
digital proximity, magnetic stripe, bar code and photo ID.
2)
Design shall be capable of smart card chip insertion, color imaging on both sides and
hole punch horizontal or vertical for using the card as a badge.
3)
Note: Active circuit type cards (those requiring batteries) shall not be acceptable.
Capacities:
1)
QuadraKey can generate a minimum eight digit access number.
2)
Cards shall have numeric encoded data embedded in an integrated circuit within the
card.
3)
Each card shall be encoded so that it is totally unique and exists in no other system
anywhere in the world.
Specifications:
1)
Dimensions: ISO standard size and thickness of 3.37 X 2.125 X 0.032 in (8.55 X 5.39 X 0.081
cm).
2)
Material: Polyester and appropriate adhesive based materials.
3)
Magnetic stripe material: single layer 3M type 5203 High Coercivity, 4000 Oerstad using
Track 2, without exception.
4)
Magnetic stripe dimensions: The stripe shall minimally extend from 0.333 in. to 0.493 in.
from the upper card edge and for the entire length of the card.
Environmental:
1)
WSE • 8/28/97
Temperature: 14° to 140° F (-10° to 60° C).
16720 — 8
NexSentry Access Control System
2)
e.
Regulatory: N/A (Card is totally passive requiring no approval.)
f.
Power:
1)
7.
Source: Passive-powered by DigiReader digital proximity reader.
g.
Communication: Via low power radio frequency, providing read ranges up to [22] inches
depending on the selected DigiReader. (see DigiReader/Prox Card Read Range Matrix in Part
IV.1 for actual figures).
h.
Manufacturer: Westinghouse Security Electronics, Model: QuadraKey.
NexKey Digital Proximity Command Card:
a.
b.
c.
d.
8.
Humidity: 0% to 100%.
General:
1)
NexKey Digital Proximity Command Key (card) is a single-coil passive digital proximity
card that can, through add-on options, support additional technologies, including: bar
code and photo ID with lamination.
2)
Card shall be highly resistant to face abrasion or bending.
3)
Card shall have a slot in the vertical position for use as a badge.
4)
Note: Active circuit type cards (those requiring batteries) shall not be acceptable.
Capacities:
1)
Card can generate a minimum eight digit access number.
2)
Cards shall have numeric encoded data embedded in an integrated circuit within the
card.
3)
Each card shall be encoded so that it is totally unique and exists in no other system
anywhere in the world.
Specifications:
1)
Dimensions: 3.37 X 2.125 X 0.075 in. (8.55 X 5.93 X 0.19 cm).
2)
Construction: Durable ABS with vinyl or polycarbonate covering.
Environmental:
1)
Temperature: 14° to 140° F (-10° to 60° C).
2)
Humidity 0% to 100% humidity.
e.
Regulatory: N/A (Card is totally passive requiring no approval.)
f.
Power: Passive-powered by DigiReader digital proximity reader.
g.
Communication: Card shall communicate via low power radio frequency, providing read
ranges up to [22] inches depending on the selected DigiReader. (See DigiReader/Prox Card
read range matrix for actual figures).
h.
Manufacturer: Westinghouse Security Electronics, Model: NexKey.
DuraKey Digital Proximity Command Card:
a.
b.
c.
General:
1)
DuraKey Digital Proximity Command Key (Card) is a highly durable, dual-coil passive
digital proximity card that supports multiple card technologies on one card, including:
digital proximity, bar code, and photo ID with lamination.
2)
Note: Active circuit type cards (those requiring batteries) shall not be acceptable.
Capacities:
1)
Digital Proximity Command Card can generate a minimum eight digit access number.
2)
Cards shall have numeric encoded data embedded in an integrated circuit within the
card. Each card shall be encoded so that it is totally unique and exists in no other system
anywhere in the world.
Specifications:
1)
WSE • 8/28/97
Dimensions: 3.37 X 2.125 X 0.099 in. (8.55 X 5.93 X 0.25 cm).
16720 — 9
NexSentry Access Control System
2)
d.
9.
Construction: Durable polycarbonate with vinyl covering.
Environmental:
1)
Temperature: 14° to 140° F (-10° to 60° C).
2)
Humidity: 0% to 100% relative humidity.
e.
Regulatory: N/A (Card is totally passive requiring no approval.)
f.
Power: Passive-powered by DigiReader digital proximity reader.
g.
