Beruflich Dokumente
Kultur Dokumente
Release 1.5.1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not
installed in accordance with Ciscos installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to
comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable
protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Ciscos written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital
devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television
communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its
peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
Turn the television or radio antenna until the interference stops.
Move the equipment to one side or the other of the television or radio.
Move the equipment farther away from the television or radio.
Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits
controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public
domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Physical Access Gateway User Guide
2014 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
Purpose
Audience
Organization
1-1
1-3
1-7
1-8
1-9
1-10
1-14
2-1
Overview
2-2
Package Contents
1-13
2-1
2-3
2-3
2-7
Cisco Physical Access Gateway User Guide
OL-32499-01
Contents
2-24
3-1
3-1
Package Contents
3-2
3-6
4-1
4-1
Package Contents
4-2
3-3
4-3
4-5
5-1
5-1
Package Contents
5-2
5-3
5-6
A-1
A-1
A-2
A-2
A-3
OL-32499-01
Contents
B-6
Contents
OL-32499-01
Preface
This preface describes the purpose, audience, organization, obtaining documentation and submitting a
service request and safety warnings of the Cisco Physical Access Gateway User Guide.
This chapter contains the following sections:
Purpose
Audience
Organization
Safety Warnings
Purpose
This document provides information to install and configure the components located near each door of
a Cisco Physical Access Control system.
Audience
This guide is intended for the Cisco Physical Access Gateway Administrators.
Organization
Chapter Number
Chapter Title
Description
Chapter 1
Overview
Chapter 2
Chapter Number
Chapter Title
Description
Chapter 3
Chapter 4
Chapter 5
Appendix A
Environmental Specifications
for the Cisco Physical Access
Gateway
Appendix B
Safety Warnings
Safety Warnings
Before you install the device, observe the safety warnings described in Appendix B, Safety Warnings.
OL-32499-01
CH A P T E R
Overview
This document provides information to install and configure the components located near each door of
a Cisco Physical Access Control system.
This chapter includes the following information:
1-1
Chapter 1
Overview
System Overview
System Overview
The Cisco Physical Access Control is a comprehensive solution of hardware and software components,
connected through an IP network as shown in Figure 1-1.
Figure 1-1
Access Layer
switch
Cisco Access
Gateway
POE
Cisco
Physical Access
Manager
IP
Network
LDAP/Microsoft
active directory
Ethernet
Low speed copper wiring
HR
database
187055
Other IT
apps
Feature
Benefit
Simplifies deployment
If additional connections are required, you can connect up to 15 optional modules using a three-wire
Controller Area Network (CAN) bus. These modules can be added or removed without affecting the
operation of the system or other modules. See the Optional Expansion Modules section on page 1-5
for more descriptions of the available modules.
Note
The modules are connected using the CAN1 interface. The CAN2 interface is not supported in this
release.
1-2
OL-32499-01
Chapter 1
Overview
System Overview
Related Documentation
For installation and configuration instructions, see Chapter 2, Installing and Configuring the Cisco
Physical Access Gateway.
See the Cisco Physical Access Manager User Guide for advanced configuration and management of
the access control components.
Doors and
Related Hardware
Cisco Access
Gateways
Ethernet/
POE
Access Layer
switch
IP
Network
Copper wiring
Note
187053
See the Power Options and Requirements section on page 1-12 for more information on support for
Power over Ethernet (PoE).
1-3
Chapter 1
Overview
System Overview
271595
Figure 1-3
Cisco PAM
Appliance
IP Network
Direct Ethernet
Connection
Network
Connection
Cisco PAM
Desktop Software
(Java Thin Clients)
1-4
OL-32499-01
Chapter 1
Overview
Optional Expansion Modules
1 RU appliance
Global I/O
Device pre-provisioning
IT data integration
Audit trails
Related Documentation
For more information on the Cisco PAM appliance, including installation and configuration instructions,
see the Cisco Physical Access Manager User Guide.
1-5
Chapter 1
Overview
Module Features
Figure 1-4 shows the modules for a Cisco Physical Access Control system.
Figure 1-4
Input
Module
Output
Module
187057
Cisco Physical
Access Gateway
Gateway
Mandatory module.
Requires connection to
an Access Gateway using
a three-wire CAN bus.
Requires connection to
an Access Gateway using
a three-wire CAN bus.
Requires connection to
an Access Gateway using
a three-wire CAN bus.
Connects up to 15
optional expansion
modules using a
three-wire CAN bus.1
Power-over-Ethernet
(POE) or 12 through 24V
DC
1. The modules are connected using the CAN1 interface. The CAN2 interface is not supported in this release.
2. A supervised input supports four states: normal, alarm, open and short. An unsupervised input only indicates normal or alarm.
1-6
OL-32499-01
Chapter 1
Overview
Optional Expansion Modules
CAN+
Sheild
CAN-
Reader Module
Input Module
Output Module
271589
Gateway Module
The maximum length for the CAN bus is 1320 feet (400 Metres).
The last device in a CAN bus must be terminated by setting the CAN terminator switch to ON.
The CAN terminator switch in included on the Reader, Input and Output modules only (the
device.
The Gateway and Reader modules are connected using the CAN1 interface. The CAN2 interface is
not supported in this release.
Related Documentation
See the following chapters for instructions to install the modules and related equipment:
1-7
Chapter 1
Overview
Step 2
Step 3
Connect door readers, input and output devices to the Cisco Physical Access Gateway or optional
modules.
Step 4
Connect power to the Cisco Physical Access Gateway and any optional modules.
Step 5
Connect an Ethernet cable from a PC to the ETH1 interface on the Gateway module.
Note
Step 6
Open a web browser on your PC and enter https://192.168.1.42. This URL opens the web-based
configuration page.
Note
Step 7
To enter the Gateway initial configuration, be sure to connect your PC to the ETH1 port. The
ETH0 port is used for network communication.
Be sure to include the s in https://. This connects your browser to the secure URL.
Step 8
Enter and save the Network settings in the Initial Setup window. See the Configuring and Managing the
Gateway Using a Direct Connection section on page 2-15. Wait until the Gateway resets and the web
browser displays the screen Network Settings Applied.
Step 9
Verify the connections to the optional modules, door readers and other input and output devices.
Step 10
Connect an Ethernet cable from the Gateway ETH0 port to the IP network, and verify IP network
connectivity.
Step 11
Perform additional configuration, verification, and monitoring tasks as described in the Cisco Physical
Access Manager User Guide.
1-8
OL-32499-01
Chapter 1
Overview
Door Device Wiring Requirements
Determine the number and type of door devices used at each door (as shown in Figure 1-6).
Determine the number and type of wires used for each device, based on the descriptions in Table 1-2.
Determine the length of the wires based on the distance between the device and the access control
Gateway, or optional module (such as a Reader, Output or Input module).
Figure 1-6
Table 1-2 describes the wires used for typical input and output door devices. Refer to the device
documentation for more information and to verify the following requirements.
Table 1-2
Function
# of
Wires
Typical
Wire
Gauge
Type
Use
Request to Exit
22
Input
Door position
switch
22
Input
1-9
Chapter 1
Overview
Table 1-2
Function
Reader
# of
Wires
6 per
reader
Typical
Wire
Gauge
Type
Use
22
Wiegand
1 LED
1 beeper
Electric strike or
magnetic lock
18
Output
Alarm bypass
22
Output
Bell or call
22
Input
Supervised input devices have four states: active, inactive, short, and open.
Unsupervised inputs have limited functionality. If a wire is cut or shorted between the input module and
a normally open device. The server cannot determine the change and the device would remains in
inactive state even when the switch is closed.
To make the input device supervised, use two 1K resistors in the circuit (Figure 1-7).
