Professional Documents
Culture Documents
Quick Start
Installation Guide
UM-272 Version B0
OVERVIEW
Software House® iSTAR Pro 2U Rack Mount is a standalone, rack-mountable access control and burglar
alarm system unit that houses all the necessary components to control up to 16 doors, and monitor up to 32
alarm inputs.
This guide describes quick installation information for the 2U Rack Mount:
How to wire readers to RM ports.
How to wire supervised input points and dry contact relay outputs.
How to wire Lock Power wire to provided Connector.
1
Rear Connection Panel
• STAR016W-64A - 64 MB RAM General Controller Module II with Two Access Control Module II
for up to 16 readers (RM only).
• 12 VDC Power Supply
• Front LCD and Alarm Panel
2
Figure 2. GCM General Control Module
Network Connection – Connect a CAT-5 RJ45 cable to J4. Connect a straight through cable to a Switch
or Hub. If unit is connected directly to the server use a crossover cable.
LED2 indicates the Ethernet link signal and LED1 displays the Receive Data signal.
Batteries – Use NiMH (Nickel Metal Hydride) batteries- AA size. Minimum 2400 milli-amp hours.
Caution: There is a risk of explosion if the battery is replaced with the wrong type. Dispose of batteries in
according to their instructions.
ISTAR Pro 2U batteries are packaged separately and should be installed in the battery backup sockets at the
bottom of the GCM.
The unit is stored and shipped with the batteries disconnected so they will not be drained while in storage.
Connect the batteries as shown in the GCM diagram that follows. It is acceptable to install the batteries with
the power on. However, if the batteries are installed with the power on, the reset switch does not need to be
pressed.
NOTE: The batteries provide the power to retain the volatile memory data in the panel.
3
Diagnostic Session - A diagnostic session can be run either through ICU or with a terminal session
through P5. Turn on the diagnostic information settings using either ICU or the HTML connection to the
ISTAR Pro 2U.
Note that the diagnostic information causes overhead and should not be left on during normal operation.
1. Connect P5 to a COM port on a PC. Use a straight through DB9F to DB9F cable.
2. Set the COM port to 115,200 baud, 8, None, 1, Hardware Flow Control.
LEDs
LED4- indicates power and shines through an opening in the door.
Dip Switches
DIP Switch S4 is used to control diagnostics, clear memory, and to display card reads in
hexadecimal. See the iSTAR Pro 2U Door map for more detailed information about running
diagnostics.
To display hexadecimal cards reads on the LCD panel set switch 4-8 on.
The Reset Switch, S5, will cause the GCM computer to reboot. Pressing S5 will also clear memory, including
configured readers, inputs and outputs. As long as there is a connection to the host these objects will be
immediately be downloaded to the memory.
If the switch S4-2 is on when S5 is pressed, the unit will be reset to factory default. This means that all of
the connection data, such as the IP address will be cleared in addition to the memory. In this case the unit
will have to be totally configured again using ICU.exe.
4
ACM - ACCESS CONTROL MODULES
The ACM “Access Control Module” connects to the readers, inputs and outputs used in access control. An
iSTAR Pro 2U can have one or two ACMs.
Wiegand Ports
Supervised inputs
12VDC Power
S4 Terminate RM Ports
RM Reader Ports
Relay Outputs
Figure 3. ACM Access Control Module
RM4 READERS
Wiegand or Magnetic Signaling read heads are connected to the RM-4s or RM-4Es. The readers are
connected to STAR1 through STAR8 Ports.
LEDs
Led Function
DS3 Shows Power to the ACM
DS1 Indicates Rx on the RS485 half Duplex Reader Bus
DS2 Indicates Tx on the RS485 half Duplex Reader Bus
DS4-DS11 Displays the eight outputs on the ACM
S5 Reset Switch Resets the iSTAR
5
RM4 TO HEAD END WIRING INSTRUCTIONS
12 VDC
6
Output Diagram
Lock +
Shield
Lock -
7
Input Diagram
8
Power Specs:
Mounting Instructions
• Install Rack Rails to both sides of iSTAR Pro 2U enclosure. (Screws Provided)
• Install Rack Rails to Server Rack.
• Slide iSTAR Pro 2U into Rack Rails on Server Rack
• Screw iSTAR Pro 2U to Server Rack for added Security.
