Home > Alarm Lock > Alarm Lock > Alarm Lock PDL5300 Programming Manual

Alarm Lock PDL5300 Programming Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Alarm Lock PDL5300 Programming Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 84 Alarm Lock manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							1 
    Trilogy 
    Double-Sided PDL5300 
    Programming Instructions 
    HID HID CORPORATION 
    PROXCARD® PROXKEY® 
    KEYFOB 
    Double-Sided PDL Trilogy Series 
    Stand-Alone Access Control Systems 
    with ProxCard
    ® Access 
    WI1622A  1/08 
      
    345 Bayview Avenue 
    Amityville, New York 11701 
    For Sales and Repairs 1-800-ALA-LOCK 
    For Technical Service 1-800-645-9440 
     Publicly traded on NASDAQ             Symbol: NSSC 
    © ALARM LOCK 2008 
    AL-DTM 
    DATA TRANSFER 
    MODULE 
    AL-PRE PROXCARD® 
    READER / ENROLLER AL-IR1 PRINTER DL-WINDOWS PROGRAMMING 
    SOFTWARE 
    PDL5300 PRIMARY SIDE  PDL5300 SECONDARY SIDE   
    						
    							2 
    Table of Contents 
    Lock Features ...................................................... 3  
    Supported Products ........................................... 4  
    Lock Design Overview ....................................... 5  
    Terminology Used in this Manual ..................... 6  
    Programming Levels .......................................... 8  
    Conventions Used in this Manual ..................... 9  
    LED and Sounder Indicators ............................. 9 
    Product Communication Examples ................. 10  
    Wiring and Power Up .......................................... 11 
    Quick Start ............................................................ 12 Testing the Codes Entered .................................14 
    Programming Functions Overview ...................15 
    Programming Functions .....................................16-28 
    Groups and Scheduled Group 1 Examples .....29 
    Programming Record Sheet ...............................31 
    User Code Record Sheet ....................................32 
    Schedule Record Sheet ......................................33 
    Glossary ................................................................34-35 
    Warranty ................................................................36 
    THE ALARM LOCK TRILOGY PDL-SERIES STAND-ALONE ACCESS CONTROL SYSTEM IS A SERIES OF STATE-OF-
    THE-ART MICROPROCESSOR-BASED PROGRAMMABLE KEYPAD-ENTRY AND PROXIMITY SECURITY LOCKS. 
    PDL5300 
    PDL5300 
    This double-sided stand-alone door lock provides controlled entry and exit at certain 
    locations such as airport security areas and police stations.  Features an HID com-
    patible ProxCard
    ® reader, and a real-time clock/calendar that automatically adjusts 
    for Daylight Saving Time and allows for automated programming of events.  Three 
    methods of programming are available:  (1) all features can be programmed manu-
    ally through the keypad; (2) you can transfer programming instructions directly from 
    your laptop or desktop PC using DL Windows software and a special AL-PCI cable; 
    and (3) data can be transferred from your PC to your PDL lock via the AL DTM 
    handheld Data Transfer Module.  In addition, data can be retrieved from the lock in 
    one of three ways (1) through an infrared printer; (2) directly from the lock to the 
    PC; or (3) through an AL-DTM to your PC.   
     
     
     
    Note:  ProxCard® and ProxKey® are trademarks of the HID© Corporation. 
    DOUBLE-SIDED PDL SERIES LOCKS  
    						
    							3 
    Audit Trail 
    •40,000 Event Capacity** 
    •Entries Logged with Time and Date 
    •Critical Programming Events Logged 
    •Printable using the AL-IR1 Hand-Held Printer (see 
    page 23, Function 55) 
    •Uploadable using Alarm Locks DL-Windows soft-
    ware (see page 23, Function 58) 
    •Transferable to AL-DTMs** 
     
    Lock Features 
    •Metal Key Override for all cylindrical locks*.   
    •Keypad Lockout (see page 24, Functions 60-61) 
    •Non-Volatile (Fixed) Memory 
    •Real-Time Clock (within one second accuracy) (see 
    page 21, Functions 43-44) 
    •Visual and Audible Keypad Feedback (see page 9)
     