Once the input device is supervised, CPAM can determine if a wire is cut or shorted.
Note
You must also configure the device as supervised in CPAM. See the Cisco Physical Access Manager User
Guide for more information.
1-10
OL-32499-01
Chapter 1
Overview
Understanding Supervised and Unsupervised Input Devices
Figure 1-7
1-11
Chapter 1
Overview
Power Options
Power Options
Table 1-3 summarizes the power options for each module. The Cisco Physical Access Gateway supports
Power over Ethernet (PoE) and DC power. All other modules support DC power only.
The DC power connections on each module are Voltage In (VIN) and Ground (GND).
For information on configuring PoE, see the documentation for your network switch. Your switch
must support PoE and be properly configured to use this feature with the Cisco Physical Access
Gateway.
Table 1-3
Module
12 through 24V DC
Supported
Supported
Not Supported
Supported
Not Supported
Supported
Not Supported
Supported
Current Draw Requirements for the Cisco Physical Access Control Modules
Module
Current Draw
Requirement
1.5A
1A
1A
N/A
1A
N/A
Notes
1-12
OL-32499-01
Chapter 1
Overview
Power Options and Requirements
If the base on a lock device receives power from an external power source, install an isolation relay
between the output device and the Gateway, Reader, or Output module.
Install a MOV (Metal Oxide Varistor) surge protection product, such as the Ditek DTK-ESS Electric
Switch Suppressor kit from Diversified Technology Group. An example installation is shown in
Figure 1-8. You can also use a diode 4N4001 for surge suppression.
Figure 1-8
Cisco Access
Control Module
Surge
Suppressor
+
Output Device
Surge
Suppressor
277557
Power Source
Terminal Strip
1-13
Chapter 1
Overview
5
2
4
5
3
187050
5
1
Screws
1-14
OL-32499-01
Chapter 1
Overview
Mounting a Gateway or Optional Module
Hardware Item
Quantity
Screws
1-15
Chapter 1
Overview
1-16
OL-32499-01
CH A P T E R
Configuring and Managing the Gateway Using a Direct Connection, page 2-15
Understanding Network Time Protocol (NTP) Settings, page 2-15
Connecting a PC to the Gateway, page 2-16
Entering the Gateway Network Settings, page 2-17
Changing the User Password, page 2-19
Upgrading the Gateway Firmware Using a Direct Connection, page 2-20
Displaying Serial Numbers and Other Information, page 2-23
Configuring the Gateway Using the Cisco Physical Access Manager, page 2-24
2-1
Chapter 2
Overview
Overview
The Cisco Physical Access Gateway (Figure 2-1) is installed near each door to provide access control
and connections for card readers, door locks and other input and output devices. The Gateway is
connected to the Cisco Physical Access Manager using an Ethernet connection to the IP network. Power
is supplied through a Power over Ethernet (PoE) connection, or using a DC power source. Each Gateway
includes connections for up to two Wiegand door readers, three input devices, and three output devices.
Optional expansion modules are available to add additional doors and devices to the Gateway.
Figure 2-1
2-2
OL-32499-01
Chapter 2
Package Contents
Each Cisco Physical Access Gateway includes the following:
Six End-Of-Line (EOL) 1K termination resistors (used for supervised input interfaces)
Type
Quantity
10 Pin
3 Pin
2 Pin
3
10
9
1
2
8
7
4
6
2
187040
2-3
Chapter 2
Figure 2-3
9 10
4
3
2
187039
11
1
PowerTwo-pin connector for Voltage In (VIN) and Ground (GND) to connect a 12 to 24 VDC
external power source.
CANA three-wire CAN bus is used to connect additional modules, including the Cisco Reader
Module, Cisco Input Module, and Cisco Output Module.
Note
Modules are connected using the CAN1 interface. The CAN2 interface is not supported
in this release.
SVR (Server)When the LED is steady green, the Gateway is connected to a Cisco PAM
appliance.
ETH 0: connects the Gateway to the network. ETH 0 also supports Power over Ethernet
(PoE) for the device (optional).
ETH 1: connects the device to a PC to access the device configuration web page.
One 10-pin Wiegand/clock and data reader interface to connect a single door reader.
Two 5-pin Wiegand/clock and data interfaces to connect two door readers (for installations
where a 5-pin interface is sufficient).
Note
Disconnect power from the Gateway or Reader module before connecting reader devices
to the modules. Connecting a reader device when the modules are powered can cause the
Gateway or Reader module to malfunction.
2-4
OL-32499-01
Chapter 2
Input interfacesThree input interfaces used to sense the contact closure. Each input can be
configured as supervised or unsupervised and can be configured to sense a Normally Open (NO)
or Normally Closed (NC) contact.
An unsupervised input senses a simple contact closure state, including Normal or Alarm.
When connected to open contacts, the terminal voltage range is 4V to 5V. For closed
contacts, the voltage range is 0V to 0.7V.
A supervised input senses four contact states, including Normal, Alarm, Open and Short.
These inputs require 1K End-Of-Line (EOL) termination resistors installed at the contacts
(two resistors are included in the accessory kits for each Input port).
Output interfacesThree Form C (5A @ 30V) relay output interfaces. Each output connection
can be configured as either Normally Closed (NC) or Normally Open (NO).
C & NO connection: The relay is normally open. The circuit is closed when triggered.
C & NC connection: The relay is normally closed. The circuit is opened when triggered.
Notes:
Install surge protection between the output device and the Cisco PAM module, as described
in the Installing Surge Suppressors on Output Device Connections section on page 1-13.
Common (C) is always used, and either NC or NO is used to complete the connection.
All Generic Output devices installed in Cisco PAM systems prior to release 1.1.0, were
connected to the Gateway, Reader, or Output modules with the wiring reversed. If upgrading
to Cisco PAM release 1.1.0 from an earlier release, disconnect all Generic Output devices
and do the following:
Connect Normally Open devices to the N.O. and C connectors on the Gateway, Reader,
or Output module.
Connect Normally Closed devices to the N.C. and C connectors on the Gateway, Reader,
or Output module.
9
PFPower fail input: an unsupervised input that raises a power fail alarm when the circuit is
open. Can be configured as an additional unsupervised port. An unsupervised input indicates
only normal or alarm. The corresponding LED is red when circuit is open (when no input is
connected).
10
TMTamper input: an unsupervised input that raises a tamper alarm when the circuit is open.
Can be configured as an additional unsupervised port. An unsupervised input indicates only
normal or alarm. The corresponding LED is red when circuit is open (when no input is
connected).
11
ResetResets the device. See the Resetting the Cisco Physical Access Gateway section on
page 2-25 for more information.
LED Status
Table 2-1 describes the Gateway module status LEDs:
Table 2-1
Status
Gateway LEDs
Description
SVR
Steady Green
2-5
Chapter 2
Table 2-1
Status
Description
GREEN
BLINKING GREEN
BLINKING RED
RED
Solid Green
Blinking Green
Note
2-6
OL-32499-01
Chapter 2
Before you install a Cisco Physical Access Gateway, verify the following:
Verify that the module has access to a power source. See the Power Options and Requirements
section on page 1-12 for more information.
Verify that you have the necessary mounting brackets or other hardware. See the Mounting a
Gateway or Optional Module section on page 1-14.
Procedure
To install the Cisco Physical Access Gateway, perform the following procedure:
Step 1
Mount the Gateway to a wall. See the Mounting a Gateway or Optional Module section on page 1-14
for more information.
Step 2
If using a DC power source, insert a two-pin connector plug into the DC power port (Figure 2-4),
and connect the Voltage In (VIN) and ground (GND) wires.
If using PoE, connect an Ethernet cable from the IP network to the ETH0 port (Figure 2-4).
See the Power Options and Requirements section on page 1-12 for more information.