Communication: Card shall communicate via low power radio frequency, providing read
ranges up to [36] inches depending on the selected DigiReader. (See DigiReader/Prox Card
read range matrix for actual figures)
h.
Manufacturer: Westinghouse Security Electronics, Model: DuraKey.
Radio Frequency Identification (RFID) Tag (KeyMate Digital Key Fob):
a.
b.
c.
d.
General:
1)
KeyMate Digital Key Fob is a compact, single-coil passive digital proximity access
credential and identification tag for use in environments requiring a flexible alternative
to access cards for tracking people, items or inventory.
2)
Fobs shall be constructed of a lightweight yet highly durable, waterproof polypropylene
material and feature one built-in slot for easy conversion to a key chain, bracelet or
commercial ID tag.
3)
Note: Active circuit type cards (those requiring batteries) shall not be acceptable.
Capacities:
1)
KeyMate Digital Key Fob shall generate a minimum eight-digit access number.
2)
Numeric encoded data shall be embedded in an integrated circuit within each fob. Each
fob shall be encoded so that it is totally unique and exists in no other system anywhere in
the world.
Specifications:
1)
Dimensions: 1.375 X 1.625 X .125 in (3.49 X 4.13 X .125 cm).
2)
Construction: Durable polypropylene material.
Environmental:
1)
Temperature: -31° to 270° F (-35° to 132° C).
2)
Humidity: 0% to 100% condensing.
e.
Regulatory: N/A (Fob is totally passive requiring no approval).
f.
Power: Passive-powered by DigiReader digital proximity reader.
g.
Communication: KeyMate Digital Key Fob shall communicate via low power radio
frequency, providing read ranges up to [15] inches depending on the selected DigiReader (see
PART IV.1, “DigiReader/Prox Card read range matrix” for actual figures).
h.
Manufacturer: Westinghouse Security Electronics, Model: KeyMate.
10. Radio Frequency Identification (RFID) Tag (DuraTag Digital Key):
a.
b.
General:
1)
DuraTag is a compact, single-coil passive digital proximity access credential and
identification tag for use in environments requiring a flexible alternative to access cards
for tracking people, items or inventory.
2)
Tags shall be constructed of a lightweight yet highly durable, waterproof polypropylene
material.
3)
Dual-slot configuration shall allow tags to be fastened easily and securely to items, or to
be adapted for wristband use.
4)
Note: Active circuit type cards (those requiring batteries) shall not be acceptable.
Capacities:
1)
WSE • 8/28/97
DuraTag Digital Key tag shall generate a minimum eight-digit access number.
16720 — 10
NexSentry Access Control System
2)
c.
d.
Numeric encoded data shall be embedded in an integrated circuit within each tag. Each
tag shall be encoded so that it is totally unique and exists in no other system anywhere in
the world.
Specifications:
1)
Dimensions: 1.37 in. D X 0.192 in. thick (3.45 cm D X 4.84 mm thick).
2)
Construction: Durable polypropylene.
Environmental:
1)
Temperature: -31° to 270° F (-35° to 132° C).
2)
Humidity: 0% to 100% condensing.
e.
Regulatory: N/A (Fob is totally passive requiring no approval).
f.
Power: Passive-powered by DigiReader digital proximity reader.
g.
Communication: DuraTag Digital Key Fob shall communicate via low power radio
frequency, providing read ranges up to [15] inches depending on the selected DigiReader (see
PART IV.1, “DigiReader/Prox Card read range matrix” for actual figures).
h.
Manufacturer: Westinghouse Security Electronics, Model: DuraTag.
11. Magnetic Stripe Card - ISO/ABA format:
a.
General: The ISO/ABA format magnetic stripe card shall conform to the ISO/ABA standards
for size and encoding characteristics.
b.
Capacities:
c.
d.
1)
Each card shall support up to 40 digits in an ISO/ABA format on track two of the magnetic
stripe.
2)
The information contained in the 40 digits shall include at least a 4- to 8-digit number for
identification or access purposes.
3)
Additional information can include a site code (4 digits) and an expiration date of month
and year (4 digits).
Specifications:
1)
Dimensions: 2.125 X 3.375 X .030 in. (5.4 X 8.57 X .07 cm)
2)
Construction: Polyester and appropriate adhesive-based materials.
