Download Print this page

Advertisement

Quick Links

OVERVIEW
Software House® iSTAR Pro 2U Rack Mount is a standalone, rack-mountable access control and burglar
alarm system unit that houses all the necessary components to control up to 16 doors, and monitor up to 32
alarm inputs.
This guide describes quick installation information for the 2U Rack Mount:
 How to wire readers to RM ports.
 How to wire supervised input points and dry contact relay outputs.
 How to wire Lock Power wire to provided Connector.
System Components The iSTAR Pro Hardware Components consist of:
 General Controller module (GCM) - A general purpose board running windows
 Access Control Modules (ACM) - An access control board that communicates
 12VDC @ 6.2A Power Supply.
CE. The GCM has two PCMCIA slots for an internal modem, and a second
network interface card. There is an LCD panel to display the current status and to
use when running diagnostics. The panel of batteries to retain the data memory in
the event of a power failure.
with the GCM and provides readers, outputs, and inputs. The iSTAR Pro can have
up to two ACMS that control 16 doors and interface with wiegand technology and
ABA (magnetic) signaling devices.
iSTAR Pro 2U RM Rack Mount
1
Quick Start
Installation Guide
UM-272 Version B0

Advertisement

loading
Need help?

Need help?

Do you have a question about the iSTAR Pro 2U RM and is the answer not in the manual?

Questions and answers

Summary of Contents for Software House iSTAR Pro 2U RM

  • Page 1 UM-272 Version B0 OVERVIEW Software House® iSTAR Pro 2U Rack Mount is a standalone, rack-mountable access control and burglar alarm system unit that houses all the necessary components to control up to 16 doors, and monitor up to 32 alarm inputs.
  • Page 2 Rear Connection Panel Figure 1. ISTAR Pro 2U Rack Mount ISTAR Pro 2U Rack Mount Hardware Components • STAR016W-64A - 64 MB RAM General Controller Module II with Two Access Control Module II for up to 16 readers (RM only). •...
  • Page 3 Figure 2. GCM General Control Module Network Connection – Connect a CAT-5 RJ45 cable to J4. Connect a straight through cable to a Switch or Hub. If unit is connected directly to the server use a crossover cable. LED2 indicates the Ethernet link signal and LED1 displays the Receive Data signal. Batteries –...
  • Page 4 Diagnostic Session - A diagnostic session can be run either through ICU or with a terminal session through P5. Turn on the diagnostic information settings using either ICU or the HTML connection to the ISTAR Pro 2U. Note that the diagnostic information causes overhead and should not be left on during normal operation. 1.
  • Page 5 ACM - ACCESS CONTROL MODULES The ACM “Access Control Module” connects to the readers, inputs and outputs used in access control. An iSTAR Pro 2U can have one or two ACMs. Wiegand Ports Supervised inputs 12VDC Power S2 Enable Wiegand Ports S4 Terminate RM Ports RM Reader Ports Relay Outputs...
  • Page 6 RM4 TO HEAD END WIRING INSTRUCTIONS 12 VDC...
  • Page 7 Output Diagram Lock + Shield Lock -...
  • Page 8: Input Diagram

    Input Diagram...
  • Page 9: Mounting Instructions

    Power Specs: Power Requirements 115VaC 60Hz /220Vac 50Hz Power 0.75A @90VA Heat Dissipation (Typical) 100 BTU/Hr AC Input Current Limit 4A @ 250V (Fused) Temperature Alarm 150°F ± 10% RACK MOUNT SIZE AND RACK REQUIRMENTS • 2U- 3.5” High • Standard 19” Wide •...
  • Page 10 Table 4. Specific considerations when using the iSTAR Pro 2U Rack Mount as an intrusion detection/burglar alarm system, per ANSI/UL 1076 UL 1076 Intrusion Detection / Burglar Alarm Recommendations Recommended Arm/Disarm Device RM2L-4000 multi-technology reader with keypad & display, to provide visual indication of individual zone status to operator AC Power Source Must use a UL-approved UPS, sized to...
  • Page 11: Installation

    2U ISTAR PRO AS A BURGLAR ALARM SYSTEM UNIT The iSTAR Pro Rack Mount controller provides burglar alarm / intrusion detection functionality per UL/ANSI standard 1076 (proprietary burglar alarm system units). Please follow these instructions when deploying the iSTAR Pro Rack Mount for this application. Installation The 2U Rack Mount unit must be mounted in a standard 19”...
  • Page 12 AC Power Fail Alarm To transmit the AC Fail alarm signal from the UPS to the Rack Mount iSTAR Pro unit, wire a two-wire circuit from the designated UPS alarm relay contacts into a selected supervised input on the rear of the Rack Mount iSTAR Pro, using two 1K resistors for line supervision.
  • Page 13 End Of Line (EOL) resistor alarm zone. The host system views monitor points as being either logically true or false. Software House wires NO and NC supervised input circuits differently because it makes the software implementation more logical.
  • Page 14 Single Device Alarm Zone – Input Status Comment Ranges of resistance Resistance 0 - 100 Ω Short Wires crossed 101 Ω – 360 Ω Line Fault Wrong resistor 361 Ω – 750 Ω 500 Ω NO Alarm 751 Ω - 1450 Ω 1K Ω...
  • Page 15 INTRUSION ZONE MODES Intrusion Zones are always in one of the following modes: • Armed • Disarmed • Violated • Ready to arm/Not ready to arm Non-Hardware Status You can view the mode of an intrusion zone in the Monitoring Station by selecting Intrusion Zone from the main menu.
  • Page 16 • Inputs that activate while the zone is armed. (If the zone is disarmed within the entrance delay, the violation does not occur.) • Doors that open while the zone is armed. (If the zone is disarmed within the entrance delay, the violation does not occur.) When the system detects an intrusion zone violation, the iSTAR changes the status of the intrusion zone to violated and notifies C•CURE of the violation.
  • Page 17 When the intrusion zone status is not ready to arm, you cannot change the mode of the zone from disarmed to armed unless you use the “force armed” feature. You can force arm an intrusion zone with a normal event action, a local keypad command action, or a mouse (manual) action from the monitoring application.
  • Page 18: Configuration Overview

