You are on page 1of 32

iSTAR Pro 2U RM Rack Mount

Quick Start
Installation Guide

UM-272 Version B0

OVERVIEW

Software House® iSTAR Pro 2U Rack Mount is a standalone, rack-mountable access control and burglar
alarm system unit that houses all the necessary components to control up to 16 doors, and monitor up to 32
alarm inputs.

This guide describes quick installation information for the 2U Rack Mount:
 How to wire readers to RM ports.
 How to wire supervised input points and dry contact relay outputs.
 How to wire Lock Power wire to provided Connector.

System Components The iSTAR Pro Hardware Components consist of:

 General Controller module (GCM) - A general purpose board running windows


CE. The GCM has two PCMCIA slots for an internal modem, and a second
network interface card. There is an LCD panel to display the current status and to
use when running diagnostics. The panel of batteries to retain the data memory in
the event of a power failure.
 Access Control Modules (ACM) - An access control board that communicates
with the GCM and provides readers, outputs, and inputs. The iSTAR Pro can have
up to two ACMS that control 16 doors and interface with wiegand technology and
ABA (magnetic) signaling devices.
 12VDC @ 6.2A Power Supply.

1
Rear Connection Panel

Figure 1. ISTAR Pro 2U Rack Mount

ISTAR Pro 2U Rack Mount Hardware Components

• STAR016W-64A - 64 MB RAM General Controller Module II with Two Access Control Module II
for up to 16 readers (RM only).
• 12 VDC Power Supply
• Front LCD and Alarm Panel

2
Figure 2. GCM General Control Module

Network Connection – Connect a CAT-5 RJ45 cable to J4. Connect a straight through cable to a Switch
or Hub. If unit is connected directly to the server use a crossover cable.

LED2 indicates the Ethernet link signal and LED1 displays the Receive Data signal.

Batteries – Use NiMH (Nickel Metal Hydride) batteries- AA size. Minimum 2400 milli-amp hours.

Caution: There is a risk of explosion if the battery is replaced with the wrong type. Dispose of batteries in
according to their instructions.

ISTAR Pro 2U batteries are packaged separately and should be installed in the battery backup sockets at the
bottom of the GCM.

The unit is stored and shipped with the batteries disconnected so they will not be drained while in storage.
Connect the batteries as shown in the GCM diagram that follows. It is acceptable to install the batteries with
the power on. However, if the batteries are installed with the power on, the reset switch does not need to be
pressed.

NOTE: The batteries provide the power to retain the volatile memory data in the panel.

3
Diagnostic Session - A diagnostic session can be run either through ICU or with a terminal session
through P5. Turn on the diagnostic information settings using either ICU or the HTML connection to the
ISTAR Pro 2U.

Note that the diagnostic information causes overhead and should not be left on during normal operation.

1. Connect P5 to a COM port on a PC. Use a straight through DB9F to DB9F cable.

2. Set the COM port to 115,200 baud, 8, None, 1, Hardware Flow Control.

3. Start a terminal session using an emulator such as HyperTerminal.

LEDs
LED4- indicates power and shines through an opening in the door.

LED2- displays the Ethernet Link signal on P6.

LED1- displays the Receive Data signal on P6.

Dip Switches

DIP Switch S2 is factory set for RS232 on P6. Do Not Change.

DIP Switch S1 is factory set for RS232 on P6. Do Not Change.

DIP Switch S4 is used to control diagnostics, clear memory, and to display card reads in
hexadecimal. See the iSTAR Pro 2U Door map for more detailed information about running
diagnostics.

To display hexadecimal cards reads on the LCD panel set switch 4-8 on.

The Reset Switch, S5, will cause the GCM computer to reboot. Pressing S5 will also clear memory, including
configured readers, inputs and outputs. As long as there is a connection to the host these objects will be
immediately be downloaded to the memory.

If the switch S4-2 is on when S5 is pressed, the unit will be reset to factory default. This means that all of
the connection data, such as the IP address will be cleared in addition to the memory. In this case the unit
will have to be totally configured again using ICU.exe.

To clear memory and reboot the unit:


1. Set switch 4-2 on.
2. Press S5 and wait 10 seconds.
3. Set switch 4-2 to OFF.
4. Press S5 and watch the LCD panel. The unit will reboot, the memory will be cleared and the unit
will need to be reconfigured.

4
ACM - ACCESS CONTROL MODULES

The ACM “Access Control Module” connects to the readers, inputs and outputs used in access control. An
iSTAR Pro 2U can have one or two ACMs.

