
Table of Contents
1: BEFORE YOU BEGIN............................................................................................................................ 5
1.1: GENERAL REQUIREMENTS:...................................................................................................... 5
1.2: POWERNET READER-CONTROLLER SPECIFICATIONS:.................................................. 6
1.3: INSTALLATION LOCATION GUIDELINES.............................................................................. 7
2: WIRING AT THE DOOR AND READER-CONTROLLER............................................................ 11
2.1: POWERING THE READER-CONTROLLERS......................................................................... 11
2.1.1: POWER OVER ETHERNET (PoE) OPTION.......................................................................... 11
2.1.2: ADDITIONAL POWER OPTIONS........................................................................................... 13
2.2: WIRING THE DOORS.................................................................................................................. 16
2.2.1: READER-CONTROLLER CONTROL-LEADS DESCRIPTION......................................... 17
2.2.2: LOCK WIRING -- BASIC.......................................................................................................... 19
2.2.3: WIRING THE REX BUTTON................................................................................................... 22
2.2.4: WIRING THE AUX INPUT ....................................................................................................... 22
2.2.5: WIRING THE DOOR SENSE.................................................................................................... 23
2.2.6: LOCK WIRING -- LOW-VOLTAGE 12VDC POWER OPTION ......................................... 24
2.2.7: LOCK WIRING -- EXTERIOR DOOR KIT............................................................................ 25
2.2.8: LOCK WIRING -- 2 READERS TO 1 LOCK.......................................................................... 27
2.2.9: USING THE TTL LEADS .......................................................................................................... 28
2.2.10: USING THE POWERNET’S RS-232 INPUT ......................................................................... 28
2.2.11: WIRING THE WIEGAND INTERFACE MODULE............................................................ 29
2.2.12: WIRING THE DUAL-SRM...................................................................................................... 31
2.2.13: WIRING THE QUAD-SRM...................................................................................................... 33
2.2.11: MANAGING INDUCTIVE LOAD CHALLANGES.............................................................. 35
2.2.12: MANAGING IN-RUSH CURRENT LOADS.......................................................................... 36
2.3: CONFIGUATION EXAMPLES........................................................................................................ 37
2.3.1: PoE --- ELECTRIC STRIKE...................................................................................................... 37
2.3.2: PoE --- EXTERNAL PWR FOR ELECTRIC STRIKE........................................................... 38
2.3.3: 12VDC –ELECTRIC STRIKE .................................................................................................. 39
2.3.4: PoE --- MAGNETIC LOCK........................................................................................................ 40
2.3.5: PoE --- MAGNETIC LOCK & PIR ........................................................................................... 41
2.3.6: PoE --- MAGNETIC LOCK, EDK & PIR................................................................................. 42
2.3.7: DUAL POWER SOURCES......................................................................................................... 43
3: CONFIGURING THE READER-CONTROLLER’S COMMUNICATIONS ................................ 44
3.1: ETHERNET-BASED TCP/IP READER-CONTROLLERS ...................................................... 44
3.2: SECURING MESSAGES ON YOUR NETWORK..................................................................... 47