Technical Manual THOR ACCESS CONTROL TECHNICAL MANUAL October 1, 1995 18-006/081-04 GB...
Page 2
Information in this document is subject to change without notice and does not represent a commitment on the part of Hi Sec International. No part of this manual may be reproduced or transmitted in any form for any purpose without the written permission of Hi Sec International.
1.2 System description ..........................16 1.2.1 Stand-Alone System ......................... 16 1.2.2 Multi-reader Systems ....................... 18 1.2.3 THOR Integration of Access and Intrusion ................19 1.2.4 External Card readers ......................20 1.2.5 THOR card reader description ....................20 1.3 S-ART's ..............................22 1.3.1 Block diagram.
Page 4
THOR Access Control 1.7 Card formats............................39 1.7.1 Non-encrypted Magstripe card data formats ................ 40 1.7.1.1 Non-encrypted Hi Sec card data format..............40 1.7.1.2 Standard Magstripe Card format................41 1.7.2 Wiegand Card formats......................42 1.7.2.1 Hi Sec Wiegand Card format..................42 1.7.2.2 Standard Wiegand Card format.
Page 5
Technical Manual 2.6 Cotag Proximity / Hands-free reader heads..................83 2.6.1 System description........................83 2.6.2 Antennas............................ 85 2.6.2.1 Measurements and fixing of standard antennas............ 85 2.6.2.2 Personnel loops......................86 2.6.3 Single zone controller......................87 2.6.3.1 Measurements and fixing .
Page 6
4.2.8 Block/unblock reader without alarm system integration ..........150 4.2.9 Open door by using code only..................... 150 4.3 Set/unsetting a non-THOR alarm system from the THOR reader..........152 4.4 Set/unsetting the THOR Integrated System from the THOR Reader..........154 4.4.1 Set/unsetting from the Indoor Reader 95T AC/M/W/P or 90T RKP AC/M/W.
Page 7
Technical Manual 4.6 Submenu 1 - Edit Message ......................... 162 Menu 10. Edit Message ........................162 4.7 Submenu 2 - Guest card programming .................... 163 Menu 21. Release Card ........................163 Menu 22. Block Card ........................163 Menu 23. Create Credit card......................163 Menu 24: Delete Credit card: ......................
Page 8
THOR Access Control 4.14 Submenu 9 - System Test ........................ 185 Menu 92. Lamp Test ........................185 Menu 93. S-ART Input Test ......................185 Menu 94. S-ART Output Test ......................186 Menu 95. Memory Test ........................186 Menu 96. Battery test ........................186 Menu 97.
1.1 General description. THOR is an access control system which can be used as a stand alone system, multi-reader system or as an integrated part of a THOR intruder alarm system. The THOR "intelligent" card reader is the basic unit in all these system configurations.
Page 12
90T RKP ACW Controller/terminal with built-in Wiegand card reader (only as spare part) (not available in Denmark, Norway and Sweden). 95T W Wiegand card (40 bit Hi Sec format). 95T ERC Controller/terminal for external magstripe/wiegand/Bar code/proximity reader head (new design)
Page 13
Technical Manual Type Description 90T CWB Cold weather board to heat-up the 90T RKP reader / terminals. 90T CRP Rain cover protection. Can only be used together with the 90T RKP reader / terminal types. 90T PS 24V 3A ( 2A available) power supply in a metallic cabinet with space for 2 x 12V/24Ah batteries, 3 S_ART's and a printer interface.
Page 14
THOR Access Control Type Description 90T CHA Hands-free Antenna (app. 70 cm.) (Cotag) (only as spare part) 90T CLC Loop Coupler (Cotag) (only as spare part) 90T CT Cotag active card. 90T HPMin Proximity Antenna and Controller (app. 10 cm.) (Hughes) (only as...
Page 15
Bar code reader (infrared) (only as spare part) All detailed information about the THOR Intrusion System can be found in the manual "THOR INTRUSION TECHNICAL MANUAL". Only a short description of the functions for the Card reader operation together with THOR Intrusion system is described in this manual.
S-ART's which can f.ex. be programmed to interface to an already installed "non-THOR" alarm system. In the above example the THOR reader will indicate in the display the Set/unset status and Alarm status from the alarm system and give a sabotage signal to the alarm system. This can be done by using two 90T - S102 S-ART's.
Page 17
An external 24V or 12V power supply can be used or the standard THOR power supply. Also a separate printer interface can be installed directly to the reader on the RS-485 bus. The reader does in this case not work in stand-alone mode anymore.
Maximum 30 sub-level busses can be installed and only in one level. The total number of readers is 900. If a printer is needed, the printer interface can either be installed in the THOR power supply 90T - PS or as a separate unit connected on the RS-485 bus.
When the access reader is integrated in a THOR intruder system it is connected via the RS485 multimaster bus to the THOR central unit and the reader can in this configuration also work as a normal THOR Intruder remote keypad.
If the reader is integrated in a THOR alarm system or a Multi-reader system and the communication between the THOR Intrusion CPU and the reader is interrupted, the card reader will continue to take decisions and store events concerning the access. The database is described in details in the following sections.
Page 21
The keypad has 6 special function keys and 10 numeric keys. 4 (5) LED's are used to indicate system status. The card reader can at the same time be used as a remote keypad and a programmer for the THOR intruder system.
THOR Access Control 1.3 S-ART's. The S-ART (Serial Addressable Receiver Transmitter) is a full custom integrated circuit, developed for transmission of data on a 2-wire cable and intended to be used to identify each individual detector in alarm or access control systems.
Technical Manual From the above it is seen that the addresses 00, 01 and 02 will always give the quickest possible overall reaction time and it is therefore recommended to use these addresses for exit push buttons and electric striking plates. The scanning signals on the bus are explained in details in the next section.
Page 24
THOR Access Control When the S-ART's are connected on a cable the signal shape changes a little depending on the cable length. On the following two figures is shown a typically S-ART signal on a 200 m cable and 500 - 700 m cable (6/10 unshielded type).
The input- and output functions are specified by attributing a specific softtype for each and for the outputs also an activation type. The terms "softtypes" and "activation types" are universal for THOR intrusion and THOR access control systems meaning f. ex. that a specific softtype number for the same function is the same in both systems (ex.