    CONFIGURATION OVERVIEW Use the Intrusion Zone dialog box to configure intrusion zones. • For iSTAR intrusion zones, select Configure>Intrusion Zone>iSTAR Intrusion Zone>New or Edit. Figure 8. STAR Configure Intrusion Zone Dialog Box Table 5. Configure Intrusion Zone Dialog Box Field and Tab Descriptions Field/Tab Description Click this check box to put the intrusion zone online.
  • Page 19 CONFIGURING ARM AND DISARM (ISTAR ZONES) The figure below shows the ways to control the arm and disarm mode of an iSTAR intrusion zone. Figure 9. Controlling iSTAR Intrusion Zone Modes Use the Disarming and Arming tabs in the iSTAR Intrusion Zone dialog box to define arm and disarm controls. Card Control You can configure iSTAR intrusion zones to arm and disarm on presentation of a valid card and required inputs.
  • Page 20 Disarm Options Use the Card Method used to disarm drop-down arrow on the Disarming Tab to specify card control disarm options. Table 6. Card Control Disarming Options Disarm Option Description None No card action necessary. Typically select to disarm with an event. Valid card only Present a valid card.
  • Page 21: Delay Options

    Sample Events Table 8 describes using events to arm and disarm an intrusion zone. Table 8. Events in Intrusion Zones Event Activated By... Example Important Configuration Information Time Use an event/time Arming and disarming events, activated by time specification specification to arm specifications, activate only on the leading edge of and disarm an intrusion the specification and do not reset at the trailing...
  • Page 22: Monitoring Station

    Configuring Delays To define delays: • Use the Reader sounds during exit delay field on the Arm tab to allow enough time for personnel to exit the zone before the intrusion zone arms and any configured alarms activate. • Use the Reader sounds during entrance delay field on the Disarm tab to allow enough time for personnel to enter the zone and complete the disarm procedure.
  • Page 23 CONFIGURING INTRUSION ZONE INPUTS To add inputs to an intrusion zone, select the Inputs tab: • Use the Add and Remove buttons to move inputs from the Available inputs list to the Selected inputs list • Use the horizontal scroll bar at the bottom of the selected inputs window to display iSTAR input options.
  • Page 24 Sample Configurations The following scenarios describe situations that trigger and shunt entrance delays: • Example: using shunted during an entrance delay A switch, inside an intrusion zone controls arming and disarming. The area around the switch is monitored by a motion sensor. The motion sensor input is shunted (disregarded) during the entrance delay to allow personnel time to complete the disarm procedure.
  • Page 25 o When the intrusion zone is disarmed and no controlled or protection inputs are active in the zone, the LCD reader (if configured to display “status”) cycles between “Ready to Arm” and “Present Card.” If the protection input becomes active, the reader LCD cycles between “Not Ready to Arm,”...
  • Page 26 PROTECTION INPUTS This feature allows you to configure a selected input as a Protection Input. The arm/disarm state of the protection input is not controlled by the intrusion zone, it is not controllable from the monitoring station by manual action, and events cannot arm or disarm the protection input. Once selected as Protection inputs, Protection inputs are always armed;...
  • Page 27 Figure 10. Protection Input selection NOTE: If you configure the Protection Input column, you will not be allowed to configure the Entrance Delay Trigger or Entrance Delay Shunt options. To configure the protection input: 1. In the Administration Client choose Configure>Intrusion Zone. 2.
  • Page 28 Configuring Events for Protection Inputs On iSTAR controllers, you can configure an Event to activate if any of the intrusion zone’s inputs become active, even if the intrusion zone is disarmed. On the Events tab, select an event to activate for either or both modes: •...
  • Page 29 Figure 12. Location of Door Status Display Option...
  • Page 30 CONFIGURING STATUS LINKS Intrusion zones provide options that link status to events (iSTAR). Use these options to: • Display iSTAR status and respond to violations by linking status to events (for example, display status using indicator lights and respond to violations by sounding alarms. Status Link Dialog Boxes To configure event status, select: •...
  • Page 31 Operational Requirements Operation/Testing Inputs are tested by opening/closing (activating/deactivating) the device. Input devices must have the proper supervision resistors installed to function with C•CURE. When inputs are working properly, you see these messages on the Monitoring Station. • input nnn activated •...
  • Page 32 Information about other products furnished by Software House is believed to be accurate. However, no responsibility is assumed by Software House for the use of these products, or for an infringement of rights of the other companies that may result from their use.