Environmental Requirements
Status Range
Regulatory Specifications
Table 3. iSTAR Pro 2U Regulatory Specifications
Regulatory
Tested and certified by ETL per ANSUI/UL standard 294-2004
Tested and certified by ETL per ANSUI/UL standard 1076-2004
FCC Part 15 Class B
CE: EN 61000-3-2, EN 61000-3-3, EN 61000-6-3, EN 50130-4, EN 60950-1
C-Tick
9
Table 4. Specific considerations when using the iSTAR Pro 2U Rack Mount as an intrusion
detection/burglar alarm system, per ANSI/UL 1076
UL 1076 Intrusion Detection / Burglar Alarm Recommendations
Recommended Arm/Disarm Device RM2L-4000 multi-technology reader with
keypad & display, to provide visual indication
of individual zone status to operator
AC Power Source Must use a UL-approved UPS, sized to
provide 4 hours of full operation when main
AC power is not present
Local Sounder Recommend to install local horn, activated
when the zone is in alarm
Maximum number of protection inputs per 32
zone
Maximum number of non-protection inputs per 32
zone
Maximum number of readers per zone 16
10
2U ISTAR PRO AS A BURGLAR ALARM SYSTEM UNIT
The iSTAR Pro Rack Mount controller provides burglar alarm / intrusion detection functionality per
UL/ANSI standard 1076 (proprietary burglar alarm system units). Please follow these instructions when
deploying the iSTAR Pro Rack Mount for this application.
Installation
The 2U Rack Mount unit must be mounted in a standard 19” rack, with 2U (3.5”) of vertical rack space
provided. The unit and slide rails may be mounted in either a four-post rack, or a two post rack, following
the instructions provided [link to page]. The installation must adhere to the following environmental
conditions:
The system must be installed within the protected premise and wired in accordance with the National
Electrical Code (ANSI/NFPA 70-1993), and the local authorities having jurisdiction.
Main Power
Provide 115 VAC +/- 10% / 60 Hz or 230VAC/50 Hz line voltage power to the unit from a non-switched
circuit. A standard type SJ flexible power cord is provided, and is attached to the rear of the unit. The unit
does not provide power for external locking mechanisms. Actual power draw will vary for different
installations based on reader type deployed, but a typical installation will draw roughly 75W. Be sure to
calculate the power draw for the specific installation.
Backup Power
The UL/ANSI 1076 standard requires a backup power source that provides four hours of backup power in
the event that main power is unavailable. The standard also calls for alarm indication of AC power fail to the
central supervising station (C•CURE 800 or C•CURE 9000 host).
Provide a UL-listed rack-mount UPS (uninterruptible power supply) unit that is sized to deliver the required
power to the Rack Mount iSTAR Pro and also capable of delivering that power level for four hours. This
may require the addition of extended battery modules for some UPS models.
11
AC Power Fail Alarm
To transmit the AC Fail alarm signal from the UPS to the Rack Mount iSTAR Pro unit, wire a two-wire
circuit from the designated UPS alarm relay contacts into a selected supervised input on the rear of the Rack
Mount iSTAR Pro, using two 1K resistors for line supervision. Input number 16 is recommended for this
purpose. Follow the wiring diagram below:
Once wired, configure Input #16 in the C•CURE 800 or C•CURE 9000 host as a Normally Open
Supervised Input. Then, configure the input to trigger an Event in the system, with the event set up to
always be armed, on-line, annunciated, and require acknowledgement. The Event should have an
appropriate name, such as “AC Power Fail.” In addition, the event should be configured to activate 2
Outputs which are wired to an external audible sounder and LED indicator, installed near the keypad reader
used to arm/disarm the Intrusion Zone. This allows the AC Power Fail notification to be presented both at
the Monitoring Station and locally at the Intrusion Zone reader.
NOTE: The resistor wiring is for NO (Normally Open) although the connection is to the NC output of
the apS/UPS. The reason is that in the normal mode (power ON) the relay is activated and the
circuit is open. When the power fails, the relay loses power and deactivates, which results in an
alarm (closed circuit).
Supervisory input points must be used for UL 1076 applications. The iSTAR Pro rack Mount provides
either 16 or 32 supervised inputs, depending on the model purchased. Each supervised input must be
configured to trigger an event when the input is activated or a supervision error is detected. These events
must be configured to always be armed, on-line, annunciated, and require acknowledgement.
Each monitor point functions independently and does not interfere with the operation of other monitor
points. The hardware modules monitor the supervised inputs. The following states are reported: Secure,
Alert, Shorted, Open, and Line Fault
The configuration in the host computer determines how the hardware module and the reporting software
will respond to the various conditions that are detected.