Page 26
THOR Access Control 33 - Set/unset status Set/unset status from an alarm unit in cases where the alarm panel is placed outside the secured area. If the alarm unit is set, the access unit is blocked and a text line appears in the display. Cannot be used in ERC-mode option bit 6 (external reader heads).
Page 27
Active when a hold-up PIN-code has been used. Involves activation of output softtype 07 and is reset on time-out or upon a subsequent card entry. Is sent as an external THOR hold-up message and as an alarm log message. October 1, 1995...
THOR Access Control 80 - Door release door 1 Active after accepted door release either by card or by the use of the exit push-button. Involves activation of output softtype 83. Is reset when the door opens or time-out. Is not sent externally.
Technical Manual 1.5 Outputs. 1.5.1 Output types. Outputs: The softtype indicates which input-actions will activate the output. The activation type indicates the polarity of the output and possible time delay and time duration. 1.5.2 Output soft type description. The output softtypes are divided into standard and special softtypes. Standard output softtypes: 02 - Sabotage Local indication of sabotage alarm.
Page 30
76 - Set/unset control pulsed Is used for setting/unsetting of other alarm systems (not THOR). Gives a 5 sec. pulse when pressing the set or unset push button as described in the Operating Procedures. Only activating type 7 and 8 can be used together with this softtype.
Page 31
Technical Manual 99 - THEN output As 95 - 98 but will also send alarm message to THOR intrusion. This soft type has to be used if an alarm message must be send to the THOR intrusion system, f.ex. Door Forced. In THOR Intrusion it is received as address 30 + the reader address and can in the Intrusion be defined freely as an input soft type from the Intrusion list.
"i2" OR a combination of at least one input with softtype "i3" AND at least one input with softtype "i4", is activated. The THOR Card Reader makes it possible to define up to 10 IF/THEN rules (one rule for each of the softtypes 90-99).
An output will always be reset when the softtype is reset (except the IF/THEN output soft types 90-94). The THOR reader is preprogrammed from the factory with the following attributes. These cannot be changed from the reader keyboard, but can only be changed from the AICS Configuration software:...
The Installer number is given to each installer under one distributor and this is administrated by the distributor. If HI SEC is selling directly to an installer, the installer will get an OEM no. and the installer can if he wants divide his "country"...
Inst. no. 2, company 2 end user, master programming cards. Inst. no. 2, company 2 end user, normal user card. As shown in the table the OEM number 0 is reserved for HI SEC. This number is used internally during the production and test, and for field test systems.
If service is allowed by the user the Service card has access to all menus. External reader kit: In case of alarm from the THOR intrusion system, the Service card is accepted on the outdoor reader and will open the door.The service man can then on the inside terminal get direct access to the Intrusion menus by keying in the Intrusion Service or guard code.
- A guest card is always connected to the Personnel group no. 1 with the Time Program valid for this group. - Normal Hi Sec Cards or a standard Credit card can be programmed as a guest card. Max. 50 credit cards can be created in a system at the same time.
Page 38
THOR Access Control The difference in the 4 priorities are specified as follows: Functions: Priority Service Allow. Not Allow. Normal Door Passage Edit message (Menu 10) Guest card programming (Menus 20-22) Display functions (Menus 30-38) Programming of cards (Menus 40-44)
Special Cotag format The Card formats 07 to 12 can only be used in the mentioned projects. Any type of Service and Master cards can be used to initialize the reader as long as they are using the Hi Sec card format.
If the reader is programmed to accept non-encrypted cards (card format 5 and option bit 7), it will also accept the normal Hi Sec encrypted cards. Only the Master cards and Service cards must always be encrypted cards and cannot be made non-encrypted.
Technical Manual It is recommended to use magnetic cards with "high coercivity" (3000 ØE), which gives the card maximum resistance against foreign magnetic fields. Normally, track 2 is used and data are always coded as specified for track 2 with a bit density of 3 bits/mm (75 bits/inch).
In the wiegand format it is not possible to have a distributor (OEM) number. The OEM number is the same for all cards and is a special Hi Sec OEM number. Each installer will be given an Installer number and this number gives the possibility to make maximum 127 different installations.
Page 43
Technical Manual Card format 15 (option bit 7 = 1): Bit position Value Description Start bit (can be omitted) 2 - 16 1 - 32767 Card no. 17 - 24 1 - 255 Company (site) code 0 - 1 Even parity for company code Stop character (cannot be omitted) The table shows the positions for a 26 bit card format.
Max. 64 bits can be read with an off-set from 0 to xx bits. The off-set is counting from the last bit read on the card. You must always initialize the reader using Hi Sec Service and Master cards to set up the correct site code etc.
Page 45
Technical Manual Set-up of the Free Programmable Card format parameters: AIMS.INI file: The following parameters can be set-up in the AIMS.INI file: [Free Card Format] Enable=1 Card Reader No.=0401 Default Format=02xxxxxxxxxxxxxx Field text=Personal no. First Format Position=0 DigitLen=8 Cardno Sort=0 - Enable=1 enables the free card format in the reader and in the AIMS software.
Page 46
THOR Access Control Menu 82 (only 95T reader types): If card format 6 or 14 is selected a new menu will be opened where it is possible to define the Off-set and Length of the digits read on the magstripe / or bits in the Wiegand format.
1.8 Credit card features. Credit cards can be accepted by the THOR reader in two cases, either as a guest card or to open a bank entrance door to cash machines. The applications are decided by the used personnel groups, see below.
Page 48
THOR Access Control LN = Log normal access. If this field is programmed with "1", all use of credit cards will be logged. When a Credit card is accepted, one line is printed in the log (on-line printer) with the last 6 digits of the credit card no.
The THOR access database is divided into 2 different types, a common (global) database for all readers and a local which can be different for each reader. In the local database the Personnel groups information, Week programs no.
The card database includes those data which are specific for the individual card. In the basic version the THOR reader can store information for up to 1000 cards. In the expanded memory version up to 12000 cards can be stored in the card database.