    •Battery Status Monitor (see page 9)  
    Scheduling 
    •500 Scheduled Events (see pages 26-29) 
    •Automated Unlock/Lock 
    •Enable/Disable Users (see page 17, Function 3) 
    •Enable/Disable Groups (see page 18) 
    •Four Quick Schedules (contains 4 most common 
    schedules) (see page 27) 
    •Real-time clock and calendar (see page 20) 
    •Programmable Timeout Functions (see page 17-21) 
    User Access Methods 
    •Keypad Entered User Codes (see pages 12-13, 16) 
    •ProxCard® and ProxKey® Keyfob (see page 13) 
    •User Code and ProxCard® (For highest security) 
    (see page 13) 
    •Batch Enroll - Quickly and easily enroll multiple Prox-
    Cards
    ® and ProxKey® keyfobs without the use of a 
    PC. (see page 13) 
           Note:  ProxCards
    ® and ProxKey® Keyfobs both 
    function identically.  Keyfobs can be substituted for 
    all references to the ProxCard
    ® in this manual.  
    User Features 
    •2000 Users (see pages 12-13, 16) 
    •6 Pre-defined Administration User Levels including 
    Master, Installer, Manager, Supervisor, Print-Only 
    and Basic User Codes (see page 9) 
    •User Code Lengths from 3-6 digits 
    •Service Code (“One-Time-Only” Code) (see page 7) 
    •User Lockout Mode (see page 17, Function 6) 
    •Users Assignable to 4 Groups (see page 29) 
     
    Keypad and Computer Programming 
    •All programming may be performed manually from 
    the keypad, or from a PC using Alarm Locks DL-
    Windows Software (see page 5)
     
    Lock Features 
    PDL5300 PRIMARY SIDE  PDL5300 SECONDARY SIDE  
    Standard red and 
    black download com-
    munication port (PC / 
    AL-DTM Interface) 
    Three-color Status LED 
    Infrared Transmitter 
    LED for printer 
    This key lock cylinder 
    ONLY removes this 
    handle (does not 
    unlock the lock--use to 
    change batteries)* 
    Battery Pack inside 
    This key lock cylinder 
    unlocks the lock* 
    (No communication 
    port Interface) 
    Proximity Card 
    Readers 
    * Note:  Only the Primary Lock Side key cylinder allows non-logged access; the Secondary Lock Side 
    cylinder is only used to secure the housing to the door.  Therefore a person in possession of only the 
    metal key on the Secondary Lock Side has no means of unlocking the PDL5300 lock. 
    ** Only 5000 of the most recent events are transferred using the AL-DTM. 
    Red LED 
    Green LED  
    						
    							4 
    Supported Products 
    Data Transfer Module (AL-DTM) 
    An AL-D TM can be used to transfer Lock Programs (and other data) between DL-Windows and locks.  When 
    computers cannot be transported or when electrical power is not available, the hand-held AL-DTM device acts as 
    a go-between--it allows the transfer of lock data from the computer (through the AL-DT M) and to the lock, or in 
    reverse (from the lock through the AL-D TM back to the computer).  The AL-DTM can only be used on the 
    Primary Lock Side where the standard red and black communication port is located.  Note:  Only 5000 of 
    the most recent events are transferred using the AL-DTM. 
    Infrared Printer (AL-IR1) 
    An AL-IR1 printer is used to print Audit Trails and User Code lists without the need for a PC.  Its infrared 
    reader means no cable connection to the lock is needed.  The AL-IR1 printer can only be used on the 
    Primary Lock Side where the infrared transmitter LED is located. 
    Prox Card Reader/Enroller (AL-PRE) 
    An AL-PRE is used to quickly enroll multiple ProxCards® and ProxKey® keyfobs into DL-Windows without the 
    need to manually type User Codes.  Use the supplied 9-pin DB9 to DB9 serial cable to connect the AL-PRE to 
    your computer’s serial COM port.  Compatible with most HID ProxCards
    ® and ProxKey® keyfobs (37 bits or 
    less).  For PDL series locks only. 
    HID 
    HID CORPORATION 
    ProxCard® / ProxKey® Keyfob 
    Compatible with most HID ProxCards® 
    and ProxKey® keyfobs (37 bits or less).  
     