2-7
Chapter 2
271594
Figure 2-4
Step 3
ETH0 for PoEConnects the Ethernet cable from the Access Layer switch to the Gateway. To
use this power option, the switch must support PoE.
Connect one or two door reader devices to the Wiegand interface using one of the following
configurations:
Connect one or two door readers using 5-pin Wiegand interface connections (for installations where
a 5-pin interface is sufficient).
2-8
OL-32499-01
Chapter 2
Figure 2-5 shows the location of the Wiegand interface connections. The table describes the connections
for 10-pin and 5-pin reader interface connections. The wire connectors from the reader device are shown
in parentheses. If attaching a second reader, use the alternative connections shown in the column on the
far right.
Figure 2-5
271603
10
8
6
5
3
Chassis
Label
One Reader
Description 10 Wire Connection
First Reader in a
5 Wire Connection
Second Reader in a
5 Wire Connection
PWR
+12v
PWR (red) 1
PWR (red)
PWR (red)
GND
Ground
GND (black)
GND (black)
GND (black)
D0
Data 0
D0 (green)
D0 (green)
----------
D1/CLCK
Data 1
D1/CLCK (white)
D1/CLCK (white)
----------
DRTN
Shield
DRTN (shield)
DRTN (shield)
DRTN (shield)
GRN
Output 2
GRN (orange)
GRN (orange)
----------
RED
Output
RED (brown)
----------
BPR
Output
(Beeper)
BPR (yellow)
(yellow)
----------
GRN (orange)
----------
2-9
Chapter 2
Chassis
Label
One Reader
Description 10 Wire Connection
First Reader in a
5 Wire Connection
Second Reader in a
5 Wire Connection
HCRD
Hold
Control
HCRD (blue)
----------
D1/CLCK (white)
10
CP
Card
Present
CP (purple)
----------
D0 (green)
Insert two-pin connector plugs into the input ports (see Figure 2-7).
b.
(Optional, for supervised input connections only). Install two End-Of-Line (EOL) 1K termination
resistors in each supervised input interface (one terminator in each connector). Figure 2-6 shows the
terminator installation for a Normally Closed (NC) and Normally Open (NO) input connection.
Figure 2-6
1K,, 1%
1K,, 1%
1K,, 1%
1K,, 1%
c.
Note
NC
NO
187838
Step 4
Connect the wires from the input devices (see Figure 2-7).
Each of the input connections can be configured as supervised or unsupervised. The tamper and
power fail inputs can be configured as additional unsupervised ports. A supervised input
supports four states: normal, alarm, open and short. An unsupervised input indicates only normal
or alarm.
2-10
OL-32499-01
Chapter 2
271592
Figure 2-7
Step 5
TMTamper input: an unsupervised input that raises a tamper alarm when the circuit is open.
Can be configured as a general input device using the Cisco Physical Access Manager. An
unsupervised input indicates only normal or alarm. The corresponding LED is red when circuit
is open (when no input is connected).
PFPower fail input: an unsupervised input that raises a power fail alarm when the circuit is
open. Can be configured as an additional unsupervised port. An unsupervised input indicates
only normal or alarm. The corresponding LED is red when circuit is open (when no input is
connected).
Connect output devices to the Gateway (Figure 2-8). Each of the three Form C (5A @ 30V) relay output
connections can be configured as either Normally Closed (NC) or Normally Open (NO).
a.
b.
triggered.
2-11
Chapter 2
271593
Figure 2-8
Step 6
Note
1
3
Insert a three-pin connector plug into the CAN1 port, as shown in Figure 2-9.
b.
Connect the CAN wires to the CAN bus, as shown in Figure 2-10.
c.
On the last device in the CAN bus, set the CAN terminator switch to ON. The CAN terminator
switch in included on the Reader, Input and Output modules only (the Gateway is always the first
device in the CAN bus). Set the terminator switch to OFF for all other modules in the CAN bus.
Modules are connected using the CAN1 interface. The CAN2 interface is not supported in this release.
2-12
OL-32499-01
Chapter 2
271590
Figure 2-9
CAN+
Connects to the positive terminal of the CAN bus.
Shield
Connects to GND and/or Shield.
Figure 2-10
CAN+
Sheild
CAN-
Reader Module
Input Module
Output Module
271589
Gateway Module
Note
On the last device in the CAN bus, set the CAN terminator switch to ON. The CAN terminator switch
in included on the Reader, Input and Output modules only (the Gateway is always the first device in the
CAN bus).
2-13
Chapter 2
Step 7
Connect the Gateway to the IP network by connecting an Ethernet cable to the ETH0 port, as shown in
Figure 2-11.
ETH 0 Ethernet Connection for the Cisco Physical Access Gateway
271591
Figure 2-11
1
1
Step 8
The ETH0 connection can also be used for Power over Ethernet.
Note
The ETH1 port is used to connect a PC to the Gateway for configuration and monitoring.
See the Configuring and Managing the Gateway Using a Direct Connection section on
page 2-15 for more information.
Continue to the Configuring the Gateway Using the Cisco Physical Access Manager section on
page 2-24.
2-14
OL-32499-01
Chapter 2
Tip
You can also use the Cisco PAM desktop software to enter network settings and upgrade firmware
images. See the Configuring the Gateway Using the Cisco Physical Access Manager section on
page 2-24.
Gateways can receive the NTP server setting from a DHCP server, or by using the Cisco PAM
desktop software.
To enter the Gateway DHCP settings, see the Entering the Gateway Network Settings section
on page 2-17.
If DHCP is used to define the Gateway NTP server, any NTP settings defined using the
Cisco PAM desktop software will not apply (the DHCP configuration takes precedence).
To enter the NTP setting for a single Gateway using Cisco PAM desktop software, choose
Hardware from the Doors menu, right-click a Gateway module, and choose Set Gateway
Address.
Beginning with Cisco PAM Release 1.3.0, you can also change the NTP server setting for
multiple Gateways (Right-click the Access GW Driver and choose the Set NTP Server
command). See the Cisco Physical Access Manager User Guide for instructions.
To enter the NTP setting on the Cisco PAM server, use the Cisco PAM web administration tool. See
the Cisco Physical Access Manager User Guide for instructions.
2-15
Chapter 2
Note
Other systems that are integrated with Cisco PAM, such as the Video Surveillance Manager (Cisco
VSM), should use the same NTP server setting.
Your PC must be configured to connect to the 192.168.1.0 network using Ethernet. Use any static
host address on the network other than 192.168.1.42.
You can use a DHCP server to assign an IP address for the Gateway.
If a DHCP server is not used, gather the Cisco Physical Access Gateway IP address, IP gateway,
subnet mask.
The domain name server (DNS) for the Gateway if DNS names (not IP addresses) are used for the
NTP or Cisco PAM addresses.
Procedure
Connect an Ethernet cable from a PC to the ETH1 interface on the Gateway module.
See the Physical Overview and Port Description section on page 2-3 for the port location.
Be sure to connect your PC to the ETH1 port. The ETH0 port is used for network communication.
Your PC must be configured to connect to the 192.168.1.0 network using Ethernet. Use any static
host address on the network other than 192.168.1.42.
Step 2
Open a web browser on your PC and enter https://192.168.1.42. to access the web-based
administration pages.
Step 3
2-16
OL-32499-01
Chapter 2
Figure 2-12
The web administration pages appear, and are described in the following sections.
Tip
ETH0 Configuration: the ETH0 port provides IP network connectivity with the Cisco PAM
appliance.
DNS Configuration: enter a DNS configuration if names (not IP addresses) are used for the NTP
or CPAM addresses.
Cisco PAM Configuration: defines the IP address and port of the Cisco PAM appliance that is used
to manage the Gateway.