The Lock function or Thor log-in field specifies, if the cardholder at the specific reader has the right to set/unset or programme the alarm system. The programming rights and the definition of zones in relation to the alarm system is programmed in the alarm system, and these information cannot be found in the database of the card reader.
An example is a time limitation monday - friday from 0800 - 1600 hrs. Any attempt to enter outside this time will be rejected, the card is refused and the THOR reader logs the attempt. The time intervals can only be programmed in steps of 10 minutes, and it is not necessary to define all 8 time periods per day.
100 card nos. which can be programmed to used code only is preprogrammed to use the nos. 1000 to 1099. This range can be changed by adding the [THOR AIMS] ): following line in the AIMS.INI file (in the section Cardno Offset=2000 The off-set no.
Option 4: Local/THOR Intrusion printer. Print-outs can be made on a printer connected directly on the THOR Intrusion central unit or on a printer specially dedicated for the access printouts. 0 = Local Access printer and 1 = THOR Intrusion printer.
Page 55
Technical Manual Option 5: The printer can print either by command or in real time printing the events as programmed for the personnel groups. Option 6: When the external reader 90T EMR-S is used together with 95T ERC / 90T RKP ERC this option bit must be 1.
Page 56
THOR Access Control Option 13: Interlocking doors. By the option bit 13 the interlocking functions can be enabled/disabled. When option bit 13 is set to "1" the interlocking functions are enabled as described in chapter 1.12. When option bit 13 is set to "0" the interlocking functions will be disabled, but the One reader - 2 doors function as described below can then be used.
Technical Manual 1.10 Anti Passback. A powerful Anti Passback software is included in the expanded memory version of the reader. The purpose of the anti passback function is to control that all cardholders use their cards to be able to register all door passages. This means that you must go out of a zone before you can enter the same zone again.
Page 58
In this mode the reader will work as a normal ACM-reader except in 3 conditions: ♦ After a setting of an area in the THOR Intrusion system, the reader will activate the door and the text DOOR IS OPEN will be shown in the display (a normal ACM-reader will block the door).
Technical Manual 1.10.2 Door control between two busses. If two readers controlling one door are connected to two different buses a special installation must be made to monitor and control the door as shown below. The two readers must be programmed with the same address on each bus. The function of the softtypes used for the different inputs / outputs are described below.
THOR Access Control 1.11 Elevator Control. N.B. This function can only be programmed from the 90T AICS configuration software ver. 2.01 or the 90T AMS management software. The elevator outputs are used to control to which floor(s) the different personnel groups are allowed to go by an elevator.
Page 61
Technical Manual To each floor is reserved one output softtype number, starting from softtype 40 for 1. floor, 41 for 2. floor etc. until 69 for the 30. floor. Please note that only the first 15 floor outputs can be used today using the S-ART 90T S102.
THOR Access Control 1.12 Interlocking doors / One reader - 2 doors. Interlocking doors: As described in Option bit 13 it is possible to create interlocking doors, where the second door cannot open before the first door is closed or the contrary if you go out. Both doors cannot be opened at the same time. If the other door is blocked then the reader on the first door will indicate DOOR IS BLOCKED and you must read the card again when the door has been closed to open the first door.
Page 63
Technical Manual One reader - 2 doors: If the reader option bit 13 is set to "0" (no interlocking function) then the input / output softtypes for Door 2 can be used as indicated in the small example below. In this example the reader is used to control two doors, which are place on each side of the reader and both close to the reader.
Page 64
THOR Access Control Please note the following limits in the use of this feature: The event log is not always 100 % correct. If two cards with access to both doors are read in the reader at the same time, the reader cannot verify which card is entering which door. There are other cases where the log can be wrong too.
Technical Manual 1.13 Event Logs. The THOR access control system can log all events, for example: Passage through door, alarms and use of the system. The log will show event name and type, time of event and card number. 2 types of logs are available: ♦...
For each event time and date will be shown. If the reader is integrated with a THOR intrusion system, the 3 first alarm types will be transmitted directly to the THOR alarm system as "Hold-up alarm" and "RKP sabotage". Furthermore it is possible to have one or more of the alarm types transmitted as "Reader alarm"...
Technical Manual 2.1 95T ACM/ACW/ACP built-in Magstripe/Wiegand/Proximity Card reader. 2.1.1 Mechanical measurements and lay-out. The unit can be opened by loosening the l/n screw at the top of the cabinet. The screw must be loosened app. 1 cm out and after that the front cover can be moved up and away from the back plate. A flat cable connects the keypad with the CPU-board and this flat cable must be taken out of the socket.
Page 70
THOR Access Control Jumper settings: "End of Line" resistor for the RS485 bus. When the jumper J1 is installed a 220 ohm resistor is connected in parallel with the two Bus terminals. All reader types include heating elements on the p.c. board. When jumper J2 is installed, the...
Page 71
Technical Manual Temperature range without heating on ..................-5 C to +60 with heating on ................-15 C to +60 C / 12V DC C to +60 C / 24V DC Heating element switch temperature ......................5 to 10 Operating humidity ....................... 0 - 96% non-condensing IP - class ..............................
THOR Access Control 2.2 95T ERC Terminal for External Wiegand/Magstripe/Proximity reader heads. The 95T ERC terminal is the 95T reader delivered without reading head. The hardware and software are the same and the 95T ERC can be updated to a 95T reader just by adding the corresponding reading head type.
Technical Manual 2.3 90T RKP ACM/ACW Indoor Magstripe/Wiegand Card reader. 2.3.1 Mechanical measurements and lay-out. The units are opened by loosening the two l/n screws in the bottom of the cabinet. The screws must be loosened app. 1 cm out and after that the front cover can be taken away from the back plate. A flat cable connects the cable interface board with the CPU-board and this flat cable is taken out of the socket.
Card reader. The addresses are set binary from 00 to 31. In systems with THOR intrusion integration address 00 cannot be used by a Card reader. In a multi-reader system without integration one of the readers must be programmed as address 00, as this address automatic will work as the master for the multi-master protocol.
Card reader. The addresses are set binary from 00 to 31. In systems with THOR intrusion integration address 00 cannot be used by a Card reader. In a multi-reader system without integration one of the readers must be programmed as address 00, as this address automatically will work as the master for the multi-master protocol.
