Preparing N500 Net Bridges

This section describes how to prepare a Net Bridge for deployment.

Before you start:

  • Connect the Net Bridge according to the separate instructions (iLOQ 5 Series Online Design Guide). If needed, you can also connect bus devices such as door modules, readers and relay cards at this stage. If the IP address and other network settings shared by the DHCP server are used both at the office and at the installation site, you can test the server connection without the bus devices in the office before installation on site.
  • If more than one lock is connected to the bus configuration, the deployment will take place in several steps. The first step is to deploy the Net Bridge and the first Door Module. In the second step, you use the Order Lock function of the Manager software to deploy the other Door Modules connected to the bus configuration. For detailed instructions on deployment, see Programming Net Bridge for Deployment and Completing a Device Configuration.
  • Make sure that you have the appropriate licenses for the bus devices that you intend to connect to the Net Bridge.

Proceed as follows.

  1. Select Administration > Browse network modules.

  2. Select Add network module.
    The Add network module wizard is opened.
  3. Select Add network module.
  4. Enter the general details of the network module. The options depend on the network module type. The different options are:
    • Name — Enter a name for the new network module. Use a descriptive name. For example, you can use a name that indicates the location of the module.
    • Type — From the menu, choose N500 (no mobile connection).
    • License — Select N500 (no mobile connection) license type.
    • Count of reserved bus devices — Set the number of bus devices to be connected to the Net Bridge.
    • Key programming Hotspot installed — Select this check box if at least one Key programming Hot Spot will be connected to the network module.

      Set the network module active by enabling Active radio button. You can select the Not in use radio button if you do not have an active license yet but you still want to configure the network module.

    • N50X device serial number — Enter the serial number of the Net Bridge you are adding.

    • Take into use without door module — Take the Net Bridge into use without a door module.

    • Take into use via N502 door module — This radio button is selected by default.

    • Take into use via N507 I/O card — Take the Net Bridge into use via an N507 I/O card.

    • N502/N507 serial number — Enter the serial number of the N502 Door Module or N507 I/O card you are adding.

  5. Click Next.
  6. Select Estate.

    Choose the estate to which you want to add the Net Bridge.

  7. Click Next.
  8. Select Zone.

    Choose the zone to which you want to add the Net Bridge.

  9. Click Next.
  10. Select a user for the network module.

    Use a unique user ID for each network module.

    Enter information, as follows:

    • Service address — The Service address is the server address of the lock system. Accept the suggested address.

    • Define server certification settings — Server validation settings depend on the network environment on the site. Contact the site IT administrator for the recommended settings. The options are:

      • Public key pinning and domain name verification (recommended) — Use public key pinning and domain name verification.

      • Public key pinning — Use public key pinning.

      • Domain name verification — Use domain name verification.

      • No server verification (not recommended) — Use no server verification. This is not recommended.

      • Set public key (not recommended) — Enter your public key in the field that is opened, if you select this option. This is not recommended.

    • Service code — The Service code is the server address of the lock system. Accept the suggested address.

    • User-ID — Choose the network module's User ID from the list.

      If the User ID drop-down menu is empty, click Add New Network Module User to add a new user, and then follow the wizard.

    • Password — Enter the network module user’s Password.

  11. Click Next.
  12. If needed, select timing settings.

    By default, Online devices do not report log events automatically. To enable automated events, select the Change timing settings check box. This activates the Audit trail collect interval drop-down menu. The collect interval can be set to No schedule, Once in a week or Once in a day.

  13. Click Next.
  14. Enter the network settings, as needed.

    If the Net Bridge is located on a network where IP addresses are obtained from a DHCP server, you do not need to fill in the network settings. If not, contact your network administrator.

  15. Click Next.
  16. The summary window opens. Check the information in the summary window.
  17. Select Ready.
  18. The Adding a lock wizard opens.
  19. Define the lock settings of the first door module:
    • PlacementPlacement is the number of the lock door or premises in the floor plan. In this step, you can only add the door module that will be used for deployment programming.

    • Approach directionApproach direction refers to the direction where the lock will be opened from, if the door is equipped with double side lock.

    • Locking targetLocking target provides a more detailed description or name of the room or premises, where the lock will lead to.

    • Lock cylinderLock cylinder is the cylinder type of the lock. The wizard has N502 selected by default.

    • Zone — The previously selected zone is visible in this field.

      You can also the change to zone to restrict the lock visibility by zone.

    • Lock type — The wizard has Online selected by default.