Wiegand Ports
Supervised inputs

12VDC Power

S2 Enable Wiegand Ports

S4 Terminate RM Ports

RM Reader Ports
Relay Outputs
Figure 3. ACM Access Control Module

RM4 READERS

Wiegand or Magnetic Signaling read heads are connected to the RM-4s or RM-4Es. The readers are
connected to STAR1 through STAR8 Ports.

Table 1. Pin connector and color code Diagram.


STARx Pin Signal Color
1 +12VDC Red
2 Tx+ / Rx+ White
3 Tx- / Rx- Green
4 GND Black

LEDs
Led Function
DS3 Shows Power to the ACM
DS1 Indicates Rx on the RS485 half Duplex Reader Bus
DS2 Indicates Tx on the RS485 half Duplex Reader Bus
DS4-DS11 Displays the eight outputs on the ACM
S5 Reset Switch Resets the iSTAR

5
RM4 TO HEAD END WIRING INSTRUCTIONS

12 VDC

6
Output Diagram

Lock +

Shield

Lock -

7
Input Diagram

8
Power Specs:

Power Requirements 115VaC 60Hz /220Vac 50Hz


Power 0.75A @90VA
Heat Dissipation (Typical) 100 BTU/Hr
AC Input Current Limit 4A @ 250V (Fused)
Temperature Alarm 150°F ± 10%

RACK MOUNT SIZE AND RACK REQUIRMENTS

• 2U- 3.5” High


• Standard 19” Wide
• 23” Long to Shroud

Mounting Instructions

• Install Rack Rails to both sides of iSTAR Pro 2U enclosure. (Screws Provided)
• Install Rack Rails to Server Rack.
• Slide iSTAR Pro 2U into Rack Rails on Server Rack
• Screw iSTAR Pro 2U to Server Rack for added Security.

Environmental Requirements

Table 2. ISTAR Pro 2U environmental requirements

Status Range

Operation 32° F (0° C) to 120° 1- (48.9° C)


Storage 1° F (-20° C) to 158° F (70° C)

Regulatory Specifications
Table 3. iSTAR Pro 2U Regulatory Specifications
Regulatory
Tested and certified by ETL per ANSUI/UL standard 294-2004
Tested and certified by ETL per ANSUI/UL standard 1076-2004
FCC Part 15 Class B
CE: EN 61000-3-2, EN 61000-3-3, EN 61000-6-3, EN 50130-4, EN 60950-1
C-Tick

9
Table 4. Specific considerations when using the iSTAR Pro 2U Rack Mount as an intrusion
detection/burglar alarm system, per ANSI/UL 1076
UL 1076 Intrusion Detection / Burglar Alarm Recommendations
Recommended Arm/Disarm Device RM2L-4000 multi-technology reader with
keypad & display, to provide visual indication
of individual zone status to operator
AC Power Source Must use a UL-approved UPS, sized to
provide 4 hours of full operation when main
AC power is not present
Local Sounder Recommend to install local horn, activated
when the zone is in alarm
Maximum number of protection inputs per 32
zone
Maximum number of non-protection inputs per 32
zone
Maximum number of readers per zone 16

10
2U ISTAR PRO AS A BURGLAR ALARM SYSTEM UNIT

The iSTAR Pro Rack Mount controller provides burglar alarm / intrusion detection functionality per
UL/ANSI standard 1076 (proprietary burglar alarm system units). Please follow these instructions when
deploying the iSTAR Pro Rack Mount for this application.

Installation

The 2U Rack Mount unit must be mounted in a standard 19” rack, with 2U (3.5”) of vertical rack space
provided. The unit and slide rails may be mounted in either a four-post rack, or a two post rack, following
the instructions provided [link to page]. The installation must adhere to the following environmental
conditions:

• 0° to 50° C (32° to 122° F),


• 5 to 95% relative humidity, non-condensing

The system must be installed within the protected premise and wired in accordance with the National
Electrical Code (ANSI/NFPA 70-1993), and the local authorities having jurisdiction.

Main Power

Provide 115 VAC +/- 10% / 60 Hz or 230VAC/50 Hz line voltage power to the unit from a non-switched
circuit. A standard type SJ flexible power cord is provided, and is attached to the rear of the unit. The unit
does not provide power for external locking mechanisms. Actual power draw will vary for different
installations based on reader type deployed, but a typical installation will draw roughly 75W. Be sure to
calculate the power draw for the specific installation.

