Documente Academic
Documente Profesional
Documente Cultură
6a
System Handbook
June 26, 2003
Trademarks:
VingCard 2100 MS
Contents
Table of Contents
1. SYSTEM OVERVIEW .............................................................................................................................1
1.1
SPECIFICATIONS .................................................................................................................................6
1.1.1
Dimensions ............................................................................................................................6
1.1.2
1.1.3
1.1.4
1.2
TERMS ...............................................................................................................................................7
1.3
1.3.2
Employee Cards...................................................................................................................10
1.3.3
1.3.4
Special Cards.......................................................................................................................15
1.3.5
1.4
1.5
EXTENDED ACCESS..........................................................................................................................22
1.6
1.7
1.8
1.9
REPORTS ..........................................................................................................................................23
1.9.1
1.9.2
1.9.3
1.10
1.11
1.12
1.13
2.
1.13.1
1.13.2
Multi-User System................................................................................................................27
1.13.3
SYSTEM SETUP................................................................................................................................27
2.1
STARTING UP....................................................................................................................................27
2.2
2.3
2.2.1
2.2.2
System Parameters...............................................................................................................29
2.3.2
2.3.3
2.3.4
Contents
2.4
3.
VingCard 2100 MS
3.1
PASSWORDS .....................................................................................................................................51
3.2
3.3
3.4
GUEST COMMANDS..........................................................................................................................53
3.5
3.6
4.
3.4.1
3.4.2
3.4.3
3.5.2
3.5.3
Removing an Employee........................................................................................................69
3.5.4
3.6.2
3.6.3
Emergency Cards.................................................................................................................74
3.6.4
3.6.5
SYSTEM OPERATION.....................................................................................................................79
4.1
REPORTS ..........................................................................................................................................79
4.1.1
4.1.2
4.2
4.3
4.4
4.5
4.6
5.
4.6.1
Programming Locks.............................................................................................................90
4.6.2
4.6.3
4.6.4
4.6.5
4.6.6
5.2
SUSPEND ............................................................................................................................96
5.2.2
ii
VingCard 2100 MS
5.3
Contents
5.2.3
RESET..................................................................................................................................97
5.2.4
Power off..............................................................................................................................97
5.2.5
Cold Booting........................................................................................................................98
Low Bat................................................................................................................................99
5.4
5.5
BATTERIES .....................................................................................................................................100
5.6
5.7
5.8
CONNECTIONS................................................................................................................................102
5.9
TROUBLESHOOTING .......................................................................................................................103
6.
5.9.1
Server SC ...........................................................................................................................103
5.9.2
Client SC............................................................................................................................103
LOCKSET.........................................................................................................................................105
6.1
6.2
6.3
6.1.2
LCU....................................................................................................................................109
6.1.3
6.1.4
Battery Pack.......................................................................................................................110
Lockcase ............................................................................................................................112
6.2.2
Cylinder .............................................................................................................................113
6.2.3
Escutcheons .......................................................................................................................113
INSTALLATION ...............................................................................................................................116
6.3.1
7.
CONTROLS......................................................................................................................................119
7.1
REMOTE CONTROLLER...................................................................................................................119
7.2
7.3
CYLINDER ......................................................................................................................................133
8.2
8.2.2
Cleaning Escutcheons........................................................................................................135
8.2.3
Lubrication ........................................................................................................................135
8.3
TROUBLESHOOTING .......................................................................................................................136
8.4
8.4.2
8.4.3
iii
Contents
VingCard 2100 MS
8.4.4
8.4.5
9. PARTS .....................................................................................................................................................151
10.
9.1
9.2
9.3
9.4
SYSTEM .........................................................................................................................................156
INTERFACED SYSTEMS ..............................................................................................................157
10.1
10.2
10.2.1
10.2.2
10.2.3
10.2.4
Summary ............................................................................................................................175
10.2.5
iv
31
1
1000-series
90
9, 18, 25, 72
batteries
100
AAA
change
8
8 character Grand Master
password
52
99
charging
100
RAM card
101
system controller
battery
99
changing
135
external
access area
access point
failure
lock
add employee
85, 101
backup cards
36
25
door unlock
lock
54
106, 109
low
106
replacement
135
55
battery compartment
36
battery pack
113, 114
blank screen
96
guest type
add guest user group
boot
48
25, 34, 35
address
95, 101
building
14
building master
destination
163
40, 42, 45
source, PMS
163
assigning to a door
42
119
example
14
alarm triggering
alphabetic characters
ANSI
ANSI-lock
40
1, 3, 4, 112
112
27, 51
answer code
PMS
Anti Tail Gating
119
160, 163
3, 4, 89, 92
viewing events
93
22, 42, 45
72
14, 17, 19, 45
connections
card
102
3, 25, 36, 45
backup
9, 18, 25
diagnostic
25, 70, 75
duration
37
19
expiration
37
independent operation
12
issuing
61
encoding
53, 65
end time
engineering supervisor
13
20
19, 41
grand master
guest
15
deadbolt override
36
issuing
53
override
user group
9, 55
HC
housekeeper
housekeeping supervisors
13
ID number
22
information on
insertion
4
101
interrelated
15
issuing
53
lock out
cable
guest
backup
coercivity
database
2100 Plus
72
building
backup
guest
longevity
37
lost
9, 53, 54
guest
53, 54
magnetic stripe
master
9, 58
memory
25, 101
25, 38
user group
battery
101
channels
one shot
grand master
15
override
check characters
162
check in
remove guest
53
station
resolution
26
check sum
section
9, 17, 19, 42
3
161
check-in
57
concierge access
47
configuration
57
sections
maximum days
171
system
29
PMS
166
connections
8, 9
time
65
1, 8, 41
component
specifications
time window
36
25
swipe
special
13
102
remote controller
early
example
interface
Continue
19
supervisor
27
communication port
start time
system controller
171
contact card
179
locations
102
3
track 3
station
27
Mini DIN
102
type
user group
36
network
102
printer
102
RS-232
102
70
unlock time
37
user ID
173
computing for PMS
171
53
date
101
PMS
166, 173
time
29
164
choices
card limit
card not verified
70
card types
in menus
52
clear
client
4, 7
14
coercivity
diagnostic
15
cold boot
95, 98
emergency card
15
command
15
15
change employee
27
building master
guest
system controller
replacement
146
controls
129
extended access
5, 7, 41, 129
convert
database
87
CPU
15, 68
3, 22
events
22
front desk
26
credit card
cursor
lock out
15
28
one shot
15
summary
25
>>
28
28
underline
40
section master
change
command codes
check-out time
29
31
employee
lock
command
9, 25, 66
25, 43, 46, 48
lock time
31
system parameters
29
unlock time
39
PMS
common door
global
119, 133
7, 8, 41, 64
recoding
22
switch
148
40, 45
8, 40, 41, 45
communication
locklink
162
19, 20, 40, 41, 47
room numbers
service
163, 164
27, 28, 39
data
events
22
lock
22, 25, 90
25
memory card
PMS
175
binary
160
27
162, 165
data fields
165
data integrity
162
database
3, 47, 51, 87
backup
85
convert
87
restore
86
date
check-out
3, 31
15
events
22
format
29
32, 88
33, 88
31
31, 88
88
start date
31
DBO
deadbolt
device number
device time out
145
deadbolt override
61, 70
deadbolt override
106
on employee cards
on guest cards
on lock readout
37
36, 171
92
default
menus
51
stay
31
unlock time
37
25
delete lock
25
destination
162
device address
164
card expiration
15, 37
card verification
70
15, 70, 75
deleting record
69
ID number
69
encoder base
identification number
remote controller
password
system controller
remove
39, 69
report
63, 83
time window
37, 61
user group
35, 36
diagnostic card
dimensions
DLE
161, 165
door
global common
7, 19
in access area
service common
119
door type
19, 40, 43
66, 70
26
user groups
8, 19
door switch
assigning to cards
encoder
66
3, 6, 27, 65
dimensions
40, 41
electrical specifications
40, 41
power supply
global common
41
guest
40
service
40
end time
56
service common
41
engineering supervisor
13
enter key
52
employee card
guest card
37
20, 31, 55, 56
encoder base
internal relay
157
environmental specifications
escape
157
special cards
70
escutcheon
unlock time
cleaning
135
removal
145
113, 114
spindle
162
egress switch
119
eject button
101
EK card
EK key
elevator reader
47
emergency
card
9, 15, 70, 74
key
EMK
95, 98
19, 41, 61, 66
19, 61
ETX
165
Euro
EURO
event report
events
112
4, 22
79, 92
CPU
22, 79
lock
89
viewing
93
example
building masters
14
card resolution
26
maid section
12
supervisor zone
13
exit
locklink mode
expiration
95
employee card
37
guest card
1, 29
HC w/DBO
guest check-in
guest only
guest room
129
extended access controller
7, 36, 55,
5, 6
interface to PMS
54, 172
interrelated keys
15
issuing cards
53
55
door
42
doors
19
type
19
guest type
61
36, 171
8, 55
guest w/DBO
55
171
facility code
7, 8, 19, 41
85
handicap
28
guest
164, 165
fields
3
See HC
handle
105
handle spindle
in PMS messages
162
five beeps
99
fixed digit
31
117, 145
replacement of
147
hardware
configuration
26
HC
format
date
29
PMS messages
7, 36, 55
unlock time
55
162
HC w/DBO
36, 171
HC w/DBO
55
housekeeper
menu
51
passwords
25, 26
housekeeping supervisors
G
global common
41, 47
15
card
issuing
card expiration
transfer
51
51
29, 31
54
user group
guest w/DBO
user group
HC
ID number
section cards
12
indication
Clear key
52
enter key
52
ESC
52
letters
40
timeout
31
96
suspended
96
indicator
lock
LOW BAT
106
99
95, 98
36
installation
4, 11619
35, 36, 38
software
27
interface
latch
1, 22
latch bolt
102
1, 22, 105
LCU
specifications
109
technical data
109
leading spaces
165
LED
106
letters
40
letters
40
lock
26, 105
battery
109
life time
data
90
40
1
events
4, 22
handle
indicators
installation
off
36, 171
157
Euro
8, 22, 66, 69
independent operation
grand master
guest
13
I
7, 19, 20, 31,
keypad
hand-held computer
SC
8, 9, 15, 70, 72
28, 15784
lockcase
106
11619
1
deadbolt
latch bolt
maintenance
13339
motor
replacement
programming
105, 112
148
4, 90
setup
report
83
sub-assemblies
troubleshooting
136
lock channels
chart summary
17
lock events
viewing
89
lock out
automatic
15
15, 70, 73
undo
70, 73
lock parameters
43
changing
48
lockcase
ANSI
112
EURO
112
locking pulse
105
locklink
3, 4, 51, 8993
locklink menu
90
locklink mode
enter
89
exit
95
53, 54
111
133
management reports
manager on duty
manual backup
master
22
See MOD
85
master password
used in setup
26, 52
27
22, 79
memory card
101
25, 95, 98, 101
memory card
battery
101
menu
14
lockcase
multi-user system
27
63
26, 51
cards
53
control field
52
define lock
40
front desk
51
guest cards
53
95, 98
network connection
password
87
new year
88
non-VingCard equipment
51
room full
58
52
special cards
system entry
27
types
52
user group
36
51
message
174
101
61
70
95, 98
99
message format
162
message length
PMS
162
Mini DIN
3
25, 26, 35, 37, 51, 63
password
25
mode
22
locklink