Technical Manual 2.5 Wiegand / Magnetic / Bar code reader heads, mechanical lay-out and connections Magstripe reader head 90T EMR-S: The magstripe reader head can be fixed on the wall by the two holes in the reader as shown below. Interconnection between terminal and magstripe reader head: The terminal (90T RKP ERC) and the reader head are each delivered with 2.5 m of shielded cable.
Page 78
THOR Access Control Important!! The screen from the two cables must be connected together in the junction box when using the 90T RKP ERC. When the junction box is opened the small tap in the cover must be cut and the tamper contact must be removed.
Page 79
Technical Manual Wiegand reader head 90T EWR-S: Before fixing the Wiegand reader on the wall the front cover must be removed by loosening the 2 screws on the front (see below drawing). After that 3 fixing holes can be used for fixing the reader on the wall. After the reader head has been fixed on the wall, the small cover plate can be placed on the reader head by removing the protection paper from the double-sided scotch.
Page 80
THOR Access Control In the table below is shown the connections between the external wiegand reader 90T EWR-S and the controller 95T ERC or 90T RKP ERC (using the junction box 90T JB). Function Cable from reader Terminal no. in...
Page 81
Technical Manual Barcode reader head 95T EIR: The bar code reader head can be fixed on the wall by the two holes in the reader as shown below. Interconnection between terminal and Bar code reader head: Function Cable from reader Terminal no.
Page 82
THOR Access Control Cable Length: ................Max. 10 m shielded, twisted pairs using 5V from the terminal 95T ERC. Max. 50 m shielded, twisted pairs using an external 5V power supply. Temperature range ..............-30 C - +70 90T RKP / 95T ERC Terminal hardware interface ..
2.6 Cotag Proximity / Hands-free reader heads. 2.6.1 System description. The THOR Access Control software is compatible with a range of hands-free/proximity Cotag antennas. The below diagram shows a single door configuration and an Anti Passback door configuration with in/out readers on the same door.
Page 84
Operating temperature: ....................... -20 C to +50 The cards are programmed in the Hi Sec format as described in the Technical manuals. A Service card and a Master card must be used as when using the other card technologies.
Technical Manual 2.6.2 Antennas. 2.6.2.1 Measurements and fixing of standard antennas. Proximity antenna: Electrical characteristics: Size: ........................80x40x13 mm Weight: ........................45 g Operating temperature: .................... -40 C to +70 C (IP 55) LED indicators: ..
90T CLC Loop Coupler. In some cases it is also necessary to use a High Performance Adapter together with the loop coupler depending on the antenna form, noise sources etc. If personnel loops are wanted because of longer reading distance needed, contact must be made to Hi Sec International for further documentation.
Tag. The Single Zone Controller monitors the Antenna and reads the code contained in the Tag. If it is a valid Hi Sec code the Single Zone Controller sends the code to the 90T RKP ERC terminal. The terminal will then from its database decide if the door can be opened or not.
Page 88
THOR Access Control The controllers are configured from the factory with the set-up to be used by the THOR system meaning that no jumpers, switches or potentiometers should be changed. The switch positions can be verified with the above figure. Only the potentiometer RV1 can be adjusted to reduce the antenna range if needed. The potentiometer is default set for maximum range.
Technical Manual 2.6.3.2 Connections. Connection diagram Single-zone controller / Proximity antenna: Please note that the control of the antenna LED's is made by the two external 470 Ohm / ½W resistors. Wire no. 1 in the flat-cable coming from the 90T RKP ERC is the wire marked with blue or red. The connections can be made in the 90 JB junction box.
Tags. It drives two Reading Heads (antennas) which detect the presence of a Card. The controller monitors both reading heads, polling them alternately. If it is a valid Hi Sec format the controller sends out the data to the corresponding 90T RKP ERC. The terminal will then from its database decide if the door can be opened or not.
Page 91
Technical Manual The controllers are configured from the factory with the set-up to be used by the THOR system meaning that no jumpers, switches or potentiometers should be changed. Only the potentiometers RV3 and RV4 can be adjusted to reduce the antenna range if needed. The potentiometers are default set for maximum range.
THOR Access Control 2.6.4.2 Connections. Connection diagram Double-zone controller / Hands-free and Proximity antenna: October 1, 1995 18-006/081-04 GB...
Page 93
Technical Manual In the above connection diagram is shown an example with two 90T RKP ERC terminals, one 90T CDC double- zone controller and one of each type of antenna. The same type of antenna for both antenna inputs can of course also be used.
2.6.5 Loop coupler. The loop coupler must be used in installations where the standard antenna ranges are not sufficient. Special designed aerials can then be made. Please contact Hi Sec International for further documentation and advises in these cases. 2.6.5.1 System characteristics.
Specially two test instruments can be recommended to use, if the Cotag antennas are installed in difficult situations etc. Please contact Hi Sec International for further details if wanted. 2.6.6.1 Installation Alignment Meter. The installation alignment meter is a portable, battery powered instrument developed for site survey and the installation and alignment of Cotag equipment.
THOR Access Control 2.7 Hughes Proximity / Hands-free reader heads. 2.7.1 System description. Hughes proximity and hands-free antennas exist in 3 different versions depending on the application and reading distances. In this manual are described the 90T HPMin (proximity antenna 10 cm), 90T HPP (proximity antenna 14 cm) and the 90T HPMax (hands-free antenna 46 cm).
Technical Manual 2.7.2 90T HPMin antenna. Technical Specifications: Dimensions: 152 x 43 x 19 mm Operating temperature: C to +65 Power supply: 5 VDC, < 100 mA Reading distance: Up to 10 cm depending on mounting and transponder type Material: Black, high-impact ABS plastic housing, two- component polyurethane...
THOR Access Control 2.7.3 90T HPP antenna. Technical Specifications: Dimensions: 127 x 127 x 25 mm Operating temperature: C to +65 Power supply: 10-28.5 VDC, < 100 mA Reading distance: Up to 14 cm depending on mounting and transponder type...