     
    Note:  ProxCard® and ProxKey® are trademarks of the 
    HID© Corporation. 
    Double-ended Mini Banana Plug Connector 
    After you create the program in DL-Windows and transfer the program from your computer to an AL-DTM, 
    transfer the program from the AL-DTM to the lock(s) via this double-ended mini banana plug.  The 2-pin 
    banana plug connector is polarity sensitive.  The TAB (marked “GND”) side must be plugged into the 
    lock’s black (left) terminal (located on the Primary Lock Side). 
    DB9 to DB9 Serial Cable 
    Enroll ProxCards quickly into DL-Windows, then transfer this new ProxCard® data from the computer to 
    the AL-PRE via this 9-pin DB9 to DB9 serial cable.  Once the data is in the AL-PRE, you can transfer the 
    data to the lock via the double-ended mini banana plug (see above), thus avoiding the need to use an AL-
    PCI cable for this process. 
    AL-PCI Cable 
    An ALARM LOCK AL-PCI cable is required to communicate between your computer’s RS-232 serial com-
    munications port (COM 1-4) and the AL-DTM or lock.  One end of the AL-PCI cable is designed to be used 
    on a 9-pin serial Com Port.  If your computer has a 25-pin Com Port only, a 25-pin to 9-pin adapter must be 
    used.  The other end of the AL-PCI cable features a 2-pin banana plug connector which is polarity sensitive-
    -the TAB (marked “GND”) side must be plugged into the lock’s black (left) terminal (located on the Primary 
    Lock Side). 
    USB to RS-232 Cable 
    If your computer does not have a serial COM port (DB-9 male) available, you can plug your AL-PCI2 cable 
    into a special USB to RS-232 cable.  Order part MX1130 for the USB to RS-232 cable only, or ALPCI2-U 
    for both the USB to RS-232 cable and an AL-PCI2 cable.  
    						
    							5 
    Lock Design Overview 
    Why Use Software inside a Lock? 
    With ordinary door locks, the need to make physical copies of metal keys and distributing them can be a 
    huge organizational and financial task -- and what will you do if someone causes a security breach by los-
    ing their key? 
     
    The answer lies in the advantage of SOFTWARE.  Software (also called firmware) is not hard or fixed 
    like hardware is.  Software is soft -- flexible and changeable to your needs.  Software exists inside your 
    Alarm Lock™ series lock, and can be programmed (and re-programmed again and again) to suit your 
    changing requirements.  No more metal keys to distribute...instead, distribute User Codes -- and delete 
    them from the lock software when needed.  (A User Code is the software equivalent of a metal key--it is a 
    series of numbers the User enters into the door lock keypad to unlock the lock). 
     
    Preparing to Program your Lock 
    The keypad contains 12 buttons, numbers 1 through 9 plus zero, a star button (:) and a special AL 
    button (
    ;).  These 12 buttons are all you need to program your lock.  In addition to using the keypad to 
    manually program your lock, you can also program your lock using a computer program named DL-
    Windows.  Using DL-Windows is not required--although it does make programming faster and easier.  This 
    manual will show you how to program your lock manually, without DL-Windows.  (For more information 
    about DL-Windows, see User Guide OI237). 
     
    Programming your lock begins after you unpack it from the box -- there is a specific procedure outlined in 
    the Quick Start (page 12) in which you wake up the lock to prepare it for programming.  This Quick 
    Start procedure shows you all the steps required to get your lock to start working.  To begin programming, 
    you must first enter something called Program Mode.   
     
    What is Program Mode? 
    Most technical people find working with hardware easy--they use tools to make fixes or changes to hard-
    ware.  But with the software inside the lock, you enact changes (you interface) using the keypad.  The 
    software has only two modes--Normal Mode and Program Mode.  When you want to make changes to 
    the lock program (such as adding User Codes), you enter Program Mode.  When you finish programming 
    and wish to put the lock into use, you exit Program Mode to enter Normal Mode.   
     
