NexSentry™ 4100 Series Controller 8-door controller and peripherals A/E Guideform Specification Version 1.1 NOTES: • The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to include Westinghouse Security Electronics products in their specifications. • The Specifier should carefully select the portions of this document that fit the intended application. • Feel free to consult with your Westinghouse Security Electronics Systems Integrator regarding your particular application. • Optional feature choices are represented by items enclosed in brackets [ ]. • This document is considered accurate through the date on the cover. For updated specifications, call Westinghouse Security Electronics at 408 727-6521, or visit the WSE Web page at http://www.wseinfo.com. • The following individuals and organizations contributed to this document: Editor/project team leader: - Brent A. Duncan, Marketing Services Manager Core team members: - Joe Bridgman, Area Sales Manager - Brian Giampaoli, Area Sales Manager - Joe Oesterle, US Sales Manager With contributions by: - Frank Binzoni, VP Sales & Marketing - James Collins, Senior Design Engineer - Dana Frischer, Area Sales Manager - Susan Goldin, Technical Writer - Steve Lever, Field Service Engineer - Jim Reeve, Software Engineer - Bill Richardson, Technical Instructor - Ping Saye, Design Engineering Manager - Tony Smith, Software Engineer - George Sousa, Project Team Director - Matt Wenzel, Field Service Manager With special thanks to: - John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants - Construction Services Institute WSE • 8/28/97 16720 — ii NexSentry Access Control System Table of Contents PART I GENERAL ................................................................................................................................................................1 .1 SECTION INCLUDES ........................................................................................................................................1 .2 SYSTEM DESCRIPTION ...................................................................................................................................1 A. Security Management System .......................................................................................................1 B. Description of work ..........................................................................................................................1 .3 SUBMITTALS .....................................................................................................................................................1 A. Product Data......................................................................................................................................1 B. Shop Drawings. .................................................................................................................................1 C. One Line Diagram ............................................................................................................................2 D. Operator’s Manual. ..........................................................................................................................2 .4 QUALITY ASSURANCE .....................................................................................................................................2 A. Manufacturer ....................................................................................................................................2 B. Systems Integrator............................................................................................................................2 C. System Checkout ..............................................................................................................................2 D. Regulatory Requirements ..............................................................................................................2 E. Warranty ............................................................................................................................................2 PART II PRODUCT ..............................................................................................................................................................3 .1 MATERIALS & COMPONENTS .......................................................................................................................3 A. System Description. .........................................................................................................................3 B. System Hardware Features ............................................................................................................3 1. Access Controller (NexSentry 4100) ................................................................................3 2. Monitor Input/Relay Output Board for 4100 (MIRO 16/8) .........................................4 3. Digital Proximity Key Reading Sensor (DigiReader) ..................................................5 4. Keypad (VIP-2) ....................................................................................................................6 5. Magnetic Stripe Pass Through Reader (MSR)..............................................................7 6. QuadraKey Digital Proximity Command Card............................................................8 7. NexKey Digital Proximity Command Card ..................................................................9 8. DuraKey Digital Proximity Command Card ................................................................9 9. Radio Frequency Identification (RFID) Tag (KeyMate Digital Key Fob) ............10 10. Radio Frequency Identification (RFID) Tag (DuraTag Digital Key) ..................10 11. Magnetic Stripe Card - ISO/ABA Format ...................................................................11 12. Power Supply (PI-1) Power Inserter............................................................................11 13. Accessories........................................................................................................................12 C. Controller Software Features .......................................................................................................13 PART III EXECUTION .......................................................................................................................................................17 .1 EQUIPMENT INSTALLATION AND DOCUMENTATION .........................................................................17 A. Installation .......................................................................................................................................17 B. Telephone Lines .............................................................................................................................17 C. Documentation ...............................................................................................................................17 .2 SERVICE AND SUPPORT................................................................................................................................17 A. Startup ..............................................................................................................................................17 B. Training ............................................................................................................................................17 C. Warranty Support ..........................................................................................................................18 PART IV APPENDIX ............................................................................................................................................................A .1 READ RANGE MATRIX................................................................................................................................. A .2 WIRING DIAGRAMS ........................................................................................................................................B A. NexSentry Controller and MIRO 16/8 ..........................................................................................B .3 MOUNTING DIAGRAMS ................................................................................................................................. C A. NexSentry Module Enclosure ....................................................................................................... C B. MIRO 16/8 Module Enclosure ...................................................................................................... D C. NexSentry/MIRO 16/8 Enclosure ..................................................................................................E .4 SAMPLE SYSTEM DIAGRAMS ....................................................................................................................... F A. NexSentry Digital Proximity with Keypad................................................................................. F B. NexSentry Magnetic Stripe/Keypad Combination................................................................... G WSE • 8/28/97 16720 — iii NexSentry Access Cont rol System NexSentry® 4100 Series Controller A/E Specification Summary 4100 Series Controller • Access Control Ports: [8] • Monitor Inputs 32 maximum via MIRO 16/8 • Relay Outputs, Lock and Auxiliary: 16 maximum via MIRO 16/8 • Keys without names: • Keys with names: • Access Codes: • Event Report Schedules: • Transaction Buffers: • Key Technology: 11,200 4,400 120 32 100 for terminal port; 4,000 for host port - Digital Proximity - Keypad - Magnetic Stripe • Operator Interface Methods: - Terminal: 1 RS-232 - Host: 1 RS-232 or 1- 20mA connector • Communications to keypads and readers: • Regulatory Approval: • Environmental: - 2 RS-485 Ports (S-Net) FCC, UL-1012, CSA, UL 294 - Humidity: 0% to 90% non-condensing Temperature: 20° to +120° F (-7° to +49° C) MIRO 16/8 • Monitor Inputs 16 • Relay outputs 8 • S-Net Communications WSE • 8/28/97 - 2 RS-485 Connectors 16720 — iv NexSentry Access Control System PART I .1 SECTION INCLUDES A. .2 GENERAL Section includes specifications for an integrated security management system which shall perform the following general services: 1. Access control 2. Alarm monitoring 3. Reporting functions 4. Security office management functions SYSTEM DESCRIPTION A. B. Security Management System: 1. Security management system (System) shall monitor and control access to areas defined herein. 2. System shall be capable of supporting multiple access control technologies at each door, as well as alarm inputs and control outputs. 3. System shall consist of a microprocessor based controller, [digital proximity] [and/or] [magnetic stripe,] [and/or] [magnetic stripe readers,] [and host software]. 4. System shall be capable of operating with or without host software station. 5. Specific types of devices and their functions shall be addressed in relevant sections. 6. [System shall be capable of being wired to support a Wiegand physical interface.] Description of work: 1. The Systems Integrator shall include all necessary labor, tools, equipment, and ancillary materials required to furnish and install a complete and operational access control and alarm monitoring system. 2. The security management system will manage access to [building] [and] [selected areas] using [encoded cards,] [and/or coded keypads] [and/or magnetic stripe cards]. 3. The extent of access management system work is defined to include, but not by way of limitation: 4. .3 a. [_____ wall mounted central controllers.] b. [_____ external keyboard and printer (directly or via central host).] c. [_____ digital proximity card reading sensors.] d. [_____ keypads.] e. [_____ magnetic stripe readers.] f. [_____ monitor input/relay output (MIRO) modules.] g. Wiring, power supplies, switches and ancillary equipment. Requirements are indicated elsewhere in these specifications for work including, but not limited to, raceways and electrical boxes and fittings required for installation of control equipment and wiring: not the work of this section. SUBMITTALS A. Product Data: Submit for prior approval, [__________] copies of manufacturer’s data on digital proximity or magnetic stripe access control system and components. B. Shop Drawings: Submit dimensioned drawings of [digital proximity] [and/or] [magnetic stripe] [and/or] [keypad] access control system and accessories including, central controller, external keyboard and printer, [digital proximity card readers] [or magnetic stripe card readers,] [keypads,] power supplies switches and ancillary equipment. WSE • 8/28/97 16720 — 1 NexSentry Access Control System C. One Line Diagram : Submit a one line diagram of the system configuration proposed if it differs from that illustrated in the riser diagram included in these specifications. Submittals indicating typical riser diagrams are not acceptable. D. Operator’s Manual: Submit for prior approval, [__________] copies of manufacturer’s manual for programming and operating the NexSentry system and its related components. .4 QUALITY ASSURANCE A. B. C. Manufacturer: Manufacturer of products defined in this section must have: 1. Industry experience: Company must have at least 25 years experience in manufacturing and serving access management systems. 2. ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification. Systems Integrator: 1. Company with a minimum of [5 (five)] years system design, engineering supervision, and installation experience in the alarm, building automation, or access control industry. 2. Company that is trained and authorized to install manufacturer products. System Checkout: 1. Pre-testing: All components and assemblies of the control unit are to be pre-tested at the factory prior to shipment. 2. Burn-in: 1,000 hours at normal operating conditions or equivalency. 3. On-site testing: Manufacturer-trained and authorized Systems Integrator shall functionally test each component in the system after installation to verify proper operation and confirm that the panel wiring and addressing conform to the wiring documentation. 4. Service facility: Systems Integrator shall have service facilities within [_____] miles of the installation. D. Regulatory Requirements: 1. NEC Compliance: All electrical wiring work shall comply to NEC. 2. NEMA Compliance: Electrical equipment shall comply with applicable portions of NEMA. 3. FCC Emissions: All assemblies shall be in compliance with FCC emission standards. 