3)
Magnetic stripe material: Single layer 3M type 5203 High Coercivity, 4000 Oerstad using
Track 2, without exception.
4)
Magnetic stripe dimensions: From 0.333 in. to 0.493 in. minimum from the upper card
edge and for the entire length of the card.
5)
Photo ID ready: Photo ID Badge shall be available as an add-on to all magnetic stripe
systems. It uses the Polaroid ID-4 Camera System with ANSI X4.16-1983 encoding.
Environmental:
1)
Temperature: -30° to +122° F (-35° to 50° C).
2)
Humidity: 5% to 95% relative humidity.
e.
Communication: Via physical read by a Magnetic Stripe Reader.
f.
Manufacturer: Westinghouse Security Electronics, Model: ISO/ABA Magnetic Stripe Card.
12. Power Supply (PI-1) Power Inserter:
a.
General: Un-interruptable power source module shall provide low voltage DC power. It shall
also support optional external lead acid batteries to maintain all controller operations for at
least four (4) hours in event of power failure.
b.
Capacities:
WSE • 8/28/97
1)
28 volt DC output to readers.
2)
Limited lock power output at 24 Volts DC.
3)
5 ampere output current.
4)
Power failure output.
16720 — 11
NexSentry Access Control System
c.
5)
Battery charger output.
6)
Additional power supplies may be required based upon system configuration of other
devices and wiring distances.
Specifications:
1)
d.
e.
Dimensions: 12 X 5.25 X 3.375 in. (31 X 13.4 X 9.5 cm).
Environmental:
1)
Humidity: 10% to 90% non-condensing.
2)
Temperature: 20° to +120° F (-7° to +49° C).
Regulatory: UL 1012 or 1310 and CSA or cUL listed.
1)
NOTE: The PI-1 Power Inserter is required when configuring NexSentry with a
keypad and/or digital readers to meet FCC requirements.
f.
Mounting: Power supply should be installed in a secure area at least two feet from the
Controller.
g.
Power: 115VAC/60Hz source.
h.
Wiring:
1)
Power Supply shall be connected to the controller and keypad network wiring via twisted
pair wire (shielding optional) of at least 18 AWG.
2)
Connectors: Phoenix-type.
i.
Feedback: A single LED indicates power ON condition.
j.
Self-protection: PI-1 shall send a POWER FAIL signal to the controller.
k.
Manufacturer: Westinghouse Security Electronics, Model: PI-1, or other manufacturerapproved device.
13. Accessories:
a.
b.
c.
d.
Terminal:
1)
Standard video display terminal (CRT) with full keyboard and display.
2)
Shall be capable of data throughput at 300, 1200, 2400, 4800, and 9600 baud.
3)
Systems Integrator shall furnish as shown on plans.
4)
Manufacturer: Westinghouse Security Electronics, Model: #57101-L-1 (110v) /
57101-L-2 (230v) or equal.
Printer:
1)
Printer shall be standard RS-232 serial communications printer.
2)
Printer shall be capable of data throughput at 300, 1200, 2400, 4800, and 9600 baud.
3)
Systems Integrator shall furnish as shown on plans.
4)
Manufacturer: Westinghouse Security Electronics; Model: parallel/serial 57184-V
(115v) / 57184-V (230v) or equal.
Modem (if required on plans):
1)
Baud Rate: 300, 1200, or 2400, 4800, 9600 baud.
2)
Regulatory: FCC registered, UL listed.
3)
Manufacturer: Westinghouse Security Electronics, Model: #5200 local / remote or equal.
Locking Hardware:
1)
e.
Switches:
1)
WSE • 8/28/97
Systems Integrator shall furnish all system electrified locking hardware as shown on
plans and which is used in conjunction with card access and alarm monitoring system.
Provide all necessary monitoring and manual switches as shown on plans and which are
used in conjunction with card access security system.
16720 — 12
NexSentry Access Control System
f.
External UPS batteries:
1)
C.
Provide necessary batteries to be used with UPS power supply to maintain all controller
operations and provide limited DC lock power at either 12VDC or 24VDC.
Controller software features:
1.
General: Controller shall have the capability to act as a standalone unit with the software features
described below. Additional functionality and features may be added by networking system
through a Host computer (see specification for WSE Host software); however, the purpose of this
section is to highlight the software features that are pre-programmed into the Controller.
2.