12
UL Compliant Supervision
The indication of whether a monitor point is Normally Closed (NC) or Normally Open (NO) is done by
how the resistor network is wired in conjunction with the alarm device to form a supervised End Of Line
(EOL) resistor alarm zone. The host system views monitor points as being either logically true or false.
Software House wires NO and NC supervised input circuits differently because it makes the software
implementation more logical.
The two different methods result in an alarm loop resistance of 1K ohms being the Secure supervised state
whether the monitor point is connected as a NO or NC alarm loop. Since the hardware wiring defines NO
and NC, the software works with inputs that are simply either logically true or false.
To wire a NO alarm loop to an input circuit, connect a 1 K Ω EOL resistor across the input and another
EOL in series with the switch, as shown below. This circuit will provide 5-state supervision.
Figure 5. NO Switch
To wire a NC alarm loop to an input circuit, connect a 1 K Ω EOL resistor across the switch and another
EOL in series with the input, as shown below. This circuit will provide 5-state supervision.
Figure 6. NC Switch
13
Single Device Alarm Zone – Input Status
Ranges of resistance Resistance Comment
An intrusion zone is a user-defined group of doors, inputs, and actions that delineate a physical area
monitored for alarms. The inputs you assign to an intrusion zone (that is, motion detectors, glass break
sensors) monitor security inside the zone. The doors you assign to an intrusion zone are used to define the
entrance and exit points for the zone.
Grouping inputs, doors, and actions into intrusion zones allows easy arming and disarming of groups of
alarm monitoring points (inputs), as well as locking and unlocking groups of doors.
The figure below shows a simple intrusion zone. Inbound and outbound readers provide access to
personnel, and also arm and disarm the zone. Monitoring devices include two glass break sensors and a
motion detector.
Inbound Outbound
Reader Reader
Motion Detector
14
INTRUSION ZONE MODES
• Armed
• Disarmed
• Violated
• Ready to arm/Not ready to arm
You can view the mode of an intrusion zone in the Monitoring Station by selecting Non-Hardware Status
and Intrusion Zone from the main menu.
Armed
If the zone is armed, the area is protected. You cannot enter an armed intrusion zone without activating
doors and inputs and causing an intrusion zone violation.
When you arm an intrusion zone, the iSTAR reports the armed status to the C•CURE server. If the arming
method included presenting a card, the hardware reports the personnel access. The iSTAR also reports
tamper, input supervision errors, and communication failures.
For five seconds after an intrusion zone is armed, the zone’s readers display “Area Armed” in the LCD area.
This message is followed by the current date and time. The readers do not display other intrusion zone
status messages, or the usual “Present Card” message. If there is an event (iSTAR) assigned to the armed
mode, the hardware activates the event while the intrusion zone is armed.
Disarmed
If the zone is disarmed, the inputs assigned to that intrusion zone do not generate intrusion zone violations
when activated (when people enter the zone, for example).
When you disarm an intrusion zone, the iSTAR reports the disarmed status to C•CURE server. If the
disarm method included presenting a card, the panel reports the personnel access. For five seconds after an
intrusion zone is disarmed, the system displays disarm status messages on all readers within the zones.
The iSTAR processes access requests at the intrusion zone doors during the disarmed state. You can gain
access at the locked doors through the usual means: valid card, valid card and pin, or RTE. The iSTAR also
reports tamper, input supervision errors, and communication failures.
Violated
An intrusion zone changes from normal to violated when the system detects an intrusion zone violation.
Violations include:
15
• Inputs that activate while the zone is armed. (If the zone is disarmed within the entrance delay,
the violation does not occur.)
• Doors that open while the zone is armed. (If the zone is disarmed within the entrance delay, the
violation does not occur.)
When the system detects an intrusion zone violation, the iSTAR changes the status of the intrusion zone to
violated and notifies C•CURE of the violation. The server records the violation in the journal and generates
an activity message at the Monitoring Station.
If the intrusion zone includes an activity, such as flashing lights, assigned to the “Event (Output) to activate
while violated” status, the system initiates the activity while the intrusion zone is violated.
The intrusion zone status remains violated – whether or not the object causing the violation returns to the
normal state – until you change the mode of the intrusion zone to Armed or Disarmed.
You can change the mode to Armed via key-press/active input and card swipe, or via an Arm selected manual
action from the Monitoring Station.
