
3/37
3
TABLE OF CONTENTS
1. INTRODUCTION...............................................................................................................................................................5
1.1 SCOPE.............................................................................................................................................................................5
1.2 INTENDED AUDIENCE......................................................................................................................................................5
2. LOCK TYPES .....................................................................................................................................................................6
3. OPERATION MODES .......................................................................................................................................................6
3.1 FACTORY MODE..............................................................................................................................................................6
3.2 CONSTRUCTION MODE....................................................................................................................................................6
3.3 ACCESS MODE ................................................................................................................................................................7
3.4 BOOTLOADER MODE.......................................................................................................................................................7
4. USER ACCESS....................................................................................................................................................................8
4.1 ACCESS UNLOCK DURATION ..........................................................................................................................................8
5. PASSAGE MODE...............................................................................................................................................................8
6. PRIVACY.............................................................................................................................................................................9
7. LOCKOUT MODE .............................................................................................................................................................9
8. TAMPER DETECTION.....................................................................................................................................................9
9. REMOTE UNLOCK (OPTION)......................................................................................................................................10
10.DOOR AJAR SENSING (OPTION)................................................................................................................................10
11. RESETTING THE LOCK TO FACTORY DEFAULTS..........................................................................................10
12. MECHANICAL KEY OVERRIDE.............................................................................................................................10
13. LOCK KEYPAD COMMANDS..................................................................................................................................11
13.1 ENTERING KEYPAD PROGRAMMING MODE ....................................................................................................................11
13.2 EXITING KEYPAD PROGRAMMING MODE .......................................................................................................................12
13.3 COMMANDS..................................................................................................................................................................12
14. MAINTENANCE UNIT (M-UNIT PDA) ...................................................................................................................15
14.1 SETTING DATE/TIME................................................................................................................................................... 16
14.2 SETTING THE COMMUNICATION KEY........................................................................................................................... 17
14.3 UPDATING THE FIRMWARE...........................................................................................................................................18
14.4 PERFORMING DIAGNOSTICS ..........................................................................................................................................19
15. AUDIT LOGS................................................................................................................................................................19
16. QUICK LOCK CONFIGURATION...........................................................................................................................20
16.1 IN FACTORY OR CONSTRUCTION MODE.........................................................................................................................20
16.2 IN ACCESS MODE...........................................................................................................................................................20