89
masters
15
suspend
97
rooms
zones
13
modules
22
month
modular connector
102
1
33, 88
22
numbered list
28
95, 98
3, 102
new version
26
events
mechanical override
lock
25, 27, 51
add employee
MOD
maximum
building masters
events
maintenance
mortise
M
main menu
memory
old versions
87
15, 76
outside handle
override
9,
172
card
172
deadbolt
in a common door
20
mechanical
22
P
parallel printer port
parameters
29, 32
lock
22, 43
system
22
user group
25
parts
2100 lockcase
152
2100 lockset
151
154
VC 2100 MS system
156
passage mode
95, 98
assignment to an employee 67
suspend
96
employee
26
switch
96
front desk
51, 79
guest only
26
master
menu
58
MOD
27
3, 28, 102, 157, 160
system controller
power on
27
power supply
99
encoder base
102
remote controller
system controller
102
pre-registration
57, 172
printer
1, 3, 4, 80, 82
on lock readout
92
replace
employee card
guest
26
replace guest
reports
55
4, 22, 25, 27, 79
events
81
82
sorted by date
81
160
172
program
8, 25
sorted by ID
81
answer codes
164
lock
4, 89
sorted by room
81
answers
176
events by Keycards
84
check sum
169
PMS
generating a report
80
check-in
163
Protocol
lock events
22
171
PMS
management
22
check-out
172
options
173
check-out date
166, 171
command codes
163
commands
176
control characters
161
data area
165
data fields
165, 175
165
destination
162
electrical specifications
160
examples
177
field identifier
165
message fields
162
message format
162
physical layer
160
polling
102
pre-registration
172
record separator
165
shares
171
syntax error
184
user group
166, 167
verify card
174
polling PMS
161
POS data
adjusting reader for
power
168
97
102
repeated use
ACK/NAK timeout
communication port
25
user group
160
access areas
employees
RAM
RAM card
101
See memory card
40
92
reader
extended access
reader module
47
108, 113, 145
replacement
readout
145
See audit trail
31
recode key
22, 134
record
4, 22
chronological
events
4, 22
record separator
161, 165
relay
157
remote controller
1, 5, 6
electrical specifications
remove
employee
guest
lock
25, 61, 69
25, 26, 53, 59
25
22
22, 83
lock data
83
system parameters
22
user groups
22, 83
printer
samples
81
system events
22
reset
97
restore
27
restore database
86
25
resume
97
resume operation
end suspend
97
3, 102
room number
for non-guest room door
room number
PMS
room occupied
40
45
165
26, 54
add guest
55
different room
55
replace guest
55
room range
61
room type
19
guest
19
service
19
service common
19
rooms
maximum
61
RS-232
102
RS-232C
159
S
save to mem card
time
33, 88
modules
year
33, 88
operation
79
parameters
29
share
58, 171
single-user system
27
source address
SC
37
162
employee
67
special cards
70
employee
37
diagnostic
70, 75
front desk
51
emergency
70, 74
master
37
fail safe
70, 72
MOD
51
lock out
70, 73
one shot
70, 76
25
6, 7
in PMS messages
LCU
109
reader module
109
as locklink
client
server
spindle
SC failure
85
64
89
batteries
blank screen
replacement
147
screw
95, 98
system access
specifications
25, 85, 101
password
96
card
eject button
bevel
117
start switch
145
communication relay
escutcheon
119
start time
8, 9
dimensions
28
start up
95
drive A
station ID
31
electrical specifications
section
assigning to a door
42
selection cursor
serial port
98
suspend
96
low battery
99
28
swiping a card
3, 28, 57, 65
no response
97
157
synchronization
polling PMS
157
8, 19,
system
31
25, 40, 79
power/resume switch
96
authorization
51
reset
97
serial communication
components
6
7
timeout
31
with encoder
27
system setup
27
45
40
contact card
non-Vingcard equipment 5
printer
remote controller
day
33, 88
95, 98
configuration
month
33, 88
hardware
157
96
environmental specifications
components
serial port
suspend
45
8, 40, 42
97
26
19
power off
alternatives
dimensions
41, 45, 64
set date
indicators
20
4, 8
room numbers
95
40
service doors
encoder
service doors
13
101
supervisors
COM1
server
common doors
5, 119
157
electric
security
audit trail from lock
strike
101
26, 29
1
T
tampering
119
thumb turn
106
time
33, 88
check-out
29
32, 88
95
time out
device
180
time out
PMS
convert
building
employee
35
front desk
35
guest
180
guest w/DBO
55
Guest w/DBO
35
employee cards
37
HC
35, 55
special cards
70
HC w/DBO
35, 55
31
master
171
MOD
timeout
device
disabled
31
PMS
transaction logging
troubleshooting
lock
version
35, 36, 37
93
VIP access
47
W
warm boot
reset
PMS
166, 167
22
report
103
section
12, 35, 42
136
zone
13, 35, 42
83
Y
year
33, 88
yellow light
extended
36
VC 2100 lock
37
verify card
HC
55
106
Z
zone
unlock time
101
15, 70, 73
92
14
user ID
97
wing masters
92
160
97
warning
35, 37
87
employee
13
1
53, 60
25, 61
guest
25, 26, 60
PMS
174, 181
assigning to a door
42
13
user group
42
System Overview
Specifications
1. System Overview
The VingCard 2100 Plus is a keycard management system for
hotels with 400 (or less) guest rooms. 1
The locks are operated by magnetically striped cards. A card
operates a lock only during a time-window encoded in the
magnetic stripe and a card with a later start time locks out any
previous guest's card.
The system consists of the following modules:
Locks
1-2 System Controllers
encoder base
contact card
Printer (optional)
Remote controller (optional)
Extended access controller
(optional)
Locks
The 2100 System supports three different series of VingCard electronic
locks :
VC2100 Classic
Presidio
Da Vinci
VC2100 Classic
Other locks can be installed on linen closets, engineering spaces, lobby doors, etc. No more than 475
unique lock identifications per property. One ID could be assigned to two locks.
System Overview
Specifications
DA Vinci
System Overview
Specifications
System Controller
The System Controllers (SC) are hand-held
computers. If the system uses two SCs, they are
connected to each other through a network
cable. An SC is the only processing device
required by the system. It stores all guest and
employee data.
When attached to an encoder base, a system
controller is a check-in station. When
connected to a contact card, the SC becomes a
locklink, a portable communication device
which is used to load the lock program and to
obtain an audit trail from a lock.
System Controller with Encoder Base
The encoder base writes magnetic information
onto track 3 of an ANSI magnetically striped
card. When a guest checks in, the hotel agent
types a room number, selects a check-out date,
and chooses a user group. Data is transferred to
the card by swiping the card through the
encoding unit.
The system controller sits inside a specially
designed receptacle in the encoder base and is
attached to the base via a modular connector
and a mini DIN connector. Printer, PMS and
network connections are at the back of the
encoder base.
The system supports both standard VingCard
insertion readers and swipe readers with a
reader head on either side. No configuration of
the reader type is required, the lock program
automatically determines this.
System Overview
Specifications
System Overview
Specifications
System Overview
Specifications
Specifications
Dimensions
Width
Height
Depth
104 (display)
33
210
90 (keypad)
Encoder base
234
93
270
Remote controller
83/1032
200/220
74/813
88/674
210/166
72/70
1.1.2
Electrical Specifications
VAC/DC
System Controller5
Current
Encoder base
External Power
300 mA
24 VAC/DC
Standby: 15 mA
Active 150 mA
2
3
4
5
24 VDC
10 mA (quiescent)
for recess
with keypad
total/recessed
power supply should be connected at all times, except when the system controller is used as a portable
locklink to communicate with doors
System Overview
Terms
1.1.3
Environmental Specifications
System controller
Operating Temp
Rh
Other
-20 to 60 C
95%
Shock: 2G
non-condensing
any axis
0 to 90%
Encoder base
non-condensing
Extended access controller
0 to 40 C
10 - 85%
non-condensing
1.1.4
1.2
Terms
Access area
A group of locks/doors.
Access point
Client
Extended (elevator) access designation on a card. Only cards with extended access will operate
the lock defined as the access point.
Four card types determine features that can be assigned to a card: Guest, Guest with DBO, HC,
HC with DBO. HC assigns a longer unlock time to a card. When an HC card is used, the door will
remain unlocked longer than usual. If deadbolt override (DBO) is selected, the card will operate
the lock even if the deadbolt has been thrown. Guest is standard; it has no deadbolt override,
and unlocks the door for a duration which is shorter than the extended unlock time on HC card
types.
A System Controller that is connected to the server and remotely accesses data from the server.
CM
DBO
Deadbolt override can be assigned to guest cards by selecting a user group with DBO. DBO is
assigned to employee cards by changing the user groups parameters under system commands.
Extended access
Allows some guests cards to operate elevators or other special doors while others do not. Any
guest card with extended access, and current time window will operate an extended access
reader.
Card types
System Overview
Terms
A special version of the remote reader which can be installed in an elevator panel. Cards which
have the extended access point will be able to operate the elevator reader.
A door which requires only the correct facility code and a valid time window to allow access.
Guest type
HC or HC w/ DBO
When a guest is assigned to an HC user group, the card will cause the lock to remain unlocked
for a longer time than a Guest or Guest w/DBO card. A card can have both HC and dead bolt
override by assigning the card to the HC w/DBO user group. See card types.
Interrelation determines how cards lock each other out. Interrelations are pre-set in the VC2100
Plus. Fail safe keys are interrelated to guest keys so that a fail safe key locks out any valid guest
keys. Conversely, when a guest key is used, it locks out the last fail safe key that was used in the
lock.
InterrelationTM
Lock channel
The VingCard electronic reader in a VC2100s/50 lockset. Also the control unit in a remote reader
or an extended access reader. LM and RM integrated in a single unit.
A virtual lock in the lock controller. Each lock controller has 30 lock channels.
A special card which can only be used once and has a very short time window.
Override
Terminating a card's validity at a lock by inserting another card of the same user type with a later
start time or by inserting a card of an interrelated user type.
Reader module, reads the magnetic stripe from a card.
LCU
RM
Remote Reader
Server
Service Common door
Service door
System Controller (SC)
Time window
User group
User ID
A VingCard unit with relay output for operation of electronic equipment (such as electric strikes)
which is not manufactured by VingCard Systems.
A System Controller with a memory card containing the database.
A door accessible only by employee cards. All employees in all sections, zones, and/or buildings
have access (if service common access is activated in their user group and when the card is
issued).
A door accessible only by employee cards. Only employees in one section, zone and/or building
have access.
A handheld PC. It runs the 2100 lock program and contains a record of valid keys at every lock.
The period during which a card is valid, defined by start time and end time. All cards are
"stamped" with a time window describing the start and end time for the card's validity.
Guest cards - A guest user group determines how long a lock will remain unlocked when the
card is inserted and whether or not the guests card can override the deadbolt.
Employee cards - An employee user group determines where (which section, zone, building)
and how (unlock time, deadbolt override) an employees card will work.
A unique number (from 1 to 16384) assigned to each card. User ID makes it possible
to distinguish which card was used in a lock for lock event reports.
1.3
System Overview
Card Features
Card Features
Each lock recodes automatically when a card, with a later
start time than the last card that was used, is inserted into the
lock. Any guest card with an earlier start time is locked out.
Cards with the same time window operate a door without
locking each other out. The system allows up to five guest
cards per room with the same time window on them. The
cards time window can be from 1 to 30 days.
Employee cards are issued for a time window from 1 to 24
months. An employee card with a later start time overrides a
previous card issued to the same employee, but one
employees card has no effect on the cards of other
employees. Employees cards do not lock each other out.
They are not interrelated.
A One Shot card is a special keycard interrelated to itself,
which means that it locks itself out and can only be used
once. The One Shot card functions independently from all
other keycards and is room-specific.
Every card operates 1 of 30 lock channels in the electronic
lock control module. Guest cards are assigned to one
channel. 23 channels are used by employee cards. If one
employee loses a card, you only have to replace that
employees card (using the change employee command).
Three channels are used for fail safe cards and one for one
shot cards (guest backup cards). One lock channel is for the
emergency card.
Much of the information that determines how a card operates
a lock is written on the card. The following variable
information is included in the magnetic information on a
card:
System Overview
Card Features
1.3.1
Guest Cards
A guests card is issued for one room. The time when the
card is issued (start time) determines whether it will override
(lock out) another card. A card overrides any card with a
previous issue time. In order for two guests to share a room,
the same start time must be assigned to both cards.
Each guests card is assigned to a user group. The user
group determines two operating parameters:
Employee Cards
Time Zones
Cards can include time zones which restrict access during
specified hours of the day. For example, you may want a day
maid's keycard to only open doors during daytime hours.