4. E. a. Microprocessor-based controller: Part 15, Subpart F, Class A. b. Digital proximity card-reading sensors: Part 15, Subpart F. c. Dial-up modems: Part 68. UL-1012 and CSA: All power supplies shall be in compliance with Underwriters Laboratories standard 1012 and CSA standards for power supplies. Warranty: 1. Digital Command Keys: No less than 1 (one) year. 2. Magnetic Stripe Cards: No less than 1 (one) year. 3. System Components: 15 (fifteen) months from shipment date or 12 (twelve) months from date of purchase by Systems Integrator, whichever comes first. WSE • 8/28/97 16720 — 2 NexSentry Access Control System PART II .1 PRODUCT MATERIALS & COMPONENTS A. System Description: The access control and security management system (System) within the building shall consist of Microprocessor-based Controller[s] (NexSentry), Monitor Input/Relay Output module[s] (MIRO 16/8), [reader types], Controller software, [and host hardware and software] and [accessories ]. To accommodate growth and to facilitate implementation of future technologies, System components shall be modular and expandable. B. System hardware features: 1. Access Controller (NexSentry 4100): a. b. General: The NexSentry Controller (Controller) shall be an 8 (eight) door controller with an onboard INTEL 32-bit microprocessor, battery backup, database, user defined reports, and several communication ports. Controller shall have two S-Net communication channels to which a variety of S-Net devices can be connected. Controller shall support one hardware module daughterboard for additional memory and/or for future feature enhancements. Functions provided by Controller shall be as follows: 1) Provides central control for all devices attached. 2) Makes decisions for access. 3) Responds to monitor activity. 4) Receives input to control its decision making. 5) Reports activity to other devices. Capacities: 1) Addressable devices: (i) Digital proximity sensors: up to 8 (eight). (ii) Keypads: up to 8 (eight). (iii) Magnetic stripe readers: up to 8 (eight). (iv) Combination magnetic stripe and keypad readers: up to 8 (eight). c. d. e. f. 2) Monitor inputs: Station switch, tamper, power fail, and alarm. 3) Relay outputs: Building Mode and Alarm. 4) MIRO module: System shall connect with up to 2 (two) monitor input/output module via S-Net. 5) Expansion Bus: Controller shall support 1 (one) hardware module daughterboard for memory expansion and/or for future feature enhancements, including: LON controller, Ethernet controller, ISA Bus interface. Specifications: 1) Controller card dimensions: 7 X 15 X 1.5 in. (17.78 X 38.1 X 3.81 cm). 2) [Controller enclosure dimensions: 7.574 X 16.778 X 1.993 in. (19.24 X 42.64 X 5.06 cm.)] Environmental: 1) Humidity: 0 to 95% non-condensing: 2) Temperature: 20° to 120° F (-7° to 49° C). Mounting: 1) The Controller shall be available [as a board-only option.] [in an enclosure.] 2) If enclosure is used, the front cover shall contain 4 (four) snap fasteners which shall remove for easy access to internal switches and parts. 3) See PART IV.3 for enclosure options. Power: 1) WSE • 8/28/97 Source: Power is provided via twisted pair (shielding optional) wiring from a Power Supply unit (see PART II.B.8.) 16720 — 3 NexSentry Access Control System g. 2) Consumption: Less than 5 (five) watts with 17 to 28 volts d.c. 3) [Battery: A low voltage battery (such as a lithium cell) shall maintain the internally stored database setup when no power is available to the controller.] Wiring: 1) Connectors: Twisted pair (shielding optional) wiring shall supply both power and communications to system devices using the following connectors: (i) Host: 9-pin D-sub DTE. Also includes a passive 20mA loop. (ii) Terminal port: 9-pin D-sub DCE. (iii) Reader: Phoenix-type. (iv) Power supply: Phoenix-type. (v) MIRO: Phoenix-type. (vi) Monitor Inputs and Relay Outputs: Phoenix-type. 2) Cable limitations: (i) S-Net data channel shall not exceed 4,000 feet. (ii) Every S-Net device requires 16 VDC minimum for power. (iii) S-Net power cable length shall be limited by the cable losses, the length of the cable, and the devices to which it is connected. h. 1) S-Net devices: RS-485 through the system’s twisted pair (shielding optional) wiring. 2) Host or printer: SEEP Protocol through RS-232 port or 20mA current loop interface. 3) Terminal: ASCII through Terminal Port. i. Feedback: To facilitate trouble-shooting, LED indicators shall be included for every serial port. j. Diagnostics: LED status lights shall indicate: k. l. 2. Communications: 1) Operational status of the controller. 2) Lock status of controlled entries. Self-protection: The Controller shall have inputs to detect: 1) Power input failures. 2) Controller tampering. Manufacturer: Westinghouse Security Electronics, Model: NexSentry 4100 Controller. Monitor Input/Relay Output Board for 4100 (MIRO 16/8): a. General: Module that monitors inputs that occur over the S-Net and sends them to the Controller. Executes relay commands received from the controller out to S-Net devices. b. Capacities: c. d. WSE • 8/28/97 1) Relay Outputs: 8 (eight) Normally opened (NO) or Normally Closed (NC) via strap position. 2) Monitor Inputs: 16 (sixteen) four-state monitor points. Specifications: 1) Board dimensions: 5 X 15 X 1.25 in. (12.7 X 38.1 X 3.175 cm) 2) [Enclosure dimensions: 16.788 X 4.6 X 5.474 in. (42.64 X11.68 X 13.9 cm)] Environmental: 1) Humidity: 0 to 95% non-condensing. 2) Temperature: 19° to 120° F (-7° to 49°C). 16720 — 4 NexSentry Access Control System e. Mounting: MIRO 16/8 shall be mounted in an enclosure with the Controller or standalone in a controlled area. f. Power: g. 1) Source: Twisted pair (shielding optional) connected to Controller. 2) Consumption: Less than 3 watts with 16 to 28 volts d.c. Wiring: 1) Connectors: Twisted pair (shielding optional) wiring shall supply both power and communications to system devices using the following connectors: (i) Monitor Inputs: Phoenix-type. (ii) 3. Relay Outputs: Phoenix-type. h. Communication: S-Net Communications through 2 (two) RS-485 connectors via the twisted pair (shielding optional) wiring. i. Manufacturer: Westinghouse Security Electronics, Model: MIRO 16/8. Digital Proximity Key Reading Sensor (DigiReader): *********** Note: There are currently five models of DigiReader digital proximity readers. Each reader provides different read ranges. When compiling Specifications, use the “Read Range Matrix” (Part IV.1, Appendix) to determine the reader and card that best suit the specific application. *********** a. b. General: 1) DigiReader (DR) shall read digital proximity keys and send signal to Controller for processing. 2) DR 4226 shall comply with the Americans with Disability Act (ADA). 3) DR 4238 shall comply with the Americans with Disability Act (ADA). 4) DR 4205K shall have an integrated weatherized keypad for additional security and shall comply with the ADA. 5) DR 4205GM shall feature a glass-mount kit for status display on front and back of reader. Capacities: 1) DR shall read digital proximity keys supporting phase shift signals to a distance of [_____] (optimum read range as defined in DigiReader/Prox Card Read Range Matrix) inches and does not require contact with the sensor. 2) DR shall be capable of reading up to 3 (three) cards in field at the same time. c. Specifications: Material shall be high-impact Lexan with 94V-2 UL flame class rating, and shall be UV resistant, sealed, water and weather resistant, and tamperproof. d. Environmental: e. f. g. WSE • 8/28/97 1) Humidity: 10% to 90% non-condensing. 