    You enter Program Mode using the keypad by pressing the Master Code of the lock that was set at the 
    factory.  This Master Code is basically a secret passcode that allows you to enter Program Mode.  But 
    since all locks are identical and leave the factory with the same Master Code, the factory Master Code is 
    therefore not very secret--and should be changed to your own personal Master Code.  This way, only YOU 
    can enter Program Mode and make changes to your locks programming.   
     
    Once the new Master Code is set , then you can continue with the Quick Start procedure and set the 
    weekday, date and time.  After this, you can start entering User Codes for people to use.  All changes to 
    the lock are organized by their Function Number.  Want to change the date?  Use Function Number 38.  
    Want to add a User Code?  Use Function Number 2.  There are 99 Functions in total, some that you will 
    use often, and others that you may never need. 
     
    Notice that when you program your lock, programming tends to follow a consistent 5-step pattern:   
    (1) Enter Program Mode  (2) Press 
    ; followed by the Function #  (3) Press ; and enter data  (4) 
    Press 
    : to end your programming  (5) Exit Program Mode.   
     
    Turn the page and learn about the special terminology used with your lock.  Once that is clear, use the 
    Quick Start procedure on page 12 to help you get up and running.    
    						
    							6 
    Terminology Used in this Manual 
    What is a Lock Program? 
    A Lock Program contains the instructions that a lock uses to 
    perform its various functions.  You can use the keypad to cre-
    ate a Lock Program that is stored within the lock.  You can 
    also use DL-Windows (defined below) to create a Lock Pro-
    gram on your computer, and then transfer and store the Pro-
    gram in the circuitry contained inside the lock itself.  The Lock 
    Program is essentially a computer database file that maintains 
    feature settings, schedules, audit trails, etc.  Using DL W in-
    dows, Lock Programs can be created with default information, 
    edited on your PC, and then sent to (and even received from) 
    locks.   
     
    The Lock Program consists of 4 areas:  User Codes, Fea-
    tures, Time Zones, and Schedules, all defined below:   
     
    What are User Codes? 
    Also called User Access Codes or PIN No. Codes, User 
    Codes are numbers the User presses into the lock keypad to 
    unlock the lock.  The User Codes are part of the Lock Pro-
    gram, and the Lock Program is stored in the lock circuitry 
    awaiting the Users to key-in their User Codes.   
     
    What are Features? 
    Your lock is designed to support several options and functions.  
    Using the keypad or DL-Windows software (the Programma-
    ble Features window), you can select the features you wish to 
    activate, such as if the lock will automatically adjust for Day-
    light Saving Time in the spring and autumn, or if the lock 
    sounder should be disabled or enabled. 
     
    What is a TimeZone? 
    Events (recorded lock activities) can be programmed to occur 
    at certain times.  It is these times (for example, “every Tues-
    day at 5pm”) that are referred to as TimeZones.  TimeZones 
    can be created manually through the keypad.  In DL-Windows, 
    you can use the Schedule-TimeZone screen to create these 
    TimeZones, and once created, you can link events to these 
    TimeZones. 
     
    What is a Schedule? 
    Your lock can be programmed to maintain a schedule in which 
    certain events can occur automatically.  For example, you can 
    program the lock to allow Groups of Users (with their User 
    Codes) access ONLY during specific business hours.  With 
    another example, you can program another lock to UNLOCK 
    at 9am, LOCK at noon for lunch, UNLOCK at 1pm, and LOCK 
    again at 5pm--every weekday.  As you can see, many different 
    combinations of Schedules can be created to suit the needs of 
    the Users.  First you create TimeZones (see above).  Next you 
    create events and link them to your TimeZones (also using the 
    Schedule-TimeZone screen in DL-W indows).  W hen finished, 
    you can view (in DL-W indows) your schedule in the Schedule 
    View screen.
     
     
    What is a User? 
    A User is a person who is authorized to unlock, use or make 
    programming changes to the lock.  This User can be anyone--
    from a one-time visitor (who will almost certainly have no au-
    thority to make programming changes) to the owner of the building in which the lock is installed (who may wish to have 
    total authority to make changes to the lock programming).  
    The PDL Series locks can hold up to 2000 Users in its pro-
    gramming memory, and each User possesses a pre-defined 
    level of authority--a Programming Level--as to their ability to 
    use or make changes to the lock.   
     