Note: The time zone on Employee Cards limits access to all
System Overview
Card Features
1.3.2.1
System Overview
Card Features
Section
Rooms
Card 1
Card 2
Card 3
10
11
12
13
14
15
101-
2116-
131-
201-
216-
231-
301-
316-
33l-
401-
416-
431-
Not
Not
Not
115
130
145
215
230
245
315
330
345
415
430
445
used
used
used
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
10
11
12
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
13
14
15
16
17
18
19
20
21
22
23
24
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
Maid
25
26
27
28
29
30
31
32
33
34s
35
36
Card 4
Card 5
Card 6
Card 7
Card 8
Card 9
System Overview
Card Features
Zones
Usually housekeeping supervisors are issued zone cards.
Only one zone can be assigned to a card, and a lock can be in
only one zone. Example: The chart below demonstrates the
zones for a four story hotel with 45 guest rooms per floor;
where a supervisors card can operate 45 rooms.
Zone
Card
Zone 1
101-145
Zone 2
201 - 245
Zone 3
301 - 345
Zone 4
401 - 445
Card 1
Supervisor 1
Supervisor 2
Supervisor 3
Supervisor 4
Card 2
Supervisor 5
Supervisor 6
Supervisor 7
Supervisor 8
Zone 5
Not used
Card 3
Card 4
Card 5
Card 6
Card 7
System Overview
Card Features
Buildings
Building
Building 1
Building 2
Card
101-245
301 - 445
Card 1
Wing Mstr 1A
Wing Mstr 2A
Card 2
Wing Mstr 1B
Wing Mstr 2B
Card 3
Card 4
Card 5
Rooms 101 to 145 and 201 to 245 are in wing 1. Rooms 301 to
445 are in wing 2. You may want to create a master key for
each wing. Building master cards would work for that purpose.
The previous chart illustrates two building masters, with 90
rooms per wing.
In the above example, the property has issued four wing master
cards, two cards for each building. Each building is a
separate user group.
1.3.3
System Overview
Card Features
Master Cards
Master cards operate all rooms in the hotel. There is only one
master section. However, there can be two grand master cards
on the property. In addition, you can make up to 5 copies of
both master access cards each with their own password and
user ID. This means you can have a total of 10 master cards.
If extended access has been activated, the master card
automatically has access at an extended access reader. Master
cards also have access to all common doors.
1.3.4
Special Cards
Five types of cards have special applications.
1.3.4.1
Emergency Card
While deadbolt override can be assigned to any user group, the
emergency card always overrides a deadbolt. The emergency
key is a master. It will operate any VC2100 lockset on the
property. It is not intended for use as a normal employee key.
It should be locked in a secure area and used only for
emergencies. It is valid for two years from date it is made. At
properties with cylinders, a metal EK key will also override the
deadbolt. The metal EK key can also be used to extend the
deadbolt.
1.3.4.2
1.3.4.3
System Overview
Card Features
the room, it will work in the normal manner. The lock out card
can be used for two years after it is made. An undo lock out
card makes a guests key valid again.
1.3.4.4
1.3.4.5
Diagnostic Cards
A diagnostic card can be created on any system controller from
the Special Cards menu. When used in a lock, the diagnostic
card will display a flash sequence that indicates the reason for
the last denial of a card.
Note: The diagnostic card does NOT unlock doors.
The result of using the diagnostic card will be a Flash
Sequence as follows:
The diagnostic card will not reset this data (using the
diagnostic card repeatedly will display the same data.) When
the next non-diagnostic card is used it will over-write the data.
System Overview
Card Features
However, you may alternate the use of room cards with the
diagnostic card, and determine the reason that access is denied
for each.
1.3.5
Guest cards are issued per room. A card can only operate one guest room. Maximum 400 guest rooms.
S Card 1
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
e Card 2
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
c Card 3
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
t Card 4
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
i Card 5
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
o Card 6
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
n Card 7
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Card 8
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Card 9
Section Section Section Section Section Section Section Section Section Section Section Section Section Section Section
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Card 1
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Z Card 2
o Card 3
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
n Card 4
e Card 5
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Card 6
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Card 7
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
B Card 1
l Card 2
Building 1
Building 2
Building 1
Building 2
d Card 3
g Card 4
Building 1
Building 2
Building 1
Building 2
Card 5
Building 1
Building 2
G Card 1
M Card 2
Master
E Card 1
Emergency Key
Master
System Overview
Card Features
Fail Safe 1
Fail Safe. Guest Backup cards operate per room. 1 card operates 1 room
Fail Safe 2
Fail Safe. Guest Backup cards operate per room. 1 card operates 1 room
Fail Safe 3
Fail Safe. Guest Backup cards operate per room. 1 card operates 1 room
One Shot
One Shot. Cards operate only once with a limited time window. 1 card operates 1 room
Lock Out
Lock out. Lock out cards are used to lock out the last guest card or fail safe card used.
1.4
System Overview
Door Types
Door Types
Each lock is programmed to operate as one of four door types:
System Overview
Door Types
1.5
System Overview
Extended Access
Extended Access
Extended access is used to limit the guests ability to use the
elevator. Access to some floors is limited by installing an
extended access reader in the elevator control panel. The guest
must insert a card with extended access activated before the
elevator controls will allow the guest to select a specific
floor(s).
Extended access readers can be used to limit access to special
areas like covered parking. Only guests or employees with
extended access assigned to their cards can obtain entry to areas
where an extended access reader is installed. The extended
access reader cannot be installed on the surface. It is for
recessed installation only.
Three criteria must be met for the extended access reader to
operate when a card is inserted. The first two are the same as
the criteria for any global common door: facility code and time
window. Additionally the extended access lock controller reads
the extended access bit on the card.
Extended access can be assigned to any card by selecting it for
the guest or employee at the time the card is issued.
Just as with a normal global common door, there is no override
in an extended access reader.
Select a room type of global common and activate extended
access in order to have a lock ID for extended access doors.
1.6
Passage Mode
Any lock can be defined as a passage mode lock. A passage
mode door unlocks when a card is used and remains unlocked
until the next time a card is used, when it will lock. Then it
remains locked until a card is used again.
A typical application of the passage mode is in meeting rooms.
The card toggles the lock between permanently locked and
unlocked modes.
Note: Passage mode is not for lobby door applications.
System Overview
Auto Unlock Mode
1.7
1.8
1.9
Reports
Various reports are generated by the system. Management
reports describing system configuration can be generated at any
time. The system controller maintains a record of the last 1995
events which can be used to generate five event reports. Each
event report organizes the data differently. Each lockset
maintains a record of events at the door. Number of stored
events depends on lock type and manufacturing date. A locks
events can be retrieved from the door and used to generate a
lock event report.
1.9.1
Management Reports
Four reports, which can be accessed only with a management
level password, provide a list of :
System Overview
Reports
1.9.2
events by date
events by room
events by keycard
repeated or single card use (if the card is used more than
once within five minutes the event report indicates one
entry)
System Overview
System Commands -- A Summary
Submenu
Guest Cards
Employee Cards
Special Cards
Reports
Locklink
Restore Database
Backup Database
Set Date and Time
System
User Groups
Define Lock
System Params
Encoder
Information
Commands
Description
Level
Check in a guest
Check out a guest
Display information for a card
FD, MOD, M
FD, MOD, M
FD, MOD, M
Add Employee
Change Employee
Remove Employee
Verify Employee Card
M
M
M
M
M
M
M
M
MOD, M
Events by Date
Events by Room
Events by SYSOP
Events by User Group
Events by Keycards
Print Employees
Print System Params
Print User Groups
Print Lock Data
Print Lock Events
MOD, M
MOD, M
MOD, M
MOD, M
MOD, M
M
M
M
M
MOD, M
Program Lock
Read Lock Events
View Lock Events
Unlock door
Set Lock Time
Exit Locklink Mode
MOD, M
MOD, M
MOD, M
M
M
MOD, M
M
M
M
M
M
M
Add Lock
Change Lock
Remove Lock
M
M
M
M
M
System Overview
Password Protection
card).
System Overview
System Alternatives
Encoder
Contact
Card
Client
SC
Network
Cable
Server
SC
Encoders
Printer
Contact
Card
Single-User System
Multi-User System
System Overview
System Alternatives
1.13.3
Interface to PMS
The system controller can be interfaced to a hotels property
management system (PMS). Interfacing allows the property to
use its PMS terminal(s) to send check-in commands to the
encoder. When the system is interfaced to the PMS, the PMS
becomes the master for issuing guest cards, but cards must still
be swiped through the encoder base. For optimal performance,
the PMS should be attached to the server SC.
Network Cable
PMS
Server
SC
Client
SC
Printer
Encoders
Contact
Card
System Overview
System Alternatives
1.13.4
Lock series
Classic
100
200
Presidio
200
200
DaVinci
200
200
System Setup
Starting up
2. System Setup
System setup consists of selecting the parameters and user
groups that will be used. All parameters already exist. The user
only has to select from a set of limited options. Only room
numbers require input of data via the keypad.
2.1 Starting up
Turn on the system controller (press the power button located
just below and at the left side of the display). After a short time,
the system entry menu will be displayed. (See Section 5 for
boot up instructions.)
2100 PLUS
CONDO \ POS
System Setup
Menus: Data Selection and Entry
Enter.
2.2.1 Add, Remove, Change Commands
Command menus usually contain three options:
Add
Remove
Change
Use the add command the first time you perform an action.
For example, when you add a user group. After initial setup,
use change and remove commands.
2.2.2 Selecting Commands and Data
Select commands from a numbered list. To select Cards from
the main menu, press 1. Alternatively, scroll through the list
using the arrow keys. The line cursor (>>) moves each time
you press an arrow key. Press Enter when the cursor
indicates the desired selection.
Some menus allow you to select from several options, but only
one option at a time is indicated in a field. To scroll through
all options, you must press an arrow key until the desired
selection is displayed, then press Enter.
System Setup
Configuring the System
System Setup
Configuring the System
mm/dd/yy (month/day/year)
dd/mm/yy (day/month/year)
yy/mm/dd (year/month/day)
2.3.1.2 Check-out
System Setup
Configuring the System
System Setup
Configuring the System
System Setup
Configuring the System
System Setup
Configuring the System
System Setup
Configuring the System
Guest w/DBO
HC HC w/DBO
Sections:
Section 1 Section 2 Section 3 Section 4 Section 5 Section 6
Section 7 Section 8 Section 9 Section 10 Section 11 Section12
Section 13 Section 14 Section 15
Zones:
Zone 1
Zone 2
Zone 3
Zone 4
Zone 5
Buildings:
Building 1 Building 2
When the system controller displays the desired user group,
press Enter. If a user group is absent from the list, it is already
activated.
Menus for adding guest and employee user groups are different.
If you select one of the four guest user groups, proceed with
instructions in the next section, 2.3.3.1 - Adding a Guest User
Group. If you select an employee user group, skip to Section
2.3.3.2 - Adding an Employee User Group.
System Setup
Configuring the System
Four guest user groups exist. The first of these, the Guest user
group, is already active. If a guest is assigned to the Guest user
group, the card will not override the deadbolt, and the door will
unlock for the time selected for standard guests. You cannot
add or remove the Guest user group.
Three other guest user groups can be added. If they are not
added, the front desk agent will not be able to assign special
options to a guests card at check-in. Select Guest w/DBO if
you want to add a user group so that designated guests cards
will override the deadbolt. Select HC if you want to be able to
assign an extended unlock time to some guests cards. This
option could be useful for handicapped, elderly guests or others
who may need a little longer to press the handle after unlocking
the door with a card. Select HC w/DBO if you want to activate
a group with extended unlock time and deadbolt override.
You automatically selected deadbolt override ON if you
designated Guest w/DBO or HC w/DBO as the user group.
Deadbolt override is automatically set to OFF for Guest and HC
user groups.
After completing steps 1-3 as indicated on the preceding page:
Use an arrow key to display the unlock times from 1
to 31 seconds. When the desired unlock time is
displayed in the Unlock Time field, press Enter.