2) Temperature: -4° to +140° F (-20° to +60° C). Regulatory: Controller shall be designed to meet the following regulatory requirements: 1) UL294 Listing Standard for Safety. 2) FCC EMI and EMC Class A. 3) EN55022 EMI and EMC Class A. Mounting: 1) DR shall have the capacity to be mounted and operated behind any non-metallic, nonconductive surface, including glass. 2) (DR 4204 only) DR shall have the capability to be mounted on any metal door frame. Power: 1) Source: Via the network twisted pair (shielding optional) wiring. 2) Consumption: 16720 — 5 NexSentry Access Control System (i) [DR 4204: Less than 5 watts.] (ii) [DR 4205: Less than 2 watts.] (iii) [DR 4205K: Less than 2 watts.] (iv) [DR 4205 GM: Less than 2 watts.] (v) [DR 4205E: Less than 2 watts.] (vi) [DR 4208: Less than 6.5 watts.] (vii) DR 4226: Less than 17 watts.] (viii) DR 4238: Less than 17 watts.] h. Wiring: Twisted pair (shielding optional) with 4,000 foot maximum recommended length. i. Feedback: 1) Single tri-color LED (green/amber/red) shall provide capability for diagnostic feedback. 2) Tri-color LED shall be programmable. 3) An audio tone shall indicate successful digital proximity card read and access granted. j. Diagnostics: DR and data-line integrity shall be monitored continuously and shall alarm if failure is detected and indicate device and location of fault. k. Self-protection: l. 1) Physical damage, including breaking open sensor housing, shall not allow access to any circuitry which would allow the system to be compromised. 2) Transmission of any frequency (or set of frequencies) into the sensor at any power level shall not compromise the system. Manufacturer: Westinghouse Security Electronics. m. Model: 4. 1) [Model DR 4204] 2) [Model DR 4205] 3) [Model DR 4205K] 4) [Model DR 4205GM] 5) [Model DR 4205E] 6) [Model DR 4208] 7) [Model DR 4226] 8) [Model DR 4238] Keypad (VIP-2): a. b. WSE • 8/28/97 General: 1) The system shall have the means to utilize a numeric keypad for entry of a Personal Identification Number (PIN). 2) The Keypad shall provide information to the Controller, either alone or in conjunction with a card reading device, thereby providing an additional level of security. 3) The system shall have the means to recognize special duress codes which can be entered into the Keypad to be available to any user during an emergency. 4) System administrator shall have capability to program a reaction based on keypad duress code input. Capacities: 1) Keypad shall provide a standard 10-digit numeric entry pad organized in the standard telephone pad layout. 2) The user shall be able to enter either a 4- to 8-digit Personal Identification Number (PIN). 16720 — 6 NexSentry Access Control System c. Specifications: The keypad unit shall be housed in a double gang metal utility box, 4.50 H X 4.56 W X 2.19 D in. (11.43 X 11.58 X 5.56 cm). d. Environmental: e. f. 5. 1) Temperature: 20° F to 120° F (-7° C to +49° C). 2) Humidity: 10% to 95% non-condensing. Regulatory: The unit shall meet the following regulatory requirements: 1) FCC class A computing device when installed in the system. 2) ANSI/NEMA Standard 250 for Type 4x enclosures. Mounting: 1) Keypad shall be mounted on the outside of a building, in a wall, or against it. 2) After the keypad is installed and operations have been verified, decal shall be placed over the cover plate to conceal mounting plate and to provide a weather seal. g. Power: Keypad receives power from the network twisted pair wiring. h. Wiring: Twisted pair cable with a maximum recommended cable length of 4,000 feet. i. Feedback: Keypad shall provide three LED status for awaiting card presentation, awaiting keypad entry and acknowledgment of successful access granted and door unlock. j. Self-protection: Keypad is protected against the circuitry being removed from the outlet box or the box being forcibly removed from the wall by means of a strategically placed internal tamper switch. k. Manufacturer: Westinghouse Security Electronics, Model: [VIP-2] [VIP-2W (weatherized)]. Magnetic Stripe Pass Through Reader (MSR): a. b. c. d. e. WSE • 8/28/97 General: 1) MSR shall read magnetic stripe cards that have been encoded with standard ISO/ABA Track II card numbering format. 2) Magnetic stripe cards shall be read in either direction while being swiped through the MSR. Capacities: 1) The readers shall read all forty (40) digits of the swiped magnetic stripe card. 2) (MSRK only ) Readers with integral keypad shall provide a standard 10-digit numeric entry for additional security. Specifications: 1) Dimensions: 1.95 X 1.30 X 5.50 in. (5 X 3.3 X 14 cm) 2) Card accommodation: Credit-card sized magnetic stripe card (2.125 X 3.375 X .030 in., +/.003 in.; 75 bip; ANSI X 4.16). 3) Read speed: 3 to 50 ips. Environmental: 1) Humidity: 0% to 95% RHNC (weatherized option to 100%). 2) Temperature: -31° F to 150° F (-35°C to +66°C). Mounting: Wall-mounted either horizontally or vertically on a standard single-gang handy box (preferred method), on any flat surface, on a structured door frame (mullion), or as a Wiegand (Sensor Model 30387) reader replacement using matching hot holes on the adapter plate. 1) [MSR only] is designed for indoor use, but can be used for most sheltered outdoor applications. 2) [MSRK only] MSRK is weatherized for outdoor use and can withstand direct exposure to the elements. 16720 — 7 NexSentry Access Control System f. g. Power: 1) Source: Powered from the system twisted pair (shielding optional) wiring connected to the Controller. 2) Current: 50mA. 3) Wiring: Twisted pair cable with maximum recommended length of cable being 4,000 feet. Feedback: 1) MSR shall provide a two state LED that indicates door status as follows: (i) A red light indicates active but locked; (ii) 2) 6. A green light indicates unlocked. MSR shall sound an alarm upon improper card entry. h. Diagnostics: MSR performs a power-up self test, which indicates the success or failure of the test. i. Self-protection: 1) Physical damage, including breaking open reader housing, shall not allow access to any circuitry which would allow the system to be compromised. 2) A special latch release tool to access concealed latches provides additional tamper resistance. j. Manufacturer: Westinghouse Security Electronics. k. Model: 1) [MSR42-G, Magnetic Stripe Card Reader.] 2) [MSR42-GW, Weatherized Magnetic Stripe Card Reader.] 3) [MSRK42-G, Magnetic Stripe Card Reader with Keypad.] 4) [MSRK42-GW, Weatherized Magnetic Stripe Card Reader with Keypad.] QuadraKey Digital Proximity Command Card: a. b. c. d. General: 1) QuadraKey Digital Proximity Command Key (card) is an ISO-compliant, single-coil passive digital proximity card that supports multiple technologies on one card, including: digital proximity, magnetic stripe, bar code and photo ID. 2) Design shall be capable of smart card chip insertion, color imaging on both sides and hole punch horizontal or vertical for using the card as a badge. 3) Note: Active circuit type cards (those requiring batteries) shall not be acceptable. Capacities: 1) QuadraKey can generate a minimum eight digit access number. 2) Cards shall have numeric encoded data embedded in an integrated circuit within the card. 3) Each card shall be encoded so that it is totally unique and exists in no other system anywhere in the world. Specifications: 1) Dimensions: ISO standard size and thickness of 3.37 X 2.125 X 0.032 in (8.55 X 5.39 X 0.081 cm). 