ASSA ABLOY

72
ASSA ABLOY Certified Integrator IP Enabled Lock Training WELCOMES you to

description

ASSA ABLOY. WELCOMES you to. Certified Integrator IP Enabled Lock Training. The Purpose of this class. Teaching you to set up and program the lock. The Purpose of this class. We will NOT be teaching:. Computer Networking Network Installation Network Encryption Network Security. - PowerPoint PPT Presentation

Transcript of ASSA ABLOY

Page 1: ASSA ABLOY

ASSA ABLOY

Certified Integrator IP Enabled Lock

Training

WELCOMESyou to

Page 2: ASSA ABLOY

The Purpose of this class

Teaching you to set up and program the lock.

Page 3: ASSA ABLOY

The Purpose of this class

We will NOT be teaching:

Computer Networking

Network Installation

Network Encryption

Network Security

Only What’s Needed To Make The Lock Work!

Page 4: ASSA ABLOY

If More Information Is Needed…

We Can Provide The Documents That Will Answer Your Questions!

Page 5: ASSA ABLOY

Agenda:

Conducting a site survey

Setting up the lock

Using the software

Page 6: ASSA ABLOY

Sequence of Events

Page 7: ASSA ABLOY

First, A Site Survey is conducted to ensure proper wireless coverage

Page 8: ASSA ABLOY

Second, The Network Administrator provides information about the network

Page 9: ASSA ABLOY

Third, He enters this information into the NCT Program, providing a file for the CI

Page 10: ASSA ABLOY

Fourth, The CI enters info about the lock using the LCT Program

Page 11: ASSA ABLOY

Fifth, He Uploads all this info into the lock

Page 12: ASSA ABLOY

Sixth, The Lock Communicates To the Host Computer

Page 13: ASSA ABLOY

Seventh, Users, Time Zones and other info is programmed

using EAC Software

Page 14: ASSA ABLOY

The First Step

We need to verify the wireless network coverage at the door.

We do this by conducting a site survey.

A successful installation begins with verifying the network coverage at the opening.

Page 15: ASSA ABLOY

Site Survey

Necessary for successful deployment of wireless Locksets

Creates a Wireless coverage picture of the facility

– Hot Spots

– Dead Zones

Determines if more APs are needed

Page 16: ASSA ABLOY

A laptop will not work for this.

It has a large WiFi Antenna.

The Lock has a small antenna in a metal case.

Page 17: ASSA ABLOY

Site Survey Tool (SST)

The Cisco AIR-CB21AG-A-K9 can be purchased. The card covers 802.11A/B/G standards

It comes with a Cisco Site Survey Tool utility

Allows for use with any laptop with a PCMCIA CardBus slot.

Provides Real Time Data

Page 18: ASSA ABLOY

Cisco Aironet Utility – Associate with network

Insert the Cisco card into your Laptop

Open the Cisco Aironet Utility and find and associate with the wireless network

– Click on the Scan button

How to conduct a site survey…

Page 19: ASSA ABLOY

Cisco Aironet Utility – Associate with network

Find the SSID that the IT department has given you

– Click “Activate”

Page 20: ASSA ABLOY

Cisco Aironet Utility – Associate with network

Type in a familiar name for you to remember the settings on the “Profile Name” field

Page 21: ASSA ABLOY

Cisco Aironet Utility – Associate with network Click the

“Security” tab.

You can see the type of security being used on this wireless network.

You have now “ASSOCIATED” with the AP and wireless network.

You can now run the Cisco Site Survey Utility Program.

Page 22: ASSA ABLOY

Cisco SST Utility

Click the first tab, “Associated Access Point” (AP) status

The utility provides a graphical and numerical representation of

– Signal strength

– Noise

– Signal/Noise ratio in dB

– Link Speed in Mbps

The utility also gives information about what AP it is currently associated with.