When the system controller displays the message
COMPLETED! Press ENTER to Continue, press Enter.
The controller reverts to the menu illustrated in step 3.
2.3.3.2 Adding an Employee User Group
System Setup
Configuring the System
cannot add or remove the Master user group. Two user groups
exist for employees who do not need cards. Employees who need
access to system commands but do not need to carry cards can be
assigned to Front Desk or MOD user groups.
After you select an employee user group in step 3 on page 35,
the system controller shows parameters that will be assigned to
all cards for that group.
1. Select a System Access group. System access
defines the employees access to system controller
commands. Usually, persons who are assigned to
sections, zones, or buildings do not need to check
in guests, run reports, etc. Exclude system access
for those users by selecting None.
Employees who should be able to issue cards can be assigned to
a system access group:
Front Desk
MOD
Master
Note: Each access group also exists in the system as a user group. You
only need to activate a system access group if employees who carry
cards also need access to system commands.
Hint: Need more than two master passwords? You can issue only two
master cards in the system, but you can assign more master
passwords to employees if you activate the Master access group for
a section, zone or building. A section, zone, or building does not
have to have doors assigned to it in order for you to assign an
employee password.
Press the up or down arrow to see each system access option.
When the desired access group is shown, press Enter.
2. Set the employees duration. Unless it is overridden, an
employees card will work for the time designated by the
duration. Select the number of months, from 1 to 24, that the
card will be effective. The time window will start when the
card is issued. Press the up or down arrow until the desired
number of months is shown. Then press Enter.
A two year duration is assigned automatically to an
System Setup
Configuring the System
You cannot change a user groups settings until the user group
has been activated using the add user group command. Guest
and master user groups are already active. They are only
accessible from the change a user group menu.
1. Press 1 to select User Groups.
System Setup
Configuring the System
System Setup
Configuring the System
System Setup
Configuring the System
Service common access can be left off of any employees keycard. See Adding Employees.
System Setup
Configuring the System
After either Guest or Service is selected as the door type, the system controller
displays the following menu:
1. Select a section. Press the down arrow to
display one section at a time. Only sections that
have already been activated by the add user
group command can be displayed. If no section
keycards should operate the lock, select None.
When the desired section name is displayed,
press Enter.
2. Select a zone. Press an arrow key until the desired zone is
shown; then press Enter. Only zones that were activated as
user groups are displayed. If no zone master cards should
operate the door, select None.
3. Select a building. Press an arrow to show the desired
building; then press Enter. Only a building that has been
activated as a user group will be displayed. If no building
user groups were created, None will be displayed, and
pressing an arrow key will have no effect.
4. Press Enter to bypass passage mode for most locks. Make
sure that you do not activate passage mode for normal guest
room locks. However, you may want to activate passage
mode for some locks that can be operated by guest cards. If,
for example, you have installed VingCard locks on a meeting
room door, you could define the room as a guest room and
activate passage mode.
When you issue a card to a guest for the room, the guests
card can be used to unlock the room for the day while
meetings are taking place, and then relock the room at the
System Setup
Configuring the System
System Setup
Configuring the System
necessary to exit the add lock menu when you need to change
parameters for the next lock. Press Escape when the cursor is
on the blank Room # field. The cursor moves to door type.
Press Enter if the door type does not need to change. If you
need to change the door type for the next lock, use the arrow
keys to select a door type. If a change is needed at another field,
press Enter to move to the field; then press an arrow key to
show the options for that field. Press Enter when the desired
option is displayed. Example: After all guest rooms in Section
1 have been entered, you can add a service door. Press Escape
to move the cursor to Door type, then press an arrow key until
Service appears. Press Enter to scroll to the room number field.
Then type a number.
If you press Enter too many times and scroll past a field you
want to change, you can press Escape to scroll back, unless the
cursor is at Door Type.
OR
Exit. After all locks have been entered, press Escape twice
when the cursor is on an empty room number field. The first
Escape moves the cursor to the door type field, the second exits
the add lock menu and returns the system controller to the
Define Locks menu, illustrated in step 2. The cursor must be at
the door type field in order to exit.
2.3.4.2 Defining a Service Common Door
If Service Com has been selected for door type (see Defining
Locks earlier in this chapter), the system controller displays the
following menu.
1. Activate section cards. When the cursor moves
to the section field, Yes appears in section, zone
and building fields. If all7 section master
keycards should have access at the door, press
Enter and go to zone. If no section cards
should have access, press an arrow to display
No. Then press Enter.
7
If you select YES, any section master card may or may not have access to all service common doors. The
ability must be added to the card when the employee is added. If NO is selected here, no section cards
will have access at this door.
System Setup
Configuring the System
All zone master cards do not have access automatically. See preceding footnote.
A building master card does not have access automatically. See preceding footnote.
System Setup
Configuring the System
command.
7. Press Enter to continue.
8. Add more locks or exit.
Add more locks with the same parameters.
The display remains in the add lock menu, but
no room number is displayed. Add another room
with the same parameters by typing another
room number and pressing Enter.
OR
Continue adding locks with different parameters. It isnt
necessary to exit the add lock function when you need to change
parameters for the next lock. If you need to change one or more
parameters before continuing, press Escape once. The cursor
moves to the door type field, allowing you to change parameters
for the next lock. Select a different door type or make a change
in any of the remaining three fields. Move to the field you want
to change by pressing Enter. Use arrow keys to display the
desired selection in each field. Then press Enter.
OR
Exit. If all locks have been entered, press Escape twice when
the cursor is on the empty room field.
2.3.4.3 Defining Global Common Doors and Extended Access Controllers
System Setup
Configuring the System
automatically.
2. Type a room number and press Enter. Type a number
between 1 and 9999. Then press Enter. Make sure you do
not use a number that will be needed for guest rooms.
3. Press Enter to continue.
4. Add more locks or exit.
Add more locks with the same parameters. The
display remains in the add lock menu at the room
number field. Add another global common room by
typing a room number and pressing Enter.
Repeat steps 2 and 3 as many times as necessary
until numbers for all global common doors and
extended access controllers have been entered.
Note:Although you can define as many global common doors and
extended access controllers as you want (without exceeding 475
locks), it is not necessary to create more than one global common
door and one extended access reader in the system database. Then
program all global common doors with the same room number,
and program all extended access readers with one room number.
If you want a different room number to appear on the readout from
a global common door, then you need to assign a unique room
number for each door in the database.
OR
Continue adding locks with different parameters. Press
Escape when the cursor is on the Room # field. At the door type
field, press an arrow key to select a door type and follow
instructions for that door type. (See 2.4.4.1 and 2.4.4.2.)
OR
Exit. If all locks have been entered, press Escape twice when
the cursor is on an empty room number field. The first entry
moves the cursor to the door type field, the second exits the add
lock command and returns the system controller to the Define
locks menu, illustrated in step 2. The cursor must be on the
Door type field in order to exit. If you press Escape when the
cursor is at any other field, the cursor will only move up to the
preceding field.
System Setup
Using Locklink
System Setup
Using Locklink
System Setup
Using Locklink
3.
Cards
Passwords
Cards
This section covers the daily operation of the system controller,
encoder base, and contact card after the database has been
configured.
3.1
Passwords
The password screen is illustrated below.
VC 2100 PLUS
CONDO \ POS
Ver 1.6
Note: If the screen is blank, press the POWER button, which is located
just below the display screen. See booting instructions in section
4.
If a front desk or Manager on Duty (MOD) password
is entered, the system controller goes to the Add Guest
to Room menu. For check-in instructions, see
"Adding a Guest" later in this chapter.
Only two other operations are available to a Front
Desk user. Press Escape; then choose Remove Guest
Card or Verify Guest Card.
An MOD password is assigned to personnel who need
access to reports and locklink commands. An MOD
cannot make changes to the systems set up and has
no access to Employee Cards, Special Cards (except
One Shot Card) or management reports. Press Escape
once to go to the Guest Cards menu. Press Escape
twice to go to Cards. Press Escape three times to exit
to the MODs main menu.
Cards
Selecting from Menus
3.2
Cards
Issuing Cards
3.3
Issuing Cards
All cards are issued from the Cards menu. Only commands
related to guest cards are available to persons with front desk
passwords. Employees with MOD passwords have access to
guest cards and the One Shot special card. Employees with
master passwords can issue all cards.
Cards
Guest
Employee
Add Employee
Change Employee
Remove Employee
Verify Employee Card
Special
3.4
Guest Commands
Add guest to room - Use this command to make a card for a
new guest. Up to five guests can be checked into one room
concurrently. Also use this command when a guest loses a
keycard. If a guest loses a keycard, a new card must be made
for each guest sharing the room.
Cards
Guest Commands
Cards
Guest Commands
OR
Select Different Room. Press 2 if you need to assign the guest
to a different room. Return to step 5.
OR Select Add Guest. Press 3 if another guest occupies the
room and the new guest will share the room with the existing
guest. Up to five cards can share a room. Go to step 8.
6. Select Type. Press an arrow key to select a
type other than Guest. Four guest types are
possible: Guest, HC, Guest w/DBO and HC
w/DBO. Press Enter when the desired Guest
type is displayed.
10
Three seconds is the standard time for guest cards, but the unlock time can be configured by the property.
Cards
Guest Commands
Note: The system controller will skip this step if Guest only was
selected by hotel managers when setting up the database.
7. Select an end date. Select a time when the card should
expire. After the selected time the card will not operate a
lock. The system controller displays a date that is calculated
based on the length of an average visit.
The end date can be changed by using the up/down arrows to
display an earlier or later date. Press the down arrow to
decrease the end date (shorten the guests stay). Press the up
arrow to lengthen the duration assigned to the guests card.
When the desired check-out date is displayed in the end date
field, press Enter. Normally, the duration of guest cards are
limited to 30 days. When this option is enabled, the duration
can be extended up to 2 years. On the Add Guest Menu, the
day of week is not displayed. The default end date is
displayed and may be adjusted using the up/down arrow keys
for 1-30 days, or may be edited directly using the number
keys for stays more than 30 days.
Caution: When a guest checks in before the standard check-out time,
you must add an extra day to the length of the visit. For
Cards
Guest Commands
Cards
Guest Commands
3.4.2
Cards
Guest Commands
Cards
Guest Commands
3.4.3
Verifying a Card
Select Verify guest card to find the room number assigned to a
card. Use this command to determine the owner of a lost
card.
To read the information from a card:
1. Type a password and press Enter.
2. If you typed a master password, select Cards from the
main menu, then select Guest. If you typed a front desk or
MOD password, press Escape.
3. To select Verify Guest card from the guest cards menu:
press 2.
4. Swipe the card through the encoder base. The
system controller searches its database for
information pertaining to the card and displays the
room number.
Cards
Employee Cards
3.5
Employee Cards
The principal differences between guest and employee cards
are:
Cards
Employee Cards
3.5.1
Adding an Employee
Add an employee to the system when you need to issue an
employee card for a zone, section, building, or all doors. Also
use this command to obtain passwords for employees who
will issue guest cards. The add employee command
automatically assigns a password if the employees user group
has access to the system controller. Do not use the Add
employee command to replace an employees lost or stolen
card.
To add an employee:
Cards
Employee Cards
Cards
Employee Cards
Cards
Employee Cards
Cards
Employee Cards
3.5.2
Cards
Employee Cards
Cards
Employee Cards
3.5.3
Cards
Employee Cards
Removing an Employee
Remove an employees record from the database only when
you also collect the employees keycard. Merely removing an
employee does not invalidate the employees card in any
doors. If you cannot obtain the employees card, use the
change command to generate a new card for that employees
ID. The missing key will be locked out when the new key is
used. Then you can remove the employee from the database
after destroying or encoding over the new card.
To remove an employee:
1. Select Cards from the main menu.
2. To select Employee Cards: press 2.
3. Select Remove Employee. Press 3 or use arrow
keys to move the line indicator (>>) to Remove
Employee and press Enter.
4. Type the employees identification number and
press Enter. Each employee was assigned an
identification number when the card was issued. (If
you have the employees card, you can verify it to
find the employees ID number.)