2) Material: Polyester and appropriate adhesive based materials. 3) Magnetic stripe material: single layer 3M type 5203 High Coercivity, 4000 Oerstad using Track 2, without exception. 4) Magnetic stripe dimensions: The stripe shall minimally extend from 0.333 in. to 0.493 in. from the upper card edge and for the entire length of the card. Environmental: 1) WSE • 8/28/97 Temperature: 14° to 140° F (-10° to 60° C). 16720 — 8 NexSentry Access Control System 2) e. Regulatory: N/A (Card is totally passive requiring no approval.) f. Power: 1) 7. Source: Passive-powered by DigiReader digital proximity reader. g. Communication: Via low power radio frequency, providing read ranges up to [22] inches depending on the selected DigiReader. (see DigiReader/Prox Card Read Range Matrix in Part IV.1 for actual figures). h. Manufacturer: Westinghouse Security Electronics, Model: QuadraKey. NexKey Digital Proximity Command Card: a. b. c. d. 8. Humidity: 0% to 100%. General: 1) NexKey Digital Proximity Command Key (card) is a single-coil passive digital proximity card that can, through add-on options, support additional technologies, including: bar code and photo ID with lamination. 2) Card shall be highly resistant to face abrasion or bending. 3) Card shall have a slot in the vertical position for use as a badge. 4) Note: Active circuit type cards (those requiring batteries) shall not be acceptable. Capacities: 1) Card can generate a minimum eight digit access number. 2) Cards shall have numeric encoded data embedded in an integrated circuit within the card. 3) Each card shall be encoded so that it is totally unique and exists in no other system anywhere in the world. Specifications: 1) Dimensions: 3.37 X 2.125 X 0.075 in. (8.55 X 5.93 X 0.19 cm). 2) Construction: Durable ABS with vinyl or polycarbonate covering. Environmental: 1) Temperature: 14° to 140° F (-10° to 60° C). 2) Humidity 0% to 100% humidity. e. Regulatory: N/A (Card is totally passive requiring no approval.) f. Power: Passive-powered by DigiReader digital proximity reader. g. Communication: Card shall communicate via low power radio frequency, providing read ranges up to [22] inches depending on the selected DigiReader. (See DigiReader/Prox Card read range matrix for actual figures). h. Manufacturer: Westinghouse Security Electronics, Model: NexKey. DuraKey Digital Proximity Command Card: a. b. c. General: 1) DuraKey Digital Proximity Command Key (Card) is a highly durable, dual-coil passive digital proximity card that supports multiple card technologies on one card, including: digital proximity, bar code, and photo ID with lamination. 2) Note: Active circuit type cards (those requiring batteries) shall not be acceptable. Capacities: 1) Digital Proximity Command Card can generate a minimum eight digit access number. 2) Cards shall have numeric encoded data embedded in an integrated circuit within the card. Each card shall be encoded so that it is totally unique and exists in no other system anywhere in the world. Specifications: 1) WSE • 8/28/97 Dimensions: 3.37 X 2.125 X 0.099 in. (8.55 X 5.93 X 0.25 cm). 16720 — 9 NexSentry Access Control System 2) d. 9. Construction: Durable polycarbonate with vinyl covering. Environmental: 1) Temperature: 14° to 140° F (-10° to 60° C). 2) Humidity: 0% to 100% relative humidity. e. Regulatory: N/A (Card is totally passive requiring no approval.) f. Power: Passive-powered by DigiReader digital proximity reader. g. Communication: Card shall communicate via low power radio frequency, providing read ranges up to [36] inches depending on the selected DigiReader. (See DigiReader/Prox Card read range matrix for actual figures) h. Manufacturer: Westinghouse Security Electronics, Model: DuraKey. Radio Frequency Identification (RFID) Tag (KeyMate Digital Key Fob): a. b. c. d. General: 1) KeyMate Digital Key Fob is a compact, single-coil passive digital proximity access credential and identification tag for use in environments requiring a flexible alternative to access cards for tracking people, items or inventory. 2) Fobs shall be constructed of a lightweight yet highly durable, waterproof polypropylene material and feature one built-in slot for easy conversion to a key chain, bracelet or commercial ID tag. 3) Note: Active circuit type cards (those requiring batteries) shall not be acceptable. Capacities: 1) KeyMate Digital Key Fob shall generate a minimum eight-digit access number. 2) Numeric encoded data shall be embedded in an integrated circuit within each fob. Each fob shall be encoded so that it is totally unique and exists in no other system anywhere in the world. Specifications: 1) Dimensions: 1.375 X 1.625 X .125 in (3.49 X 4.13 X .125 cm). 2) Construction: Durable polypropylene material. Environmental: 1) Temperature: -31° to 270° F (-35° to 132° C). 2) Humidity: 0% to 100% condensing. e. Regulatory: N/A (Fob is totally passive requiring no approval). f. Power: Passive-powered by DigiReader digital proximity reader. g. Communication: KeyMate Digital Key Fob shall communicate via low power radio frequency, providing read ranges up to [15] inches depending on the selected DigiReader (see PART IV.1, “DigiReader/Prox Card read range matrix” for actual figures). h. Manufacturer: Westinghouse Security Electronics, Model: KeyMate. 10. Radio Frequency Identification (RFID) Tag (DuraTag Digital Key): a. b. General: 1) DuraTag is a compact, single-coil passive digital proximity access credential and identification tag for use in environments requiring a flexible alternative to access cards for tracking people, items or inventory. 2) Tags shall be constructed of a lightweight yet highly durable, waterproof polypropylene material. 3) Dual-slot configuration shall allow tags to be fastened easily and securely to items, or to be adapted for wristband use. 4) Note: Active circuit type cards (those requiring batteries) shall not be acceptable. Capacities: 1) WSE • 8/28/97 DuraTag Digital Key tag shall generate a minimum eight-digit access number. 16720 — 10 NexSentry Access Control System 2) c. d. Numeric encoded data shall be embedded in an integrated circuit within each tag. Each tag shall be encoded so that it is totally unique and exists in no other system anywhere in the world. Specifications: 1) Dimensions: 1.37 in. D X 0.192 in. thick (3.45 cm D X 4.84 mm thick). 2) Construction: Durable polypropylene. Environmental: 1) Temperature: -31° to 270° F (-35° to 132° C). 2) Humidity: 0% to 100% condensing. e. Regulatory: N/A (Fob is totally passive requiring no approval). f. Power: Passive-powered by DigiReader digital proximity reader. g. Communication: DuraTag Digital Key Fob shall communicate via low power radio frequency, providing read ranges up to [15] inches depending on the selected DigiReader (see PART IV.1, “DigiReader/Prox Card read range matrix” for actual figures). h. Manufacturer: Westinghouse Security Electronics, Model: DuraTag. 11. Magnetic Stripe Card - ISO/ABA format: a. General: The ISO/ABA format magnetic stripe card shall conform to the ISO/ABA standards for size and encoding characteristics. b. Capacities: c. d. 1) Each card shall support up to 40 digits in an ISO/ABA format on track two of the magnetic stripe. 