Assa DK-26 manual Subset Codes, Deleting Codes

Page 18

Rev. A.2, 10/03

Page-15

button in the CPU board. It is deliberately kept separate from all programming functions. Another use for it, however, is as a “masterkey” code. For example, consider a facility with multiple DK-26’s under the control of different departments. Each department might want to employ different Program and User codes to restrict cross access but a common Hard code could be established for all of the units so that security management personnel could enjoy universal access. This Hard code will never be lost from keypad operations (the CPU board has to be accessed).

4.4 SUBSET CODES

When you recognize that the DK-26 accepts multiple codes of different lengths, it is possible that one code will be a subset of another. For example, suppose you programmed “1-3-3-5-8” and then programmed “3-3-5” as another code. When you try to enter 1-3-3-5-8, you can’t complete the entry because when the unit sees the sequence 3-3-5, it will operate. A real problem could occur if a User code was a subset of the Program code. The unit could not be put into program mode from the keypad.

The DK-26, however, avoids this problem by rejecting any code that is a subset of another code in memory. It signals this rejection by showing the single red (error) flash instead of the two-flash confirmation signal. You’ll get the same error if you try to enter a duplicate code. If you are trying to enter a code and see it rejected by the error signal, carefully check your list of other codes. You are probably attempting to enter a subset code. If the security procedures of the installation allow individuals to choose their own codes without reference to a list, the users need to be advised that they may have to try alternate codes if the one they prefer is rejected as a subset. Other typical reasons for code rejection are covered in the troubleshooting section at the end of the manual.

4.5 DELETING CODES

Any code can be deleted by “calling it up” and hitting the Bell key rather than entering a new code (which would over-write the old one). Alternately, if you don’t hit the Bell key but don’t enter a new code, the unit will time out and still delete the code.

To delete the Hard code, press the “Hard Code” button on the CPU board, confirm that you are in hard program mode (slow yellow flash) and press the Bell key or wait 30 seconds.

To delete the Program code, put the unit into program mode (fast yellow flash) from the “Prgm Code” button or from the existing Program code. Enter 0-0 and press the Bell key or wait five seconds. You’ll see the two red confirmation flashes. You’ll need to then press the Bell key again to exit program mode or wait 30 seconds. Note that it can be considered logical to operate without a Program code. It is more difficult to put the unit into program mode (it can only be done from the “Prgm Code” button in the CPU board) but User codes can still be changed and some users may feel that this is a more secure code changing procedure.

To delete any individual User code, put the unit into program mode (fast yellow flash) from the “Prgm Code” button or from the existing Program code. Enter the prefix for the code you wish to delete (01 - 59) and press the Bell key or wait five seconds. You’ll see the two red flashes. You’ll then need to press the Bell key again to exit program mode or wait 30 seconds.

An alternate method to delete any individual User code when you know the actual code but not the two digit prefix is as follows. Put the unit into program mode (fast yellow flash) from the “Prgm Code” button or from the existing Program code. Enter 7-9 followed immediately by the complete code you wish to delete. If it’s a seven digit code you’ll immediately see the two red confirmation flashes. Otherwise press the Bell key or wait five seconds. If you get the single red error flash, it is probably because the code you thought was in memory was not. You’ll then need to press the Bell key again to exit program mode or wait 30 seconds.

Image 18
Contents Connecting the Keypad Cable to the CPU Board Adding Other Lock Control SwitchesSetting the Time Range and Toggle Mode 1 Changing the User and PROG. Code from Keypad --PageWiring with Touch Sense BAR and Magnalock Nightlight FunctionPhysical Installation Physical Installation of Keypad DK-26 Power Consumption Volts WiringPower Selection Power and Electric Lock WiringOverview of CPU Board AC Lock AC Power Wiring DC Lock with AC PowerDC Lock AC Power Wiring DC Lock with DC PowerDC Lock DC Power Wiring Adding Other Lock Control SwitchesUSE of the F Terminal Adding External Contacts for Fail Safe and Fail Secure Locks REX FunctionDouble Break Wiring for Free Egress TWO Pole Switch Programming Fixed ProgrammingRev. A.2, 10/03 Page-11 Keypad Changeable Programming Changing the User and Program Code from the Keypad Adding Multiple User Codes Masterkey USE of the Hard CodeSubset Codes Deleting CodesChanging LED and Beeper Operation USE of the Programmable Relay Doorbell FunctionDuress Function ANTI-TAMPER Alarm Function Door Prop Alarm FunctionNightlight Function Additional Hard Wired OptionsHardwired Code Disabling Dual PAD OperationAlarm System Shunting Wiring to Shunt Alarm System on DoorANTI-TAILGATING Wiring with Securitrons Touch Sense BAR and Magnalock Wiring of DK-26, Touch Sense BAR and MagnalockMAGNACARE→ Limited Lifetime Warranty Appendix a Command Summary With the Unit in Program Mode Fast Yellow FlashRev. A.2, 10/03 Page-ii PROBLEM-- a key isn’t echoed no beep or LED flash PROBLEM-- Door opens on a short code that wasn’t programmed PROBLEM-- How to check the Keypad

DK-26 specifications

The Assa DK-26 is a state-of-the-art electronic locking system designed to provide enhanced security for a variety of applications, including commercial, institutional, and residential environments. This locking solution is characterized by its robust construction, advanced technology, and user-friendly features, making it a popular choice among security professionals.

One of the standout features of the Assa DK-26 is its innovative design, which combines mechanical and electronic security elements. The locking mechanism utilizes a high-security cylinder, ensuring that unauthorized access is thwarted. This cylinder is key-operated, allowing for traditional key entry while also supporting electronic access control, offering flexibility to users.

The DK-26 is equipped with advanced electronic technologies that enhance its functionality. One of the key technologies integrated into this system is RFID (Radio Frequency Identification). This allows users to gain access using key fobs or cards that contain embedded RFID chips. The system can be programmed to allow or deny access based on time schedules, occupancy status, or individual user credentials, providing a high level of control over who can enter a facility.

Another notable characteristic of the Assa DK-26 is its ability to integrate with various security management systems. This compatibility allows for centralized control and monitoring of multiple locking devices, enabling security personnel to efficiently manage access across an entire building or campus. Additionally, the DK-26 features real-time audit trails, which log all access attempts and can be reviewed for security audits or investigations.

The DK-26 is designed for durability and resilience, featuring weather-resistant materials that make it suitable for both interior and exterior applications. Its sleek and modern aesthetic adds to the appeal for businesses looking to maintain a professional appearance while ensuring optimal security.

Installation of the Assa DK-26 is straightforward, as it can be retrofitted to existing door hardware without requiring extensive modifications. This ease of installation, combined with its reliable performance, makes the DK-26 an intelligent choice for anyone looking to upgrade their locking systems.

In summary, the Assa DK-26 electronic locking system combines high-security mechanical features with advanced electronic technologies, making it a versatile and effective solution for securing a diverse range of environments. Its RFID access capabilities, integration with security management systems, and robust construction make it a standout choice in modern security solutions.