Gateway modules can be added to the IP network before or after the full module configuration is entered
in Cisco PAM. For more information, see the Cisco Physical Access Manager User Guide.
Procedure
Enter the ETH0 Configuration settings, as shown in Figure 2-13. The ETH0 port is used for network
communications with the Cisco PAM appliance.
a.
If a Dynamic Host Configuration Protocol (DHCP) server is configured on your IP network, check
the DHCP box for ETH0 to automatically configure the required IP network settings, including IP
address, Subnet Mask, and Gateway. The DHCP check box is checked by default.
b.
(Optional) If a DHCP server is not used to assign IP address settings, enter the following information
in the ETH0 fields:
IP address: Enter the IP address of the Cisco Physical Access Gateway.
Subnet Mask: Enter the subnet mask.
Gateway: Enter the IP gateway address.
2-17
Chapter 2
Figure 2-13
Step 2
(Optional) Enter the DNS Server address if names (not IP addresses) are used for the CPAM address.
Step 3
Enter the Cisco PAM IP Address (IP address or name) to enable Gateway communication with the
appliance.
b.
Enter the Port number for the Cisco PAM appliance. The port number must be greater than 1024 and
less 65535. The default is 8020.
Tip
DHCP can also be configured to supply the Gateway with the IP address of the Cisco PAM
appliance by configuring option 150 in the DHCP response. The Cisco PAM appliance TCP port
number can be provided by DHCP option 151 of the DHCP response.
c.
Enable SSL: The secure socket layer (SSL) is enabled for secure communication between the
Gateway and Cisco PAM appliance by default. If necessary SSL can be disabled by unchecking the
Enable SSL check box.
Note
Step 4
SSL is enabled by default on all Gateways and Cisco PAM appliances. If SSL is disabled for a
Gateway but enabled for Cisco PAM, the Gateway will not be able to connect to the appliance.
If the SSL settings are changed, reset all Gateways and the Cisco PAM appliance. We
recommend enabling SSL to ensure secure communications.
Click Save to save the settings. Wait until the Gateway resets and the web browser displays the screen
Network Settings Applied. Or click:
Reset Application: The Reset Application restarts the Gateway to clear any software issues.
configuration/settings(re-initialized). This does not impact stored data. Again the Gateway
reconnects with the server after reload.
2-18
OL-32499-01
Chapter 2
Reset Factory Defaults:This command deletes all information on the device (including log and
event data), resets the password and all other configurations to the factory default. Any custom
configurations previously entered on the device are also removed.
Delete Events: delete all events stored on the Gateway.
Delete Configuration: delete the module configuration. The configuration is automatically
dowloaded when the gateway establishes communication with the Cisco PAM appliance.
Delete Credentials: delete the credential data stored on the Gateway.The credential is
automatically downloaded when the gateway establishes communication with Cisco PAM
appliance.
Note
Step 5
Step 6
Perform additional configuration, verification, and monitoring tasks as described in the Cisco Physical
Access Manager User Guide.
You can also change the password for one or more Gateways using the Cisco PAM desktop software. See
the Changing Gateway Passwords section in the Cisco Physical Access Manager User Guide for more
information.
The Gateway password can be added/reset from CPAM also.
2-19
Chapter 2
Procedure
To change the password used to access the Gateway, perform the following procedure:
Step 1
Step 2
Step 3
Step 4
Step 5
Note
Tip
To reset the device to the default password, see the Hard Reset (Restore Factory Defaults) section on
page 2-25.
You can also upgrade the firmware for a single Gateway, or all Gateways, over the network using the
Cisco PAM desktop software. For instructions, see the Cisco Physical Access Manager User Guide.
2-20
OL-32499-01
Chapter 2
Procedure
To upgrade the Gateway firmware from a PC directly connected to the module, perform the following
procedure:
Step 1
Log on to the Gateway administration tool, as described in the Connecting a PC to the Gateway section
on page 2-16.
Step 2
Step 3
Step 4
Tip
Current Images: a list of the firmware images currently loaded on the Gateway module.
Running: the green check in the Running column indicates the image operating the Gateway.
Active: the green check in the Active column indicates the image set as the active image. This is the
image that will become the Running image when the Gateway is reset.
Upload a new firmware image from a file located on a local disk or on a remote TFTP server:
You can also choose an existing image: highlight the image name, click the Set Active button, and then
reset the Gateway. The new active image becomes the running image only after the Gateway is reset (see
the Soft Reset (Powercycle) section on page 2-25).
2-21
Chapter 2
b.
Click Browse and choose a file from located on a local or network disk. The selected file appears in
the Image Name field. You can also manually enter the directory path and filename.
b.
c.
Enter the directory Path on the TFTP server for the firmware image. Be sure the path and filename
are valid. The administration tool does not verify remote server paths.
Tip
The directory path and filename for the remote image displays in the second Image Name field.
You can also enter the path and filename manually.
d.
Note
Choose the options that will occur after the image is loaded to the Gateway:
When upgrading Gateway firmware images from a release prior to release 1.1.0, choose all available
options.
Active image: (checked by default) make the firmware file new active image.
Reset gateway: (checked by default) perform a soft reset to powercycle the module. See the
Soft Reset (Powercycle) section on page 2-25 for more information. Changes to the active
image are applied only after the Gateway is reset.
Delete credentials: delete the credential data stored on the Gateway.The credential is
automatically downloaded when the Gateway establishes communication with Cisco PAM
appliance.
Delete configuration: delete the module configuration. The configuration is automatically
dowloaded when the Gateway establishes communication with the Cisco PAM appliance.
Delete events: delete all events stored on the Gateway.
Step 5
Click Upgrade to copy the firmware image to the Gateway module and perform the selected options (if
any).
When all options are selected, wait approximately 10-15 minutes for the firmware upgrade to complete.
Note
The Gateway must be reset to enable the new active image. See the Soft Reset (Powercycle) section
on page 2-25.
2-22
OL-32499-01
Chapter 2
Log on to the Gateway administration tool, as described in the Connecting a PC to the Gateway section
on page 2-16.
Step 2
2-23
Chapter 2
Tip
The serial number is also displayed on the back of the module. To view the serial number in Cisco PAM,
open the Hardware module device view, right-click on the Gateway Controller, and choose Edit to
view the module properties.
See the Cisco Physical Access Manager User Guide for more information.
Tip
You can configure the Gateway modules in Cisco PAM before or after they are added to the IP network.
2-24
OL-32499-01
Chapter 2
Hardware reset button: Press and release the reset button once. See Figure 2-2 on page 2-3 for the
location of the Reset button.
Gateway web administration tool: Follow the instructions in the Configuring and Managing the
Gateway Using a Direct Connection section on page 2-15 to connect a PC to the Gateway, and click
the Reset button at the bottom of the screen.
Cisco PAM desktop software: Open the Hardware module in the Doors menu and right-click on
a Gateway Controller (blue icon). Choose Reset from the menu.
Allow five to 10 minutes for the hard reset erase operation to complete.
Do not disconnect power from the module until the hard reset erase process is complete. Loss of
power during a hard reset can result in equipment malfunction.
The module reboots with the existing firmware image after the hard reset is complete.
Hardware reset button: Press Reset button three times in succession. See Figure 2-2 on page 2-3
for the location of the Reset button.
Gateway web administration tool: Follow the instructions in the Configuring and Managing the
Gateway Using a Direct Connection section on page 2-15 to connect a PC to the Gateway, and click
the Restore Factory Defaults button at the bottom of the screen.
2-25
Chapter 2
2-26
OL-32499-01
CH A P T E R
3-1
Chapter 3
Package Contents
The Cisco Reader Module is connected to a required Cisco Physical Access Gateway using a CAN
connection, as shown in Figure 3-2.
