TABLE OF CONTENTS

Preface

Important Notices

6

General Information

7

Features

8

Section 1 – Installation

1.1

Installation Guidelines – All Systems

9

 

1.1.1

Surface Mount Units

10

 

1.1.2

Surface Mount Units with Recess Box

11

 

1.1.3

Flush Mount Units

12

 

1.1.4

Flush Mount Rough-in Box

13

 

1.1.5

Flush Mount Trim Ring

14

 

1.1.6

Flush Mount Surface Mounting Kit

15

 

1.1.7

Wall Mount Units

16

1.2

Memory Chip Installation

17

1.3

Postal Lock Installation

18

Section 2 – Wiring

General Information

19

Maximum Wire Run Distance Charts

20

2.1

Main Terminal Description

21

2.2Weigand Terminals

2.2.1

Weigand Power Terminals

22

2.2.2

Weigand Data Terminals

22

2.2.3

Elevator Control Terminals

23

2.2.4

RS-232 Terminals

23

2.3Relay Wiring (Typical)

2.3.1

Controlling a Single Door or Gate

24

2.3.2

Controlling a Gate and a Pedestrian Gate or Door

25

2.3.3

Controlling a Gate Operator and Two Pedestrian Doors or Gates

26

2.3.4

Tracker Expansion Board Control

27

Section 3 – Programming

3.1General Programming Information

3.1.1

Programming with a PC

29

3.1.2

Programming from the Keypad

30

3.1.3

System Memory

31

3.2Programming with a PC

3.2.1

Master Code

32

3.2.2

Single or Multiple Systems

32

3.2.3

Programming for Call Up Operation

33

3.2.4

PC Programming Table

33

3.3General Programming

3.3.1

Relay Strike Time

34

3.3.2

Talk Time

34

3.3.3

Tone Open Numbers

35

3.3.4

Postal Switch

35

3.3.5

Touch-tone / Rotary-dial

36

3.3.6

Rotary-dial 9

36

4

Page 4
Image 4
DKS Enterprises 1803PC, 1815, 1817 owner manual Table of Contents

1815, 1803PC, 1817 specifications

DKS Enterprises has established itself as a leading provider of cutting-edge access control solutions, and among its notable offerings are the 1803PC, 1817, and 1815 models. These products stand out in the commercial security landscape, providing businesses with reliable and efficient entry management.

The DKS 1803PC is an advanced digital keyless entry system designed for commercial applications. Its primary feature is the easy-to-use keypad interface, which allows users to input their access codes directly. This model is equipped with a robust memory capable of storing up to 100 unique codes, making it suitable for locations with multiple users. Additionally, the 1803PC supports timed access, enabling businesses to set specific entry windows, which enhances security and access control.

The DKS 1817 model takes entry management a step further with its smart technology integration. It features Bluetooth capabilities that allow users to unlock doors via their smartphones, offering convenience and flexibility. The 1817 can be connected to various security devices, such as alarms and surveillance cameras, providing a comprehensive security ecosystem. It also includes a user-friendly mobile app that enables remote management of access permissions, ensuring that business owners can monitor and control entry points effectively from anywhere.

In contrast, the DKS 1815 model caters to businesses looking for a cost-effective yet reliable access solution. This model features a straightforward keypad interface similar to the 1803PC, but it is designed with essential functionalities to meet basic security needs. The 1815 supports up to 50 access codes and is ideal for smaller businesses or limited access areas. Its durable construction ensures longevity and requires minimal maintenance over time.

All three models employ DKS's proprietary technology that emphasizes durability and security. They are built to withstand harsh environmental conditions, making them suitable for both indoor and outdoor use. Each model adheres to stringent safety standards to protect against unauthorized access, ensuring the safety of personnel and assets.

In conclusion, DKS Enterprises' 1803PC, 1817, and 1815 models represent a diverse range of access control solutions tailored for various business needs. Their features focus on ease of use, advanced technology, and reliability, making them an excellent choice for organizations looking to enhance their security measures while streamlining access management.