You can only disarm a violated intrusion zone if you have enabled the Allow zone disarm while violated option
on the iSTAR Intrusion Zone dialog box Disarming tab.
You can change the mode to Disarmed via key-press/active input and card swipe, or via a Disarm selected
manual action from the Monitoring Station.
When an intrusion zone is in disarmed mode, the status of the intrusion zone may be either ready to arm or
not ready to arm.
Ready to Arm
16
When the intrusion zone status is not ready to arm, you cannot change the mode of the zone from disarmed
to armed unless you use the “force armed” feature.
You can force arm an intrusion zone with a normal event action, a local keypad command action, or a
mouse (manual) action from the monitoring application. A force arm is necessary when one or more
intrusion zone inputs are active, causing a not ready to arm state. You can also force arm an intrusion zone,
to intentionally disregard an active monitoring point.
Exit Considerations
The C•CURE system uses input from the Door DSM to initiate door locking and allow personnel to exit
during arm and disarm procedures.
• To disarm a zone from the outside, personnel outside the zone initiate a disarm command or
activity. The iSTAR unlocks the door, and disarms the zone after DSM (door open and close)
activity.
• To arm a zone from the inside, personnel inside the zone initiate an arm command or activity. The
iSTAR waits for DSM (door open and close) before arming, thereby allowing personnel to exit.
Off normal points are inputs that are activated when an intrusion zone is disarmed.
• If a zone is “not ready to arm”, at least one input is off normal. This state can occur at any time.
• If a zone is “violated”, at least one input is active or was active. This state can only occur with the
intrusion zone is in “armed” mode.
17
CONFIGURATION OVERVIEW
Table 5. Configure Intrusion Zone Dialog Box Field and Tab Descriptions
Field/Tab Description
Online Click this check box to put the intrusion zone online. C•CURE only monitors online
intrusion zones.
Maintenance Click this check box to put the intrusion zone into Maintenance Mode.
Mode Default: Disabled (unchecked)
(C•CURE 800
only) NOTE: This check box is not visible if the user does not have Maintenance Mode
privilege.
Disarming Tab Configures the methods for disarming an intrusion zone locally.
Arming Tab Configures the methods for arming an intrusion zone locally.
Doors Tab Specifies the doors for the entrance and exit points of the intrusion zone.
Inputs Tab Specifies the inputs, such as motion detectors, to assign to the intrusion zone.
Events Tab Specifies events for this intrusion zone that activate when the zone changes mode.
18
CONFIGURING ARM AND DISARM (ISTAR ZONES)
The figure below shows the ways to control the arm and disarm mode of an iSTAR intrusion zone.
Use the Disarming and Arming tabs in the iSTAR Intrusion Zone dialog box to define arm and disarm controls.
Card Control
You can configure iSTAR intrusion zones to arm and disarm on presentation of a valid card and required
inputs. You can also use keypad command. You can restrict access by requiring:
19
Disarm Options
Use the Card Method used to disarm drop-down arrow on the Disarming Tab to specify card control disarm
options.
Active input and valid Press active input (such as a key activated
card switch) and valid card.
Arm Options
Use the Card method used to arm drop-down arrow on the Arming Tab to specify card control arm options.
Key press and valid Press CMD/ENT twice, followed by a valid card.
card
Active input and valid Press active input (such as a key activated
card switch) and valid card.
NOTE: When the zone is armed from an outside reader, the door strike is not activated when the card is
read. The system determines the zone is being armed because either the active input is active or
CMD/ENT has been pressed twice. Since you are already outside the zone there is no need to
activate the door strike. If you arm the zone from an inside reader, the system activates a door
strike.
20
Sample Events
Event
Activated
By... Example Important Configuration Information
Input Use an inside switch to For Inputs, Events and Keypad Commands:
toggle zone between
armed and disarmed • Events activated by other C•CURE 800/8000
states.
objects can reside on either the host or a cluster
Another • Event disarms the • Events activated by keypad commands must be
event intrusion zone if a downloaded to a cluster
specific cardholder • Events that activate local actions must be
is in the building activated by keypad commands, downloaded to
during a specific the cluster, and activated by a door and reader
time (dayshift) that is part of the intrusion zone
• Event arms zone
and secures doors
if a door forced
alarm occurs
Delay Options
21
Configuring Delays
To define delays:
• Use the Reader sounds during exit delay field on the Arm tab to allow enough time for personnel
to exit the zone before the intrusion zone arms and any configured alarms activate.