Backup Power

The UL/ANSI 1076 standard requires a backup power source that provides four hours of backup power in
the event that main power is unavailable. The standard also calls for alarm indication of AC power fail to the
central supervising station (C•CURE 800 or C•CURE 9000 host).

Provide a UL-listed rack-mount UPS (uninterruptible power supply) unit that is sized to deliver the required
power to the Rack Mount iSTAR Pro and also capable of delivering that power level for four hours. This
may require the addition of extended battery modules for some UPS models.

• UPS Type: Line-interactive or online rack-mount UPS, 115VAC/60Hz or 230VAC/50Hz input,


115VAC/60Hz or 230VAC/50Hz output.
• UPS Rating: Minimum 250W, minimum 4 hours runtime at full load.

11
AC Power Fail Alarm

To transmit the AC Fail alarm signal from the UPS to the Rack Mount iSTAR Pro unit, wire a two-wire
circuit from the designated UPS alarm relay contacts into a selected supervised input on the rear of the Rack
Mount iSTAR Pro, using two 1K resistors for line supervision. Input number 16 is recommended for this
purpose. Follow the wiring diagram below:

Figure 4. Power Fail wiring

Once wired, configure Input #16 in the C•CURE 800 or C•CURE 9000 host as a Normally Open
Supervised Input. Then, configure the input to trigger an Event in the system, with the event set up to
always be armed, on-line, annunciated, and require acknowledgement. The Event should have an
appropriate name, such as “AC Power Fail.” In addition, the event should be configured to activate 2
Outputs which are wired to an external audible sounder and LED indicator, installed near the keypad reader
used to arm/disarm the Intrusion Zone. This allows the AC Power Fail notification to be presented both at
the Monitoring Station and locally at the Intrusion Zone reader.
NOTE: The resistor wiring is for NO (Normally Open) although the connection is to the NC output of
the apS/UPS. The reason is that in the normal mode (power ON) the relay is activated and the
circuit is open. When the power fails, the relay loses power and deactivates, which results in an
alarm (closed circuit).

Installation and Wiring of Supervisory / Monitor Points

Supervisory input points must be used for UL 1076 applications. The iSTAR Pro rack Mount provides
either 16 or 32 supervised inputs, depending on the model purchased. Each supervised input must be
configured to trigger an event when the input is activated or a supervision error is detected. These events
must be configured to always be armed, on-line, annunciated, and require acknowledgement.

Each monitor point functions independently and does not interfere with the operation of other monitor
points. The hardware modules monitor the supervised inputs. The following states are reported: Secure,
Alert, Shorted, Open, and Line Fault

The configuration in the host computer determines how the hardware module and the reporting software
will respond to the various conditions that are detected.

12
UL Compliant Supervision

The indication of whether a monitor point is Normally Closed (NC) or Normally Open (NO) is done by
how the resistor network is wired in conjunction with the alarm device to form a supervised End Of Line
(EOL) resistor alarm zone. The host system views monitor points as being either logically true or false.
Software House wires NO and NC supervised input circuits differently because it makes the software
implementation more logical.

The two different methods result in an alarm loop resistance of 1K ohms being the Secure supervised state
whether the monitor point is connected as a NO or NC alarm loop. Since the hardware wiring defines NO
and NC, the software works with inputs that are simply either logically true or false.

Wiring for Alarm Zones

To wire a NO alarm loop to an input circuit, connect a 1 K Ω EOL resistor across the input and another
EOL in series with the switch, as shown below. This circuit will provide 5-state supervision.

Figure 5. NO Switch
To wire a NC alarm loop to an input circuit, connect a 1 K Ω EOL resistor across the switch and another
EOL in series with the input, as shown below. This circuit will provide 5-state supervision.

Figure 6. NC Switch

13
Single Device Alarm Zone – Input Status
Ranges of resistance Resistance Comment

Short 0 - 100 Ω Wires crossed


Line Fault 101 Ω – 360 Ω Wrong resistor
NO Alarm 361 Ω – 750 Ω 500 Ω
Secure 751 Ω - 1450 Ω 1K Ω
NC Alarm 1451 Ω - 2980 Ω 2K Ω
Line Fault 2981 Ω – 11.8K Ω Wrong resistor
Open Loop > 11.8K Ω Cut wire

Configuration and Operation of Burglar Alarm Intrusion Zones

An intrusion zone is a user-defined group of doors, inputs, and actions that delineate a physical area
monitored for alarms. The inputs you assign to an intrusion zone (that is, motion detectors, glass break
sensors) monitor security inside the zone. The doors you assign to an intrusion zone are used to define the
entrance and exit points for the zone.
Grouping inputs, doors, and actions into intrusion zones allows easy arming and disarming of groups of
alarm monitoring points (inputs), as well as locking and unlocking groups of doors.

