TECOM TS1066 Owner's manual

TS1066 Network Access
Controller Programming
Manual
P/N MAPROG-TS1066 • REV 1.6 • ISS 16AUG19

Copyright
© 2019 UTC Fire & Security Australia Pty Ltd. All rights reserved.
Trademarks and
patents
The Challenger name and logo are trademarks of
UTC Fire & Security Australia Pty Ltd.
Other trade names used in this document may be trademarks or
registered trademarks of the manufacturers or vendors of the
respective products.
Manufacturer
Made in China by United Technologies Safety Systems
No. 80, Changjiang East Road, QETDZ, Qinhuangdao, Hebei,
P. R. China 066004
Imported by UTC Fire & Security Australia Pty Ltd t/a Interlogix
10 Ferntree Place
Notting Hill, Victoria, 3168, Australia
ACMA compliance
Notice! This is a Class B product. In a domestic
environment this product may cause radio interference
in which case the user may be required to take
adequate measures.
WEEE compliance
For proper recycling, dispose all the batteries and the
packaging as required by local ordinances or
regulations
Contact information
For contact information, see www.interlogix.com.au.

TS1066 Network Access Controller Programming Manual i
Content
Important information.................................................................. iii
Limitation of liability.........................................................................iii
Agency compliance.........................................................................iii
Product overview.......................................................................... 5
About this manual........................................................................... 5
Related documentation................................................................... 5
Introduction..................................................................................... 5
Operating modes ............................................................................ 7
Doors............................................................................................ 11
Lock types..................................................................................... 12
Interlocking doors.......................................................................... 13
Alarm control................................................................................. 15
Bus formats................................................................................... 16
Flexible device locations............................................................... 18
Input and relay mapping ............................................................... 21
Overriding door state .................................................................... 24
Random lockout time.................................................................... 27
LED area mapping for door readers.............................................. 27
Recommended programming sequence................................... 28
DIP switches................................................................................. 29
Defaulting the NAC....................................................................... 29
CTPlus connection........................................................................ 29
Uploading default configuration..................................................... 30
Upgrading firmware....................................................................... 36
Programming IP communications................................................. 38
Programming the NAC.................................................................. 42
Programming holidays.................................................................. 56
Programming time zones.............................................................. 58
Programming regions.................................................................... 58
Programming doors ...................................................................... 59
Programming input and relay mapping......................................... 79
Programming macro logic............................................................. 83
Programming user information...................................................... 86
Management via CTPlus............................................................. 88
Status and control......................................................................... 88
Configuring door schedules .......................................................... 93
Configuring door overrides............................................................ 95
Appendix A: Reference materials.............................................. 98
Using time and attendance readers.............................................. 98
Macro events ................................................................................ 99
Nac Door Defaults....................................................................... 104

ii TS1066 Network Access Controller Programming Manual
APPENDIX B: Enclosure Access Restrictions ....................... 106

TS1066 Network Access Controller Programming Manual iii
Important information
Limitation of liability
To the maximum extent permitted by applicable law, in no event will Interlogix be
liable for any lost profits or business opportunities, loss of use, business
interruption, loss of data, or any other indirect, special, incidental, or
consequential damages under any theory of liability, whether based in contract,
tort, negligence, product liability, or otherwise. Because some jurisdictions do not
allow the exclusion or limitation of liability for consequential or incidental
damages the preceding limitation may not apply to you. In any event the total
liability of Interlogix shall not exceed the purchase price of the product. The
foregoing limitation will apply to the maximum extent permitted by applicable law,
regardless of whether Interlogix has been advised of the possibility of such
damages and regardless of whether any remedy fails of its essential purpose.
Installation in accordance with these manual, applicable codes, and the
instructions of the authority having jurisdiction is mandatory.
The customer is responsible for testing and determining the suitability of this
product for specific applications. The customer is responsible for testing the
product at least once every three months.
While every precaution has been taken during the preparation of this manual to
ensure the accuracy of its contents, Interlogix assumes no responsibility for
errors or omissions.
Agency compliance
This product conforms to the standards set by Standards Australia on behalf of
the Australian Communications and Media Authority (ACMA). Interlogix
recommend enclosure covers remain fitted to maintain ACMA compliance.
Notice! This is a Class B product. In a domestic environment this product may
cause radio interference in which case the user may be required to take
adequate measures.