Technical Manual 2.7.4 90T HPMax antenna. Technical Specifications: Dimensions: 305 x 305 x 25.4 mm Operating temperature: C to +65 Power supply: 24 - 28 VDC, < 1.5A Reading distance: Up to 46 cm depending on mounting and transponder type Material: Black, high-impact ABS plastic housing, two-...
THOR Access Control 2.8 Deister Proximity / Hands-free reader heads. 2.8.1 System description. Deister proximity and hands-free antennas exist in different versions depending on the application and reading distances. In this manual are described the 95T ACP (built-in proximity), 95T PRX5 (proximity antenna) and the 95T PRX15 (hands-free antenna).
Technical Manual 2.8.3 95T PRX 5 proximity antenna. Please note that the back frame is not included in the 95T PRX5. Technical Specifications: Dimensions: 80 x 80 x 16 mm Operating temperature: C to +70 Power supply: 8 - 14 VDC, < 100 mA or 5 VDC +/- 10% Frequency: 125kHz...
THOR Access Control 2.8.4 95T PRX 15 Hands-free antenna. Technical Specifications: Dimensions: 300 x 300 x 25 mm Operating temperature: Standard C to +60 Power supply: 24 VDC +/- 25 %, < 500 mA Max. ripple Frequency: 125kHz Reading distance:...
Page 103
Technical Manual Connections: Function 95T PRX15 antenna Terminal no. in Flat-cable from terminal Terminal no. 95T ERC 90T RKP ERC 12-28 Volt Ext. P.S. Ext. P.S: Data 2 ( D0 ) Clock 3 ( D1 ) 0 Volt 4 ( 0V ) Green LED 6 ( LED2 ) Red LED...
THOR Access Control 2.9 General Purpose Interface 95T GPI COM. The General Purpose Interface 95T GPI COM can be used for the 4 following different applications depending on the SW1 switch setting: Printer interface PC interface Modem/X28 interface SECOM alarm transmitter interface 2.9.1 Mechanical lay-out.
(SW1/6 and 7 both OFF). When the power is put back the interface will start up in the mode (intrusion or access) last selected when changing the switch with power on. Please refer to the "THOR Intrusion Technical Manual" for the possibilities of the printer interface in Integrated systems.
Page 106
THOR Access Control Serial Printer connection: A standard 80 columns serial printer can be used. For a serial printer terminal block P2 is used with the following terminals: Terminal block P2 Signal function Standard 25 pin printer connector No. 1...
Technical Manual 2.9.4 PC Interface application. Switch position: Switch position for PC interface application: SW1/6 = ON, SW1/7 = ON. Connections: October 1, 1995 18-006/081-04 GB...
THOR Access Control 2.9.5 Modem/X28 Interface application. Switch position: Switch position for modem/x28 application: SW1/6 = ON, SW1/7 = OFF. The modem interface can be used in two different ways: Hayes modem or X28 Pad interface. Default the interface will be a Hayes modem interface. To change this the SW1/6 must be changed with DC connected as follows: SW1/6 OFF -->...
Technical Manual 2.9.6 SECOM transmitter interface application. Switch position: Switch position for SECOM transmitter application: SW1/6 = OFF, SW1/7 = ON. For further information concerning the SECOM transmitter please refer to the French version of this manual. October 1, 1995 18-006/081-04 GB...
THOR Access Control 2.10 95T GPI BR Bridge. The 95T GPI BR Bridge interface is used to connect two RS485 buses together ( see system diagram for Multi-reader Systems chapter 1.2.2). Connections: The Bridge will always have address 00 on the second bus (Lower level).
Technical Manual 2.11 95T GPI BRM / DLM Direct line modem interface. The 95T GPI BRM and 95T GPI DLM interfaces are used when the distances between two bus systems are more than 1.2 km and where it is not possible to use the 95T GPI DLC bus amplifier. The maximum distance between the BRM and DLM interfaces are specified by the modem supplier.
Technical Manual 2.12 95T GPI DLC Bus amplifier. The 95T GPI DLC can be used to prolong the RS485 bus extra 1.2 km or to make a branch out from the bus if a star cabling of the RS485 bus is needed. Important note: After a 95T GPI DLC interface only one address can be connected.
Page 114
THOR Access Control Connections: October 1, 1995 18-006/081-04 GB...
Technical Manual 2.13 RS-485 bus connections. The RS485 bus is used to communicate between the different Card readers and remote printer interface etc. All units are connected in parallel on the bus as shown in the connecting diagram below. "Star"-connections exceeding 0.3m in length are not allowed, but the order in which the different addresses are installed is not important.
Page 116
In each card reader it is possible to install a local separate S-ART bus with maximum 15 S-ART's. This bus must not be connected together with other S-ART busses coming from other readers or THOR intrusion. The Card reader S-ART bus is used to connect the door contact, electric striking plate, exit push button etc.
In THOR Access control it is recommended to use the S-ART type 90T S102, but if special wishes are demanded, the other types used in THOR Intrusion can also be used. The 90T S102 has 2 n.c. inputs and 1 relay output.
Page 118
THOR Access Control 90T RKP ACM/ACW/ERC: When connecting the S-ART's to the bus-cable care must be taken not to interchange term. no. 2 and 4. The communication will in many cases work but there is a possibility of having noise problems if the two terminals are interchanged.
Technical Manual 2.14.2 Input/output connection to the S-ART type 90T S102. S-ART unit with 2 inputs and one relay output. Technical data. Loops IN 0/IN 1 ..........Any voltage free contact, normally closed. (The inputs can also be a normally open - type) Terminating resistor ....
THOR Access Control 2.14.3 Coding of S-ART addresses. When installing SART's, the address code field of each SART must be coded for the correct address. The coding is done by cutting from 0 to 5 jumpers as shown in the following tables and examples.
Technical Manual 2.15 Mechanical measurement and lay-out of the power supply cabinet 90T PS. The power supply cabinet must be mounted directly on a wall by means of the 4 "keyholes", one in each corner. The front cover can be removed by loosening the 4 screws. If the optional communication board is already installed it must be removed to get access to the upper-left "keyhole".
THOR Access Control 2.15.1 Power supply and batteries. Lay-out of the power supply. The mains cable is connected directly to the power supply board to the terminals marked L, N and earth. Terminals for 2 x 12V/24Ah rechargeable batteries are found on the 24V Power Supply Board. A fuse for both the plus and minus terminal are placed on the power supply board.