Sample Intrusion Zone

The figure below shows a simple intrusion zone. Inbound and outbound readers provide access to
personnel, and also arm and disarm the zone. Monitoring devices include two glass break sensors and a
motion detector.

Glass Break Glass Break

Inbound Outbound
Reader Reader
Motion Detector

Figure 7. Sample Intrusion Zone

14
INTRUSION ZONE MODES

Intrusion Zones are always in one of the following modes:

• Armed
• Disarmed
• Violated
• Ready to arm/Not ready to arm

You can view the mode of an intrusion zone in the Monitoring Station by selecting Non-Hardware Status
and Intrusion Zone from the main menu.

Armed

If the zone is armed, the area is protected. You cannot enter an armed intrusion zone without activating
doors and inputs and causing an intrusion zone violation.

When you arm an intrusion zone, the iSTAR reports the armed status to the C•CURE server. If the arming
method included presenting a card, the hardware reports the personnel access. The iSTAR also reports
tamper, input supervision errors, and communication failures.

For five seconds after an intrusion zone is armed, the zone’s readers display “Area Armed” in the LCD area.
This message is followed by the current date and time. The readers do not display other intrusion zone
status messages, or the usual “Present Card” message. If there is an event (iSTAR) assigned to the armed
mode, the hardware activates the event while the intrusion zone is armed.

Disarmed

If the zone is disarmed, the inputs assigned to that intrusion zone do not generate intrusion zone violations
when activated (when people enter the zone, for example).

When you disarm an intrusion zone, the iSTAR reports the disarmed status to C•CURE server. If the
disarm method included presenting a card, the panel reports the personnel access. For five seconds after an
intrusion zone is disarmed, the system displays disarm status messages on all readers within the zones.

The iSTAR processes access requests at the intrusion zone doors during the disarmed state. You can gain
access at the locked doors through the usual means: valid card, valid card and pin, or RTE. The iSTAR also
reports tamper, input supervision errors, and communication failures.

Violated

An intrusion zone changes from normal to violated when the system detects an intrusion zone violation.
Violations include:

• Hardware tamper or communication failure


• Supervision errors for intrusion zone inputs or tamper inputs

15
• Inputs that activate while the zone is armed. (If the zone is disarmed within the entrance delay,
the violation does not occur.)
• Doors that open while the zone is armed. (If the zone is disarmed within the entrance delay, the
violation does not occur.)

When the system detects an intrusion zone violation, the iSTAR changes the status of the intrusion zone to
violated and notifies C•CURE of the violation. The server records the violation in the journal and generates
an activity message at the Monitoring Station.

If the intrusion zone includes an activity, such as flashing lights, assigned to the “Event (Output) to activate
while violated” status, the system initiates the activity while the intrusion zone is violated.

The intrusion zone status remains violated – whether or not the object causing the violation returns to the
normal state – until you change the mode of the intrusion zone to Armed or Disarmed.

You can change the mode to Armed via key-press/active input and card swipe, or via an Arm selected manual
action from the Monitoring Station.

You can only disarm a violated intrusion zone if you have enabled the Allow zone disarm while violated option
on the iSTAR Intrusion Zone dialog box Disarming tab.

You can change the mode to Disarmed via key-press/active input and card swipe, or via a Disarm selected
manual action from the Monitoring Station.

Ready to Arm/Not Ready to Arm

When an intrusion zone is in disarmed mode, the status of the intrusion zone may be either ready to arm or
not ready to arm.

Ready to Arm

The intrusion zone is ready to arm when:

• All objects assigned to the intrusion zone are in a normal state


• Intrusion zone inputs are not active
• Intrusion zone doors are closed

You can arm an intrusion zone whose status is ready to arm.

Not Ready to Arm

The status of an intrusion zone is not ready to arm when:

• Any object assigned to the intrusion zone is not functioning normally


• An intrusion zone input is active
• An intrusion zone door is open

16
When the intrusion zone status is not ready to arm, you cannot change the mode of the zone from disarmed
to armed unless you use the “force armed” feature.