Product overview
About this manual
This manual is intended for use only by trained Challenger installation and
configuration technicians.
The manual introduces the TS1066 Network Access Controller (NAC) and covers
all aspects of programming the NAC.
Related documentation
The TS1066 Network Access Controller Installation Manual provides instructions
on installing the Network Access Controller.
The ChallengerPlus Programming Manual provides detailed information about
Challenger system configuration and programming.
The Challenger system is modular. Refer also to the documentation that is
shipped with each module that you intend to use.
The CTPlus Operators Manual and the CTPlus online help describe the CTPlus
user interface and all available programming options for ChallengerPlus and the
NAC.
Introduction
The TS1066 Network Access Controller is a complete access control solution
which allows you to manage not only your door and lift access requirements but
also supports intrusion applications.
The flexible connection options mean you can connect the NAC directly to your
management software without the need for other panel hardware, or you can
connect to the ChallengerPlus panel for an easy upgrade on your existing site.
Powerful processing and on-board storage means the NAC suits a range of
applications from small standalone systems, to distributed systems covering
hundreds of thousands of users.
Features
The Network Access Controller has the following features:
Compatible with ChallengerPlus panels
Direct Ethernet and USB connections to supported management software
via up to ten communications paths
Supports up to eight doors (depending on operating mode)
Large memory capacity (depending on operating mode):
250,000 users
10,000 door groups

50,000 access history events
2,000 time zones (‘hard’ time zones)
8 sub-time zones per time zone
100 holidays
Up to 128 bit card data
Two local RS-485 buses supporting the following protocols:
Tecom
OSDP v2
SALLIS by SALTO Systems
Aperio
Remote flash firmware upgradeable
Configurable end-of-line (EOL) resistor values
Up to 100 door schedules can be programmed to lock or unlock doors at
set times
Supports operator-defined door overrides for use from management
software
Each person can have a 4 to 10 digit PIN
Map up to 32 inputs and 16 relays for use with a ChallengerPlus panel
A variety of lock types reduces the need for complex lock programming
Easy configuration of interlocking doors on the same NAC
Battery management using intelligent charging process.
Flexibility in device locations for devices (inputs/relays/readers) attached
to the NAC
Two sets of plug-in connectors (providing communications and lock
power), which require no wiring, for ease of connection to additional
boards
Each door can have up to six readers in any combination of IN or OUT
readers
Doors can be programmed to lock out a certain percentage of the times
that a valid card or PIN is presented to a reader
Supports mapping of ChallengerPlus areas to door reader LEDs (in
supported modes)
Detailed door diagnostics from the NAC can be requested from
management software
Up to 48 macros can be programmed
Note: Configuration via keypad is not available for the Network Access
Controller. Configuration must be done via software (CTPlus).

Note: For access restrictions to the interior of the enclosure, refer to APPENDIX
B: Enclosure Access Restrictions.
The major features are described in the following sections.
Operating modes
The Network Access Controller can operate in three different ways depending on
your current system and access requirements:
IP Direct mode –in this mode, management software has a direct IP
connection to the NAC, without needing a Challenger panel. The NAC
provides access control functionality but does not provide alarm control
functionality.
IP Extended mode –in this mode, management software has a direct IP
connection to the NAC. In addition to access control, the NAC provides
alarm control and reporting functionality in conjunction with a
ChallengerPlus panel.
Classic mode –this mode is for direct upgrade of a V8 Four-Door
Controller with minimal programming changes. In addition to access
control, the NAC provides alarm control and reporting functionality in
conjunction with a ChallengerPlus panel.
The limits for users and other entities vary according to the operating mode, as
shown in Table 1 below.
Table 1: NAC limits per mode
IP Direct
IP Extended
Classic
Doors
8
8
8
Users
250,000
250,000
65,535 (2000)
Door groups
10,000
10,000
255
Time zones
2,000
2,000
64
Sub time zones
8
8
8
Holidays
100
100
24
Holiday types
8
8
8
Card bit length
128
48
48
History event buffer
50,000
50,000
50,000
The modes are described in more detail in the following sections.

IP Direct mode
IP Direct mode allows software to communicate with the NAC directly via IP
rather than through a Challenger panel. The IP connection allows for high-speed
download of users and other configuration data to the NAC. The NAC provides
access control functionality but does not provide alarm control functionality. In
this mode, a Challenger panel is optional.
Figure 1: IP Direct mode
In this mode, management software downloads users, door groups, etc. directly
to the NAC, allowing the NAC to utilise its maximum capacities, as shown in
Table 1 on page 7.
History events, alarms, and NAC status are reported via IP to management
software.
Note: The NAC will still be fully functional if it is disconnected from management
software.