5. Specify whether to abort or continue. Before
deleting the employees record, the system requires
confirmation that you want to remove the card.
Press 0 if you do not want to continue, and the
system controller will abort the procedure. Press 1
to confirm that you want to remove the employee.
6. The employees record was removed successfully.
Press Enter to return to the display illustrated in
step 4. Press Escape four times to go to password
prompt.
Cards
Special Cards
3.5.4
3.6
Special Cards
Five types of special cards help maintain the system.
Cards
Special Cards
Note: All special cards (expect the one shot card) are valid for two
years from the date they are issued. Do not allow them to
expire without issuing a new set of cards to replace them.
Record the date that you make any special card, and make sure
that a replacement is made prior to its expiration to avoid
inconvenience to employees. A one shot is valid only for one
Cards
Special Cards
Cards
Special Cards
8. Press Enter.
3.6.2
Cards
Special Cards
Emergency Cards
An emergency card has access to all doors (guest, service,
and common). It automatically overrides the deadbolt and
operates extended access readers. An emergency card
should be created as soon as possible after the database has
been configured and should then be stored in a safe or other
secure area for use only in the event that an extreme
situation arises where access is needed to all rooms.
To make an emergency card:
1. Select Cards.
2. Select Special Cards.
3. Select Emergency card from the special cards menu
by pressing 3.
Cards
Special Cards
Diagnostic Cards
A diagnostic card can be created on any system controller from
the Special Cards menu. When used in a lock, the diagnostic
card will display a flash sequence that indicates the reason for
the last denial of a card.
Note: The diagnostic card does NOT unlock doors.
The result of using the diagnostic card will be a Flash Sequence
as follows:
The diagnostic card will not reset this data (using the diagnostic
card repeatedly will display the same data.) When the next nondiagnostic card is used it will over-write the data. However,
you may alternate the use of room cards with the diagnostic
card, and determine the reason that access is denied for each.
To make a diagnostic card:
1. Select Cards.
2. Select Special Cards.
Cards
Special Cards
Cards
Special Cards
Cards
Special Cards
4.
System Operation
System Operation
An event is recorded in memory every time the System
Controller completes a command. System memory stores the
last 1995 events. An events report is a printed copy of the last
1995 events (if all events are included).
Any employee with an MOD or master password can generate
event reports. Only personnel with master passwords can
generate parameters, user groups, employees and lock data
reports. Employees with front desk passwords cannot generate
reports.
4.1
Reports
Several reports permit managers to monitor and maintain
records of the systems activities. An event report allows a
manager to review the last 1995 electronic events. Other reports
permit managers to print configuration of the system.
Reports can be printed from both the server and client SC, but
the client SC is preferred. Regardless of which SC is used, the
report contains all events held in the database, i.e. all events
from both the client and server SC.
The following reports can be generated by the system controller:
System Operation
Reports
4.1.1
Generating a Report
To generate a report:
1. Type a master or MOD password.
4. Specify date and time. You can specify a start and end date
System Operation
Sample Reports
An event report sorted by room lists events for each room:
Date: 02/24/99
VC2100 System
Page: 1
Events by Room
===========================================================================
Room Number
Date
Time
Transaction
==========================================================================
102
09/26/99
22:20
Checked in Guest
09/27/99
09:30
Verify Guest Card
09/27/99
16:45
Checked in Guest
196
09/22/99
15:51
Checked in Guest
09/22/99
15:58
Removed Guest
197
09/22/99
15:59
Checked in Guest
200
09/25/99
08:00
Program Lock
This report shows check in, check out, verify and programming
events. It does not show events that are not related to specific
rooms (add employee key, make emergency key, change system
parameters, etc.).
Event Report Sorted by System Operators Identification
Number (SYSOP)
Date: 02/24/99
VC2100 System
Page: 1
Events by SYSOP
================================================================================
Employee Number
Date
Time
Transaction
================================================================================
2301
09/03/99
18:05
Checked in Guest
2501
09/01/99
22:33
Log System User Off
2501
09/02/99
03:36
Changed Employee
2501
09/02/99
10:26
Edit System Parameters
250
09/02/99
17:53
Changed Employee
9501
09/02/99
18:00
Checked in Guest
9501
09/02/99
18:02
Checked in Guest
9501
09/02/99
18:04
Checked in Guest
System Operation
Reports
14:45
at time of readout
Name:Operation OK
Info: Write
Issue Area:
Lock time at time of
05/17/99
15:07
Info:
User ID:
DB not overridden
15
readout
Time that the
event occurred.
System Operation
Issue Area:
05/17/99
16:00
User ID:
13054
Housekeeping
card used to
open door
05/18/99
07:00
Name:
Info:
Issue Area:
05/17/99
14:45
Name:Operation OK
Info:
Issue Area:
Write
Employees Report
An example of an Employees report is on the next page. The
report is sorted by employee identification number, the number
that you typed into the system when the employee was issued a
card or assigned a password. The report shows the user group
and password as well as the unique identity assigned to each
employees card. The report also shows whether the employees
card can operate common doors.
Date: 02/25/99
VingCard 2100 System
Page: 1
Print Employees
-----------------------------------------------------------------------------Id Number
User ID
Password
User Group
Common Doors
-----------------------------------------------------------------------------2310
13065
9817
Front Desk
No
2501
13051
6867
Front Desk
No
9501
13350
9997
Master
Yes
9663
13444
None
Section 1
Yes
9724
13897
None
Section 2
Yes
9888
14999
8363
Guest Only
No
9889
15000
8357
Zone 1
Yes
Lock Data
The lock data report describes the section, zone and building
cards that operate each lock. An employee keycard assigned to
the respective section, zone, or building has access to the listed
door.
System Operation
Reports
Date: 02/25/99
VingCard 2100 System
Page: 1
Print Lock Data
Room
Door Type
Section
Zone
Building
-----------------------------------------------------------------------------101
Guest
Section 1
Zone 1
Building 1
102
Guest
Section 2
Zone 1
Building
103
Guest
Section 3
Zone 1
Building
104
Guest
Section 4
Zone 2
Building
105
Guest
Section 5
Zone 2
Building
991
Service
Section 1
Zone 1
Building 1
995
Service Common
Yes
Yes
Yes
999
Global Common
1
1
1
1
User Groups
A User Group report describes the user groups that have been
activated. It lists the parameters assigned to all employee cards
in a user group.
Date: 02/25/99
VingCard 2100 System
Page: 1
Print User Groups
---------------------------------------------------------------------------User
Area
Duration Unlock
System
Deadbolt
Group
Time
Access
Override
---------------------------------------------------------------------------Section 1
Section 1
24
3
0
No
Section 2
Section 2
24
3
0
No
Section 3
Section 3
24
3
0
No
Section 4
Section 4
24
3
0
No
Section 5
Section 5
24
3
0
No
Section 6
Section 6
24
3
0
No
Section 7
Section 7
24
3
0
No
Section 8
Section 8
24
3
0
No
Section 9
Section 9
24
3
0
No
Section 10
Section 10
24
3
0
No
Zone 1
Zone 1
24
3
0
No
Zone 2
Zone 2
24
3
0
No
Zone 3
Zone 3
24
3
0
No
Zone 4
Zone 4
24
3
0
No
Building 1
Building 1
24
3
0
No
Building 2
Building 2
24
3
0
No
Master
Master
24
24
3
No
Front De-sk
None
0
0
1
No
MOD
None
0
0
1
No
Guest
Guest
0
3
0
No
Guest w/DBO
Guest
8
3
0
Yes
HC
Guest
8
7
0
No
HC w/DBO
Guest
8
7
0
Yes
Keycards
The Events by Keycards report shows the date/time of the event
and identifies the system operator.
Date: 05/25/99
VC2100 System
Page: 1
Events by KeyCards
(Wed 05/12/99 11:00 - Wed 05/12/99 16:00)
---------------------------------------------------------------------------------Date
Time
Room/Empl#
SYSOP Event Description
User Id
System Operation
---------------------------------------------------------------------------------05/12/99
11:52 2553
1235
Add Employee
13052
05/12/99
12:24 110
1235
Add Employee
13053
05/12/99
12:47 0
1235
Made Lockout Card
13054
05/12/99
12:55 122
1230
Checked in Guest
13053
05/12/99
13:02 157
1230
Checked in Guest
13053
05/12/99
12:25 135
1230
Checked in Guest
13053
05/12/99
12:33 188
1230
Checked in Guest
13053
05/12/99
12:40 127
1230
Checked in Guest
13053
05/12/99
13:58 0
1235
Made Lockout Card
13055
05/12/99
14:02 2553
1235
Changed Employee
13056
05/12/99
14:35 2589
1235
Changed Employee
13057
05/12/99
14:44 2589
1235
Add Employee
13058
05/12/99
15:52 0
1235
Made Backup Card
13059
4.2
System Operation
Restoring a Database Backup
System Operation
7. The system now writes the data to the system memory card
Press Enter when prompted.
8. You may now log back into the system.
4.4
System Operation
Setting Date and Time
4.5
Hour - Use the arrow keys to select the hour. Then press
Enter. (The minute field appears beneath the hour.)
System Operation
Note: At the beginning of each new year the System Controller computes
the start and stop dates for daylight saving time. The first time a
master password is used in a new year, the system controller
displays a message showing the computed dates. To accept the
dates press Enter three times. To change a date, move to the field
that you want to change and use the arrow keys to display the
correct start or stop date. Press Clear when the cursor is on the
start date if you do not observe Daylight Saving Time.
4.6
Set lock time - set the lock time equal to the locklink
System Operation
Communicating with Locks
1
2
3
4
5
6
7
LOCKLINK MENU
Program Lock
Read Lock Events
View Lock events
Unlock Door
Set Lock Time
Set Contact Card
Exit LockLink Mode
4.6.1
Programming Locks
Program a lock:
at startup
To program a lock:
System Operation
1
2
3
4
5
6
7
LOCKLINK MENU
Program Lock
Read Lock Events
View Lock events
Unlock Door
Set Lock Time
Set Contact Card
Exit Locklink Mode
System Operation
Communicating with Locks
4.6.2
Event time
Deadbolt overridden
4.6.3
System Operation
Mode B
Mode B
Mode B
13:24
11-03-99
3 of 95
Open/closed, valid card
11/03/99
08:47
User Group:
Section 1
User ID:
1012
Info: DB not overridden
Override:
Repeated:
Used Once
Issue Area: 1
System Operation
Communicating with Locks
4.6.4
Unlocking a Door
The system controller can be used to unlock a door, if the door
does not respond to cards. Using the contact card (with
connections for a battery pack), the door can be unlocked even
if batteries have been drained or connection between the locks
batteries and the control module has been severed.
To unlock a door using the system controller:
1
2
3
4
5
6
7
LOCKLINK MENU
Program Lock
Read Lock Events
View Lock events
Unlock Door
Set Lock Time
Set Contact Card
Exit Locklink Mode
4.6.5
System Operation
4.6.6
5.
System Controller
Booting the System Controller (First Time)
System Controller
Before turning the system on for the first time, make sure that
each system controller has batteries in it or that it is connected
to the external power. If you are using both a server and a client
unit, check the cable between them.
5.1
2100 PLUS
NO DATABASE
System Controller
Power Switch Functions
5.2
Power ON
SUSPEND operation
Power OFF
System Controller is
5.2.1
Press Power
button for
Result
OFF
1 Second
Turns unit ON
SUSPENDED
1 Second
RESUMES operation
ON
1 Second
SUSPENDS
operation
ON
3 Seconds
RESETS unit11
ON
more than 3
seconds
SUSPEND
Suspend is a power conservation mode. When the system
controller enters this state, the display is blank. The VC2100
PLUS program is still running and remains at the last menu you
used. The system controller suspends automatically when it is
operating from batteries and a time-out limit (three minutes) is
exceeded. The controller will not go into the suspend mode
automatically if it is connected to the power supply.
You can place the system controller in the suspend mode by
pressing and immediately releasing the power button. The
system controller clears the screen and displays the message
SUSPENDING. The screen blanks, but the system
controller is still ON. There is no other indication that the
11
After a reset, you do not have to remove the card before you start the system again.