You can force arm an intrusion zone with a normal event action, a local keypad command action, or a
mouse (manual) action from the monitoring application. A force arm is necessary when one or more
intrusion zone inputs are active, causing a not ready to arm state. You can also force arm an intrusion zone,
to intentionally disregard an active monitoring point.

Exit Considerations

The C•CURE system uses input from the Door DSM to initiate door locking and allow personnel to exit
during arm and disarm procedures.

• To disarm a zone from the outside, personnel outside the zone initiate a disarm command or
activity. The iSTAR unlocks the door, and disarms the zone after DSM (door open and close)
activity.
• To arm a zone from the inside, personnel inside the zone initiate an arm command or activity. The
iSTAR waits for DSM (door open and close) before arming, thereby allowing personnel to exit.

Factors that Impact Intrusion Zones Modes

Off normal points are inputs that are activated when an intrusion zone is disarmed.

• If a zone is “not ready to arm”, at least one input is off normal. This state can occur at any time.
• If a zone is “violated”, at least one input is active or was active. This state can only occur with the
intrusion zone is in “armed” mode.

17
CONFIGURATION OVERVIEW

Use the Intrusion Zone dialog box to configure intrusion zones.

• For iSTAR intrusion zones, select Configure>Intrusion Zone>iSTAR Intrusion Zone>New or


Edit.

Figure 8. STAR Configure Intrusion Zone Dialog Box

Table 5. Configure Intrusion Zone Dialog Box Field and Tab Descriptions

Field/Tab Description
Online Click this check box to put the intrusion zone online. C•CURE only monitors online
intrusion zones.

Maintenance Click this check box to put the intrusion zone into Maintenance Mode.
Mode Default: Disabled (unchecked)
(C•CURE 800
only) NOTE: This check box is not visible if the user does not have Maintenance Mode
privilege.

Disarming Tab Configures the methods for disarming an intrusion zone locally.

Arming Tab Configures the methods for arming an intrusion zone locally.

Doors Tab Specifies the doors for the entrance and exit points of the intrusion zone.

Inputs Tab Specifies the inputs, such as motion detectors, to assign to the intrusion zone.

Events Tab Specifies events for this intrusion zone that activate when the zone changes mode.

18
CONFIGURING ARM AND DISARM (ISTAR ZONES)

The figure below shows the ways to control the arm and disarm mode of an iSTAR intrusion zone.

Figure 9. Controlling iSTAR Intrusion Zone Modes

Use the Disarming and Arming tabs in the iSTAR Intrusion Zone dialog box to define arm and disarm controls.

Card Control

You can configure iSTAR intrusion zones to arm and disarm on presentation of a valid card and required
inputs. You can also use keypad command. You can restrict access by requiring:

• Cards with a specific clearance


• Card with a specific clearance and in a specific personnel group.

19
Disarm Options

Use the Card Method used to disarm drop-down arrow on the Disarming Tab to specify card control disarm
options.

Table 6. Card Control Disarming Options

Disarm Option Description

None No card action necessary. Typically select to


disarm with an event.

Valid card only Present a valid card.

Active input and valid Press active input (such as a key activated
card switch) and valid card.

Arm Options

Use the Card method used to arm drop-down arrow on the Arming Tab to specify card control arm options.

Table 7. Card Control Arming Options

Arm Option Description

None No card action necessary. Typically selected to


arm with an event.

Key press and valid Press CMD/ENT twice, followed by a valid card.
card

Active input and valid Press active input (such as a key activated
card switch) and valid card.

NOTE: When the zone is armed from an outside reader, the door strike is not activated when the card is
read. The system determines the zone is being armed because either the active input is active or
CMD/ENT has been pressed twice. Since you are already outside the zone there is no need to
activate the door strike. If you arm the zone from an inside reader, the system activates a door
strike.

20
Sample Events

Table 8 describes using events to arm and disarm an intrusion zone.

Table 8. Events in Intrusion Zones

Event
Activated
By... Example Important Configuration Information

Time Use an event/time Arming and disarming events, activated by time


specification specification to arm specifications, activate only on the leading edge of
and disarm an intrusion the specification and do not reset at the trailing
zone during normal edge of the time specification. This means that you
hours. must create an event to disarm the zone and
another to arm it.