Database: Database shall store all user operating data and handle event reporting for all possible
attached devices, and shall contain memory capacity for the following:
3.
a.
Users with unique ID: 11,200 maximum (standard) [100,000 maximum with optional RAM
upgrade)].
b.
Access Codes: The access code shall define where and when the key holder will be granted
access.
Number available: 120.
2)
Capacity: 4 (four) maximum time periods for each door in the system.
3)
Definable time periods: Time of Day, Day of week, and Holidays.
c.
Reports: 32.
d.
Time intervals: 128.
e.
User-definable holidays: up to 30.
f.
Transaction buffer: 4,000 maximum in Host port, 100 circular in the Terminal port.
Operational modes: Controller shall operate in one of two modes, as follows:
a.
b.
4.
1)
Standalone mode:
1)
NexSentry shall not attach to a Host computer.
2)
User interaction shall be via the user terminal or via access control card readers, keypads,
etc.
3)
All functions shall still be operable and commands normally done via the Host computer
shall still be done directly on the Controller via user terminal.
4)
All system activity messages to the operator shall be printed in plain English Language
Text. Mnemonic type or transaction code type operator messages are not acceptable.
Networked mode:
1)
NexSentry shall be connected to a Host computer.
2)
Changes to the database in the Controller shall be made on the host computer then
downloaded to Controller.
3)
Log messages shall be stored on the Host.
4)
If communications between Host and Controller fails, Controller shall continue
processing without degradation in function or responsiveness and log messages shall be
stored in Controller memory until they can be delivered to Host.
5)
All system activity messages to the Host system shall be hexadecimal for efficient data
communications supporting SEEP protocol.
6)
The Host shall have the responsibility for acknowledging and translating the received
messages.
7)
While operating in Host mode, a second port on the Controller shall be available for
standalone mode connection and output.
Building Mode: Controller shall operate in one of three Building modes to determine if access
will be allowed or denied.
a.
Building Modes shall be defined as follows:
1)
WSE • 8/28/97
OPEN mode: designates any key holder, privileged or not, may enter the building
provided he has a valid access code (used during peak normal hours).
16720 — 13
NexSentry Access Control System
5.
6.
7.
2)
LIMIT mode: designates when a privileged key holder may enter the building, provided
he has a valid access code.
3)
CLOSED mode: is used when the building is unoccupied. Although a privileged key
holder may enter a closed building, he must put the structure in the open or limited
mode within one minute or an alarm will be activated.
b.
Any key shall have means to be programmed as PRIVILEGED and be authorized to arm or
disarm the building mode feature.
c.
If the key is not authorized to disarm mode alarm system, the key user shall be unable to gain
entry, regardless if user’s Access Code has been programmed for that period.
Operator Modes: Controller shall always operate in one of two states, depending on whether or
not an operator is present, as follows:
a.
Operate Mode: System shall operate in OPERATE Mode whenever the operator is not logged
on. Log records shall be displayed on the screen as they are generated, if so configured.
b.
Command Mode: System shall operate in COMMAND Mode whenever an operator is logged
onto the Controller. All operations can be performed from the terminal or from the Host
computer. Command Mode shall have three functions:
1)
To configure the system.
2)
To override the system.
3)
To use print commands.
Readers:
a.
System shall be able to assign a 12-character name for each reader.
b.
System shall be capable of defining which reader and at what times they are to report valid
access reports.
c.
User shall be able to select which times and at what reader key trace reports are generated.
d.
User shall be able to define which are CLOSED readers (readers where privileged keys
function).
e.
Type: Controller shall support 4 (four) reader types, as follows:
1)
NORMAL: Shall operate during all building modes for all users who meet the regular
access criterion for that door. Privileged access criterion shall be disregarded.
2)
OPEN: Shall operate only during the Building OPEN mode: everyone shall be denied
access during the LIMITED and CLOSED modes.
3)
CLOSED: Shall operate during all modes, but, during the LIMITED and CLOSED modes it
shall operate under the regular access criteria only for users with privileged access.
4)
STATION: Shall be available if the Building Mode feature is used. Shall allow authorized
users to change the Building operation mode to or from OPEN, LIMITED or CLOSED.
Building modes may be completely controlled by direct commands. The STATION Type
Reader shall have the same operation restrictions as the CLOSED Type Reader.
Anti-passback:
a.