System Controller
Power Switch Functions
5.2.2
5.2.3
RESET
While the unit is ON, pressing the Power switch for three
seconds will force a system reset (warm boot).
Press and hold the power switch until the suspend
message illustrated at left disappears. Then release
the power button. The system has a real time clock, so
you do not lose time and date when you turn the
system off.
Warning:
5.2.4
Power off
Pressing power switch for an extended time (past the RESET
warning) will power the unit off entirely. The system has a real
time clock, so when you turn the system controller back on,
there is no need to set the time and date again.
System Controller
Indicators and Messages
5.2.5
Cold Booting
When you press the power button and turn the system on, the
system controller can display one of two windows.
2100 PLUS
CONDO \ POS
5.3
2100 PLUS
NO DATABASE
Charge Indicator
Low Battery Indicator
Power/Resume
System Controller
5.3.1
Low Bat
When the batteries need to be changed, the LOW BAT indicator
flashes at a rate of once per second. When the batteries have
discharged to a point where they cannot sustain continued
operation, the indicator remains on continuously. Turn the unit
off immediately and change the batteries.
To change the batteries:
1. Log off.
2. Turn the SC off (or connect external power direct to the SC)
3. Replace the batteries.
4. Reboot the SC (or remove external power).
5. Log back on the client SC, if necessary.
Note: Whenever you power off the server SC, make sure that you have logged
off the client SC first.
The following chart summarizes the system controllers
indicators:
Indicator Name
Indication
Charge (VISUAL)
LOW BAT (VISUAL)
On steadily
Flashing (1/second)
On steadily
AUDIBLE SIGNAL
5 rapid beeps
5.4
Meaning
The unit is operating from external power supply.
Batteries need to be changed.
Batteries are discharged. Turn off the unit and replace the
batteries.
Encoder time-out.
Power Supply
The system controller is powered by the encoder base, which is
connected to a power supply. The power supply can be
disconnected from the encoder base and connected directly to
the power input on the system controller when the controller is
not attached to the encoder base. However, the system
System Controller
Batteries
Batteries
The system controller uses standard AAA size alkaline batteries
which can be bought from any supermarket (e.g. Eveready
Energizer, Duracell Alkaline or Ultra, Rayovac Maximum).
Zinc-Carbon batteries are not recommended.
When external power is applied to the SC (through the power
jack or the encoder base), the SC uses it instead of the batteries,
thereby extending the battery life as much as possible.
The system controller has no recharging capabilities and the
power system is completely safe: since there is no charge path
to the batteries, battery power cannot leak out and external
power cannot reach, and damage, the batteries.
5.6
System Controller
Memory Cards
Memory Cards
Memory cards store the system data. RAM (random access
memory) cards are powered by batteries. Some RAM cards
have an arrow on top of the card, pointing in the direction of
card insertion. A write protect switch is at the end of the card
which is not inserted into the drive. The write protect switch
must be set in the unprotected mode for use in the system
controller. The system controller writes to the card after each
transaction.
A RAM card has a two-year (approximate) battery life if not
installed in the system controller. When the RAM card is
inserted, it uses the system controllers power supply. If a RAM
cards battery is low, all information on the card will be lost.
The system controller will not be able to read from or write to
the card. When the system is booted, or following any
transaction, the system controller will display the message, Card
Battery Low, after the charge has dropped below an acceptable
level. A memory card with battery will have to be inserted into
the drive or the battery will have to be replaced before the
system will be able to read and write to the card.
Every system transaction is written to memory and also to the
memory (RAM) card. Since the database on the card is
constantly updated, frequent backups are not necessary.
However, it is still desirable to perform a manual backup of data
at least once daily on a different card than the one which
permanently resides in the drive.
The memory card must be present in order to boot the system.
5.7
Eject Button
The eject button pops out when a memory card is inserted.
Press the button to eject a card.
System Controller
Connections
5.8
Connections
System Controller
After locks have been programmed, the system controller
should be returned to its cradle in the encoder base. Unplug the
contact card and replace it with the modular RJ-11 in the
encoder base.
Encoder Base
Three communication ports are located on the back of the
encoder base. The nine-pin port is for serial communication
with a property management system (PMS). The 25 pin port is
for parallel printer communication. The RJ45 modular jack is
for the network connection.
When you return the system controller to the encoder base,
connect the power supply to the base before plugging in the RJ11 jack. If you apply power to the base when the system
controller is already connected, the unit will poll for PMS on
power up. Polling stops automatically after one minute, but you
can abort polling at any time by pressing the Escape key.
5.9
System Controller
Troubleshooting
Troubleshooting
This section details what to do in the event of problems with a
system controller.
5.9.1
Server SC
If you experience operational problems at the server SC, carry
out the following steps, stopping when the problem is cleared.
1. Check the memory card is correctly inserted.
2. Check the PMS/printer connections (if the problem concerns
PMS or printing).
3. RESET the server SC.
5.9.2
Client SC
If you experience operational problems at the client SC, carry
out the following steps, stopping when the problem is cleared.
1. Check network cable connection to the server SC.
2. Check the PMS/printer connections (if the problem concerns
PMS or printing)
3. RESET the client SC.
4. Check the memory card is correctly inserted at the server SC.
5. RESET the server SC.
System Controller
Troubleshooting
Lockset
Electronic Controls
6. Lockset
This Chapter describes the 2100 Classic Lockset.
The 2100 System can also be used with Presidio or Da Vinci
Locks. Please refer to separate Lock documentation for details of
these lock types.
The 2100 Classic lock consists of five
sub-assemblies:
lockcase
inside escutcheon
outside escutcheon
cylinder (optional)
13
Unlock time is written on the card. Only two durations are available when a guest checks in. The front
desk agent either assigns a Guest or HC user group to determine how long the door remains unlocked.
105
Lockset
Electronic Controls
Once inside the room, the guest can extend the deadbolt for added
security and privacy. Rotate the top of the thumb turn
approximately 45 degrees toward the doors hinges to extend the
deadbolt. To retract the deadbolt and exit, depress the handle. The
inside handle retracts both the deadbolt and the latch bolt. Retract
the deadbolt without opening the door by returning the thumb turn
to the vertical position.
The VC2100 system can be configured to allow some cards to
override the deadbolt. When a card has deadbolt override
(DBO) assigned to it, both the deadbolt and latch bolt will be
retracted when the handle is depressed after the card is used. If no
deadbolt override is assigned and the deadbolt is extended, the
indicator on the outside escutcheon flashes yellow when the card is
inserted.
A metal EMK key, which operates the cylinder14 overrides the
deadbolt. If the deadbolt is thrown, turn the key 360 degrees to
retract the deadbolt, then turn an additional 120 degrees to retract
the latch. (If the deadbolt isnt thrown, it is only necessary to turn
the key 120 degrees to retract the latch.) Only a metal key can
extend a deadbolt from outside a room. When the door is
deadbolted, you can open the door from the outside with the
emergency key (EMK) or a keycard with override capability.
A new guest card automatically locks out the keycard of the
previous guest. When the card is issued, the system writes the
present time onto the card. Guests who share a room are checked
in by assigning the same start time to their cards. Up to five guests
can share a room. A card with a later start time locks out or
overrides an earlier card.
A green/red/yellow LED communicates the locks status to the user
according to the following table:
14
Function
LED
3 yellow flashes
door.
keycard is inserted
guest privacy
yellow
access granted
green
106
Lockset
Electronic Controls
lock-out
1 green flash
undo lock-out
3 green flashes
red
lock communication OK
green
locklink error
red
green
107
Lockset
Electronic Controls
6.1
Electronic Controls
Electronic components read and process the magnetic information on a
card and control the locksets mechanical operation. Standard ANSI and
Euro locksets consist of four electronic modules: the control module, on
the inside escutcheon; the reader module, on the outside escutcheon; the
battery pack; and the lock motor assembly.
The VC2100s/50 conversion kit combines the reader and control modules
in one lock control unit (LCU). All conversion electronic components are
on the outside escutcheon. Only the outside escutcheon must be replaced
when a 1050 lockset is upgraded to a 2100 system.
6.1.1 The Control Module (CM) and the Reader Module (RM)
The control module is a micro-computer
attached to the inside escutcheon. After
being programmed by the system
controller, a control module sends an
unlock command to the door in response
to correctly coded keycards inserted in the
reader module (RM). A control module
can be reprogrammed at any time.
The RM is an insert type magnetic reader
on the outside escutcheon. The cable from
the RM is connected to a cable from the
CM.
108
Lockset
Electronic Controls
RM Technical Data:
Read speed
Magnetic head life time:
Head to card force:
Operating temperature:
Humidity:
Storage temperature:
I2C-CONNECTOR
BATTERY CONNECTOR
LOCK CASE CONNECTOR
6.1.2 LCU
The lock control unit is included as a component on the outside
escutcheon in the 2100s/50 conversion kit. Incorporating both reader and
controller in one device, the LCU is also used as the reader/controller for
remote readers and extended access controllers.
Technical data:
Read speed
Magnetic head life time:
Head to card force:
Operating temperature:
Humidity:
Storage temperature:
15
16
109
Lockset
Electronic Controls
Lockset
Electronic Controls
111
Lockset
Mechanical Components
6.2
Mechanical Components
6.2.1 Lockcase
The lockcase houses the latch, deadbolt, and the lock motor. The latch
bolt retracts any time an inside handle is depressed and can be retracted
by depression of the outdoor handle when power from the control module
to the motor disengages the locking mechanism. A panic release feature
automatically retracts the deadbolt when the inside handle is depressed.
The cylinder can be used to extend or retract the deadbolt and the latch.
Two types of lockcases are available: ANSI standard and EURO
standard. The ANSI standard lockcase is shown at left in the following
diagram. The EURO is at right.
112
Lockset
Mechanical Components
6.2.2 Cylinder
The optional17 mechanical cylinder is operated by a metal key. The
emergency key (EMK) overrides the deadbolt at any door in the hotel.
Only the emergency key can be used to extend a deadbolt from outside
the room. The cylinder is recodable. If a propertys metal emergency key
should be lost or otherwise compromised, the cylinder can be recoded up
to two times for a new emergency key without requiring replacement.
6.2.3 Escutcheons
VC2100 Lockset
The inside escutcheon and door
handle assembly includes a
covered battery pack18, inside
handle with handle retainer
unit19, the control module, and
the deadbolt thumb turn, which
allows the guest to lock (or
unlock) the deadbolt for
additional safety or privacy
when the room is occupied.
The outside escutcheon includes
the reader module and the
outside handle.
Thum b Turn
Cylind er
VC2100 Lo c kse t
17
113
Lockset
Mechanical Components
VC2100s/50
The inside escutcheon and door
handle assembly consists of the
inside handle with handle
retainer unit20, and the deadbolt
thumb turn, which allows the
guest to lock (or unlock) the
deadbolt for additional safety or
privacy when the room is
occupied.
The inside escutcheon must be
removed for conversion of a
VC1050, but it will be reinstalled.
Outside escutcheon
Code cover
Thumb Turn
Inside Escutcheon
VC2100s/50
20
The inside escutcheon is not included in the installation package (as a rule). Use the inside escutcheon
which you removed.
114
6.3
The Lockset
Installation
Installation
The following instructions are for installation of VC2100 locksets. For
instructions to convert locksets from VC1050 to VC2100s/50, see the
separate publication: VingCard 1050 to Mag Stripe Lock Conversion.
Prior to lock installation, doors must be milled and drilled according to
lock installation template.
Note: When installing, align all parts properly so that they can move
freely. The lock will function without abnormal wear or
maintenance if it is properly installed. The cylinder, RM, and CM
must never be disassembled! These components consist of many
spring loaded parts and can only be assembled with special tools.
Lockset
Installation
116
The Lockset
Installation
Note: When batteries are connected to the RM, the lock will sound two
sets of three beeps. These beeps indicate that the connection is
good and that a lock program has been loaded into the CM. You
may hear only one set of three beeps from the RM, indicating that
the CM does not have a program loaded into it yet. Either signal is
acceptable.