Page 23: ASSA ABLOY

Cisco SST Utility

A second tab, AP scan list, shows all available APs

This is helpful in determining conditions like over lapping channels and adjacent (Cisco suggests five channel separation between APs)

It also gives a general overview of available APs and SSIDs in the area

Page 24: ASSA ABLOY

How to conduct a Site Survey What you need

– Close all doors that the signal must pass through from the AP to the lock to emulate worst case scenario

– Laptop with/ Cisco SST software installed

– Cisco Aeronet Card

– Site Survey Forms 1 per door

– IT Information– Need SSID

– Need encryption info

Page 25: ASSA ABLOY

Site Survey Form - ITPorts Available/Open (2571 & 8023) <Only Need To Enter Once>

DCHP or Static IPs: <Only Need To Enter Once>

MAC Address Reservations? <Only Need To Enter Once>

Potential Lock IP (If static): <Only Need To Enter Once>

Static IP Address Possible for Host PC?

<Only Need To Enter Once>

Host PC IP Address: <Only Need To Enter Once>

Wireless Encryption type: <Only Need To Enter Once>

Subnet (if not DHCP): <Only Need To Enter Once>

Gateway IP (if not DHCP): <Only Need To Enter Once>

Survey tool used: <Need Info From Each Door>

Signal Strength on battery side of lock

<Need Info From Each Door>

Signal/Noise Ratio on battery side of lock

<Need Info From Each Door>

Estimated distance to AP: <Need Info From Each Door>

Page 26: ASSA ABLOY

How to Site Survey

4. Walk to Lock location

5. Get Signal, noise and signal to noise ratio on the outside and inside of the door (with the door closed)

6. Record values on Site Survey Sheet

7. View the AP list for overlapping APs in the area

8. Note any overlap in channels

9. Repeat for every door

10.Evaluate results for each door

Page 27: ASSA ABLOY

Example

This is a comparison between two doors

Signal Strength is not the only factor in a site Survey– The picture on the left is a lock that has stable communication

– The picture on the right is a lock that has intermittent communication

Note the top lines or signal strength is almost the same picture to picture. But the non working lock on the right has a red for transmit speed and shows a lower Signal/Noise ratio. This indicates a bad connection.

Page 28: ASSA ABLOY

Any questions about conducting a site survey?

How to Complete a Site Survey

Page 29: ASSA ABLOY

Please visit:

Need more information?

For an online version

www.AssaAbloyAmericasUniversity.com

Page 30: ASSA ABLOY

Sequence of Events

Page 31: ASSA ABLOY

Setting up the lock

WHO? WHAT? WHERE? WHEN? HOW?

Five questions we need to answer…

Page 32: ASSA ABLOY

Setting up the lock

We have to tell the lock WHO it is

Determine WHAT system it will talk to

Tell the lock WHERE that system is

WHEN the lock will communicate

HOW it will communicate

Page 33: ASSA ABLOY

A Sixth question…

WHY are we taking these steps?

???The Lock Doesn't Know

Anything!

Page 34: ASSA ABLOY

To answer these questions, we will be using two tools:

Lock Configuration Tool - LCT

Network Configuration Tool - NCT

Page 35: ASSA ABLOY

Network & Lock Configuration Tools The lock and network configuration

tools were created to ease the install process by creating a tool that uses simple GUIs

Network Configuration Tool– Simple for IT professionals to enter

IT information in a secure fashion to the installers

Lock Configuration Tool– Uses the data you entered into the NCT program and inputs that into the lock

– Easy to use GUI that allows for lock installers to set up locks with little IT knowledge

Page 36: ASSA ABLOY

Wireless Lock Configuration

Configurable Items:– IP Address

– DHCP or Static

– Host IP (Computer that runs the Access Control Software) Always a Static Value!

