Mercury SR-10K Mag-Stripe Access System manual Description

Page 11

Operating Mode 02: Restricted Access Control with Door Monitoring

Description

Restricted Access Control with Door Monitoring restricts Level 1 user access based on the status of Input I2 and provides door use annunciation on Output K2.

Level 1 cards are accepted only if the Input I2 sees a closed contact. Level 2 or 3 cards are not dependent on Input I2.

A downward read of all valid User Cards pulse Output K1, the strike control relay.

The upward read of a Level 2 card toggles the strike control relay, K1, in effect performing a lock/unlock function. The upward read of a Level 1 card will release an unlocked condi- tion.

Output K2 is pulsed to annunciate improper door use, such as

a)Forced Open condition, which occurs if the door opening was not preceded by the use of a valid card or an exit request, or

b)Held Open condition, which occurs if the door is kept open longer than the preset open time.

User Level Specifications

User Level 1

A downward read will pulse Output K1 only if Input I2 is closed.

A upward read ends an unlocked condition, regardless of the status of Input I2.

User Level 2 (and 3)

A downward read will pulse Output K1 (no effect if the door is unlocked).

A upward read will toggle the state of Output K1, locking or unlocking the door.

Configuration

Input assignments:

Input I1 is connected to a door contact: closed contact signifies a closed door

Input I2 is connected to the access control control contact, such as an external timer. User Level 1 cards are accepted only when a closed contact is presented to this input.

Upper LED assignment:

The upper LED follows Input I2, the Access Control Input:

Open Contact is displayed as RED

Closed Contact is displayed as GREEN.

Notes

This mode is very similar to Operating Mode 1. The same caution should be observed regarding the ability to permanently unlock the door:

The 10 cards included in the original shipment are enrolled as Level 1 users. Be aware, that if they are modified or any subsequent cards are added as Level 2 users, an up- ward read will unlock the door - requiring another upward read (by any user Level) to release the locked condition. Add Level 2 users only if the lock/unlock function is desired.

Consider using Operating Mode 4 or 5 if restricted access is required, but the unlock function is not.

Mercury Security Corporation, © 2005

SR-10K

Doc. 10107-0007 Rev 1.04

Page 11

Image 11
Contents SR-10K Mag-Stripe Access System Users Guide Table of Contents Card Database Options DescriptionProgramming Multi-Reader Sites Cipher CodesUser Levels Operating ModesLost Master Card Configuration PlanningInterpreting the LED and Buzzer Indicators Quick StartCommand 13 Delete a range of cards Command 10 Add cardsCommand 11 Delete a card, using the user slot Command 12 Delete a card, using the cardBlock Database Mode Commands Commands 20 through Cipher Codes Related Commands Commands 15 throughConfiguration and Database Copy Commands Commands 41through System Configuration Settings Commands 91through Configuration Operating Mode Access Control with Door MonitoringUser Level Specifications Description Operating Mode Access Control and Alarm Panel Control Description Operating Mode Two-Door Access Control Operating Mode Supervisor Restricted Access ControlOperating Mode Output Toggle on Valid Access Operating Mode Access Control with Door Buzzer ControlRelay Contact Protection/Noise Suppression InstallationSpecification MaintenanceStrike Addendum Revision C

SR-10K, SR-10K Mag-Stripe Access System specifications

The Mercury SR-10K Mag-Stripe Access System is a cutting-edge access control solution designed for environments that require robust security and reliable performance. This system is well-suited for various applications, including commercial buildings, educational institutions, and industrial facilities. With its advanced technology and user-friendly design, the SR-10K provides a comprehensive security platform that streamlines access management.

One of the main features of the SR-10K is its compatibility with both magnetic stripe cards and ISO 7810-compliant cards. This flexibility allows organizations to implement existing card technologies without the need for extensive infrastructure changes. The system supports both single-door and multi-door configurations, making it adaptable to different facility requirements.

The SR-10K includes a powerful embedded controller that ensures efficient processing of access control transactions. This controller leverages smart technology to manage access rights and monitor activities in real-time, providing operators with immediate insights into system status. Additionally, it incorporates a user-friendly interface, allowing for straightforward programming and administration of the access control system.

Durability is a key characteristic of the SR-10K, as it is designed to withstand the rigors of everyday use in demanding environments. The system features weather-resistant components, making it suitable for both indoor and outdoor installations. This robustness contributes to the overall reliability of the security solution, reducing maintenance and operational costs over time.

The SR-10K also integrates seamlessly with existing security infrastructures, supporting various communication protocols such as Wiegand and RS-485. This connectivity allows organizations to enhance their security measures by integrating the access control system with surveillance cameras, alarms, and other security devices. The SR-10K can be easily scaled to accommodate future growth, ensuring that the system remains effective as security needs evolve.

In addition to its technical features, the SR-10K prioritizes user experience. The system offers intuitive software for system management, which simplifies the process of managing user profiles, access permissions, and activity logs. This accessibility ensures that security personnel can effectively monitor and respond to access events.

Overall, the Mercury SR-10K Mag-Stripe Access System stands out as a versatile and reliable access control solution. Its combination of advanced features, robust construction, and ease of use makes it an ideal choice for organizations seeking to enhance their security while maintaining operational efficiency.