Figure 3-2
Access Layer
switch
Door and
Related
Hardware
Ethernet
Cisco
Access Gateway
CAN connection
271602
Cisco
IP Network
Cisco Access
Control Manager
Cisco Reader
Module (Optional)
Door and
Related
Hardware
Package Contents
Each Cisco Reader Module includes the following:
Type
Quantity
10 Pin
3 Pin
2 Pin
3-2
OL-32499-01
Chapter 3
9
8
1
2
7
6
5
2
187049
3-3
Chapter 3
Figure 3-4
9 10
187038
Power
Two-pin connector for Voltage In (VIN) and Ground (GND) to connect a 12 to 24 VDC
external power source.
CAN interfaces
A 3-wire CAN bus is used to connect additional modules.
Note
Modules are connected using the CAN1 interface. The CAN2 interface is not
supported in this release.
CAN terminator
The CAN terminator switch is set to ON for the last device in a CAN wiring bus. This switch
is set to set to OFF for all other devices in the CAN bus.
Serial Interface
The RS-485 interface is not supported in this release.
Wiegand Interface
One 10-pin Wiegand/clock and data reader interface. This interface can be configured as
two 5-pin Wiegand/clock and data interfaces for installations where a 5-pin interface is
sufficient.
Note
Disconnect power from the Gateway or Reader module before connecting reader
devices to the modules. Connecting a reader device when the modules are powered
can cause the Gateway or Reader module to malfunction.
3-4
OL-32499-01
Chapter 3
Input interfaces
Three input interfaces used to sense the contact closure. Each input can be configured as
supervised or unsupervised and can be configured to sense a Normally Open (NO) or
Normally Closed (NC) contact.
A supervised input senses four contact states, including Normal, Alarm, Open and
Short. These inputs require 1K End-Of-Line (EOL) termination resistors installed at the
contacts (two resistors are included in the accessory kits for each Input port).
Output interfaces
Three Form C (5A @ 30V) relay output interfaces. Each output can be configured as either
Normally Closed (NC) or Normally Open (NO).
C & NO connection: The relay is normally open. The circuit is closed when triggered.
C & NC connection: The relay is normally closed. The circuit is opened when triggered.
Notes:
Install surge protection between the output device and the Cisco PAM module, as
described in the Installing Surge Suppressors on Output Device Connections section
on page 1-13.
Common (C) is always used, and either NC or NO is used to complete the connection.
All Generic Output devices installed in Cisco PAM systems prior to release 1.1.0, were
connected to the Gateway, Reader, or Output modules with the wiring reversed. If
upgrading to Cisco PAM release 1.1.0 from an earlier release, disconnect all Generic
Output devices and do the following:
Connect Normally Open devices to the N.O. and C connectors on the Gateway,
PF
Power fail input: an unsupervised input that raises a power fail alarm when the circuit is
open. Can be configured as an additional unsupervised port. An unsupervised input
indicates only normal or alarm. The corresponding LED is red when circuit is open (when
no input is connected).
TM
Tamper input: an unsupervised input that raises a tamper alarm when the circuit is open.
Can be configured as an additional unsupervised port. An unsupervised input indicates only
normal or alarm. The corresponding LED is red when circuit is open (when no input is
connected).
3-5
Chapter 3
Table 3-1
Wiegand Wiring
Chassis Label
One 10 Wire
Wiegand
PWR
PWR (red)
PWR (red)
PWR (red)
GND
GND (black)
GND (black)
GND (black)
D0
D0 (green)
D0 (green)
D1/CLCK
D1/CLCK (white)
D1/CLCK (white)
DRTN
DRTN (shield)
DRTN (shield)
DRTN (shield)
GRN
GRN (orange)
GRN (orange)
RED
RED (brown
GRN (orange)
BPR
BPR (blue)
HCRD
HCRD (yellow)
D1/CLCK (white)
CP
CP (purple)
D0 (green)
Status LEDs
Table 3-2 describes the Gateway module status LEDs:
Table 3-2
Gateway LEDs
Status
Description
GREEN
BLINKING GREEN
BLINKING RED
RED
Solid Green
Blinking Green
There are no Ethernet ports. The Cisco Reader Module is not directly connected to the IP network,
and is not directly configured.
The Cisco Reader Module does not support Power over Ethernet (PoE). The device is connected to
a DC power source.
3-6
OL-32499-01
Chapter 3
The Cisco Reader Module must be terminated if it is the last device in a CAN wiring bus. See the
CAN Bus Connections for Optional Modules section on page 1-7 for more information.
Verify that the module has access to a power source. See the Power Options and Requirements
section on page 1-12 for more information.
Verify that you have the necessary mounting brackets or other hardware. See the Mounting a
Gateway or Optional Module section on page 1-14.
Procedure
Mount the module to a wall. See the Mounting a Gateway or Optional Module section on page 1-14
for more information.
Step 2
Insert a two-pin connector plug into the DC power port (Figure 3-5)
b.
See the Power Options and Requirements section on page 1-12 for more information.
Power Connection: for the Cisco Reader Module
271601
Figure 3-5
3-7
Chapter 3
Step 3
Insert a three-pin connector plug into the CAN1 port, as shown in Figure 3-6.
b.
Connect the CAN wires to the CAN bus, as shown in Figure 3-7
c.
Turn the CAN terminator ON if the device is the last device in a CAN wiring bus.
Note
The CAN terminator switch in included on the Reader, Input and Output modules only (the Gateway is
always the first device in the CAN bus). Set the terminator switch to OFF for all other modules in the
CAN bus.
Note
271600
Figure 3-6
CAN+
Connects to the positive terminal of the CAN bus.
Shield
Connects to GND and/or Shield.
CAN Terminator
Turn the terminator ON if the device is the last device in a CAN wiring bus.
3-8
OL-32499-01
Chapter 3
Figure 3-7
CAN+
Sheild
CAN-
Reader Module
Input Module
Output Module
271589
Gateway Module
Step 4
Connect one or two door reader devices to the Wiegand interface using one of the following
configurations:
Connect one or two door readers using 5-pin Wiegand interface connections (for installations where
a 5-pin interface is sufficient).
3-9
Chapter 3
Figure 3-8 shows the location of the Wiegand interface connections. The table describes the connections
for 10-pin and 5-pin reader interface connections. The wire connectors from the reader device are shown
in parentheses. If attaching a second reader, use the alternative connections shown in the column on the
far right.
Figure 3-8
271603
10
8
6
5
3
Chassis
Label
One Reader
Description 10 Wire Connection
First Reader in a
5 Wire Connection
Second Reader in a
5 Wire Connection
PWR
+12v
PWR (red) 1
PWR (red)
PWR (red)
GND
Ground
GND (black)
GND (black)
GND (black)
D0
Data 0
D0 (green)
D0 (green)
----------
D1/CLCK
Data 1
D1/CLCK (white)
D1/CLCK (white)
----------
DRTN
Shield
DRTN (shield)
DRTN (shield)
DRTN (shield)
GRN (orange)
GRN (orange)
----------
GRN
Output
RED
Output
RED (brown)
----------
BPR
Output
(Beeper)
BPR (yellow)
----------
GRN (orange)
----------
3-10
OL-32499-01
Chapter 3
Chassis
Label
One Reader
Description 10 Wire Connection
First Reader in a
5 Wire Connection
Second Reader in a
5 Wire Connection
HCRD
Hold
Control
HCRD (blue)
----------
D1/CLCK (white)
CP
Card
Present
CP (purple)
----------
D0 (green)
Insert two-pin connector plugs into the input ports (Figure 3-10).
b.
(Optional, for supervised input connections only). Install two End-Of-Line (EOL) 1K termination
resistors in each supervised input interface (one terminator in each connector). Figure 3-9 shows the
terminator installation for a Normally Closed (NC) and Normally Open (NO) input connection.