2) The information contained in the 40 digits shall include at least a 4- to 8-digit number for identification or access purposes. 3) Additional information can include a site code (4 digits) and an expiration date of month and year (4 digits). Specifications: 1) Dimensions: 2.125 X 3.375 X .030 in. (5.4 X 8.57 X .07 cm) 2) Construction: Polyester and appropriate adhesive-based materials. 3) Magnetic stripe material: Single layer 3M type 5203 High Coercivity, 4000 Oerstad using Track 2, without exception. 4) Magnetic stripe dimensions: From 0.333 in. to 0.493 in. minimum from the upper card edge and for the entire length of the card. 5) Photo ID ready: Photo ID Badge shall be available as an add-on to all magnetic stripe systems. It uses the Polaroid ID-4 Camera System with ANSI X4.16-1983 encoding. Environmental: 1) Temperature: -30° to +122° F (-35° to 50° C). 2) Humidity: 5% to 95% relative humidity. e. Communication: Via physical read by a Magnetic Stripe Reader. f. Manufacturer: Westinghouse Security Electronics, Model: ISO/ABA Magnetic Stripe Card. 12. Power Supply (PI-1) Power Inserter: a. General: Un-interruptable power source module shall provide low voltage DC power. It shall also support optional external lead acid batteries to maintain all controller operations for at least four (4) hours in event of power failure. b. Capacities: WSE • 8/28/97 1) 28 volt DC output to readers. 2) Limited lock power output at 24 Volts DC. 3) 5 ampere output current. 4) Power failure output. 16720 — 11 NexSentry Access Control System c. 5) Battery charger output. 6) Additional power supplies may be required based upon system configuration of other devices and wiring distances. Specifications: 1) d. e. Dimensions: 12 X 5.25 X 3.375 in. (31 X 13.4 X 9.5 cm). Environmental: 1) Humidity: 10% to 90% non-condensing. 2) Temperature: 20° to +120° F (-7° to +49° C). Regulatory: UL 1012 or 1310 and CSA or cUL listed. 1) NOTE: The PI-1 Power Inserter is required when configuring NexSentry with a keypad and/or digital readers to meet FCC requirements. f. Mounting: Power supply should be installed in a secure area at least two feet from the Controller. g. Power: 115VAC/60Hz source. h. Wiring: 1) Power Supply shall be connected to the controller and keypad network wiring via twisted pair wire (shielding optional) of at least 18 AWG. 2) Connectors: Phoenix-type. i. Feedback: A single LED indicates power ON condition. j. Self-protection: PI-1 shall send a POWER FAIL signal to the controller. k. Manufacturer: Westinghouse Security Electronics, Model: PI-1, or other manufacturerapproved device. 13. Accessories: a. b. c. d. Terminal: 1) Standard video display terminal (CRT) with full keyboard and display. 2) Shall be capable of data throughput at 300, 1200, 2400, 4800, and 9600 baud. 3) Systems Integrator shall furnish as shown on plans. 4) Manufacturer: Westinghouse Security Electronics, Model: #57101-L-1 (110v) / 57101-L-2 (230v) or equal. Printer: 1) Printer shall be standard RS-232 serial communications printer. 2) Printer shall be capable of data throughput at 300, 1200, 2400, 4800, and 9600 baud. 3) Systems Integrator shall furnish as shown on plans. 4) Manufacturer: Westinghouse Security Electronics; Model: parallel/serial 57184-V (115v) / 57184-V (230v) or equal. Modem (if required on plans): 1) Baud Rate: 300, 1200, or 2400, 4800, 9600 baud. 2) Regulatory: FCC registered, UL listed. 3) Manufacturer: Westinghouse Security Electronics, Model: #5200 local / remote or equal. Locking Hardware: 1) e. Switches: 1) WSE • 8/28/97 Systems Integrator shall furnish all system electrified locking hardware as shown on plans and which is used in conjunction with card access and alarm monitoring system. Provide all necessary monitoring and manual switches as shown on plans and which are used in conjunction with card access security system. 16720 — 12 NexSentry Access Control System f. External UPS batteries: 1) C. Provide necessary batteries to be used with UPS power supply to maintain all controller operations and provide limited DC lock power at either 12VDC or 24VDC. Controller software features: 1. General: Controller shall have the capability to act as a standalone unit with the software features described below. Additional functionality and features may be added by networking system through a Host computer (see specification for WSE Host software); however, the purpose of this section is to highlight the software features that are pre-programmed into the Controller. 2. Database: Database shall store all user operating data and handle event reporting for all possible attached devices, and shall contain memory capacity for the following: 3. a. Users with unique ID: 11,200 maximum (standard) [100,000 maximum with optional RAM upgrade)]. b. Access Codes: The access code shall define where and when the key holder will be granted access. Number available: 120. 2) Capacity: 4 (four) maximum time periods for each door in the system. 3) Definable time periods: Time of Day, Day of week, and Holidays. c. Reports: 32. d. Time intervals: 128. e. User-definable holidays: up to 30. f. Transaction buffer: 4,000 maximum in Host port, 100 circular in the Terminal port. Operational modes: Controller shall operate in one of two modes, as follows: a. b. 4. 1) Standalone mode: 1) NexSentry shall not attach to a Host computer. 2) User interaction shall be via the user terminal or via access control card readers, keypads, etc. 3) All functions shall still be operable and commands normally done via the Host computer shall still be done directly on the Controller via user terminal. 4) All system activity messages to the operator shall be printed in plain English Language Text. Mnemonic type or transaction code type operator messages are not acceptable. Networked mode: 1) NexSentry shall be connected to a Host computer. 2) Changes to the database in the Controller shall be made on the host computer then downloaded to Controller. 3) Log messages shall be stored on the Host. 4) If communications between Host and Controller fails, Controller shall continue processing without degradation in function or responsiveness and log messages shall be stored in Controller memory until they can be delivered to Host. 5) All system activity messages to the Host system shall be hexadecimal for efficient data communications supporting SEEP protocol. 6) The Host shall have the responsibility for acknowledging and translating the received messages. 7) While operating in Host mode, a second port on the Controller shall be available for standalone mode connection and output. Building Mode: Controller shall operate in one of three Building modes to determine if access will be allowed or denied. a. Building Modes shall be defined as follows: 1) WSE • 8/28/97 OPEN mode: designates any key holder, privileged or not, may enter the building provided he has a valid access code (used during peak normal hours). 16720 — 13 NexSentry Access Control System 5. 6. 7. 