System shall have capability to designate any command key so that when it is used to enter
an area it must be used to exit that area before it can be reused for entry.
b.
System shall have capability to manually or automatically reset the location of all command
key’s passback status at any time.
c.
Anti-passback modes:
d.
WSE • 8/28/97
1)
HARD mode: Denies re-entry and reports passback violation.
2)
SOFT mode: Allows re-entry but reports passback violation.
Auto-forgive: A supervisor shall have a method of selectively disabling anti-passback
protection. During the time auto-forgive is active, the system shall ignore the anti-passback
protection and reset the keys that use the door within the building to UNKNOWN.
16720 — 14
NexSentry Access Control System
8.
9.
Alarm monitoring and control functions:
a.
Latch Alarm: Any monitor point can drive a report that shall trigger the Controller’s latched
alarm contact. This alarm shall stay on until an operator performs the “SILENCE” command
to turn it off.
b.
Alarm points: Alarm monitors, such as electronic eyes, motion detectors, etc., shall be
monitored constantly by the Controller. These shall be capable of being programmed to cause
output contacts to be closed to sound alarms or activate other devices.
c.
Output contacts: 8 (eight) shall be used to activate silent alarms or to report alarms to the
central station or to control devices such as pumps and sirens.
d.
Alarm Silence: Latched alarm may be silenced via either the user interface or from the Host
computer. The alarm may be turned on again if the alarm trigger is still activated.
e.
Alarm shunts: System shall have means to connect presence detecting device to shunt alarms
when authorized employee uses an alarmed exit. Exit reporting shall be selected by user.
f.
Open door detection: Any time a door is left open for more than the configured amount of
time, a configured action can be taken.
g.
Forced door detection: Any time a door is forced open, a configured action can be taken.
h.
Loss of power alarm: Controller shall indicate when the UPS is about to run out of power. If
possible, a POWER FAIL log message shall be produced.
i.
Tamper detection: Controller shall indicate when the unit’s enclosure is being tampered with.
User interface:
a.
System shall support an ASCII character-based line-oriented interface via the RS-232
“Terminal” line.
b.
If Controller is configured without a Host connection, then the User interface may also be
performed via the “Host” port.
10. Passwords:
a.
Authorization levels: Each password shall be assigned to one of 6 (six) authorization levels.
b.
Operator passwords defined: up to 8 (eight).
c.
Duplication: If a password is duplicated, Controller will only recognize the first occurrence.
d.
Identification of operators for terminal use: 8 (eight) different operators.
e.
User definable passwords: Up to 12 (twelve) character user definable passwords shall be used
to log on to the system.
11. System diagnostics:
a.
System shall be capable of automatic system diagnostics and automatic alarming based on
detected faults in the controller, readers, monitor input and relay controlling devices and
keypads.
b.
System shall be capable of off-line diagnostics for checking the integrity of controller’s
memory (RAM and PROM test), Relay outputs, RAM, serial communication ports and other
functions.
12. Control operation:
a.
Control operation shall be based on the ability to force relay lock outputs to an operating
mode.
b.
Forcing action may be initiated by:
WSE • 8/28/97
1)
Time-of-Day schedule.
2)
Switch Closure.
3)
Command Key Presentation.
4)
Keyboard Command.
16720 — 15
NexSentry Access Control System
13. Card/Key Commands and Functions:
a.
[Unique numeric identification (with standard 1MB RAM): 11,200 command keys.
b.
12-character description and unique numeric identification: 4,400 command keys.]
c.
[Unique numeric identification (with 2MB RAM upgrade): 100,000 with user-definable PIN
codes.]
d.
Both keys with names and without within the same database.
e.
Bulk program keys in groups and remove any key from the database.
f.
Any key usage may be traced by the system and a key trace report generated.
g.
Access parameter definition: any single key can be programmed to open a given door during
four different time periods.
h.
Modification of key access parameters: may be modified at any time by an operator with a
sufficient authorization level.
14. Pre-programming: The access control and security management system shall have preprogrammed default data for ease in start-up and testing of equipment.
15. Printed Data Output:
a.
System shall be capable of selecting which access and monitor point activity messages are to
be output to the printer.
b.
System shall be capable of printing the following information:
1)
Key Definitions: Keycodes/ Names/ Access Codes/Location (In-Out status for antipassback)/ Key trace function (Enable/Disable)/ whether Privileged or not.