Figure 3-9
1K,, 1%
1K,, 1%
1K,, 1%
1K,, 1%
c.
Note
NC
NO
187838
Step 5
Each of the input connections can be configured as supervised or unsupervised. The tamper and
power fail inputs can be configured as additional unsupervised ports. A supervised input
supports four states: normal, alarm, open and short. An unsupervised input indicates only normal
or alarm.
3-11
Chapter 3
271592
Figure 3-10
TM
Tamper input: an unsupervised input that raises a tamper alarm when the circuit is open. Can
be configured as a general input device using the Cisco Physical Access Manager. The
corresponding LED is red when circuit is open (when no input is connected).
PF
Power fail input: an unsupervised input that raises a power fail alarm when the circuit is open.
Can be configured as an additional unsupervised port. The corresponding LED is red when
circuit is open (when no input is connected).
Step 6
Insert three-pin connector plugs into the output ports (Figure 3-11).
b.
3-12
OL-32499-01
Chapter 3
If the relay is normally open, use the C & NO connections. The circuit is closed when triggered.
If the relay is normally closed, use the C & NC connections. The circuit is opened when
triggered.
Output Connections: Cisco Physical Access Gateway and Reader Module
271593
Figure 3-11
Step 7
C (Common)
See the Cisco Physical Access Manager User Guide for information to configure the module ports.
3-13
Chapter 3
3-14
OL-32499-01
CH A P T E R
4-1
Chapter 4
Package Contents
The optional Cisco Input Module is connected to a Cisco Physical Access Gateway or Cisco Reader
Module using a CAN connection to provide connections for additional input devices, as shown in
Figure 4-2.
Figure 4-2
Ethernet
Cisco
Access Gateway
CAN connection
271597
Cisco
IP Network
Cisco Access
Control Manager
Cisco Reader
Module (Optional)
Door Readers
and Input/Output
devices
CAN connection
Additional
Input/Output devices
Package Contents
Each Cisco Input Module includes the following:
4-2
OL-32499-01
Chapter 4
Connector plugs:
Type
Quantity
3 Pin
2 Pin
13
6
5
1
2
4
187043
4-3
Chapter 4
Figure 4-4
187039
Power
Two-pin connector for Voltage In (VIN) and Ground (GND) to connect a 12 to 24 VDC
external power source.
CAN interface
A 3-wire CAN bus is used to connect additional modules.
Note
Modules are connected using the CAN1 interface. The CAN2 interface is not
supported in this release.
CAN Terminator
The CAN terminator switch is set to ON for the last device in a CAN wiring bus. This switch
is set to set to OFF for all other devices in the CAN bus.
Input connections
Ten input interfaces used to sense the contact closure. Each input can be configured as
supervised or unsupervised and can be configured to sense a Normally Open (NO) or
Normally Closed (NC) contact.
A supervised input senses four contact states, including Normal, Alarm, Open and
Short. These inputs require 1K End-Of-Line (EOL) termination resistors installed at the
contacts (two resistors are included in the accessory kits for each Input port).
4-4
OL-32499-01
Chapter 4
PF
Power fail input: an unsupervised input that raises a power fail alarm when the circuit is
open. Can be configured as an additional unsupervised port. The corresponding LED is red
when circuit is open (when no input is connected).
TM
Tamper input: an unsupervised input that raises a tamper alarm when the circuit is open.
Can be configured as an additional unsupervised port. The corresponding LED is red when
circuit is open (when no input is connected).
Status LEDs
Each input port includes a status LED that indicates the following information:
Table 4-1
Status
Description
OFF
GREEN
BLINKING GREEN
BLINKING RED
RED
Verify that the module has access to a power source. See the Power Options and Requirements
section on page 1-12 for more information.
Verify that you have the necessary mounting brackets or other hardware. See the Mounting a
Gateway or Optional Module section on page 1-14.
Procedure
Mount the module to a wall. See the Mounting a Gateway or Optional Module section on page 1-14
for more information.
Step 2
Insert a two-pin connector plug into the DC power port (Figure 4-5)
b.
See the Power Options and Requirements section on page 1-12 for more information.
4-5
Chapter 4
271599
Figure 4-5
1
2
Step 3
Insert a three-pin connector plug into the CAN1 port, as shown in Figure 4-6.
b.
Connect the CAN wires to the CAN bus, as shown in Figure 4-7
c.
Turn the CAN terminator ON if the device is the last device in a CAN wiring bus.
Note
The CAN terminator switch in included on the Reader, Input and Output modules only (the Gateway is
always the first device in the CAN bus). Set the terminator switch to OFF for all other modules in the
CAN bus.
Note
4-6
OL-32499-01
Chapter 4
271598
Figure 4-6
CAN+
Connects to the positive terminal of the CAN bus.
Shield
Connects to GND and/or Shield.
CAN Terminator
Turn the terminator ON if the device is the last device in a CAN wiring bus.
Figure 4-7
CAN+
Sheild
CAN-
Reader Module
Input Module
Output Module
271589
Gateway Module
Step 4
4-7
Chapter 4
(Optional, for supervised input connections only). Install two End-Of-Line (EOL) 1K termination
resistors in each supervised input interface (one terminator in each connector). Figure 4-8 shows the
terminator installation for a Normally Closed (NC) and Normally Open (NO) input connection.
Figure 4-8
1K,, 1%
1K,, 1%
1K,, 1%
1K,, 1%
c.
Note
Step 5
NC
NO
187838
b.
Each of the input connections can be configured as supervised or unsupervised. The tamper
(TM) and power fail (PF) inputs can be configured as additional unsupervised ports. A
supervised input supports four states: normal, alarm, open and short. An unsupervised input
indicates only normal or alarm.
See the Cisco Physical Access Manager User Guide for information to configure the module ports.
4-8
OL-32499-01
CH A P T E R
5-1
Chapter 5
Package Contents
The Cisco Output Module is connected to a Cisco Physical Access Gateway or Cisco Reader Module
using a CAN connection to provide connections for additional output devices, as, as shown in Figure 5-2.
Figure 5-2
Ethernet
Cisco
Access Gateway
CAN connection
Door Readers
and Input/Output
devices
271597
Cisco
IP Network
Cisco Access
Control Manager
Cisco Reader
Module (Optional)
CAN connection
Additional
Input/Output devices
Package Contents
Each Cisco Output Module includes the following:
Connector plugs:
Type
Quantity
3 Pin
2 Pin
5-2
OL-32499-01
Chapter 5
6
5
1
2
3
187046
5-3
Chapter 5
Figure 5-4
187045
Power
Two-pin connector for Voltage In (VIN) and Ground (GND) to connect a 12 to 24 VDC
external power source.
CAN interface
A 3-wire CAN bus is used to connect additional modules.
Note
Modules are connected using the CAN1 interface. The CAN2 interface is not
supported in this release.
CAN terminator
The CAN terminator switch is set to ON for the last device in a CAN wiring bus. This switch
is set to set to OFF for all other devices in the CAN bus.
5-4
OL-32499-01
Chapter 5
Output Interfaces
Eight Form C (5A @ 30V) relay outputs. Each output can be configured as either Normally
Closed (NC) or Normally Open (NO).
C & NO connection: The relay is normally open. The circuit is closed when triggered.
C & NC connection: The relay is normally closed. The circuit is opened when triggered.
Notes:
Install surge protection between the output device and the Cisco PAM module, as
described in the Installing Surge Suppressors on Output Device Connections section
on page 1-13.
Common (C) is always used, and either NC or NO is used to complete the connection.