– Subnet

– Encryption

– Serial Number (Electronic serial number in the lock)

– Set by Factory

Page 37: ASSA ABLOY

How to use NCT

Open the NCT file on your computer

Page 38: ASSA ABLOY

Configuration Tool – NCT Overview

Used to create site file

Each lock is defined and named

File contains all IT info– IP Address

– Subnet

– Encryption

– SSID

– Port

– Host IP

Page 39: ASSA ABLOY

NCT – Enter Site Name Site name

– The site name is the designation for this set of locks and is typically represented by the company name, company plus division, etc.

Page 40: ASSA ABLOY

NCT – Enter Inactivity Timeout Inactivity Timeout

– The Inactivity Timeout determines how long the LCT will wait for user input before automatically terminating. This is a security measure. The default value is 300 seconds or 5 minutes.

Page 41: ASSA ABLOY

NCT – Enter Installer Password Installer

Password – The Installer

Password allows the installer to use the data but not to view the network communication parameters.

Page 42: ASSA ABLOY

NCT – Enter IT Password IT Password

– The IT Password allows the IT administrator to view and edit all network communication parameters for all defined locks.

Page 43: ASSA ABLOY

NCT – 2. Lock Info (if DHCP)

Lock Info – By default the

‘Locks’ section will be in “View Mode”.

– To create a new lock entry, click on the “New” button.

– The Lock area will change color and “Add Mode” will be displayed Information can now be entered.

Page 44: ASSA ABLOY

NCT – Enter Lock Name (if DHCP)

Name – Helps the installer

identify the lock

– “West Stairwell Door”

– “Rear Exterior Door”, etc

– Use meaningful names

Page 45: ASSA ABLOY

NCT – Enter Lock Serial Number (if DHCP)

Serial Number – Serial number - 16

character identifier taken from the label on the lock controller or from the lock information sticker included in each box

Page 46: ASSA ABLOY

NCT – Check Box “DHCP” (if DHCP)

DHCP – DHCP

– If this box is checked, the IT department has determined that the locks will be assigned IP addresses dynamically by their system– In this case, the IP

Address, Subnet Mask and Gateway fields remain blank

Page 47: ASSA ABLOY

NCT – Enter IP Info (if Static)

Static IP’s– If this DHCP box is

un-checked, the locks need to be assigned the IP Address, Subnet Mask and Gateway as determined by the IT department

Page 48: ASSA ABLOY

NCT – Enter SSID (DHPC or Static)

SSID– For determining

which wireless network should the locks communicate through to the network

– Information must be supplied by the IT department

– Case sensitive

Page 49: ASSA ABLOY

NCT – Enter EAC IP Address (DHPC or Static)

EAC IP Address– EAC IP Address

(Host Address)

– Must be a static IP address of the Access Control Software Server

Page 50: ASSA ABLOY

NCT – Enter EAC Port Info (DHPC or Static)

Ports– 2571 by default

– This allows the locks to communicate directly to the computer that controls the locks (Host PC)

– The IT department may need to “open” ports for these locks to talk directly to the Host PC and no where else on the network

Page 51: ASSA ABLOY

NCT – Enter Encryption Info (DHPC or Static)

Encryption – Encryption Type

(optional)

– WPA, WEP or LEAP– If WPA-PSK, (WPA-

TKIP) insert Key given by IT

– If WEP, insert Key given by IT (must be HEX)

– If LEAP, enter the Key, LEAP User Name and LEAP Password

Page 52: ASSA ABLOY

NCT – Enter the AES Key Info (DHPC or Static)

LOCK AES Key

- Encrypts the data from the lock to the host PC and vice-versa

– The 128 bit AES Key (for “packetized data”) – If used:

– Enter the Key by hand, or

– The system will generate the Key when you push the “Generate” button

Page 53: ASSA ABLOY

NCT – DPAC Info and DPAC Rate

DPAC (Lock Radio Module)– The fields “DPAC User

Name” and “DPAC Password” are not used at this time

Page 54: ASSA ABLOY

NCT – Save your input (DHPC or Static)

Save – You must SAVE TWICE

– First, use the SAVE button at the bottom of the screen to save this particular lock’s info

– Second, Click “File” at the top of the screen and use “Save As” to save the actual Network Configuration File. (*.slct)

Page 55: ASSA ABLOY

NCT – Saving a Configuration File Save & Close

– Always SAVE your work after entering any data.– To save a configuration

file click “Save” from the “File” menu.