2)
Monitored Point Parameters.
3)
Door Parameters.
4)
Access Code Parameters.
5)
User Names, Passwords, and Access Levels.
6)
System Status (real time report).
7)
All Report Types.
16. Relay outputs: System shall initiate relay output commands based on:
a.
Card Access Activity.
b.
Operator Keyboard Inputs.
c.
Pre-programmed Time Schedule.
d.
Switch Input.
17. Monitoring:
a.
Supervised alarm contacts: up to 32.
b.
Character names: up to 24 characters defined by user.
c.
Monitor points shall:
WSE • 8/28/97
1)
Be designated by the user as an alarm or non alarm event.
2)
Be elected to either monitor at all times or during selected time periods.
3)
Be capable of being enabled/disabled from terminal or externally from key holder.
4)
Be capable of enabling any lock output or annunciator output including the latched alarm
contact.
5)
Work with the controller to provide immediate re-lock after key holder has gained access
into a facility. Systems re-locking only after adjustable time delay shall be acceptable.
16720 — 16
NexSentry Access Control System
18. Forced Entry Alarms:
a.
System shall have means to select which doors shall report forced entry alarms or door held
open alarms.
b.
On a door by door basis, user shall be able to select which doors are to report forced entry
and during what time periods.
c.
User shall be able to select whether such alarms will be generated at all times or when
system is in LIMITED/CLOSED mode.
19. Disk backup: The access control and security management system shall allow for disk backup
and restoration of user data in the event of database loss if connected to a Host computer.
20. Battery back-up: The access control and security system shall include internal battery backup to
maintain controller database, program, time, date, and building mode during a power loss.
PART III
.1
EQUIPMENT INSTALLATION AND DOCUMENTATION
A.
B.
C.
.2
EXECUTION
Installation:
1.
The proximity access control and security management system shall be installed and wired
completely as shown on the plans by a trained and authorized Westinghouse Security Electronics
Systems Integrator.
2.
Systems Integrator shall make all necessary wiring connections to external devices and
equipment.
Telephone Lines:
1.
The owner shall arrange for dedicated or dial-up telephone lines for the telecommunications
equipment as shown on the plans.
2.
Each phone line shall be terminated in an RJ-11 telephone jack.
3.
Note: Any connections to the public telephone system require notification of the local
telephone company. See specific instructions in manual for modem used.
Documentation:
1.
Accurate “as built” drawings shall be furnished by the Systems Integrator to aid the owner in
programming. These should indicate the door(s) controlled by each lock output, the monitoring
points for the door controlled area, and any relay outputs or special inputs into the system.
2.
The Systems Integrator shall supply operating and maintenance manuals to aid the owner in the
programming of the system.
SERVICE AND SUPPORT
A.
B.
Startup:
1.
After the system has been installed, the documentation delivered to the owner and the telephone
lines are operational in compliance with Part III.1 above, the Systems Integrator shall verify
correct operation of all system components.
2.
The Systems Integrator shall guarantee all material and workmanship involving the system for
up to [_____] year after startup.
Training:
1.
After system startup, the Systems Integrator shall instruct owner’s personnel in how to program
the system.
2.
On-site training from manufacturer shall be available.
3.
Manufacturer-direct training shall be available through WSE University, Santa Clara, CA.
WSE • 8/28/97
16720 — 17
NexSentry Access Control System
C.
Warranty Support:
1.
The authorized Systems Integrator shall be available during the warranty period to answer
programming and application questions to support owner’s personnel during this period.
2.
[Option: The authorized Systems Integrator shall have capability to have a remote terminal for
programming the Controller to support the owner’s personnel during this period. The owner’s
system shall include a modem, necessary cabling and telephone extension to support this
telecommunications operation.]
3.
[Option: The authorized Systems Integrator shall have the training and capability to provide
additional support services including:
a.
Regular testing and inspection of all system components and to submit reports on the results.
b.
Emergency service for repairs and adjustments to the system and part replacement if
necessary.]