    What is a Programming Level? 
    The Programming Level defines the range of programming 
    tasks a User is allowed to perform.  The higher the Level, the 
    more programming tasks the User is allowed (with Master al-
    lowing ALL tasks).   
     
    For example, PDL Series locks can hold up to 2000 Users in 
    its programming memory, and each User is associated with a 
    User Number (see definition of User Number below) and 
    therefore a specific Programming Level, as follows: 
     
    Master:  Always associated with User Number 1.  Is always 
    enabled and can program all functions.  (Abbreviated as 
    Programming Level = M). 
    Installer:  Always associated with User Numbers 2 and 3.  
    Can program all functions except changing the Master 
    Code.  (Abbreviated as Programming Level = 4). 
    Manager:  Always associated with User Numbers 4, 5, and 6.  
    Can program all functions except functions relating to lock 
    configuration.  (Abbreviated as Programming Level = 3). 
    Supervisor:  Always associated with User Numbers 7, 8 and 
    9.  Can only program functions relating to day to day 
    operation.  (Abbreviated as Programming Level = 2). 
    Print Only Users:  Always associated with User Numbers 10 
    & 11.  Restricted to print event logs only.  No other 
    programming ability allowed.  (Abbreviated as 
    Programming Level = 1). 
    Basic Users:  Always associated with User Number 12 and 
    higher (except 297-300).  No programming ability allowed.  
    Most Users are Basic Users, who are given their own 
    personal User Codes (and / or proximity cards) and are 
    only allowed to simply unlock the lock.   
     
    Programming Levels are hierarchical--higher levels are al-
    lowed to do anything the levels below them can do.  For exam-
    ple, if you are a Manager, you are allowed to do anything that 
    Supervisors, Print-Only Users and Basic Users can do in addi-
    tion to those tasks allowed for Managers (Level 3).   
     
    What is the Minimum Required Program Level? 
    This Programming Level abbreviation is the minimum pro-
    gramming level required to access the particular Function.  
    (The higher the level number, the more programming tasks the 
    User is allowed, with Master allowing all tasks). 
     
    In this manual, Programming Levels for the PDL5300 series 
    are abbreviated as follows:  M = Master, 4 = Installer, 3 = Man-
    ager, 2 = Supervisor, 1 = Print Only Users 
     
    For the PDL5300 series, the Master is abbreviated with an 
    M, and all other Levels are hierarchical, with higher levels 
    being allowed to do anything the levels below them can do.  
    Therefore Level 4 is higher than level 3.  See page 8 for 
    more information.  
    						
    							7 
     
    What is a User Number? 
    User Numbers are used and are significant within each indi-
    vidual lock only.  The User Number determines the Program-
    ming Level for each User.  For example, PDL Series locks 
    can hold up to 2000 Users in its programming memory.  This 
    memory can be thought of as simply a numbered list from 1 
    through 2000.  Each entry in the list is represented by a User 
    Number.  Therefore, where a User is located in this list will 
    determine their Programming Level.  Because of their simi-
    larities, the terms User Number, User Location and Location 
    Number can be used interchangeably.  In some DL-Windows 
    screens, the word Slot is also used.  They all mean the 
    same thing. 
     
    Since User Numbers are fixed, knowing a User Number will 
    specify the associated Programming Level, and will in turn 
    determine a User’s programming abilities.  For example, User 
    Number 1 is always the Master, who can perform all program-
    ming tasks. 
     
    Programming Levels are hierarchical--higher levels are al-
    lowed to do anything the levels below them can do.  For ex-
    ample, if you are User 2, you are allowed to do anything that 
    Users 3 through 11 can do.   
     