5. Fasten inside and outside escutcheons with
the four escutcheon mounting screws. Wait
until you have installed the cylinder and
checked operation of the lockset before you
tighten down these screws.
6. (Projects with cylinders) Insert a turning key
into the cylinder and turn the cylinder
clockwise until flush with the outside
escutcheon. A turning key is a shortened key
included in the installation package. Make
sure the keyway is in the correct position by
checking the cam on the back of the cylinder.
In order to fit into the lockcase, the cam must
not extend outside the circumference of the
cylinder.
Lockset
Installation
Controls
Remote Controller
7. Controls
Three devices can be used with the VC2100 system to control
equipment that is not manufactured by VingCard Systems.
Remote Controller (6866)
Extended Access Controller (6870)
Room Controller
7.1
Remote Controller
The remote reader controls locking
equipment which must be installed when
the VingCard mortise lockset cannot be
used. A remote controller could be
installed, for example, next to a glass door
at a pool or lobby door which is set up as a
global common door. Then connect the
output through a switch or a timer so that
the door remains open during the day
while at night only guests have access to
the hotel using their keycards. At a
parking lot gate the remote controller
could be programmed as a global common
door and all guests would have access to
the parking lot, during the time window
on their cards.
In addition to the features of a VingCard lockset, the remote
controller has functions for:
Tampering
Strike powered via relay
Egress switch
Alarm triggering and ATL (Anti Tail Gating) via door
switch
The remote controller can be surface mounted, where the entire
box is visible, or it can be recessed so that only 27 millimeters
extend beyond the wall or panel where it is installed. Recessed
installation requires a flange or trim.
119
Controls
Remote Controller
120
Controls
Remote Controller
86
83
200
63
121
Controls
Remote Controller
Tamper
122
Controls
Remote Controller
tamper switch
X4
X4
Position 1
24 V
J1 and J2
Position 2
12 V
jumper to LCU
cable to
interface board
in 6866 housing
jumper to LED
123
Controls
Remote Controller
124
Controls
Remote Controller
Two remote controllers can be connected to one load device for control of
entrance and exit:
125
Controls
Remote Controller
126
Controls
Extended Access Controller
7.2
The extended access reader is designed for use in elevators. When extended
access is enabled in system parameters, hotel agents will be able to activate
extended access on any guests card. Managers will be able to assign extended
access to each employee when they encode the employees card. The extended
access controller reads the extended access bit. If the card has the correct
facility code, a valid time window, and the extended access bit is valid, the
controller activates a relay that can be configured either as normally open or
normally closed.
The extended access controller is not designed for exterior or surface mount
applications. It is primarily for indoor applications. It is connected to the call
button circuit in an elevator.
Dimensions:
Min
Min
35 mm
35 mm
32.5 mm 32.5 mm
45 mm
44
105
93.5 mm
Min 85 mm
Side View
44
105
93.5 mm
Min 85 mm
Min
25 mm
Cutout Dimensions
Front View
127
Controls
Extended Access Controller
PLC
Elevator electronics
X3
COMMON IN
OUT 1
COMMON OUT
+
24 V
Power Supply
Use a 24 VDC power supply connected at terminals 17 (+) and 18 (-). The
illustration above shows connections if a PLC is used. If a PLC is not used, be
sure to provide a jumper between input voltage and one side of the output relay.
128
Controls
Extended Access Controller
Set relay output one for either normally open or normally closed output.
Disregard the remaining 7 jumpers and output terminals. If no PLC is available
and the strike or other device controlled by the extended access reader receives
power from the same power supply that is used for the reader, connect a jumper
from terminal 17 to terminal 2.
Normally open: Relay contacts close when a valid keycard is used.
Normally closed: Relay contacts open when a valid keycard is used.
129
Controls
Room Controller
7.3
Room Controller
84 mm
155
38
In (Mains)
130
Controls
Room Controller
NC
C
Neon Lamp
NO
Line
L1
L2
L2
L1
Load
131
Controls
Room Controller
132
System Maintenance
Cylinder
8. System Maintenance
This Chapter focuses on the 2100 Classic Lockset.
The 2100 System can also be used with Presidio or Da Vinci Locks.
Please refer to separate Lock documentation for extra information
regarding these lock types
Use the information in this section to help maintain the security and
efficiency of the VC2100 system.
8.1
Cylinder
Cylinders are optional on 2100 and Da Vinci locksets. Presidio locks do
not have cylinders. Cylinders cannot be used with 2100s/50 locksets.
After installation is completed, a locks cylinder can be recoded up to two
times. Recode all cylinders in the event that a metal EMK key is lost,
stolen, or otherwise compromised. Recoding the cylinder locks out the
lost key without requiring complete replacement of the cylinder. After
two recodings, all cylinders must be replaced if a metal EMK key is lost.
System keys are marked EMKn and RKn where n is 1, 2, or 3 and
indicates the recode level. An EMK key is used for emergency access to
all rooms. An RK key is used only to recode a cylinder. RK keys allow
recoding of the cylinder from level 1 to level 2, and from level 2 to level
3.
The markings of metal keys and the sequence in which they should be
used are shown in the table below:
Level:
LEVEL 0 (Construction)
LEVEL 1
LEVEL 2
LEVEL 3
Marking:
Function:
EC0
RK1
Recoding key:
To recode from construction level to level 1
EMK1
RK1
Recoding key:
To exit level 1
RK2
Recoding key:
To enter level 2
EMK2
RK2
Recoding key:
To exit level 2
RK3
Recoding key:
To enter level 3
EMK3
System Maintenance
Cylinder
8.2
8.2.1
System Maintenance
Lockset Maintenance
Lockset Maintenance
Changing Batteries
Battery packs with an output below 7.8 volts (measured without load)
cannot operate the lock motor. The CM (VC2100) or LCU
(VC2100s/50) checks the battery voltage when an employees card is
used. The check is performed when the lock motor is activated. If the
battery packs output is below the acceptable range, the control unit
signals with three yellow flashes. The controller will still unlock the
door as long as the battery voltage is high enough to operate the lock
motor.
To change batteries, first remove battery lid on inside escutcheon using
the hexagonal battery cover tool. Turn counter-clockwise. Pull out the
old battery-pack and insert a battery-pack with new batteries. Fasten the
battery lid by using the hexagonal screwdriver.
8.2.2
Cleaning Escutcheons
In order to preserve the appearance of the lockset, clean escutcheons
using an alkaline cleaning fluid with a max. pH of 9 with no solvents or
abrasives. Apply the cleaning solution using a damp cloth. Avoid
spraying, especially directly at the card insertion slot.
8.2.3
Lubrication
Use of lubricants containing solvents or graphite will void the warranty
on the lockset.
System Maintenance
Troubleshooting
8.3
Troubleshooting
If a lock does not work properly when a card is inserted, you must
determine whether the malfunction is due to a card error or to a
mechanical error. Many mechanical malfunctions can be detected by a
visual inspection. If a lock cannot be operated when a card is inserted
and the reader displays a green LED, or if the lockset is difficult to
operate, check the following:
Latch retraction Depress the latch with your thumb. If it does
not depress easily, either the lockcase is in a
bind or lockcase components are
malfunctioning. Remove the lockcase from the
door and depress the latch. If the latch
depresses easily when the lockcase is removed
from the door, reinstall the lockcase, carefully
testing at each stage of assembly.
After installation of a lock, check for full
extension of the latch. If the latch does not
extend completely, binding between the
lockcase and the mortise pocket or other lockset
parts may be interfering with operation.
Handle return
System Maintenance
Troubleshooting
System Maintenance
Troubleshooting
Loosening the escutcheon screws and retightening often corrects alignment. However,
thumb turn difficulty can indicate more serious
lockcase malfunction. If the deadbolt is difficult
to operate, even when the lockcase is removed
from the door, replace the lockcase.
Auxiliary bolt
Inside Spindle
After you are sure that the locksets mechanical operation is OK, use the
charts on the following pages to help you analyze electronic and system
malfunctions.
Electronic problems are simple to troubleshoot if you keep spare
electronic components available for testing purposes. You can, for
example, quickly determine that an LCU or CM is operating properly by
connecting a spare lockmotor. Rather than pulling all components off the
door, connect the spare lockmotor after pulling off the outside escutcheon
only. If you experience the same problem with the test lockmotor then
you can expect to find an electronic problem in the RM, CM, LCU or the
battery pack.
System Maintenance
Troubleshooting
Possible Causes
Solutions
No Flash
1.
2.
3.
4.
System Maintenance
Troubleshooting
System Maintenance
Troubleshooting
1.
System Maintenance
Troubleshooting
8.3.1.2
Verify card.
4. CM malfunction
5. Already locked out by more recent guest card
or lockout card
Verify card.
System Maintenance
Troubleshooting
System Maintenance
Troubleshooting
8.3.1.3
No Encoder Response
The system controller has a built in utility to help you check encoder base
communications. Any time you see a No encoder response or Printer is
down message you can use the Encoder Information function to make
sure the system controller is connected to the Encoder base and that the
encoder base is responding to the SC:
Printer is down.
Press any key except Enter or Escape to return to the Reports menu. Then press
encoder information. If the system controller displays an encoder software version, the
Escape. Press 6 when the Main menu is displayed, then press 6 again to display
Each property has a unique facility code. A facility code for another system is already
loaded into the CM. Return the CM for replacement.
8.4
8.4.1
System Maintenance
Lockset Repair and Part Replacement
System Maintenance
Lockset Repair and Part Replacement
8.4.3
8.4.4
System Maintenance
Lockset Repair and Part Replacement
8.4.5
8.4.5.1
System Maintenance
Lockset Repair and Part Replacement
ANSI Lockcase
8.4.5.2
System Maintenance
Lockset Repair and Part Replacement
Euro Lockcase
Note: Make sure that the switch arm is placed correctly and that
the plastic transfer mechanism is functioning properly.
Replace the lockcase lid.
Place the lockcase in the door cut-out and then replace escutcheons.
When the lock is re-installed, check both mechanical and electronic
functions to make sure that the lock is operating properly.
System Maintenance
Lockset Repair and Part Replacement
Parts
2100 Classic Lockset
9. Parts
9.1
1
2
3
4
5
6
7
8
9
1
0
1
1
1
2
1
3
Battery cover
Batteries
Battery holder
Spindle, deadbolt
O ring
Screw lockcase innst.
Spindle, handle
Spindle, handle outside
Escutcheon, inside
Screw, escutcheon
Strike
Screw, strike inst.
Screw, machine, front
plate
Parts
2100 Lockcase
1
4
1
5
1
6
1
7
9.2
Plate, front
Cylinder set screw
Lockcase
Escutcheon outside
2100 Lockcase
1
2
3
Latch assembly
Dead latch
Washer
1
9
2
0
2
1
2
2
2
3
2
4
2
5
2
6
2
7
Parts
2100 Lockcase
2
8
2
9
3
0
3
1
3
2
3
3
Latch retractor
assembly
3
4
Bushing, plastic
3
5
Switch box
Spring for switch box
Lockmotor adapter
Wire protector
Bushing
Dead bolt lever
Cyl./latch lever
assembly
Spring for switch arm
Parts
2100s/50 Conversion Set
9.3
27
25
24
26
23
17
22
21
15
16
14
20
19
18
13
9
12
10
8
11
6
7
28
1
3
R
e
1
f
2
.3
.4
.5
.6
.7
.8
Description
escutcheon, outside
frame (extension)
battery
case, battery
LCU (Lock Control Unit)
retainer, latch (spring
keeper)
guide, retainer (spring
guide)
spring, retainer, latch
1
0
1
bracket, LCU
1
1
2
1
3
1
4
1
5
1
6
R
e
1
f7
1
.8
1
9
2
0
2
1
2
2
2
3
2
4
2
5
2
6
2
7
2
8
2
9
Description
spindle, outside
axle, indicator
counterweight
(plate),
sleeve lm
lockmotor
hub, outside
washer, spindle
hub, inside
spindle, handle
cover,
spindle, indicator
cable, battery
screw, escutcheon
Parts
2100s/50 Conversion Set
1 3/8
Spindle,
Thumb
76mm Turn
1
3/4
88 mm
100 mm
Spindle,
Handle
X
X
Escutcheon
Screw
Finish
64mm
64 mm
64 mm
72 mm
72 mm
72 mm
80 mm
80 mm
80 mm
2
6
D
US4
US3
26
D
U
S4
U
S3
26
D
X
X
X
X
X
X
X
X
Orders for
replacement screws
must designate finish
and length.