IP Extended mode
IP Extended mode allows software to communicate with the NAC directly via IP
rather than through a ChallengerPlus panel (like IP Direct mode), while retaining
the alarm control and reporting functionality of a NAC in Classic mode.
Figure 2: IP Extended mode
In this mode, management software downloads users, door groups, etc. directly
to the NAC, allowing the NAC to utilise its maximum capacities, as shown in
Table 1 on page 7. The NAC retains its own database of users, door groups etc.
from the ChallengerPlus panel.
The number of users that can exercise alarm control from the NAC is limited by
the user capacity of the ChallengerPlus panel (2,000 users or 65,535 users if the
ChallengerPlus panel has a TS1084 Memory Expansion Module). See the “Alarm
control” section on page 15 for more information.
History events are sent directly via IP to management software, while alarms and
NAC status are sent to the ChallengerPlus panel. [what goes where] [eg. Dgp
tamper reports to c10 to be dialled out to monitoring station, but can also report
to management software via IP.]
Note: The NAC will still be fully functional if it is disconnected from management
software.
Note: Inputs will only register alarms in the ChallengerPlus panel if they are
mapped to ChallengerPlus inputs. See the “Input and relay mapping” section on
page 21 for information on ChallengerPlus input mapping.

Classic mode
Classic mode can be used for direct upgrade of a V8 Four-Door Controller with
minimal programming changes. In addition to access control, the NAC provides
alarm control functionality in conjunction with a ChallengerPlus panel.
The NAC is polled as a DGP on one of the ChallengerPlus system LANs.
Figure 3: Classic mode
In this mode, management software downloads configuration (users, door
groups, etc.) to the ChallengerPlus panel. The ChallengerPlus panel distributes
the configuration to the NAC via the RS-485 LAN.
Since the ChallengerPlus is responsible for the distribution of users, door groups
etc. to the NAC, the numbers allowed are limited, as shown in Table 1 on page 7.
History events, alarms, and NAC status are sent from the NAC to the
ChallengerPlus panel.
Note: Inputs will only register alarms in the ChallengerPlus panel if they are
mapped to ChallengerPlus inputs. See the “Input and relay mapping” section on
page 21 for information on ChallengerPlus input mapping.

Multiple modes
Warning: It is possible to configure a NAC to operate in one mode and still
connect to it via one of the other modes. Programming commands will always be
accepted and processed by the NAC. This may cause conflicted or incorrect
programming in the NAC.
For example, it is possible to connect a NAC in IP Direct mode to a
ChallengerPlus panel and attempt to program it in IP Extended or Classic mode.
Programming commands issued via the LAN will be accepted and processed by
the NAC.
Doors
The Network Access Controller supports up to eight doors in all modes.
If the NAC is connected to a ChallengerPlus panel (i.e. in IP Extended or Classic
mode), then the NAC can support up to eight doors. The doors are numbered
from 17 to 64 or from 81 to 128, depending on which ChallengerPlus system LAN
the NAC is connected to.
NACs may use the first 12 addresses on each ChallengerPlus system LAN.
Table 2 below lists the LAN number, the address of the NAC (set via the NAC’s
DIP switches), the DGP number that the NAC is polled as, the ranges of door
numbers for 4 Doors and 8 Doors Modes.
If 8 Doors Mode is selected, no door-type DGPs (E.g. NAC, DWI, 4DC, 4LC) can
be polled in the next DGP address. (E.g. NAC with 8 doors mode addressed as
DGP 1, next NAC can only be addressed from DGP 3 onwards)
Standard type DGPs such as TS1020, TS0820, TS1025 and 4 inputs DGP can
still be polled in the next DGP address if NAC is configured with 8 Doors Mode.
Table 2: Door numbers per DGP address
ChallengerPlus
LAN
Address
Polled as
4 Doors
Mode
8 Doors
Mode
LAN 1
1
DGP 1
17 to 20
17-24
LAN 1
2
DGP 2
21 to 24
21-28
LAN 1
3
DGP 3
25 to 28
25-32
LAN 1
4
DGP 4
29 to 32
29-36
LAN 1
5
DGP 5
33 to 36
33-40
LAN 1
6
DGP 6
37 to 40
37-44
LAN 1
7
DGP 7
41 to 44
41-48
LAN 1
8
DGP 8
45 to 48
45-52
LAN 1
9
DGP 9
49 to 52
49-56
LAN 1
10
DGP 10
53 to 56
53-60
LAN 1
11
DGP 11
57 to 60
57-64
LAN 1
12
DGP 12
61 to 64
-

