1 / 72

ASSA ABLOY

ASSA ABLOY. WELCOMES you to. Certified Integrator IP Enabled Lock Training. The Purpose of this class. Teaching you to set up and program the lock. The Purpose of this class. We will NOT be teaching:. Computer Networking Network Installation Network Encryption Network Security.

deron
Download Presentation

ASSA ABLOY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ASSA ABLOY WELCOMESyou to Certified Integrator IP Enabled Lock Training

  2. The Purpose of this class Teaching you to set up and program the lock.

  3. The Purpose of this class We will NOT be teaching: • Computer Networking • Network Installation • Network Encryption • Network Security Only What’s NeededTo Make The Lock Work!

  4. If More Information Is Needed… We Can Provide The Documents That Will Answer Your Questions!

  5. Agenda: • Conducting a site survey • Setting up the lock • Using the software

  6. Sequence of Events

  7. First, A Site Survey is conducted to ensure proper wireless coverage

  8. Second, The Network Administrator provides information about the network

  9. Third, He enters this information into the NCT Program, providing a file for the CI

  10. Fourth, The CI enters info about the lock using the LCT Program

  11. Fifth, He Uploads all this info into the lock

  12. Sixth, The Lock Communicates To the Host Computer

  13. Seventh, Users, Time Zones and other info is programmed using EAC Software

  14. The First Step A successful installation begins with verifying the network coverage at the opening. We need to verify the wireless network coverage at the door. We do this by conducting a site survey.

  15. Site Survey • Necessary for successful deployment of wireless Locksets • Creates a Wireless coverage picture of the facility • Hot Spots • Dead Zones • Determines if more APs are needed

  16. A laptop will not work for this. It has a large WiFi Antenna. The Lock has a small antenna in a metal case.

  17. Site Survey Tool (SST) • The Cisco AIR-CB21AG-A-K9 can be purchased. The card covers 802.11A/B/G standards • It comes with a Cisco Site Survey Tool utility • Allows for use with any laptop with a PCMCIA CardBus slot. • Provides Real Time Data

  18. How to conduct a site survey… Cisco Aironet Utility – Associate with network • Insert the Cisco card into your Laptop • Open the Cisco Aironet Utility and find and associate with the wireless network • Click on the Scan button

  19. Cisco Aironet Utility – Associate with network • Find the SSID that the IT department has given you • Click “Activate”

  20. Cisco Aironet Utility – Associate with network • Type in a familiar name for you to remember the settings on the “Profile Name” field

  21. Cisco Aironet Utility – Associate with network • Click the “Security” tab. • You can see the type of security being used on this wireless network. • You have now “ASSOCIATED” with the AP and wireless network. • You can now run the Cisco Site Survey Utility Program.

  22. Cisco SST Utility • Click the first tab, “Associated Access Point” (AP) status • The utility provides a graphical and numerical representation of • Signal strength • Noise • Signal/Noise ratio in dB • Link Speed in Mbps • The utility also gives information about what AP it is currently associated with.

  23. Cisco SST Utility • A second tab, AP scan list, shows all available APs • This is helpful in determining conditions like over lapping channels and adjacent (Cisco suggests five channel separation between APs) • It also gives a general overview of available APs and SSIDs in the area

  24. How to conduct a Site Survey • What you need • Close all doors that the signal must pass through from the AP to the lock to emulate worst case scenario • Laptop with/ Cisco SST software installed • Cisco Aeronet Card • Site Survey Forms 1 per door • IT Information • Need SSID • Need encryption info

  25. Site Survey Form - IT

  26. How to Site Survey • Walk to Lock location • Get Signal, noise and signal to noise ratio on the outside and inside of the door (with the door closed) • Record values on Site Survey Sheet • View the AP list for overlapping APs in the area • Note any overlap in channels • Repeat for every door • Evaluate results for each door

  27. Example • This is a comparison between two doors • Signal Strength is not the only factor in a site Survey • The picture on the left is a lock that has stable communication • The picture on the right is a lock that has intermittent communication • Note the top lines or signal strength is almost the same picture to picture. But the non working lock on the right has a red for transmit speed and shows a lower Signal/Noise ratio. This indicates a bad connection.