    What is a Group? 
    With many lock applications, it is convenient for large num-
    bers of similar Users to be grouped together.  Placing Users 
    into Groups (by assigning them specific User Numbers) al-
    lows large numbers of Users to be controlled all at once 
    rather than individually--saving time and effort.  Groups are 
    controlled via schedules, and a typical example involves ena-
    bling or disabling a Group at a certain time.  Default Group 
    associations are specified in the tables on page 8.  For exam-
    ple, if you wish to add a User to Group 1, assign this User a 
    User Number between 51 and 100.  These default Group as-
    sociations can be changed if needed to allow Groups larger 
    than the default number of 50 (by using keypad Function 35).  
    (See page 18 for some Group function examples). 
     
    Who are Users 297-300? 
    Users assigned to User Numbers 297, 298, 299 and 300 
    have special abilities, as follows: 
     
    User 297:  Quick Enable User 300 
    In short, the User 297 User Code enables the User 300 User 
    Code.  The person in possession of the User 297 User Code 
    first presses the User 297 User Code into the lock keypad.  
    When User 300 subsequently presses the User 300 User 
    Code, the lock unlocks (for one time) and then the User 300 
    User Code becomes disabled. 
     
    For example, you wish to allow one-time access to a tempo-
    rary worker.  Simply press the User 297 User Code at the 
    lock keypad.  Later, when the temporary worker presses the 
    User 300 User Code into the lock keypad, the User 300 
    User Code unlocks the lock (for one time only) and then be-
    comes disabled.  Later, if you wish to grant the temporary 
    worker access again, simply re-enter the User 297 User 
    Code and the User 300 User Code will be re-enabled (again 
    for one time only).    
    User 298:  Quick PC Access Code 
    Entering the User Code for User 298 enables that User to 
    send data to or from the lock.  Therefore, User 298 can acti-
    vate what is the equivalent of Function 58 in Program Mode 
    (see page 23), without the need to enter Program Mode nor 
    the need to know the Master Code of the lock.  An AL-PCI 
    cable with a PC is required.   
     
    User 299:  AL-DTM Code 
    This is the only User Code that will initiate data transfer with 
    the AL-DTM.  An AL-PCI cable and an AL-DTM (first pro-
    grammed by the computer by DL-Windows) is required. 
     
    User 300:  One-Time Only Service Code 
    This is a One-Time Only Service User Code enabled by 
    User 297.  For example, User Code 300 is sometimes used 
    for guard tour duties or temporary workers.  See above  
    User 297:  Quick Enable User 300.   
     
    What is DL-Windows? 
    DL-Windows is a computer program that allows you to pro-
    gram your ALARM LOCK T3 Security Lock.  DL-Windows is 
    not required to program your lock, but it makes programming 
    much faster and easier.  With DL-Windows, you can quickly 
    create Lock Programs (programs that make the lock perform 
    its many functions) add multiple Users (who have access), 
    add ProxCards
    ® and ProxKey® keyfobs, retrieve event logs, 
    and create Schedules.  The benefit of DL-Windows is that it 
    allows you to set up all lock programming in advance (on your 
    computer), and then later send the information to the locks at 
    your convenience. 
    Terminology Used in this Manual (contd)  
    						
    							8 USER TYPE  USER NUMBER GROUP DEFAULT  
    ASSOCIATION MINIMUM PROGRAM 
    LEVEL (See page 6) 
    Master Code  1  - M 
    Installer Codes  2 & 3  none 4 
    Manager Codes  4 - 6  none 3 
    Supervisor Codes  7 - 9  none 2 
    Print Only Codes  10 - 11  none 1 
    Basic User Codes  12 - 50  none  none 
    Basic User Codes Group 1  51 - 100  1  none 
    Basic User Codes Group 2  101 - 150  2  none 
    Basic User Codes Group 3  151 - 200  3  none 
    Basic User Codes Group 4  201 - 250  4  none 
    Basic User Codes  251 - 296  none  none 
    Quick Enable User 300 Code  297  none  none 
    Quick PC Access Code  298  none  none 
    AL-DTM Code  299  none  none 
    Service Code  300  none  none 
    Basic User Codes  301-2000  none  none 
    Lock Defaults for PDL5300 
    Users added will default to a Group Association and a Program Level Ability as follows:  
    User 299 is a Non-Pass Code.  This is the only code that will initiate data transfer with the AL-DTM. 
    NOTES:  
    The Programming Level defines the range of programming 
    tasks a User is allowed to perform.  The higher the Level, the 
    more programming tasks the User is allowed (with Master al-
    lowing ALL tasks).   
     