• Use the Reader sounds during entrance delay field on the Disarm tab to allow enough time for
personnel to enter the zone and complete the disarm procedure.
Monitoring Station
You can arm, disarm, and force arm an intrusion zone by selecting manual icons and options from the
Monitoring Station.
To add doors to an intrusion zone, select the Doors tab and use the Add and Remove buttons to add and
remove doors.
Table 9 below shows iSTAR door configuration options. Use the horizontal scroll bar in the Doors Selected
area to display these options.
Option Description
Card Control Enables or disables readers in the zone to use card control to arm and disarm the zone.
Display Blank - sets the LCD display on readers to display time/date (first line) and a second line that is
blank (except for occasional display of mode or control messages.)
Status - displays time/date (first line) and intrusion zone status (second line)
22
CONFIGURING INTRUSION ZONE INPUTS
• Use the Add and Remove buttons to move inputs from the Available inputs list to the Selected
inputs list
• Use the horizontal scroll bar at the bottom of the selected inputs window to display iSTAR input
options.
Option Description
23
Sample Configurations
The following scenarios describe situations that trigger and shunt entrance delays:
A switch, inside an intrusion zone controls arming and disarming. The area around the switch is
monitored by a motion sensor. The motion sensor input is shunted (disregarded) during the
entrance delay to allow personnel time to complete the disarm procedure.
The perimeter door of an intrusion zone is key operated. The input that monitors the door triggers
an entrance delay to allow the cardholder time to disarm the intrusion zone after entering. This input
is also shunted (disregarded) during the entrance delay.
• Example: configuring an input that does not trigger the entrance delay and is not shunted
during an entrance delay
An input monitors the state of a window. This input is shunted whenever the zone is disarmed but
reports immediately when the zone is armed, regardless of whether the entrance delay is running.
Table 11 below outlines valid and invalid trigger and shunt situations.
As soon as the configuration is downloaded to the iSTAR, the change is in effect and the protection
input is active and monitoring the area within the intrusion zone.
24
o When the intrusion zone is disarmed and no controlled or protection inputs are active in the
zone, the LCD reader (if configured to display “status”) cycles between “Ready to Arm” and
“Present Card.”
If the protection input becomes active, the reader LCD cycles between “Not Ready to
Arm,” “Present Card,” and the first 16 characters of the name of the protection input. The
active input is logged in the journal and displays on the Monitoring station, if the operator’s
account was configured to display the activity. If an Event was configured to activate when
the protection input becomes active, it also activates.
o When the intrusion zone is armed and no other controlled or protection inputs are active in
the zone, the LCD reader display cycles between “Area Armed” and “Present Card.”
If the protection input becomes active, the intrusion zone is violated, the LCD reader and
the Monitoring station display the input active status, and a violation message, with named
input, is logged in the journal.
• Example: arming/force arming an intrusion zone with an active protection input.
o Arming an intrusion zone by normal means when a protection input is active will result in a
failure, with an entry in the activity log and no change in status on the Monitoring station.
o Force arming the intrusion zone with the active protection input will successfully arm the
intrusion zone.
Because protection inputs are always armed, to permanently override defective hardware associated with a
protection input, the input must be de-configured from the Admin Station.
25
PROTECTION INPUTS
This feature allows you to configure a selected input as a Protection Input. The arm/disarm state of the
protection input is not controlled by the intrusion zone, it is not controllable from the monitoring station by
manual action, and events cannot arm or disarm the protection input. Once selected as Protection inputs,
Protection inputs are always armed; setting the input default state to disarmed on the input configuration
screen has no effect.
If a protection input becomes active, it also causes an armed intrusion zone to be violated, and the
monitored inputs that supervise the protection input will cause the armed intrusion zone to violate if they
become active (i.e., tamper, comm fail, or supervision error of the protection input hardware will violate the
intrusion zone).
An active protection input prevents regular arming of the intrusion zone. The journal message will indicate
which input prevented arming. Force arming over an active protection input will allow the intrusion zone to
arm without affecting the state of the protection input. However, a subsequent activation of the protection
input will cause a violation in the armed intrusion zone.
If the intrusion zone is configured with an “Intrusion zone violated” event, an active protection input in an
armed intrusion zone will activate this event. Active protection inputs in an armed or disarmed intrusion
zone activate the “Not ready to arm” event.
An intrusion zone may have multiple protection inputs, but each protection input may be configured as part
of only one intrusion zone, not multiple intrusion zones, and the inputs must be on the same iSTAR
controller as the protected intrusion zone. Protection inputs may be configured only for iSTAR inputs.