ChallengerPlus
LAN
Address
Polled as
4 Doors
Mode
8 Doors
Mode
LAN 2
1
DGP 17
81 to 84
81-88
LAN 2
2
DGP 18
85 to 88
85-92
LAN 2
3
DGP 19
89 to 92
89-96
LAN 2
4
DGP 20
93 to 96
93-100
LAN 2
5
DGP 21
97 to 100
97-104
LAN 2
6
DGP 22
101 to 104
101-108
LAN 2
7
DGP 23
105 to 108
105-112
LAN 2
8
DGP 24
109 to 112
109-116
LAN 2
9
DGP 25
113 to 116
113-120
LAN 2
10
DGP 26
117 to 120
117-124
LAN 2
11
DGP 27
121 to 124
121-128
LAN 2
12
DGP 28
125 to 128
-
When an operator connects CTPlus to a NAC, doors are automatically created:
eight doors if the NAC is in IP Direct mode, eight doors if the NAC is in IP
Extended or Classic mode with 8 Door Mode or four doors if the NAC is in IP
Extended or Classic mode with 4 Door Mode.
Each door controlled by the NAC can have two door inputs, an egress input, two
lock relays, a DOTL (Door Open Too Long) relay, a forced door relay, a warning
relay, and six assigned readers in any combination of IN and OUT readers.
Each door has various options for access, shunting, egress, and anti-passback.
There are also options for alarm control if the NAC is connected to a
ChallengerPlus panel.
Doors are programmed on the Doors/Lifts form in CTPlus. See the
“Programming doors” section on page 59.
Lock types
To support more complex door operation than the V8 Four-Door Controller, the
Network Access Controller introduces new lock types, with associated inputs,
relays and timers.
The new lock types are:
Strike
Maglock
There are two inputs for each door, and two lock relays for each door:
Door input 1 –Connected to the door to indicate if the door is open or
closed. This is usually the reed switch.
Door input 2 –Connected to the lock monitor on Strike and Maglock
locks.

Lock relay 1 –Unlocks the door.
Lock relay 2 –Reserved for future use.
The door’s lock type, and inputs and relays are programmed in CTPlus on the
Hardware tab for the door. See the “Programming hardware options” section on
page 61 for instructions.
The following timers can be defined:
Pre-Lock time –Once the door open input (Door input 1) has been
sealed, the NAC waits for the pre-lock time to expire before locking the
door. If the door open input unseals during the pre-lock time, the door is
deemed open and the pre-lock timer is cancelled. The shunt continues
during the pre-lock time.
Post-lock time –The post-lock time allows time for a lock to fully engage.
After the post-lock time has expired, the door is deemed secure, and the
shunt is cancelled. If the door open input unseals during the post-lock
time, the door is deemed open and the post-lock timer is cancelled. The
shunt continues during the post-lock time.
Note: There are also two roller door specific timers that are reserved for future
use.
The timers are programmed in CTPlus on the Access tab for the door. See the
“Programming access options” section on page 66 for instructions.
Example door operation scenarios
Simple door unlock with no inputs
At the start of the access time, the door is unlocked (via Lock relay 1) and is
locked at the end of the access time. There are no inputs assigned. At the end of
the access time, the door is deemed to be closed and secure.
There is no shunting, forced door or DOTL support.
Door unlock with one input for open door
At the start of the access time, the door is unlocked (via Lock relay 1). If the
door is opened within the access time (i.e., Door input 1 is unsealed), then the
shunt timer starts. When the door is subsequently closed, the pre-lock timer
starts. After the pre-lock time, the door is deemed closed. At that time, maglocks
can be locked. After the post-lock time, the shunt is cancelled, and the door is
deemed secure.
If the shunt timer expires while the door is open, or expires during the pre-lock or
post-lock time, then a normal alarm or DOTL occurs.
Interlocking doors
Interlocking is a method that stops two or more doors from being opened at the
same time. Interlocking may be used in a vault, for example.