Technical Manual PS MONITORING Terminals: Term. 1: Battery test 0 (input) connection test Term. 2: Battery monitor (output) Term. 3: Power monitor (output) Term. 4: 12VDC Term. 5: Battery Test 1 (input) capacity test. Term. 6: 0V 2.15.2 Printer interface (built-in). The printer interface 90T - PRI has two different interface types, a parallel or an RS232 serial.
Page 124
THOR Access Control After the magnet has been fixed to the back-plate of the power supply the S-ART must be installed on the fixed stays on the back-plate. For this purpose the following must be used for fixing each S-ART: ♦...
2.15.4 Power supply monitoring. When using the power supply 90T PS together with the THOR Access Control System, it is possible to monitor and test the batteries. The battery tests are done automatically every 24 hour or manually by a test menu. Also the mains can be monitored and mains fault can be indicated on the reader by the - LED.
Page 126
THOR Access Control Softtype Programming: The following programming must be made for the above example: S-ART no. Input Softtype Output Softtype IN 0 14 Mains fault IN 1 13 Battery fault IN 0 07 Sabotage IN 1 not used OUT 1...
Technical Manual 2.16 Power consumption. Normally Alarm 24V Power Supply Board 24V/50mA 24V/50mA (stand-by) Card reader (backlight off) 24V/80mA 24V/80mA (backlight on: +60mA) 12V/100mA 12V/100mA Printer Interface 24V/50mA 24V/100mA(communicating) 12V/50mA 12V/100mA(communicating) S-ART's: 90T - S102 24V/0mA, 17V/2mA 24V/12mA, 17V/2mA 12V/0mA 12V/6mA (The values are for one S-ART, keypad etc.) The above listed values are useful not only for calculating cable length and dimension, but also for calculating...
THOR Access Control 2.18 Outdoor kit for Access or Intrusion terminals. To be able to use the different terminals mounted outside, an outdoor kit can be used. This outdoor kit can be used together with the following products: 90T RKP...
Technical Manual Remove the display from the CPU board by unscrewing the 4 screws fixing the display. Connect the plug coming from the display board to the P3 connector on the 90T CWB board. Connect the P2 plug coming from the 90T CWB board to the P5 connector on the CPU-board. Connect the P1 plug coming from the 90T CWB board to the P6 connector on the CPU-board.
Page 130
THOR Access Control Rain Cover Protection. If the terminals are placed outside without any protection against rain etc. a Cover for Rain Protection, 90T CRP must be used. The rain cover protection is fixed together with the back plate of the reader by the same fixing screws.
When a system is produced the reader has no system configuration data, that means no OEM no., Installer no., Company no., card no., time programs etc. In this condition the reader will only accept the special HI SEC Service card (any installer service card).
Page 133
WP = 2 (always no PIN-code) (Guest cards) LF = 0 (no padlock function) HU = 0 (hold-up code disabled) AC = 001 (THOR intrusion user no.) LN = 0 (no log of normal access) No. 2: WP = 1 (always PIN-code)
THOR Access Control Service card PIN-code: 1122(33) (cannot be changed). Master card PIN-code: 6692(92) G: If the reader has more input/output connections than pre-programmed in the default data each used input or output address must be programmed with a softtype using the menus 84 or 85.
3.2.3 THOR intrusion integrated reader. If a reader is used to initialize a THOR Intrusion system each reader must be initialized as described from A to F before programming the Intrusion part. When this is done, the Intrusion Central unit can be initialized following the description in the "THOR Intrusion Technical Manual".
THOR Access Control Default data: Each reader is pre-programmed with the default data shown for a stand-alone reader above. Database programming: As described the database consists of two parts, a global part and a local part. During programming the global database is automatically updated.
A Type 98 equation used to control the door strike will suppress the door forced message when the equation is true. - Type 99: As 95 - 98 but an alarm message will also be send to THOR intrusion (if connected). October 1, 1995 18-006/081-04 GB...
THOR Access Control 3.5 Card programming. As described in the section 1.9 the database is divided into 2 parts, one part which is global and identically for all readers and another part, which is specific for each reader (local). The global database must only be programmed on one reader and is automatically distributed to all readers connected to the bus.
The integration with the THOR intrusion system is done via the programming of the personnel group where a THOR Intrusion User no. is defined. The User no. is in the Intrusion system connected to an area and a code. That means that a group of cards in this way is programmed to set and unset an area in the intrusion system.
THOR Access Control Week programs, which do not refer to a personnel group can also be created f.ex. a time program to control the logging of different types of events, or to control an S-ART output. See complete list of types of week programs in section 1.9.3.
Technical Manual 3.6 Anti Passback programming. Each reader must be programmed with the zone no. where it is installed (OWN) and the zone no. to where it is leading (ENTRY) and a Zone Control function (CONTROL). In the below installation example is shown the programming of the 3 different principles in the Anti Passback programming: ♦...
Page 142
THOR Access Control October 1, 1995 18-006/081-04 GB...
4.1 Operating facilities. The reader has 4 special Status LED indicators, which can be controlled by THOR intrusion, when the reader is part of a THOR integrated system. The LED indicators will in this case function as described in the THOR Intrusion User Manual.
Page 145
This key is used for setting (if connected to an alarm system). This key is used for unsetting (if connected to an alarm system). This key is used for alarm/fault reset (only in THOR integrated system) and to move the cursor to the right in all programming menus.
During non operation mode, the display will indicate the date and time (backlight off). The below figure is showing 3 different cases in the normal use of the THOR reader. When a card is read the display will be lit at the same time.
4.2.5 Hold Up Code. The hold up code is defined (like the Thor alarm system) as the PIN code + 1, but this function can only be used, if it has been allowed during the programming of the personnel groups. It should be noted that the personnel group is local, and therefore is individual from reader to reader.The use of the hold up code will trigger a...
Page 148
- Alarm message from an intrusion system. If the reader is connected to a THOR intrusion system or if the input softtype 36 (alarm input from a non THOR intrusion system) is defined in the reader programming and if the alarm system is in alarm condition then the display will show an Alarm text, light the Alarm indicators and give a short buzzer every time the door is opened from the reader.