Input Use an inside switch to For Inputs, Events and Keypad Commands:
toggle zone between
armed and disarmed • Events activated by other C•CURE 800/8000
states.
objects can reside on either the host or a cluster
Another • Event disarms the • Events activated by keypad commands must be
event intrusion zone if a downloaded to a cluster
specific cardholder • Events that activate local actions must be
is in the building activated by keypad commands, downloaded to
during a specific the cluster, and activated by a door and reader
time (dayshift) that is part of the intrusion zone
• Event arms zone
and secures doors
if a door forced
alarm occurs

Keypad Security personnel use


command keypad commands to
arm and disarm the
intrusion zone.

Delay Options

Use options on the Arming and Disarming tabs to define delays.

21
Configuring Delays

To define delays:
• Use the Reader sounds during exit delay field on the Arm tab to allow enough time for personnel
to exit the zone before the intrusion zone arms and any configured alarms activate.
• Use the Reader sounds during entrance delay field on the Disarm tab to allow enough time for
personnel to enter the zone and complete the disarm procedure.

Monitoring Station

You can arm, disarm, and force arm an intrusion zone by selecting manual icons and options from the
Monitoring Station.

CONFIGURING INTRUSION ZONE DOORS

To add doors to an intrusion zone, select the Doors tab and use the Add and Remove buttons to add and
remove doors.

iSTAR Door Options

Table 9 below shows iSTAR door configuration options. Use the horizontal scroll bar in the Doors Selected
area to display these options.

Table 9. STAR Door Configuration Options

Option Description

Arm/Disarm Locked - access is granted with valid card


State
Unlocked - door is open. Access not required.
Secure - door is locked and card access is not allowed. Door must be changed to locked or
unlocked to provide access.

Direction Used by the system to determine if a strike (unlock) action is required:


In - For almost all intrusion zones, the In reader leads into the zone and the Out reader leads
out of the zone.
Out - Configured for atypical intrusion zones. Reverses the reader settings, so that the In
reader leads out of the zone and the Out reader leads in.

Card Control Enables or disables readers in the zone to use card control to arm and disarm the zone.

Display Blank - sets the LCD display on readers to display time/date (first line) and a second line that is
blank (except for occasional display of mode or control messages.)
Status - displays time/date (first line) and intrusion zone status (second line)

22
CONFIGURING INTRUSION ZONE INPUTS

To add inputs to an intrusion zone, select the Inputs tab:

• Use the Add and Remove buttons to move inputs from the Available inputs list to the Selected
inputs list

• Use the horizontal scroll bar at the bottom of the selected inputs window to display iSTAR input
options.

iSTAR Input Options

The iSTAR input options are shown in Table 10.

Table 10. iSTAR Input Options

Option Description

Entrance Delay Toggles the entrance delay trigger.


Trigger
• If yes, activation of this input while the intrusion zone is
armed starts the entrance delay.
• If no, activation of this input while the intrusion zone is
armed does not start the entrance delay.

Entrance Delay Toggles the entrance delay shunt.


Shunt • If yes, the input is shunted (disregarded) during an entrance
delay.
• If no, the input is not shunted, and activation of the input
causes a zone violation.

Protection Toggles the activation of the input as a protection input.


Input • If yes, the input is active as a protection input and is armed,
monitoring the area within the Intrusion Zone.
• If no, the input is not active as a protection input and is not
monitoring the area within the Intrusion Zone.
If you select Yes for this option, you cannot also configure Yes for
the Entrance Delay Trigger or the Entrance Delay Shunt.

23
Sample Configurations

The following scenarios describe situations that trigger and shunt entrance delays:

• Example: using shunted during an entrance delay

A switch, inside an intrusion zone controls arming and disarming. The area around the switch is
monitored by a motion sensor. The motion sensor input is shunted (disregarded) during the
entrance delay to allow personnel time to complete the disarm procedure.

• Example: using entrance delay trigger

The perimeter door of an intrusion zone is key operated. The input that monitors the door triggers
an entrance delay to allow the cardholder time to disarm the intrusion zone after entering. This input
is also shunted (disregarded) during the entrance delay.

• Example: configuring an input that does not trigger the entrance delay and is not shunted
during an entrance delay

An input monitors the state of a window. This input is shunted whenever the zone is disarmed but
reports immediately when the zone is armed, regardless of whether the entrance delay is running.

Table 11 below outlines valid and invalid trigger and shunt situations.