    • N500/N501 Network module — The N500 or N501 Network module that you are adding.

    • Clock installed — Select Clock installed if there is a clock circuit in the lock. If the selected Lock cylinder contains a clock, Clock installed will be automatically selected.

      Note:

      In conjunction with initial programming, always connect the RTC unit to the connection cable on the lock. After this, do not disconnect the RTC unit from the connection cable.

      If you have disconnected the RTC unit from the connection cable, you must restart the RTC unit. You can do this by inserting a programming key, connected to the programming cable, to the keyway of the lock cylinder. Always carry out this procedure after disconnecting the RTC unit.

    • Save lock audit trails automatically — Lock audit trails are saved automatically by default.

    • Lock collects audit trail – The automatic collection of a lock audit trail is selected by default.

    • Allow API access rights – By default, API access rights are not allowed.

  20. Click Next.
  21. Choose the relay settings:

    The options are:

    • Basic relays 1X2 — Select in conjunction with N502.

      If you select this option, set K1 and/or K2 settings.

      By default, the operating time for relays K1 and K2 is set to 8 seconds. To change the relay’s operating time, deselect Use default. The operating time can be set to 0 to 65534 seconds.

    • Relays 1X10 — Select in conjunction with N502 as controller and N507 as a responder.

      If you select this option, set:

      • Relay name

      • Type — The options are:

        • Impulse — Select the relay impulse and time.

        • Switch — Select that the relay switches state.

        • Key hold — Keep the relay operating as long as the key is held in the cylinder.

      • Operating time — Set the relay operating time.

      • In use — Check this check box to enable the relay.

    • Relays 2X10 — Select in conjunction with N502 as controller and two pieces of N507 as responders.

      If you select this option, see the options for Relays 1X10 above.

  22. Click Next.
  23. Enter additional details, as necessary.
    • Door typeDoor type is the type of door on which the lock is installed.

    • EscutcheonEscutcheon is the protective plate surrounding the keyhole in the door.

    • Lock modelLock model is the model of the lock body.

    • Cylinder extension — A cylinder extension is used to extend the lock.

    • Door thicknessDoor thickness is the thickness of the door on which the lock is installed.

    • Lock body depth (mm)Lock body depth (mm) is the depth of the lock body.

    • Opening directionOpening direction indicates whether the door handle (if any) is on the left or right hand side.

    • Label — If the door has a label, Label refers to that label.

    • NoteNote contains additional information about the lock or door.

    • Other equipmentOther equipment refers to other devices related to the lock or door.

    • Restricted — This check box indicates that a device that controls restricted access is connected to the lock.

    • Restriction label — Enter a description of the restricted access in this field. This can be a description of the access controlling device, for example.

  24. Click Next.
  25. Choose Estate. (If enabled in the lock settings).

    Choose the estate to which you want to add the lock.

  26. Click Next.
  27. Choose the lock access rights.

    The default access rights are added to the lock automatically.

    Choose the desired access rights from the menu on the left.

    You can manage access rights with the arrow buttons:

    • — Click the Arrows right button to move all items to the list.
    • — Click the Arrow right button to move the selected item(s) to the list.
    • — Click the Arrow left button to remove the selected item(s) from the list.
    • — Click the Arrows left button to remove all items from the list.
  28. Click Next.
  29. Choose time profiles.

    You can use this menu to define a time profile for the lock.

    • Not time limited — The lock ignores all time profiles on keys.
    • Apply all time profiles on a key — The lock applies all time profiles on keys.
    • Apply selected time profiles — The lock applies the selected time profiles on keys.
  30. Click Next.
  31. Choose whether or not an individual access right is added to the lock.

    If you select individual access rights for the lock, the type and grouping of the access rights must also be set. For more information, see Access Rights

  32. Click Next.
  33. Choose how to continue:

    Available options:

    • Leave locks in planning state — Select Leave locks in planning state if you want to leave the locks in the planning state, and continue planning the locking system without, for example, programming any physical locks.

    • Order locks — Choose Order locks if you know that the lock definitions are final but you want to program the locks later.

      For more information, see Ordering Locks.

    • Order and transfer to Programming key — Choose Order and transfer to Programming key if you are deploying an installed lock and you want to program it by taking the Programming key with you to the lock. This can only be done for one lock at a time.

      Note:

      For instructions on deployment programming, see Programming Net Bridge for Deployment and Completing a Device Configuration.

  34. Click Next.
  35. A summary window is displayed.
  36. Click Close.