– It is recommended that when saving a configuration file, it should be saved as a “.slct” file extension.

– Click on the ‘File name’ drop-down menu to select “Secure LCT Configuration files (*.slct)”

– To terminate the application click on the close box in the upper right corner of the main window or click on “Exit” in the “File” menu.

Page 56: ASSA ABLOY

NCT – Edit a Lock Edit

– You can edit a lock at anytime.

– The screen color turns yellow.

– Remember to SAVE after making any changes

Page 57: ASSA ABLOY

NCT – Copy a Lock Copy

– To copy an existing lock, first select it in the list on the left side of the window and then click “Copy”. The Lock area will change color and “Add Mode” will be displayed

– All of the data from the selected lock is cloned and available for editing..

– Notice that the “Edit” button changes to “Save” and the “Delete” button changes to “Cancel”.

Page 58: ASSA ABLOY

NCT –Opening an Existing NCT File

Open – Opening an existing

configuration is done by clicking on “Open” in the “File” menu (next to “Help”).

– You can either double-click the desired file or highlight it and select ‘Open’

– The IT Password will be required to open any *.slct files

Page 59: ASSA ABLOY

NCT is Complete!

Now the IT Department will give that file to you…

Page 60: ASSA ABLOY

Sequence of Events

Page 61: ASSA ABLOY

How to use LCT

Open the LCT file on your computer

Page 62: ASSA ABLOY

Lock Configuration Tool - LCT

Used to configure wireless settings for locks

Simple easy to use

Speeds up installations

File encryption keeps IT data secure

What you need:– Laptop

– Serial Port

– Serial to Rj11 Adapter Cable

Page 63: ASSA ABLOY

LCT - Open a .lct or .slct file

Start by Opening the file you just created in NCT

You will need the Installer password!

It will display the last config file opened in this drop down

After doing that return to the file menu and open the Setup

Page 64: ASSA ABLOY

LCT - Setup Menu, COM Ports

Set the Comm port

`

Page 65: ASSA ABLOY

LCT – COM Ports, Device Manager, Ports

`

> START

> CONTROL PANEL

> SYSTEM

> HARDWARE

>DEVICE MANAGER

>PORTS

Page 66: ASSA ABLOY

LCT – Setup Menu, Temp Users & Firmware

Input the test card or test PIN number or both

Confirm the firmware version is the most current.

The firmware is available on the install CD for NCT/LCT in the firmware folder. It is required to complete the setup

Page 67: ASSA ABLOY

LCT – Connect to lock

Select the correct lock you are working on

If you don’t know, the configuration tool will change to the correct lock, based on serial number.

If you connect to a lock that is not in the .LCT file (the file you created with the NCT program) you will get an error message.– Update the .LCT file to correct

with the NCT program

Page 68: ASSA ABLOY

LCT - Communicate with Lock

Now click

– Connect to Lock (lock must be connected to computer)

– Update firmware

– Configure Lock

The program will not allow you to move on to the next step without successfully completing the previous step.

Verify DHCP (if Applicable)

– Uncheck Verify DHCP if using static IP addresses

Page 69: ASSA ABLOY

LCT – Additional Configuration Options

After configuration you can:

– Add Temporary Users

– Delete Temporary Users

– Delete All Users

– Reset NVRAM (Reset Lock)

– Get Network Device Info– Gives network info, confirms

connection to the wireless network or Access Point (AP)

– Verify Connection to Host– Confirms there is a connection

between the lock and its host IP

Page 70: ASSA ABLOY

Sequence of Events

Page 71: ASSA ABLOY

Sequence of Events

Page 72: ASSA ABLOY

Any Questions?