In this condition the Service card is allowed with a low priority even without the acceptance from the user. When the Service card is read the door will be opened and the reader will go directly into THOR Intrusion mode and the Service man must key in his THOR Intrusion Service- or Guard-code.
THOR Access Control 4.2.8 Block/unblock reader without alarm system integration. It is possible for systems without alarm system integration to make some "first-in/last-out" cards by giving this personnel group the Lock-function = Yes. By doing this the reader will be blocked using the closed padlock key until the open padlock key is pressed by a card with a personnel group including Lock function.
Page 151
Technical Manual The codes must be entered as 6 digits - the first two digits are the last 2 digits of the corresponding card no. and the last 4 digits are the personal PIN-code (see drawing below). NB! If the reader is initialized to use 6 digit PIN-code, the code only feature will still use only the first 4 digits as the PIN-code after the card no.
Input softtype 35 is used together with output softtype 75 where it is possible to set and unset an intrusion system with an on/off signal. The THOR reader will act in this mode in the same way as when it is connected to a THOR intrusion system.
Page 153
When a set attempt is successful without set faults, the reader display will be the same for THOR or non-THOR intrusion systems. In non-THOR systems it is the input softtype 35 that tells the reader if the set attempt by the output softtype 75 is successful or not.
In case of alarms in the THOR Intrusion system the reader display will indicate ALARM(S) but follow the normal unset procedure. If it is wanted to see the list of detectors in alarm, it is necessary to go into the THOR Intrusion menus, which will display the alarms automatically one by one.
Page 155
Technical Manual In THOR integrated systems it is also possible to have a partly set area. In this case the user can make the choice to unset the complete area or to accept the status of the area and open the door (see below).
Page 156
PIN-code. If all detectors can be set the reader will indicate the set status of the THOR system. If all areas have been set the reader will indicate SYSTEM SET. If one or more detectors are giving a set fault, the list of detectors with problems will be shown as on a normal THOR intrusion remote keypad and the detectors can be isolated etc.
Technical Manual 4.4.2 Set/unsetting from the Terminal 95T ERC or 90T RKP ERC with external reader heads. Unset-procedure: Read the card in the external reader. The door will open even if the area is set, but the entry time starts. The buzzer starts in the Reader keypad 95T ERC during the entry time as all normal remote keypads or readers.
After opening the door by the outside reader the entry time starts and all terminals activate the buzzer. When an area in the THOR Intrusion system is unset from the reader, the reader will close the door and indicate in the display AREA UNSET, DOOR IS CLOSED.
Page 159
Setting an area or complete system follows the procedure as on a standard indoor reader. After a setting of an area in the THOR Intrusion system, the reader will activate the door and the text DOOR IS OPEN will be shown in the display (a normal 95T ACM will block the door).
THOR Access Control 4.6 Submenu 1 - Edit Message. The following messages are typically preprogrammed in the reader and cannot be changed from the reader keyboard: Message no. 0: No message to user. Message no. 1: CONTACT PERSONNEL DEPT. Message no. 2: CONTACT YOUR HOME Message no.
Technical Manual 4.7 Submenu 2 - Guest card programming. Programming cards with any priority can be used to release or block a guest card (card always to personnel group no. 1). All guest cards released will automatically be blocked at 24:00 the same day, but can also be blocked earlier if needed.
THOR Access Control When the credit card is used in one of the readers to open the door, the last six digits of the credit card no. will be printed out together with the text CRED. If more than 50 credit guest cards are programmed in the system, the display will show the text NOT CREATED.
Technical Manual 4.8 Submenu 3 - System Status Display. For the user priority 2, 3 and Service priority it is possible to display the programmed system configuration, card database and logs. The following menus can be used: Menu 31. Show Local Log. The local log includes the normal door/card transactions and alarms concerning the reader which is operated.
THOR Access Control Menu 32. Show All Alarms. The alarm log is a global log containing all the alarms/tamper etc.for the complete system.The alarm log can have up to max 100 events. When the log is full the oldest event will be overwritten.
Technical Manual The program version no. is equal to the number marked on the EPROM's inside the reader and the company code is the OEM no. (3 digits), Installer no. (3 digits) and the Company no. (3 digits). By using the → - key the Options and Mode no.
THOR Access Control By using the ↓ - key the next blocked card no. will be shown. By keying in a card no. the first following blocked card no. will be shown. When the list is finished it will display the first no. again. By means of the C - key, the display function is stopped and a return to Menu 36 is made.
Technical Manual If the Free card format (6 or 14) is being used the card number can be displayed by using the → - key (only 95T readers). By using the ↓ - key the next card no. with the personnel group no. equal to the no. keyed in will be shown. By keying in a card no.
THOR Access Control 4.9 Submenu 4 - Programming Of Cards. Card programming consists of the following: Creation and cancellation of cards, modification of card data, i.e.: changing of the personnel group and the status of the card being blocked or not. Card programming can only be performed with privileged cards.
Technical Manual Menu 43. Block Card. By this menu it is possible to block a card. The programmed data for a blocked card will still remain in the data base. When this function is called the display asks for the card no. to be blocked. After the card no. has been keyed in the ↓...
THOR Access Control 4.10 Submenu 5 - System Programming. By system programming is meant: Creation of personnel groups, time periods and special days. In order to perform system programming, cards with a high priority are required. Menu 51. Edit Personnel Groups.
Menu 55. Adjust Clock. In a THOR integrated system the intrusion system will be the master clock and the time will be updated every minute. For stand alone or multi-reader systems it can be necessary to adjust the clock "speed" with a factor calculated f.ex.
THOR Access Control 4 digits can be keyed in after calling the menu. The first digit can only be 0 or 1 and is indicating if the clock must be adjusted positive or negative. 0 means negative correction (the clock will go slower) 1 means positive correction (the clock will go quicker) The next 3 digits is the number of seconds that the built-in clock must go quicker or slower during one week .