Begin configuring the protection input by configuring an intrusion zone in the system, with options as
desired. On the Inputs tab, select one of the Available inputs and in the Selected Inputs window, scroll to
the right and configure it as a protection input. Protection Inputs may be configured to activate events when
the input is active or not active as part of the normal input configuration screens. You may configure any or
all of the protection inputs to activate the same event.
The figure below shows the location of the protection input menu selection.
26
Figure 10. Protection Input selection
NOTE: If you configure the Protection Input column, you will not be allowed to configure the Entrance
Delay Trigger or Entrance Delay Shunt options.
2. Click Edit to edit an existing intrusion zone, or click New to configure a new one.
4. On the Inputs tab, select the appropriate Available input(s) and add them to the Selected inputs list.
5. In the Selected inputs list, select the one you want to designate as the Protection Input.
6. Scroll to the right in the Selected inputs window, click in the Protection Input field, and select Yes
(No is the default).
7. Click OK to save the configured input, and click Close on the Intrusion Zone Selection browser.
27
Configuring Events for Protection Inputs
On iSTAR controllers, you can configure an Event to activate if any of the intrusion zone’s inputs become
active, even if the intrusion zone is disarmed. On the Events tab, select an event to activate for either or
both modes:
The Not Ready to Arm event will be activated any time the intrusion zone has off normal inputs (inputs that
are activated when an intrusion zone is disarmed) or open doors, regardless of whether the intrusion zone is
armed or disarmed. The figure below shows the Events tab and modes that may be configured.
When an intrusion zone door is configured to display “status,” the active protection inputs will display on
the reader LCD in the same manner as the messages for controlled and monitored inputs. The reader LCD
will cycle through messages indicating the intrusion zone state/mode, any active input names, and text
indicating the current door mode (e.g., “Present Card” or “Unlocked.”)
28
Figure 12. Location of Door Status Display Option
29
CONFIGURING STATUS LINKS
Intrusion zones provide options that link status to events (iSTAR). Use these options to:
• Display iSTAR status and respond to violations by linking status to events (for example, display
status using indicator lights and respond to violations by sounding alarms.
• Disarmed
• Armed
• Violated.
There are specific considerations when using the iSTAR Pro 2U Rack Mount as an intrusion detection /
burglar alarm system, per ANSI/UL 1076
Table 12. Specific considerations when using the iSTAR Pro 2U Rack Mount
as an intrusion detection/burglar alarm system, per ANSI/UL 1076
UL 1076 Intrusion Detection / Burglar Alarm Recommendations
Recommended Arm/Disarm Device RM2L-4000 multi-technology reader with
keypad & display, to provide visual indication
of individual zone status to operator
AC Power Source Must use a UL-approved UPS, sized to
provide 4 hours of full operation when main
AC power is not present
Local Sounder Recommend to install local horn, activated
when the zone is in alarm
Maximum number of protection inputs per 32
zone
Maximum number of non-protection inputs per 32
zone
Maximum number of readers per zone 16
30
Operational Requirements
Operation/Testing
Inputs are tested by opening/closing (activating/deactivating) the device. Input devices must have the
proper supervision resistors installed to function with C•CURE.
When inputs are working properly, you see these messages on the Monitoring Station.
Outputs are tested by performing a manual action in the Monitoring Station application. You can
momentarily open a door or activate any other relay. You can then use a resistance meter to determine if the
relay contacts close and open properly.
Maintenance
For electronic modules exposed to high dust environments: Check the assemblies for excess dust
build-up every 6 months and remove the dust and dirt from the assemblies with forced air.
For power backup: Disconnect the main AC power feed to the UPS, and verify that the iSTAR Pro Rack
Mount continues full operation. Verify that the AC Fail alarm is presented in the C•CURE Monitoring
Station. Reconnect AC power to the UPS and verify that the AC Fail alarm returns to normal. Replace the
batteries on the UPS according to the manufacturer’s instructions.
31
C•CURE and Software House are registered trademarks of Tyco International Ltd. and its Respective
Companies.
Certain Product names mentioned herein may be trade names and/or registered trademarks of other
companies. Information about other products furnished by Software House is believed to be accurate.
However, no responsibility is assumed by Software House for the use of these products, or for an
infringement of rights of the other companies that may result from their use.
Revision: B0
Copyright © 2008 - 2012 by Tyco International Ltd. and its Respective Companies.
32