WSE • 8/28/97
16720 — 18
NexSentry Access Control System
PART IV
.1
APPENDIX
READ RANGE MATRIX
DigiReader® Digital Proximity Reader
Prox Card
DR4204
DR4205
DR4208
DR4226
DR4238
QuadraKey
up to 2"
(5.08 cm)
up to 4"
(10.16 cm)
up to 7"
(17.78 cm)
up to 13"
(33.02 cm)
up to 22"
(55.88 cm)
NexKey
up to 2"
(5.08 cm)
up to 4"
(10.16 cm)
up to 7"
(17.78 cm)
up to 13"
(33.02 cm)
up to 22"
(55.88 cm)
DuraKey
up to 3"
(7.62 cm)
up to 6"
(15.24 cm)
up to 8"
(20.32 cm)
up to 22"
(55.88 cm)
up to 36"
(91.44 cm)
KeyMate
up to 1"
(2.5 cm)
up to 2"
(5.0 cm)
up to 6"
(15 cm)
up to 12"
(30 cm)
up to 15"
(45 cm)
DuraTag
up to 1"
(2.5 cm)
up to 2"
(5.0 cm)
up to 4"
(10 cm)
up to 10"
(25 cm)
up to 15"
(38 cm)
Maximum read ranges may vary depending on physical environment of installation
WSE • 8/28/97
16720 — A
NexSentry Access Control System
.2
WIRING DIAGRAMS
A.
NexSentry Controller and MIRO 16/8
WSE • 8/28/97
16720 — B
NexSentry Access Control System
.3
MOUNTING DIAGRAMS
A.
NexSentry Module enclosure
6.700
.437
1.993
7.574
16.788
.250
16.288
MOUNTING HOLE .22
4x
NEXSENTRY ENCLOSURE
WSE • 8/28/97
16720 — C
NexSentry Access Control System
B.
MIRO 16/8 Module enclosure
4.600
.437
5.474
1.993
.250
16.288
16.788
MOUNTING HOLE .22
4x
WSE • 8/28/97
16720 — D
NexSentry Access Control System
C.
NexSentry/MIRO 16/8 enclosure
0
4.000[101.6]
14.50[368.30]
#8 MACHINE SCREW
3.25 [82.55]
22.375 [568.32]
MIRO 16/8
NexSentry CONTROLLER
25.000[635]
EXPANSION AREA
.750 [19.05]
0
0
WSE • 8/28/97
10.50[266.7]
16720 — E
21.000[533.4]
NexSentry Access Control System
SAMPLE SYSTEM DIAGRAMS
A.
NexSentry Digital Proximity with Keypad
Parking lot
Security center
or alarm central station
Video
monitor
DigiReader
(DR 4238)
PI-1 Power Inserter
Cafeteria
Manufacturing
CCTV
camera
Video switcher
WSE host
Main entrance
DigiReader Keypad
(DR 4205)
Gate arm
DigiReader Keypad
(DR 4205)
DigiReader
(DR 4205)
Alarm
Alarm
Lock
Lock
IN
Sensor loop
Door switch
Door switch
Door switch
OUT
Sensor loop
Motion sensor
(REX)
Motion sensor
(REX)
Motion sensor
(REX)
Glass break
detector
Glass break
detector
Glass break
detector
Fire sensor
Fire sensor
Fire sensor
Alarm
AC input
LEGEND
RS-232
RS-485 S-NET
Twisted pair wire
WSE • 8/28/97
16720 — F
Lock
up to eight doors per NexSentry Controller
.4
NexSentry Access Control System
NexSentry Magnetic Stripe/Keypad combination
Parking lot
Security center
or alarm central station
Video
monitor
Magnetic
Stripe Reader
w/Keypad
(MSRK42)
PI-1 Power Inserter
Cafeteria
Manufacturing
CCTV
camera
Video switcher
WSE host
Main entrance
Magnetic
Stripe Reader
w/Keypad
(MSRK42)
Magnetic
Stripe Reader
w/Keypad
(MSRK42)
Magnetic
Stripe Reader
w/Keypad
(MSRK42)
Alarm
Alarm
Alarm
Lock
Lock
IN
Sensor loop
Door switch
Door switch
Door switch
OUT
Sensor loop
Motion sensor
(REX)
Motion sensor
(REX)
Motion sensor
(REX)
Glass break
detector
Glass break
detector
Glass break
detector
Fire sensor
Fire sensor
Fire sensor
Gate arm
AC input
LEGEND
RS-232
RS-485 S-NET
Twisted pair wire
WSE • 8/28/97
16720 — G
Lock
up to eight doors per NexSentry Controller
B.
NexSentry Access Control System