All Generic Output devices installed in Cisco PAM systems prior to release 1.1.0, were
connected to the Gateway, Reader, or Output modules with the wiring reversed. If
upgrading to Cisco PAM release 1.1.0 from an earlier release, disconnect all Generic
Output devices and do the following:
Connect Normally Open devices to the N.O. and C connectors on the Gateway,
PF
Power fail input: an unsupervised input that raises a power fail alarm when the circuit is
open. Can be configured as an additional unsupervised port. An unsupervised input
indicates only normal or alarm. The corresponding LED is red when circuit is open (when
no input is connected).
TM
Tamper input: an unsupervised input that raises a tamper alarm when the circuit is open.
Can be configured as an additional unsupervised port. An unsupervised input indicates only
normal or alarm. The corresponding LED is red when circuit is open (when no input is
connected).
Status LEDs
Each output port includes a status LED that indicates the following information:
Table 5-1
Status
Description
Off
Solid Green
Blinking Green
5-5
Chapter 5
Verify that the module has access to a power source. See the Power Options and Requirements
section on page 1-12 for more information.
Verify that you have the necessary mounting brackets or other hardware. See the Mounting a
Gateway or Optional Module section on page 1-14.
Procedure
Mount the module to a wall. See the Mounting a Gateway or Optional Module section on page 1-14
for more information.
Step 2
Insert a two-pin connector plug into the DC power port (Figure 5-5)
b.
See the Power Options and Requirements section on page 1-12 for more information.
5-6
OL-32499-01
Chapter 5
271599
Figure 5-5
1
2
Step 3
Insert a three-pin connector plug into the CAN1 port, as shown in Figure 5-6.
b.
Connect the CAN wires to the CAN bus, as shown in Figure 5-7
c.
Turn the CAN terminator ON if the device is the last device in a CAN wiring bus.
Note
The CAN terminator switch in included on the Reader, Input and Output modules only (the Gateway is
always the first device in the CAN bus). Set the terminator switch to OFF for all other modules in the
CAN bus.
Note
5-7
Chapter 5
271598
Figure 5-6
CAN+
Connects to the positive terminal of the CAN bus.
Shield
Connects to GND and/or Shield.
CAN Terminator
Turn the terminator ON if the device is the last device in a CAN wiring bus.
Figure 5-7
CAN+
Sheild
CAN-
Reader Module
Input Module
Output Module
271589
Gateway Module
Step 4
b.
5-8
OL-32499-01
Chapter 5
If the relay is normally open, use the C & NO connections. The circuit is closed when triggered.
If the relay is normally closed, use the C & NC connections. The circuit is opened when
triggered.
Step 5
See the Cisco Physical Access Manager User Guide for information to configure the module ports.
5-9
Chapter 5
5-10
OL-32499-01
A P P E N D I X
Environmental Specifications
This appendix contains the following:
Environmental Specifications for the Cisco Physical Access Gateway, page A-1
Item
Description
Housing
Aluminum
Dimensions
(LxWxH)
5 x 7 x 2.14 in.
Weight
Certifications
FCC
CSA
CE
Operating
Temperature
Indoors only
32 to 122F (0 to 50C)
A-1
Appendix A
Environmental Specifications
Table A-1
Humidity
Power
Item
Description
Housing
Aluminum
Dimensions
(LxWxH)
5 x 7 x 2.14 in.
Weight
Certifications
FCC
CSA
CE
Operating
temperature
Indoors only
Humidity
Power
32 to 122F (0 to 50C)
Item
Description
Housing
Aluminum
Dimensions
(LxWxH)
5 x 7 x 1.46 in.
127 x 178 x 37 mm
A-2
OL-32499-01
Appendix A
Environmental Specifications
Environmental Specifications for the Cisco Output Module
Table A-3
Weight
Certifications
FCC
CSA
CE
Operating
temperature
Indoors only
Humidity
Power
32 to 122F (0 to 50C)
Item
Description
Housing
Aluminum
Dimensions
(LxWxH)
5 x 7 x 1.46 in.
Weight
127 x 178 x 37 mm
With Plugs: 1.53 lb (716 g)
With Brackets: 1.59 lb (722 g)
With Plugs & Brackets: 1.69 lb (790 g)
Certifications
FCC
CSA
CE
Operating
temperature
Indoors only
Humidity
Power
32 to 122F (0 to 50C)
A-3
Appendix A
Environmental Specifications
A-4
OL-32499-01
A P P E N D I X
Safety Warnings
Before you install the device, observe the safety warnings in this section.
Warning
Waarschuwing
BELANGRIJKE VEILIGHEIDSINSTRUCTIES
Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan
veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij
elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van de standaard
praktijken om ongelukken te voorkomen. Gebruik het nummer van de verklaring onderaan de
waarschuwing als u een vertaling van de waarschuwing die bij het apparaat wordt geleverd, wilt
raadplegen.
BEWAAR DEZE INSTRUCTIES
B-1
Appendix B
Varoitus
Safety Warnings
TRKEIT TURVALLISUUSOHJEITA
Tm varoitusmerkki merkitsee vaaraa. Tilanne voi aiheuttaa ruumiillisia vammoja. Ennen kuin
ksittelet laitteistoa, huomioi shkpiirien ksittelemiseen liittyvt riskit ja tutustu
onnettomuuksien yleisiin ehkisytapoihin. Turvallisuusvaroitusten knnkset lytyvt laitteen
mukana toimitettujen knnettyjen turvallisuusvaroitusten joukosta varoitusten lopussa nkyvien
lausuntonumeroiden avulla.
SILYT NM OHJEET
Attention
Warnung
WICHTIGE SICHERHEITSHINWEISE
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu Verletzungen fhren
kann. Machen Sie sich vor der Arbeit mit Gerten mit den Gefahren elektrischer Schaltungen und
den blichen Verfahren zur Vorbeugung vor Unfllen vertraut. Suchen Sie mit der am Ende jeder
Warnung angegebenen Anweisungsnummer nach der jeweiligen bersetzung in den bersetzten
Sicherheitshinweisen, die zusammen mit diesem Gert ausgeliefert wurden.
BEWAHREN SIE DIESE HINWEISE GUT AUF.
Avvertenza
Advarsel
VIKTIGE SIKKERHETSINSTRUKSJONER
Dette advarselssymbolet betyr fare. Du er i en situasjon som kan fre til skade p person. Fr du
begynner arbeide med noe av utstyret, m du vre oppmerksom p farene forbundet med
elektriske kretser, og kjenne til standardprosedyrer for forhindre ulykker. Bruk nummeret i slutten
av hver advarsel for finne oversettelsen i de oversatte sikkerhetsadvarslene som fulgte med denne
enheten.
TA VARE P DISSE INSTRUKSJONENE
B-2
OL-32499-01
Appendix B
Safety Warnings
Aviso
Advertencia!
Varning!
VIKTIGA SKERHETSANVISNINGAR
Denna varningssignal signalerar fara. Du befinner dig i en situation som kan leda till personskada.
Innan du utfr arbete p ngon utrustning mste du vara medveten om farorna med elkretsar och
knna till vanliga frfaranden fr att frebygga olyckor. Anvnd det nummer som finns i slutet av
varje varning fr att hitta dess versttning i de versatta skerhetsvarningar som medfljer denna
anordning.
SPARA DESSA ANVISNINGAR
B-3
Appendix B
Aviso
Safety Warnings
Advarsel
VIGTIGE SIKKERHEDSANVISNINGER
Dette advarselssymbol betyder fare. Du befinder dig i en situation med risiko for
legemesbeskadigelse. Fr du begynder arbejde p udstyr, skal du vre opmrksom p de
involverede risici, der er ved elektriske kredslb, og du skal stte dig ind i standardprocedurer til
undgelse af ulykker. Brug erklringsnummeret efter hver advarsel for at finde oversttelsen i de
oversatte advarsler, der fulgte med denne enhed.
