Download Print this page

LTS Security LXK101-KD User Manual

Mullion mount access reader

Advertisement

Quick Links

Mullion Mount Access Reader
LXK101-KD
User's Manual
V1.0.0

Advertisement

loading
Need help?

Need help?

Do you have a question about the LXK101-KD and is the answer not in the manual?

Questions and answers

Summary of Contents for LTS Security LXK101-KD

  • Page 1 Mullion Mount Access Reader LXK101-KD User's Manual V1.0.0...
  • Page 2: Foreword

    Foreword General This manual introduces the functions and operations of the access reader. Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
  • Page 3 ● There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. ● Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened.
  • Page 4: Important Safeguards And Warnings

    Important Safeguards and Warnings This section introduces content covering the proper handling of the access reader, hazard prevention, and prevention of property damage. Read carefully before using the Card Reader, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the access reader under allowed humidity and temperature conditions.
  • Page 5 Operation Requirements ● Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the access reader while the adapter is powered on. ● Operate the access reader within the rated range of power input and output. ●...
  • Page 6: Table Of Contents

    Table of Contents Foreword ..............................I Important Safeguards and Warnings ......................III 1 Introduction ............................... 1 1.1 Features ............................1 1.2 Appearance ............................1 2 Ports Overview ............................2 3 Installation ..............................3 4 Sound and Light Prompt..........................5 5 Unlocking the Door ........................... 6 5.1 Unlocking through IC Card ........................
  • Page 7: Introduction

    1 Introduction 1.1 Features ● PC material, tempered glass panel and IP66, suitable for indoor and outdoor use. ● Contactless card reading for IC cards (Mifare cards). ● Unlock through card swiping and Bluebooth. ● Communicates through the RS-485 port, wiegand port, and Bluetooth. ●...
  • Page 8: Ports Overview

    2 Ports Overview Use RS–485 or Wiegand to connect the access reader. Table 2-1 Cable connection description Color Port Description Power (12 VDC) Black RD– Blue CASE Tamper alarm signal White Wiegand transmission signal (effective only when using Wiegand protocol) Green Wiegand responsive signal (effective only when using Wiegand Brown...
  • Page 9: Installation

    3 Installation Procedure Step 1 Drill 4 holes and one cable outlet on the wall. For surface-mounted wiring, cable outlet is not required. Step 2 Put 3 expansion tubes into the holes. Step 3 Wire the access reader, and pass the wires through the slot of the bracket. Step 4 Use three M3 screws to mount the bracket on the wall.
  • Page 10 Figure 3-2 Surface mounted wiring...
  • Page 11: Sound And Light Prompt

    4 Sound and Light Prompt Table 4-1 Sound and light prompt description Situation Sound and Light Prompt Buzz once. Power on. The indicator is solid blue. Removing the Device. Long buzz for 15 seconds. Pressing buttons. Short buzz once. Alarm triggered by the controller. Long buzz for 15 seconds.
  • Page 12: Unlocking The Door

    5 Unlocking the Door Unlock the door through IC card or Bluetooth card. 5.1 Unlocking through IC Card Unlock the door by swiping the IC card. 5.2 Unlocking through Bluetooth Unlock the door through Bluetooth cards. The access reader must work with the access controller to realize Bluetooth unlock.
  • Page 13 Figure 5-1 Flowchart of configuring Bluetooth unlock Administrator needs to perform Step1 to Step6, and general users need to perform Step7. Procedure Step 1 Initialize and log in to the main access controller.
  • Page 14 Step 2 Go to Access Rules > Door Parameters, select a door from the list, turn on the Bluetooth card function, and then configure the Bluetooth range. Figure 5-2 Unlock settings The Bluetooth card must be a certain distance away from the access control device to exchange data and unlock the door.
  • Page 15 Figure 5-3 Add access controller to PRO-X Step 4 Go to User Management > Add to add users to the main controller. The email address you entered when adding users to the main controller must be the same to the email account that users use to sign up to PRO-X. Figure 5-4 Basic information on the user Step 5 On the Authentication tab, click Bluetooth Card.
  • Page 16 Batch issue cards only supports requesting through Email. Issue Bluetooth cards to all the users on the list: Click Issue Cards to All Users. ◇ Issue Bluetooth cards to selected users: Select users, and then click Issue Cards ◇ to Selected Users. 2.
  • Page 17 Figure 5-7 Request through registration code 4. Click OK. The Bluetooth card is added. Step 6 Add permission rules. Go to Access Rules > Permission Settings, click Add to add a permission rule. You can associate users with the zone so that users will be assigned with defined access permissions. Figure 5-8 Create permission rules Step 7 After users sign up and log in to PRO-X with the email address, they need to open PRO-X to...
  • Page 18 In the auto unlock mode, the Bluetooth card will frequently unlock the door if you are still in the Bluetooth range, and finally a failure might occur. Please turn off Bluetooth on the phone and turn it on again. ● Shake to unlock: The door unlocks when you shake your phone to allow the Bluetooth card transmits signals to the access reader.
  • Page 19: Updating The System

    6 Updating the System Update the system of the access reader through the Access Controller. 6.1 Updating through the Access Controller Prerequisites Connect the access reader to the 2-door web access controller through RS-485. Background Information ● Use the correct update file. Make sure that you get the correct update file from technical support. ●...
  • Page 20: Appendix 1 Security Recommendation

    Appendix 1 Security Recommendation Account Management 1. Use complex passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters; ● Include at least two types of characters: upper and lower case letters, numbers and symbols; ●...
  • Page 21 It is recommended that you change the default port of HTTP and other services to any port between 1024 and 65535 to reduce the risk of being guessed by threat actors. Network Configuration 1. Enable Allow list It is recommended that you turn on the allow list function, and only allow IP in the allow list to access the device.
  • Page 22 as placing the device in a dedicated machine room and cabinet, and having access control and key management in place to prevent unauthorized personnel from damaging hardware and other peripheral equipment (e.g. USB flash disk, serial port).