    For example, PDL Series locks can hold up to 2000 User 
    Codes in its programming memory, and each User Code is 
    associated with a User Number (see definition of User Num-
    ber in the previous Terminology section) and therefore a 
    specific Programming Level, as follows: 
     
    Master:  Always associated with User number 1.  Is always 
    enabled and can program all functions.  (Abbreviated as 
    Programming Level = M). 
    Installer:  Always associated with Users 2 and 3.  Can pro-
    gram all functions except changing the Master Code.  
    (Abbreviated as Programming Level = 4). 
    Manager:  Always associated with Users 4, 5, and 6.  Can 
    program all functions except functions relating to lock configuration.  (Abbreviated as Programming Level = 3). 
    Supervisor:  Always associated with Users 7, 8 and 9.  Can 
    only program functions relating to day to day operation.  
    (Abbreviated as Programming Level = 2). 
    Print Only Users:  Always associated with Users 10 & 11.  
    Restricted to print audit trails only.  No other programming 
    ability allowed.  (Abbreviated as Programming Level = 1). 
    Basic Users:  Always associated with User number 12 and 
    higher (except 297-300).  No programming ability allowed. 
     
    Programming Levels are hierarchical--higher levels are al-
    lowed to do anything the levels below them can do.  For exam-
    ple, if you are a Manager, you are allowed to do anything that 
    Supervisors, Print-Only Users and Basic Users can do in addi-
    tion to those tasks allowed for Managers (Level 3).   
    Programming Levels  
    						
    							9 
    ACTIVITY LED SOUNDER COMMENTS 
    Keypress 1 RED Flash 1 Beep Normal Operation 
    Access Granted or Remote Release 3 GREEN Flashes 3 Beeps  
    Invalid Code 6 RED Flashes 6 Beeps Re-enter User Code 
    Successful Program Entry 2 GREEN Flashes 2 Beeps When in Program Mode 
    Unsuccessful Program Entry 7 RED Flashes 7 Beeps When in Program Mode 
    Exit Program Mode 1 RED, 2 GREEN Flashes 10 Beeps  
    Valid but Disabled Code 1 GREEN, 4 RED Flashes 1 long, 5 short beeps Code exists in memory, but disabled 
    Low Battery YELLOW Flash during key 
    presses Long Beep See page 11 before changing batteries 
    User Code Entered YELLOW  Flash Sequence of 7 Beeps 
    Repeated 4 Times  Non-fatal memory or clock error has been 
    detected.  Under this condition, 
    unexpected operation is possible.   
    Remove power and restart. 
    Programming Key Sequence. 
    Programming  
    Information 
    General Program Mode Information 
    If a wrong key is pressed during code entry,  hold any key continuously until the error sound is heard (7 short beeps), this will clear the entry.  Re-enter the key 
    sequence again.   
    All program sequences are followed by the : key; 2 short beeps indicate a successful program sequence. 
    Enabling/Disabling Users (By User Number) 
    3. Disable User  ; 3      ; [ _ _ _ ] : 
    4. Enable User  ; 4      ; [ _ _ _ ] : 
    User Number must be between 2 and 2000.   
    NOT E:  Will Enable/Disable users even if the user is associated with an enabled Group. 
    2 
    Conventions Used in this Manual 
    LED and Sounder Indicators 
    The PDL Series locks provide visual and audible keypad feedback.  Note:  The Primary Lock Side has a three-color Status 
    LED and Infrared transmitter LED; the Secondary Lock Side has individual red and green LED’s.  With a fully charged battery, 
    the LED and sounder feedback is as follows: 
    Minimum Required Program Level  Program Levels are abbreviated as follows:  M = Master 
    4 = Installer  
    3 = Manager 
    2 = Supervisor 
    1 = Print Only Users 
     This Program Level abbreviation is the 
    minimum program level required to 
    access the particular Function.  (The 
    higher the level, the more programming 
    tasks the User is allowed, with Master 
    allowing all tasks). 
    Function  
    Description 
    Function  
    Number Function Name  
    						