2) LIMIT mode: designates when a privileged key holder may enter the building, provided he has a valid access code. 3) CLOSED mode: is used when the building is unoccupied. Although a privileged key holder may enter a closed building, he must put the structure in the open or limited mode within one minute or an alarm will be activated. b. Any key shall have means to be programmed as PRIVILEGED and be authorized to arm or disarm the building mode feature. c. If the key is not authorized to disarm mode alarm system, the key user shall be unable to gain entry, regardless if user’s Access Code has been programmed for that period. Operator Modes: Controller shall always operate in one of two states, depending on whether or not an operator is present, as follows: a. Operate Mode: System shall operate in OPERATE Mode whenever the operator is not logged on. Log records shall be displayed on the screen as they are generated, if so configured. b. Command Mode: System shall operate in COMMAND Mode whenever an operator is logged onto the Controller. All operations can be performed from the terminal or from the Host computer. Command Mode shall have three functions: 1) To configure the system. 2) To override the system. 3) To use print commands. Readers: a. System shall be able to assign a 12-character name for each reader. b. System shall be capable of defining which reader and at what times they are to report valid access reports. c. User shall be able to select which times and at what reader key trace reports are generated. d. User shall be able to define which are CLOSED readers (readers where privileged keys function). e. Type: Controller shall support 4 (four) reader types, as follows: 1) NORMAL: Shall operate during all building modes for all users who meet the regular access criterion for that door. Privileged access criterion shall be disregarded. 2) OPEN: Shall operate only during the Building OPEN mode: everyone shall be denied access during the LIMITED and CLOSED modes. 3) CLOSED: Shall operate during all modes, but, during the LIMITED and CLOSED modes it shall operate under the regular access criteria only for users with privileged access. 4) STATION: Shall be available if the Building Mode feature is used. Shall allow authorized users to change the Building operation mode to or from OPEN, LIMITED or CLOSED. Building modes may be completely controlled by direct commands. The STATION Type Reader shall have the same operation restrictions as the CLOSED Type Reader. Anti-passback: a. System shall have capability to designate any command key so that when it is used to enter an area it must be used to exit that area before it can be reused for entry. b. System shall have capability to manually or automatically reset the location of all command key’s passback status at any time. c. Anti-passback modes: d. WSE • 8/28/97 1) HARD mode: Denies re-entry and reports passback violation. 2) SOFT mode: Allows re-entry but reports passback violation. Auto-forgive: A supervisor shall have a method of selectively disabling anti-passback protection. During the time auto-forgive is active, the system shall ignore the anti-passback protection and reset the keys that use the door within the building to UNKNOWN. 16720 — 14 NexSentry Access Control System 8. 9. Alarm monitoring and control functions: a. Latch Alarm: Any monitor point can drive a report that shall trigger the Controller’s latched alarm contact. This alarm shall stay on until an operator performs the “SILENCE” command to turn it off. b. Alarm points: Alarm monitors, such as electronic eyes, motion detectors, etc., shall be monitored constantly by the Controller. These shall be capable of being programmed to cause output contacts to be closed to sound alarms or activate other devices. c. Output contacts: 8 (eight) shall be used to activate silent alarms or to report alarms to the central station or to control devices such as pumps and sirens. d. Alarm Silence: Latched alarm may be silenced via either the user interface or from the Host computer. The alarm may be turned on again if the alarm trigger is still activated. e. Alarm shunts: System shall have means to connect presence detecting device to shunt alarms when authorized employee uses an alarmed exit. Exit reporting shall be selected by user. f. Open door detection: Any time a door is left open for more than the configured amount of time, a configured action can be taken. g. Forced door detection: Any time a door is forced open, a configured action can be taken. h. Loss of power alarm: Controller shall indicate when the UPS is about to run out of power. If possible, a POWER FAIL log message shall be produced. i. Tamper detection: Controller shall indicate when the unit’s enclosure is being tampered with. User interface: a. System shall support an ASCII character-based line-oriented interface via the RS-232 “Terminal” line. b. If Controller is configured without a Host connection, then the User interface may also be performed via the “Host” port. 10. Passwords: a. Authorization levels: Each password shall be assigned to one of 6 (six) authorization levels. b. Operator passwords defined: up to 8 (eight). c. Duplication: If a password is duplicated, Controller will only recognize the first occurrence. d. Identification of operators for terminal use: 8 (eight) different operators. e. User definable passwords: Up to 12 (twelve) character user definable passwords shall be used to log on to the system. 11. System diagnostics: a. System shall be capable of automatic system diagnostics and automatic alarming based on detected faults in the controller, readers, monitor input and relay controlling devices and keypads. b. System shall be capable of off-line diagnostics for checking the integrity of controller’s memory (RAM and PROM test), Relay outputs, RAM, serial communication ports and other functions. 12. Control operation: a. Control operation shall be based on the ability to force relay lock outputs to an operating mode. b. Forcing action may be initiated by: WSE • 8/28/97 1) Time-of-Day schedule. 2) Switch Closure. 3) Command Key Presentation. 4) Keyboard Command. 16720 — 15 NexSentry Access Control System 13. Card/Key Commands and Functions: a. [Unique numeric identification (with standard 1MB RAM): 11,200 command keys. b. 12-character description and unique numeric identification: 4,400 command keys.] c. [Unique numeric identification (with 2MB RAM upgrade): 100,000 with user-definable PIN codes.] d. Both keys with names and without within the same database. e. Bulk program keys in groups and remove any key from the database. f. Any key usage may be traced by the system and a key trace report generated. g. Access parameter definition: any single key can be programmed to open a given door during four different time periods. h. Modification of key access parameters: may be modified at any time by an operator with a sufficient authorization level. 14. Pre-programming: The access control and security management system shall have preprogrammed default data for ease in start-up and testing of equipment. 15. Printed Data Output: a. System shall be capable of selecting which access and monitor point activity messages are to be output to the printer. b. System shall be capable of printing the following information: 1) Key Definitions: Keycodes/ Names/ Access Codes/Location (In-Out status for antipassback)/ Key trace function (Enable/Disable)/ whether Privileged or not. 2) Monitored Point Parameters. 3) Door Parameters. 4) Access Code Parameters. 5) User Names, Passwords, and Access Levels. 6) System Status (real time report). 7) All Report Types. 16. Relay outputs: System shall initiate relay output commands based on: a. Card Access Activity. b. Operator Keyboard Inputs. c. Pre-programmed Time Schedule. d. Switch Input. 