When programming a door on the NAC, there are two ways to specify an
interlock door: either another door on the same NAC, or a door on a separate
controller.
The NAC has simplified configuration of interlocking doors on the same
controller.
Interlock door on same controller
When programming the door, navigate to the door’s Hardware tab and tick the
required interlock doors in the Interlock doors field.
When an attempt to open/unlock the programmed door occurs (either from user
action or from management software), the NAC will check all other locally linked
doors to ensure that no other door is unsecure, before allowing the door to open.
When internal interlocking option is enabled on NAC, a special interlocking timer
(300ms if only internal interlocking is enabled) is started when a user credential is
presented. Any repeated attempt to gain access by providing a user credential
while the timer is running and the remaining time is greater than 100ms will
cause Access Denied Void and 7 error beeps. If access is granted and the door
becomes in access, this waiting time is bypassed and all the consequent
credential requests are processed without that delay.
A proposed sequence of user action on the interlocked doors is below:
- Present a credential (hear a single beep if it's a card or press enter if it's a pin);
- Wait for the NAC to confirm. NAC confirms with either 2 beeps if the credential
has a right to access or 7 beeps in case of a wrong credential. The waiting time
may be less than a second if no external interlocking is enabled or about 3
seconds if external interlocking is enabled;
- Proceed to the next step.
Interlock door on external controller
There are three external input fields provided for the NAC to check for
interlocking on external controllers.
To interlock with a door on an external controller, a contact from the external
door must be wired to a spare input connected to the NAC, and vice versa.
When programming the door on the NAC, navigate to the door’s Hardware tab
and define the locations of the inputs connected to external door contacts in the
External input fields.
When an attempt is made to open/unlock the programmed door (either by user
action or from management software), then the NAC will check the state of these
external inputs. If any of the external inputs is unsealed, access will be denied
immediately.
If all external inputs are sealed, the NAC will activate the “Door unlocked” event.
A macro should be created which takes the “Door unlocked” event and activates
a relay linked to the other controller(s).

When external interlocking option is enabled on NAC, a special interlocking timer
(3sec if only external interlocking is enabled) is started when a user credential is
presented. Any repeated attempt to gain access by providing a user credential
while the timer is running and the remaining time is greater than 100ms will
cause Access Denied Void and 7 error beeps. If access is granted and the door
becomes in access, this waiting time is bypassed and all the consequent
credential requests are processed without that delay.
A proposed sequence of user action on the interlocked doors is below:
- Present a credential (hear a single beep if it's a card or press enter if it's a pin);
- Wait for the NAC to confirm. NAC confirms with either 2 beeps if the credential
has a right to access or 7 beeps in case of a wrong credential. The waiting time
may be less than a second if no external interlocking is enabled or about 3
seconds if external interlocking is enabled;
- Proceed to the next step.
Interlocking is programmed on the Hardware tab of the Doors/Lifts form. See
the “Interlock options” section on page 63.
Alarm control
Note: Alarm control does not apply to the NAC in IP Direct mode.
The Network Access Controller can perform alarm control functions, such as
arming areas, if it is connected to a ChallengerPlus panel. Alarm control for each
NAC door is determined through alarm control levels, which are analogous to
alarm groups in Challenger.
Each alarm control level can be assigned a time zone:
In IP Extended mode, a NAC time zone can be assigned to an alarm
control level
In Classic mode, a ChallengerPlus time zone (either a “hard” panel time
zone or a soft time zone) can be assigned to an alarm control level
Each alarm control level can be allocated a list of up to ten areas for arming,
disarming, timed disarming, and resetting alarms. Other alarm control attributes
such as the ability to reset system alarms can be programmed for each alarm
control level.
A NAC door can have up to six alarm control levels, which are then assigned to a
door side (either IN or OUT) in any combination. Up to six alarm control levels
can be assigned to a door side.
If a user initiates some alarm control functionality at a reader (e.g. they badge
their card three times to arm areas), the NAC checks the alarm control levels for
the door that apply to the reader (depending on whether the reader is an IN or
OUT reader).
If any of the assigned alarm controls levels has a time zone that is valid, then the
user’s credential information is sent to the ChallengerPlus panel, along with