Technical Manual 4.11 Submenu 6 - System Print-out. A print-out of the local event log, global alarm log , personnel groups and the complete programming can be made by the Service priority (when Service is allowed) and the highest user priority. All print-out menus will automatically change to the main menu 12 seconds after they are called and the reader can be used as normal during a print-out time.
THOR Access Control 4.12 Submenu 7 - Manual Door Control. With a Service card (when Service is allowed) or a programming card with the highest priority, it is possible to overwrite the automatic door control functions. Menu 71. Block Door.
The Set-up menus can only be used when Service is Allowed by the user. Menu 82. Initialize Reader. The initialization procedure will depend on if it is a stand alone, multi-reader system or a THOR integrated intrusion system. The initialization procedure can only be started by the Service card. Stand alone and multi- reader systems can be initialized without using the master card.
Page 178
THOR Access Control Language selection. (only available on 95T reader types) The access reader contains all possible languages in the same Eprom. To select the wanted language use the country telephone code. Below is listed all possible languages and the corresponding country codes: (...
Page 179
Option 4: Local/THOR Intrusion printer. Print-outs can be made on a printer connected directly on the THOR Intrusion central unit or on a printer specially dedicated for the access printouts. 0 = Local Access printer and 1 = THOR Intrusion printer.
Page 180
THOR Access Control Option 6: When the external reader 90T EMR-S is used together with 95T ERC / 90T RKP ERC this option bit must be 1. When the normal reader 95T ACM/ACW or 90T RKP ACM/ACW are used this option bit must be 0. See also 1.10.1 "External and Internal readers on the same door in Integrated Systems".
Page 181
(real time). This printer can also be used to print out the programming. Card formats: CFORM Card format Hi Sec encrypted magstripe format Hi Sec Wiegand format Hi Sec Cotag prox./hands-free format Hi Sec Hughes prox/hands-free format Hi Sec non-encrypted magstripe format Free programmable BCD code format (ISO 2) max.
Mode 00: Reader not initialized Mode 01: Stand Alone Reader Mode 02: Multi Reader System Mode 03: THOR Integrated Reader Menu 83. Door Timing. The following times can be programmed for a reader to control a door: Door release time = REL.
Technical Manual Menu 85. Output Definitions. To each S-ART output 2 parameters must be connected, Output softtype and activating type (Please refer to 1.5.2 for the list of output soft types). When the menu is called the output no. 00 is displayed and a new number can be keyed in if wanted. After that the corresponding output softtype and activating type are keyed in followed by ↓...
Page 184
THOR Access Control All data programmed under menu 87 are memorized in the local database in each reader and must also be programmed locally on each reader. The zone control (CONTROL) can be programmed with 4 different values between 0 and 3. The zone control function defines the security level wanted for the anti Passback.
Technical Manual 4.14 Submenu 9 - System Test. The Service Card has also access to certain test functions f. ex. S-ART input/output test and memory test. Menu 92. Lamp Test. The 5 status lamps starts flashing in 1 sec. intervals and the display shows the text above alternating with all segments turned on in 5 sec.
THOR Access Control Menu 94. S-ART Output Test. It is possible to set or reset the two outputs on a S-ART by this function for test purposes. This "write" order will override the existing output condition. By entering the S-ART no. and the values for the two outputs OUT0 and OUT1 the outputs will be activated corresponding (1 = SET and 0 = RESET).
Technical Manual Menu 97. Check Database. This function is used to check that all global databases have the same data in all readers. When the test has been made a display picture will give an overview of the first 16 readers with reader 0 to the left and reader 15 to the right.
Page 188
THOR Access Control All the counters can be reset by leaving the menus by the → - key. Leaving by the C - key, the counters are not reset. October 1, 1995 18-006/081-04 GB...
Page 189
Technical Manual October 1, 1995 18-006/081-04 GB...
Page 193
THOR ACCESS CONTROL PROGRAMMING SCHEMES Programming Form # 1: Reader set-up/Anti PassBack Programming Form # 2: Input / output set-up Programming Form # 3: Activating types Programming Form # 4: Week programmes 3 - 30 (global) Programming Form # 5:...
Page 194
OPTION 14 | | 0 = door forced normal, 1 = no door forced —————————|———|—————————————————————————————————————————————————————— OPTION 15 | | 0 = local bus printer, 1 = main bus log printer —————————|———|—————————————————————————————————————————————————————— Appendix A HI SEC Page ... 1 / 12 International...
Page 195
Card Format: CFORM Card format Hi Sec encrypted magstripe format Hi Sec Wiegand format Hi Sec Cotag prox./hands-free format Hi Sec Hughes prox/hands-free format Hi Sec non-encrypted magstripe format Free programmable BCD format (ISO 2) max. 16 digits Special l'Oreal BCD magstripe format...
Page 196
Menu 87: Anti PassBack Zone: OWN: ENTRY: Zone Control: 0: Unlimited zone control 1: Zone control reset each 24 hour 2: Zone control reset each hour 3: No zone control Appendix A HI SEC Page ... 3 / 12 International...
Page 198
T14 | —————|————————|————————|—————|——————————————————————————————————————— T15 | —————|————————|————————|—————|——————————————————————————————————————— T16 | —————|————————|————————|—————|——————————————————————————————————————— Polarity: 0 - Active low 1 - Active high 2 - Pulsating Can only be programmed from the AICS configuration software. Appendix A HI SEC Page ... 5 / 12 International...
Page 199
| DAY 5 F R I D A Y |———————————————|———————————————|———————————————|———————————————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| HI SEC Appendix A Page ... 6 / 12 International...
Page 200
S P E C I A L D A Y |——————————————— _ ———————————————|———————————————|———————————————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| Appendix A HI SEC Page ... 7 / 12 International...
Page 201
| DAY 5 F R I D A Y |——————————————— _ ———————————————|———————————————|———————————————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| HI SEC Appendix A Page ... 8 / 12 International...
Page 202
S P E C I A L D A Y |——————————————— _ ———————————————|———————————————|———————————————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| |—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—|—| | FNC: | FNC: | FNC: | FNC: |—————|—|———————|—————|—|———————|—————|—|———————|—————|—|———————| Appendix A HI SEC Page ... 9 / 12 International...
Need help?
Do you have a question about the THOR and is the answer not in the manual?
Questions and answers