17. Monitoring: a. Supervised alarm contacts: up to 32. b. Character names: up to 24 characters defined by user. c. Monitor points shall: WSE • 8/28/97 1) Be designated by the user as an alarm or non alarm event. 2) Be elected to either monitor at all times or during selected time periods. 3) Be capable of being enabled/disabled from terminal or externally from key holder. 4) Be capable of enabling any lock output or annunciator output including the latched alarm contact. 5) Work with the controller to provide immediate re-lock after key holder has gained access into a facility. Systems re-locking only after adjustable time delay shall be acceptable. 16720 — 16 NexSentry Access Control System 18. Forced Entry Alarms: a. System shall have means to select which doors shall report forced entry alarms or door held open alarms. b. On a door by door basis, user shall be able to select which doors are to report forced entry and during what time periods. c. User shall be able to select whether such alarms will be generated at all times or when system is in LIMITED/CLOSED mode. 19. Disk backup: The access control and security management system shall allow for disk backup and restoration of user data in the event of database loss if connected to a Host computer. 20. Battery back-up: The access control and security system shall include internal battery backup to maintain controller database, program, time, date, and building mode during a power loss. PART III .1 EQUIPMENT INSTALLATION AND DOCUMENTATION A. B. C. .2 EXECUTION Installation: 1. The proximity access control and security management system shall be installed and wired completely as shown on the plans by a trained and authorized Westinghouse Security Electronics Systems Integrator. 2. Systems Integrator shall make all necessary wiring connections to external devices and equipment. Telephone Lines: 1. The owner shall arrange for dedicated or dial-up telephone lines for the telecommunications equipment as shown on the plans. 2. Each phone line shall be terminated in an RJ-11 telephone jack. 3. Note: Any connections to the public telephone system require notification of the local telephone company. See specific instructions in manual for modem used. Documentation: 1. Accurate “as built” drawings shall be furnished by the Systems Integrator to aid the owner in programming. These should indicate the door(s) controlled by each lock output, the monitoring points for the door controlled area, and any relay outputs or special inputs into the system. 2. The Systems Integrator shall supply operating and maintenance manuals to aid the owner in the programming of the system. SERVICE AND SUPPORT A. B. Startup: 1. After the system has been installed, the documentation delivered to the owner and the telephone lines are operational in compliance with Part III.1 above, the Systems Integrator shall verify correct operation of all system components. 2. The Systems Integrator shall guarantee all material and workmanship involving the system for up to [_____] year after startup. Training: 1. After system startup, the Systems Integrator shall instruct owner’s personnel in how to program the system. 2. On-site training from manufacturer shall be available. 3. Manufacturer-direct training shall be available through WSE University, Santa Clara, CA. WSE • 8/28/97 16720 — 17 NexSentry Access Control System C. Warranty Support: 1. The authorized Systems Integrator shall be available during the warranty period to answer programming and application questions to support owner’s personnel during this period. 2. [Option: The authorized Systems Integrator shall have capability to have a remote terminal for programming the Controller to support the owner’s personnel during this period. The owner’s system shall include a modem, necessary cabling and telephone extension to support this telecommunications operation.] 3. [Option: The authorized Systems Integrator shall have the training and capability to provide additional support services including: a. Regular testing and inspection of all system components and to submit reports on the results. b. Emergency service for repairs and adjustments to the system and part replacement if necessary.] WSE • 8/28/97 16720 — 18 NexSentry Access Control System PART IV .1 APPENDIX READ RANGE MATRIX DigiReader® Digital Proximity Reader Prox Card DR4204 DR4205 DR4208 DR4226 DR4238 QuadraKey up to 2" (5.08 cm) up to 4" (10.16 cm) up to 7" (17.78 cm) up to 13" (33.02 cm) up to 22" (55.88 cm) NexKey up to 2" (5.08 cm) up to 4" (10.16 cm) up to 7" (17.78 cm) up to 13" (33.02 cm) up to 22" (55.88 cm) DuraKey up to 3" (7.62 cm) up to 6" (15.24 cm) up to 8" (20.32 cm) up to 22" (55.88 cm) up to 36" (91.44 cm) KeyMate up to 1" (2.5 cm) up to 2" (5.0 cm) up to 6" (15 cm) up to 12" (30 cm) up to 15" (45 cm) DuraTag up to 1" (2.5 cm) up to 2" (5.0 cm) up to 4" (10 cm) up to 10" (25 cm) up to 15" (38 cm) Maximum read ranges may vary depending on physical environment of installation WSE • 8/28/97 16720 — A NexSentry Access Control System .2 WIRING DIAGRAMS A. NexSentry Controller and MIRO 16/8 WSE • 8/28/97 16720 — B NexSentry Access Control System .3 MOUNTING DIAGRAMS A. NexSentry Module enclosure 6.700 .437 1.993 7.574 16.788 .250 16.288 MOUNTING HOLE .22 4x NEXSENTRY ENCLOSURE WSE • 8/28/97 16720 — C NexSentry Access Control System B. MIRO 16/8 Module enclosure 4.600 .437 5.474 1.993 .250 16.288 16.788 MOUNTING HOLE .22 4x WSE • 8/28/97 16720 — D NexSentry Access Control System C. NexSentry/MIRO 16/8 enclosure 0 4.000[101.6] 14.50[368.30] #8 MACHINE SCREW 3.25 [82.55] 22.375 [568.32] MIRO 16/8 NexSentry CONTROLLER 25.000[635] EXPANSION AREA .750 [19.05] 0 0 WSE • 8/28/97 10.50[266.7] 16720 — E 21.000[533.4] NexSentry Access Control System SAMPLE SYSTEM DIAGRAMS A. NexSentry Digital Proximity with Keypad Parking lot Security center or alarm central station Video monitor DigiReader (DR 4238) PI-1 Power Inserter Cafeteria Manufacturing CCTV camera Video switcher WSE host Main entrance DigiReader Keypad (DR 4205) Gate arm DigiReader Keypad (DR 4205) DigiReader (DR 4205) Alarm Alarm Lock Lock IN Sensor loop Door switch Door switch Door switch OUT Sensor loop Motion sensor (REX) Motion sensor (REX) Motion sensor (REX) Glass break detector Glass break detector Glass break detector Fire sensor Fire sensor Fire sensor Alarm AC input LEGEND RS-232 RS-485 S-NET Twisted pair wire WSE • 8/28/97 16720 — F Lock up to eight doors per NexSentry Controller .4 NexSentry Access Control System NexSentry Magnetic Stripe/Keypad combination Parking lot Security center or alarm central station Video monitor Magnetic Stripe Reader w/Keypad (MSRK42) PI-1 Power Inserter Cafeteria Manufacturing CCTV camera Video switcher WSE host Main entrance Magnetic Stripe Reader w/Keypad (MSRK42) Magnetic Stripe Reader w/Keypad (MSRK42) Magnetic Stripe Reader w/Keypad (MSRK42) Alarm Alarm Alarm Lock Lock IN Sensor loop Door switch Door switch Door switch OUT Sensor loop Motion sensor (REX) Motion sensor (REX) Motion sensor (REX) Glass break detector Glass break detector Glass break detector Fire sensor Fire sensor Fire sensor Gate arm AC input LEGEND RS-232 RS-485 S-NET Twisted pair wire WSE • 8/28/97 16720 — G Lock up to eight doors per NexSentry Controller B. NexSentry Access Control System