  28. How to Complete a Site Survey Any questions about conducting a site survey?

  29. Need more information? Please visit: www.AssaAbloyAmericasUniversity.com For an online version

  30. Sequence of Events

  31. Setting up the lock Five questions we need to answer… WHO? WHAT? WHERE? WHEN? HOW?

  32. Setting up the lock We have to tell the lock WHO it is Determine WHAT system it will talk to Tell the lock WHERE that system is WHEN the lock will communicate HOW it will communicate

  33. A Sixth question… WHY are we taking these steps? ? ? ? The Lock Doesn't Know Anything!

  34. To answer these questions, we will be using two tools: Network Configuration Tool - NCT Lock Configuration Tool - LCT

  35. Network & Lock Configuration Tools • The lock and network configuration tools were created to ease the install process by creating a tool that uses simple GUIs • Network Configuration Tool • Simple for IT professionals to enter IT information in a secure fashion to the installers • Lock Configuration Tool • Uses the data you entered into the NCT program and inputs that into the lock • Easy to use GUI that allows for lock installers to set up locks with little IT knowledge

  36. Wireless Lock Configuration • Configurable Items: • IP Address • DHCP or Static • Host IP (Computer that runs the Access Control Software) Always a Static Value! • Subnet • Encryption • Serial Number (Electronic serial number in the lock) • Set by Factory

  37. How to use NCT Open the NCT file on your computer

  38. Configuration Tool – NCT Overview • Used to create site file • Each lock is defined and named • File contains all IT info • IP Address • Subnet • Encryption • SSID • Port • Host IP

  39. NCT – Enter Site Name • Site name • The site name is the designation for this set of locks and is typically represented by the company name, company plus division, etc.

  40. NCT – Enter Inactivity Timeout • Inactivity Timeout • The Inactivity Timeout determines how long the LCT will wait for user input before automatically terminating. This is a security measure. The default value is 300 seconds or 5 minutes.

  41. NCT – Enter Installer Password • Installer Password • The Installer Password allows the installer to use the data but not to view the network communication parameters.

  42. NCT – Enter IT Password • IT Password • The IT Password allows the IT administrator to view and edit all network communication parameters for all defined locks.

  43. NCT – 2. Lock Info (if DHCP) • Lock Info • By default the ‘Locks’ section will be in “View Mode”. • To create a new lock entry, click on the “New” button. • The Lock area will change color and “Add Mode” will be displayed Information can now be entered.

  44. NCT – Enter Lock Name (if DHCP) • Name • Helps the installer identify the lock • “West Stairwell Door” • “Rear Exterior Door”, etc • Use meaningful names

  45. NCT – Enter Lock Serial Number (if DHCP) • Serial Number • Serial number - 16 character identifier taken from the label on the lock controller or from the lock information sticker included in each box

  46. NCT – Check Box “DHCP” (if DHCP) • DHCP • DHCP • If this box is checked, the IT department has determined that the locks will be assigned IP addresses dynamically by their system • In this case, the IP Address, Subnet Mask and Gateway fields remain blank

  47. NCT – Enter IP Info (if Static) • Static IP’s • If this DHCP box is un-checked, the locks need to be assigned the IP Address, Subnet Mask and Gateway as determined by the IT department

  48. NCT – Enter SSID (DHPC or Static) • SSID • For determining which wireless network should the locks communicate through to the network • Information must be supplied by the IT department • Case sensitive

  49. NCT – Enter EAC IP Address (DHPC or Static) • EAC IP Address • EAC IP Address (Host Address) • Must be a static IP address of the Access Control Software Server

  50. NCT – Enter EAC Port Info(DHPC or Static) • Ports • 2571 by default • This allows the locks to communicate directly to the computer that controls the locks (Host PC) • The IT department may need to “open” ports for these locks to talk directly to the Host PC and no where else on the network

More Related