    							10 
     
    NOTE:  
    The AL-PCI cable is designed to be used on a 9 pin serial COM port.  If your computer has a 25 pin COM port, a 25 pin to 9 pin adapter must be used.   
    Warning:  Polarity MUST be observed when connecting cables to the lock.  The tab (-) must plug into the negative (black) hole. 
    DB9 to DB9 Serial 
    Cable (supplied) 
    Scenario 3   Enroll ProxCards® quickly into DL-Windows, then transfer this new ProxCard® data from the computer through the AL-PRE 
    to the lock (thus avoiding the need to use an AL-PCI cable).  For PDL series locks only. 
    IBM COMPATABLE  
    LAPTOP OR DESKTOP PC 
    CONNECT DB9 CABLE 
    TO COMPUTER SERIAL 
    PORT (COM 1-4) 
    NOTE:  OBSERVE TAB DIRECTION W HEN 
    INSERTING CABLE INTO THE AL-PRE AND 
    THE LOCK.  ALSO NO TE TH AT THE  
    COMMUNICATION PORT IS LOCATED ON 
    THE PRIMARY LOCK SIDE ONLY. 
    DOUBLE-ENDED MINI BANANA 
    PLUG CONNECTOR 
    Scenario 4   Use the AL-IR1 Infrared printer to print your lock’s audit trail (event log), User Code list, clock settings and software version.  No 
    cable required.  The AL-IR1 printer can only be used on the Primary Lock Side where the infrared transmitter LED is located. 
    Scenario 1   Create the program in DL-Windows on your computer, then transfer the program from the computer directly to the lock via an 
    AL-PCI cable.  You must always enter the User 298 User Code to send or receive data Using DL-Windows. 
    IBM COMPATABLE  
    LAPTOP OR DESKTOP PC 
    NOTE:  OBSERVE TAB DIRECTION W HEN 
    INSERTING CABLE INTO LOCK 
    AL-PCI CABLE 
    CONNECT TO SERIAL PORT 
    (COM 1-4) 
    PDL5300 LOCK (PRIMARY SIDE)  
    Scenario 2   Create the program in DL-Windows and transfer the program from your computer to an AL-DTM (via an AL-PCI cable)…then 
    transfer the program from the AL-DTM to the lock(s) (via a double-ended mini banana plug).  The hand-held AL-DTM is useful because you 
    do not have to transport (or find electricity for) your computer.  Data can also flow in reverse, from the lock, through the AL-DTM, back to the 
    computer for examination.  The AL-DTM can only be used on the Primary Lock Side where the communication port is located.   
    IBM COMPATABLE  
    LAPTOP OR DESKTOP PC 
    NOTE:  OBSERVE TAB DIRECTION W HEN 
    INSERTING CABLE INTO LOCK 
    AL-PCI CABLE 
    CONNECT TO SERIAL PORT 
    (COM 1-4) 
    NOTE:  OBSERVE TAB DIREC-
    TION WHEN INSERTING CABLE 
    INTO AL-DTM AND LOCK 
    DOUBLE-ENDED MINI BANANA 
    PLUG CONNECTOR 
    Product Communication Examples 
    Send to lock Receive from lock 
    If your computer does not have a serial COM port 
    (DB-9 male) available, you can plug your AL-PCI2 
    cable into a special USB to RS-232 cable.  Order 
    part MX1130 for the 
    USB to RS-232 cable 
    only, or ALPCI2-U for 
    both the USB to RS-232 
    cable and an AL-PCI2 
    cable. 
    AL-DTM DATA 
    TRANSFER 
    MODULE 
    AL-PRE PROXCARD READER/
    ENROLLER 
    AL-IR1  
    INFRARED PRINTER 
    PDL5300 LOCK (PRIMARY SIDE)  
    PDL5300 LOCK (PRIMARY SIDE)  
    PDL5300 LOCK (PRIMARY SIDE)   
    						
    All Alarm Lock manuals Comments (0)

    Related Manuals for Alarm Lock PDL5300 Programming Manual