GEM DISSE ANVISNINGER
B-4
OL-32499-01
Appendix B
Safety Warnings
B-5
Appendix B
Safety Warnings
Warning
Waarschuwing
This product must be connected to a Power over Ethernet (PoE) IEEE 802.3af compliant power source.
Statement 369
Dit product moet worden verbonden met een stroomvoorziening die compatibel is met PoE
(power-over-ethernet) IEEE 802.3af.
B-6
OL-32499-01
Appendix B
Safety Warnings
Varoitus
Attention
Ce produit doit tre connect une source d'alimentation lectrique par cble Ethernet (PoE)
conforme la norme IEEE 802.3af.
Warnung
Dieses Produkt muss an eine Stromquelle angeschlossen sein, die mit dem IEEE 802.3af-Standard
Power-over-Ethernet (PoE) kompatibel ist.
Avvertenza
Advarsel
Aviso
Advertencia!
Varning!
Questo prodotto deve essere connesso a una fonte di alimentazione di tipo PoE
(power-over-ethernet) conforme a IEEE 802.3af.
Dette produktet m vre koblet til en Power-over-Ethernet (PoE) IEEE 802.3af-kompatibel
strmkilde.
Este produto tem de estar ligado a uma fonte de alimentao compatvel com a norma IEEE 802.3af,
tambm conhecida pela sigla Power over Ethernet (PoE).
Debe conectar este producto a una fuente de alimentacin en Ethernet (PoE) conforme con el
estndar IEEE 802.3af.
Denna produkt mste vara ansluten till en PoE IEEE 802.3af-kompatibel strmklla.
Warning
Waarschuwing
Varoitus
This product must be connected to a power-over-ethernet (PoE) IEEE 802.3af compliant power source
or an IEC60950 compliant limited power source. Statement 353
Dit product moet worden verbonden met een stroomvoorziening die compatibel is met PoE
(power-over-ethernet) IEEE 802.3af of een beperkte stroomvoorziening die compatibel is met
IEC60950.
Tm tuote on liitettv PoE (power-over-ethernet) IEEE 802.3af -yhteensopivaan virtalhteeseen tai
IEC60950-yhteensopivaan rajoitettuun virtalhteeseen.
B-7
Appendix B
Safety Warnings
Attention
Ce produit doit tre connect une source d'alimentation lectrique par cble Ethernet (PoE)
conforme la norme IEEE 802.3af ou une source d'alimentation limite conforme la norme
IEC60950.
Warnung
Dieses Produkt muss entweder an eine Stromquelle angeschlossen sein, die mit dem IEEE
802.3af-Standard Power-over-Ethernet (PoE) kompatibel ist oder an eine Stromquelle fr geringe
Leistungen, die IEC60950-kompatibel ist.
Avvertenza
Questo prodotto deve essere connesso a una fonte di alimentazione di tipo PoE
(power-over-ethernet) conforme a IEEE 802.3af o a una fonte di alimentazione conforme a IEC60950.
Advarsel
Dette produktet m vre koblet til en Power-over-Ethernet (PoE) IEEE 802.3af-kompatibel strmkilde
eller en IEC60950-kompatibel begrenset strmkilde.
Aviso
Este produto tem de estar ligado a uma fonte de alimentao compatvel com a norma IEEE 802.3af,
tambm conhecida pela sigla Power over Ethernet (PoE), ou a uma fonte de alimentao limitada
compatvel com a norma IEC60950.
Advertencia!
Varning!
Debe conectar este producto a una fuente de alimentacin en Ethernet (PoE) conforme con el
estndar IEEE 802.3af, o a una fuente limitada conforme con el estndar IEC60950.
Denna produkt mste vara ansluten till en PoE IEEE 802.3af-kompatibel strmklla eller en
IEC60950-kompatibel begrnsad strmklla.
B-8
OL-32499-01
Appendix B
Safety Warnings
Warning
Waarschuwing
Varoitus
Ultimate disposal of this product should be handled according to all national laws and regulations.
Statement 1040
Het uiteindelijke wegruimen van dit product dient te geschieden in overeenstemming met alle
nationale wetten en reglementen.
Tm tuote on hvitettv kansallisten lakien ja mrysten mukaisesti.
Attention
La mise au rebut ou le recyclage de ce produit sont gnralement soumis des lois et/ou directives
de respect de l'environnement. Renseignez-vous auprs de l'organisme comptent.
Warnung
Die Entsorgung dieses Produkts sollte gem allen Bestimmungen und Gesetzen des Landes
erfolgen.
Avvertenza
Lo smaltimento di questo prodotto deve essere eseguito secondo le leggi e regolazioni locali.
Advarsel
Endelig kassering av dette produktet skal vre i henhold til alle relevante nasjonale lover og
bestemmelser.
Aviso
Advertencia!
Varning!
Aviso
Advarsel
Deitar fora este produto em conformidade com todas as leis e regulamentos nacionais.
Al deshacerse por completo de este producto debe seguir todas las leyes y reglamentos nacionales.
Vid deponering hanteras produkten enligt gllande lagar och bestmmelser.
O descarte definitivo deste produto deve estar de acordo com todas as leis e regulamentaes
nacionais.
Endelig bortskaffelse af dette produkt skal ske i henhold til gldende love og regler.
B-9
Appendix B
Safety Warnings
Warning
Waarschuwing
Varoitus
Read the installation instructions before connecting the system to the power source. Statement 1004
Raadpleeg de installatie-instructies voordat u het systeem op de voedingsbron aansluit.
Lue asennusohjeet ennen jrjestelmn yhdistmist virtalhteeseen.
Attention
Avant de brancher le systme sur la source d'alimentation, consulter les directives d'installation.
Warnung
Vor dem Anschlieen des Systems an die Stromquelle die Installationsanweisungen lesen.
Avvertenza
B-10
OL-32499-01
Appendix B
Safety Warnings
Advarsel
Aviso
Advertencia!
Varning!
B-11
Appendix B
Safety Warnings
B-12
OL-32499-01
INDEX
delete
events 19
delete Credentials 19
active
delete events 19
state 10
active images
device
current 21
door wiring 9
running 21
input 5
devices
output 5
door
device wiring 9
CAN terminator 4
dynamic
reader
host configuration 17
input
output 7
card readers 5
locks 5
Cisco
E
enable SSL 18
input module 1
ETH 0 4
output module 1
ETH 1 4
reader module 1
events
configuration
delete 19
delete 19
host 17
Controller Area Network (CAN) bus 2
credentials
F
Fast Ethernet interfaces
delete 19
ETH 0
ETH 1 4
D
DC power 12
delete
configuration 19
credentials
G
ground (GND) wires 7
ground connection
input 11
Cisco Physical Access Gateway User Guide
OL-32499-01
21
Index
obtaining documentation 6
host
output
devices 5
reader 4
I
image
management 21
inactive
P
port description 3
state 10
Positive 11
input
device 5
ground connections 11
protocol
reader 4
input interfaces 5
R
L
reader
LED Status 5
input 4
locks 5
output 4
card readers 5
reboot 18
related documentation 7
remote TFTP server 22
reset application 18
management 21
image 21
RSS feeds 6
running images 21
running images 21
module
Cisco input 1
Cisco output 1
Cisco reader 1
S
safety warnings 6
mounting brackets 14
serial interface 4
soft reset (Powercycle) 25
state
active 10
22
OL-32499-01
Index
inactive 10
status LEDs 5
submitting a service request 6
supervised and unsupervised input devices 10
supervised input 5
surge suppressors 13
SVR 4
T
tamper input 5
termination resistors 3
U
unsupervised input 5
V
video surveillance manager 16
voltage in 7
W
web administration tool 15
Wiegand door readers 2
wiring
door device 9
23
Index
24
OL-32499-01