Use existing lockcase and inside escutcheon parts when upgrading from 1050 locksets to
2100s/50 locksets.
Parts
System
9.4
System
Server system
controller
Encoder base for
server
Client system
controller
Encoder base for
client
Memory card
Power supply
Network cable
2
3
4
8
9
1
0
1
1
1
2
1
3
Parts
System
Interfaced Systems
PMS Connection
Interfaced Systems
PMS Connection
To avoid this, the PMS should send check-out commands at the actual
time of check-out or immediately prior to checking in a new guest, one
whose card should override or lockout all previously issued guest cards.
If two new guests check in who will share a room, the PMS should send a
check-out command, followed by a check-in command for the first guest,
followed by a check-in command for the second guest.
The PMS must add an extra day to the guests stay if the guest checks in
before the check-out time, see System Parameters, Check-out.
Interfaced Systems
PMS Connection
SC-END
PMS-END
Data signals are as shown in the following table. No control signals are
necessary.
Note that the system controller is defined as terminal side.
Pin no
Signal abbr.
Description
TX
RX
GND
Interfaced Systems
PMS Protocol/Specifications
Interfaced Systems
PMS Protocol/Specifications
Hex
Purpose
STX
0x02
ETX
0x03
ENQ
0x05
ACK
0x06
NAK
0x15
DLE
0x10
Escape data characters from being interpreted as control characters (see below)
RS
0x1E
The Data Link Escape is used to prevent data characters from being
interpreted as message control characters. The DLE is to be inserted
during transmission and removed upon reception and is not included in
the calculation of check characters or in the length of the various fields.
If an STX or ENQ, which is not prefixed by a DLE, is found within a
data field then any data already received will be discarded, and the system
will execute the command dictated by the control character.
Note: The PMS must prefix all commands with an ENQ. An ENQ must not be
sent at any other time. (Sometimes PMS systems send ENQs at regular
intervals to test links, but the VC2100 responds to a PMS inquiry by
polling the PMS for sixty seconds. When it is polling, the system
controller locks out the keypad, and commands cannot be executed by the
VingCard CPU.)
Interfaced Systems
PMS Protocol/Specifications
ENQ
VCS
STX
ACK
dd
ss
ff
<data>
ETX
cc
ACK
Upon receiving an ENQ, VCS returns a low level ACK. Following the
ACK, the PMS can send a frame as illustrated on the preceding page.
VCS will return an ACK to the command, assuming that the calculated
and received check characters agree. If check characters do not agree, the
VCS will respond with a NAK. VingCards responses apply to the data
integrity at the message level, not to the message contents or the result of
the command.
Message field
Purpose
dd
ss
ff
<data>
cc
The length of messages varies with the number of fields included in the
data area and the length of each field. The total message length from the
VCS or PMS cannot exceed 768 characters.
The following format is used for answers from VCS to PMS:
VCS
PMS
STX
dd
ss
ff
<data>
ETX
cc
ACK
Interfaced Systems
PMS Protocol/Specifications
Purpose:
Comments:
Valid contents
Command codes
ASCII char
Check In Guest
Comments:
Interfaced Systems
PMS Protocol/Specifications
ASCII
code
OK , command complete
<x>
Purpose:
Informs the PMS of the result of the command.
Comments: One byte long. If PMSs command contains an error
in a data fields, VCS returns the field identifier for
the erroneous field. VCS does not attempt to process
the command.
Interfaced Systems
PMS Protocol/Specifications
[R], 0x52
Length
1 - 6, Variable
Valid contents
Numeric characters
Field syntax
Example
Interfaced Systems
PMS Protocol/Specifications
Length
Valid contents
Numeric characters
Field syntax
Examples
[U], 0x55
Length
1 fixed
Valid contents
Alphanumeric characters
Field syntax
1, 2, 3, or 4.
Example
Interfaced Systems
PMS Protocol/Specifications
Extended Access
This field is optional in the check-in the command. If no
extended access field is included in a check-in command or if an
ASCII zero is sent, the guests card will not have extended
access. An ASCII 1 following the field identifier A, commands
the VCS to include extended access on the guests card.
Extended access is not used at all properties.
Field identifier
[A], 0x41
Length
1 fixed
Valid contents
Numeric
Field syntax
Example
Interfaced Systems
PMS Protocol/Specifications
Length
1 39, Variable
Valid contents
Field syntax
Example
0's
ASCII
1011110011000000000000010011101110110111..............10000000000000000
Leading 0's
Interfaced Systems
PMS Protocol/Specifications
0x41
0x52
0x6F
ETX
second byte
= 0x41
= 0x13
third byte
= 0x7C
fourth byte
0x7 = 0x37
0x41
0x52
0x6F
ETX
0x37
0x46
On reception, all bytes following the STX up to the two bytes following
the ETX are XORed. The two bytes following the ETX are contracted
from ASCII to hex value. The result is 0x00 if the message is received
correctly.
Interfaced Systems
PMS Protocol/Specifications
= 0x41
= 0x13
= 0x7C
= 0x0F
Interfaced Systems
PMS Protocol/Specifications
Interfaced Systems
PMS Protocol/Specifications
The card overrides the deadbolt and the door remains unlocked for an
extended time.
The property controls implementation of the three special user groups.
Computing a check-out date
Add an extra day to any card issued before the scheduled check-out
time. Any cards issued before the check-out time will expire one day
earlier than indicated by the check-out date sent by the PMS. Assume a
hotel has set up its VingCard System so that the VCS check-out time
(time keys will cease to work in doors) is 1400 (2:00 PM). If a guest
checks in at noon, on December 1, 1994 and wants a key for one day
(until December 2) the PMS must send a check-out date of December 3,
1994.
If a guest checks in at 1500 (3 PM) on December 1, and the card needs to
expire on December 2, the PMS could send a check-out date of December
2.
The check-out time (hour and minute) is the same for all cards. The
property determines the check-out time when it sets up the system.
This presents three options for the PMS:
1. Make a configurable check-out time to mirror VCS. Check in
all cards before the check-out time for one extra day. If property
changes check-out time in the VCS it must also change the
check-out time in the PMS.
2. Establish a check-out time in the PMS database and instruct the
hotel that the check-out time in the VCS system must be
configured for the same check-out time. Then check in all
guests registering before the check-out time by adding an extra
day.
3. Check in all cards for one extra day.
Shares
If two or more guests share one room, each guest must be checked in with
a separate Check-in command. Guests share a room if the Room Number
and their time windows (check-in and check-out times) are identical. If
a new guest is checked in before the expiration of the previous guests
card, the system controller automatically copies the time window of the
preceding card to the new card. Because of this automatic function it is
of utmost importance that guests are checked out when their folios are
Interfaced Systems
PMS Protocol/Specifications
Interfaced Systems
PMS Protocol/Specifications
were assigned to a new guest, the card would expire before the desired
departure date. Therefore, it is essential for the PMS to send a checkout command to VCS to close guests records.
The check-out command could be issued at the time the folio is closed
in the PMS. Even if folios are closed early in the morning for express
check-out, guests cards would continue to operate until their
scheduled expiration time, unless a new guests card were used to lock
them out.
Alternatively, a check-out command could be sent immediately prior
to the check-in of a new single guest or the first guest in group of
guests who share a room. The latter option may be more desirable
from a security standpoint: the card will remain in the VCS database
until a new guest is checked in, and the card could be associated with a
specific room (using the verify and room audit trail features) until the
time that the next guests card is issued.
Verify Guest Card Command
This command requires the operator to swipe a card through the
encoder base. The system controller searches for the card in the
database. The data on the card is displayed at the system controller.
The data is not returned to the PMS. If a card is found in the database,
all fields are displayed. If a card is not found, VCS displays only
information on the card. The card is no longer associated with a room
number and the system controller displays, Guest not found.
Interfaced Systems
PMS Protocol/Specifications
10.2.4 Summary
The following tables summarize VC2100 PMS Protocol.
Field Summary
Field
Identifier
Length
Contents
bytes
Destination
Address
Source Address
Command codes
Answer codes
Check Character
Room number
Not
applicable
Not
applicable
Numeric
All commands
Numeric
All commands
from PMS and
answers from
VCS
Not
applicable
Not
applicable
Alphanumeric
Alphanumeric
Alphanumeric
0x30-0x39, 0x410x46
[O], 0x4F
[U], 0x55
[A], 0 x 41
from PMS
All answers
Replies to PMS
from VCS
All commands
from PMS
and answers
Numeric
Check-in
Variable
leading spaces
Check-out
12
Numeric
Numeric
Fixed
Extended Access
1-6
Fixed
User Group
All commands
commands
Check-out Time
Comments
For
from PMS and
answers from
VCS
Not
applicable
[R], 0x52
Field Required
Check-in
commands
Check-in
commands
Numeric
Fixed
(0 or 1)
Check-in
(optional)
Interfaced Systems
PMS Protocol/Specifications
Command
Check In
Fields
Required
Room Number
Yes
Check-out Time
Yes
User Group
Optional
Access Point
Optional
Check out
Room Number
Verify Card
No fields needed
Yes
Comments
Guests sharing a room must have
identical time windows Use the longest
stay as default.
Must be included in order for cards to
operate extended access readers.
All guests are checked out.
No fields are returned, See 4.4
Command
Field
Required
Comments
Check In
Yes
Check-out
Yes
Verify Card
Yes
Interfaced Systems
PMS Protocol/Specifications
Interfaced Systems
PMS Protocol/Specifications
2
ACK
3
PMS Check out Guest
[STX][00][02][B][fields][ETX][CC]
4
ACK
Message received. Check
characters OK.
6
VC Completes check out
[STX][03][00][0][ETX][CC]
7
ACK
8
Interfaced Systems
PMS Protocol/Specifications
PMS
VCS
1
PMS ENQ
2
ACK
3
PMS Check in Guest
[STX][00][02][A][fields][ETX][CC]
ACK
Message received. Check
characters OK.
Interfaced Systems
PMS Protocol/Specifications
VCS
1
PMS ENQ
2
ACK
3
PMS Check in Guest
[STX][00][02][A][fields][ETX][CC]
ACK
Message received. Check
characters OK.
6
Device time out (e.g. no card)
[STX][02][00][58[ETX][CC]
VCS Prompts: Retry: Yes/No
[06] ACK
9
[06] ACK
8
If user selects no, command is
aborted. It can be sent by PMS
again. If retry is selected the
operator must swipe card
within additional 15 seconds
and VCS sends completed
answer
[STX][02][00][00[ETX][CC]
.
Interfaced Systems
PMS Protocol/Specifications
2
ACK
3
PMS Verify Guest Card
[STX][00][01][E][fields][ETX][CC]
ACK
Message received. Check
characters OK.
6
Card swiped. Verified and card
information displayed at VCS.
[STX][01][00][0][ETX][CC]
ACK
8
Interfaced Systems
PMS Protocol/Specifications
VCS
1
PMS ENQ
2
No response
3
Retry ENQ
4
5
ACK
Send command
6
Interfaced Systems
PMS Protocol/Specifications
VCS
1
PMS ENQ
2
ACK
3
PMS Check in Guest Card
[STX][00][01][A][fields][ETX][CC]
5
PMS retries check in.
[STX][00][01][A][fields][ETX][CC]
Noise on line
4
NAK
Check character disagreement
6
ACK
7
PMS Swipe card message
8
Command executed
[STX][01][00][0][ETX][CC
]
ACK
10
Interfaced Systems
PMS Protocol/Specifications
VCS
1
ENQ
2
ACK
3
ACK
Message received. Check
characters OK.
6
VC cannot execute command.
Invalid check out date field.
[STX][02][00][O][ETX][CC]
Note: Error code is an alphabetic o, not zero
ACK
8