information about any applicable alarm control levels. The ChallengerPlus panel
checks the user’s credentials in its user database and checks the corresponding
ChallengerPlus user’s alarm group.
If the corresponding ChallengerPlus user’s alarm group and the reader’s alarm
control level allow an alarm function, then the alarm function proceeds.
Note: In IP Extended mode, the number of users that can exercise alarm control
from the NAC is limited by the user capacity of the ChallengerPlus panel (2,000
users or 65,535 users if the ChallengerPlus panel has a TS1084 Memory
Expansion Module).
Alarm control levels are set up in CTPlus on the Alarm control levels tab for the
door. Alarm control levels must also be assigned to the door’s readers, which can
be done on the Alarm tab for the door. The alarm control functionality is
programmed in CTPlus on the Alarm tab for the door. See the “Programming
alarm control options” section on page 77 for instructions.
Bus formats
There are two RS-485 buses on the Network Access Controller. Each bus can
have up to 16 RAS devices. Each bus can support readers other than Tecom
readers.
Each bus supports the following protocols:
Tecom
OSDP (Open Supervised Device Protocol) version 2
SALLIS by SALTO Systems
Aperio
Each bus can use one protocol at a time, but the two buses can use different
protocols.
The bus format for each bus is defined on the NAC options tab of the DGPs form
for the NAC. See the “Bus options” section on page 45. If the bus format is
OSDP, then the baud rate of the bus can be configured, and encryption can be
enabled by entering the OSDP encryption key. OSDP encryption uses the AES
128-bit encryption algorithm.
When assigning a RAS to the NAC via the Assigned RAS tab of the DGPs form,
specify the bus format that the reader will use (which depends on the RAS’s
number). See the “Assigning RASs” section on page 47.
Note: The two 4-pin RS-485 cable sockets provide data and power from Bus 1.
For more information about the cable sockets, see the TS1066 Network Access
Controller Installation Manual.
Non-Tecom devices must meet certain requirements to work with the NAC, as
described in the following sections.

OSDP
The Network Access Controller supports OSDP version 2.
Note: OSDP has a fixed baud rate of 9600 baud.
OSDP reader addresses
If the OSDP reader has DIP switches, refer to the manual for the reader to
configure the reader’s address using the DIP switches. If the reader does not
have DIP switches, then the reader’s address must be configured using a
configuration card. Assign the reader the desired address by badging the
appropriate configuration card at the reader.
OSDP encryption
Without an encryption key configured for the NAC bus, the NAC communicates
with the OSDP devices using a default encryption key as specified in the OSDP
standard. To use a non-default encryption key with OSDP readers, set the 128-
bit AES encryption key for the bus in CTPlus. See the “Bus encryption key”
section on page 46. The encryption key will be set on each OSDP reader
attached to the bus once the encryption key is defined.
Once set, the encryption key on an OSDP reader cannot be changed by
changing the encryption key for the bus. To reset the encryption key used by an
OSDP reader, the reader must be changed to Install Mode.
HID ordering codes
Configuration cards may be required to configure OSDP readers. The ordering
codes for HID configuration cards for HID OSDP version 2 readers are shown in
Table 3 below.
Table 3: HID configuration card ordering codes
Address
Ordering code
0
SEC9X-CRD-B-00
1
SEC9X-CRD-B-01
2
SEC9X-CRD-B-02
3
SEC9X-CRD-B-03
4
SEC9X-CRD-B-04
5
SEC9X-CRD-B-05
6
SEC9X-CRD-B-06
7
SEC9X-CRD-B-07
8
SEC9X-CRD-B-08
9
SEC9X-CRD-B-09
10
SEC9X-CRD-B-10
11
SEC9X-CRD-B-11

Address
Ordering code
12
SEC9X-CRD-B-12
13
SEC9X-CRD-B-13
14
SEC9X-CRD-B-14
15
SEC9X-CRD-B-15
Aperio
The Aperio protocol is for future use.
Note: Aperio has a fixed baud rate of 19200 baud.
SALLIS
The SALLIS protocol is for future use.
Note: SALLIS has a fixed baud rate of 38400 baud.
Flexible device locations
With the Network Access Controller, there is flexibility in how devices such as
inputs, relays and readers can be physically wired up to the NAC and how they
are addressed.
Devices can be connected directly to the NAC or can be connected to DGPs or
RASs on one of the NAC’s buses. Thus, when programming the NAC, devices
are not addressed by their number alone, but must be defined according to how
they have been physically wired up to the NAC.
When specifying a device attached to the NAC in CTPlus, the operator must
enter information in location fields that look like the following:
The fields are defined as follows:
1. Location –select the device’s location from the following options:
Onboard –The device is connected directly to the NAC’s onboard
terminals (or a relay on an attached relay controller). Enter the device’s
number in the Device number field.
DGP –The device is connected to a DGP that is connected to one of
the NAC’s buses. Enter the address of the DGP in the Address field,
and the device’s number on the DGP in the Device number field. The
DGP must be assigned to the NAC and polled on the bus.
RAS –The device is a RAS, or is an input or relay connected to a
RAS, which is connected to one of the NAC’s buses. Enter the address
Other manuals for TS1066
1
Table of contents
Other TECOM IP Access Controllers manuals