Table 11. Input Trigger and Shunt Situation

Trigger Shunt Allowed Example

No No Yes Broken glass sensor

No Yes Yes Motion sensor

Yes Yes Yes Key operated door

Yes No No Not valid - any input trigger


must be shunted

• Example: configuring an input as a protection input within an intrusion zone.

As soon as the configuration is downloaded to the iSTAR, the change is in effect and the protection
input is active and monitoring the area within the intrusion zone.

24
o When the intrusion zone is disarmed and no controlled or protection inputs are active in the
zone, the LCD reader (if configured to display “status”) cycles between “Ready to Arm” and
“Present Card.”

If the protection input becomes active, the reader LCD cycles between “Not Ready to
Arm,” “Present Card,” and the first 16 characters of the name of the protection input. The
active input is logged in the journal and displays on the Monitoring station, if the operator’s
account was configured to display the activity. If an Event was configured to activate when
the protection input becomes active, it also activates.

o When the intrusion zone is armed and no other controlled or protection inputs are active in
the zone, the LCD reader display cycles between “Area Armed” and “Present Card.”

If the protection input becomes active, the intrusion zone is violated, the LCD reader and
the Monitoring station display the input active status, and a violation message, with named
input, is logged in the journal.
• Example: arming/force arming an intrusion zone with an active protection input.

o Arming an intrusion zone by normal means when a protection input is active will result in a
failure, with an entry in the activity log and no change in status on the Monitoring station.

o Force arming the intrusion zone with the active protection input will successfully arm the
intrusion zone.

Because protection inputs are always armed, to permanently override defective hardware associated with a
protection input, the input must be de-configured from the Admin Station.

25
PROTECTION INPUTS

This feature allows you to configure a selected input as a Protection Input. The arm/disarm state of the
protection input is not controlled by the intrusion zone, it is not controllable from the monitoring station by
manual action, and events cannot arm or disarm the protection input. Once selected as Protection inputs,
Protection inputs are always armed; setting the input default state to disarmed on the input configuration
screen has no effect.

If a protection input becomes active, it also causes an armed intrusion zone to be violated, and the
monitored inputs that supervise the protection input will cause the armed intrusion zone to violate if they
become active (i.e., tamper, comm fail, or supervision error of the protection input hardware will violate the
intrusion zone).

An active protection input prevents regular arming of the intrusion zone. The journal message will indicate
which input prevented arming. Force arming over an active protection input will allow the intrusion zone to
arm without affecting the state of the protection input. However, a subsequent activation of the protection
input will cause a violation in the armed intrusion zone.

If the intrusion zone is configured with an “Intrusion zone violated” event, an active protection input in an
armed intrusion zone will activate this event. Active protection inputs in an armed or disarmed intrusion
zone activate the “Not ready to arm” event.

An intrusion zone may have multiple protection inputs, but each protection input may be configured as part
of only one intrusion zone, not multiple intrusion zones, and the inputs must be on the same iSTAR
controller as the protected intrusion zone. Protection inputs may be configured only for iSTAR inputs.

Begin configuring the protection input by configuring an intrusion zone in the system, with options as
desired. On the Inputs tab, select one of the Available inputs and in the Selected Inputs window, scroll to
the right and configure it as a protection input. Protection Inputs may be configured to activate events when
the input is active or not active as part of the normal input configuration screens. You may configure any or
all of the protection inputs to activate the same event.

The figure below shows the location of the protection input menu selection.

26
Figure 10. Protection Input selection

NOTE: If you configure the Protection Input column, you will not be allowed to configure the Entrance
Delay Trigger or Entrance Delay Shunt options.

To configure the protection input:

1. In the Administration Client choose Configure>Intrusion Zone.

2. Click Edit to edit an existing intrusion zone, or click New to configure a new one.

3. Configure the intrusion zone.

4. On the Inputs tab, select the appropriate Available input(s) and add them to the Selected inputs list.

5. In the Selected inputs list, select the one you want to designate as the Protection Input.

6. Scroll to the right in the Selected inputs window, click in the Protection Input field, and select Yes
(No is the default).

7. Click OK to save the configured input, and click Close on the Intrusion Zone Selection browser.

27
Configuring Events for Protection Inputs

On iSTAR controllers, you can configure an Event to activate if any of the intrusion zone’s inputs become
active, even if the intrusion zone is disarmed. On the Events tab, select an event to activate for either or
both modes:

• “Event to Activate when not ready to arm”

• “Event to activate when zone violated”

The Not Ready to Arm event will be activated any time the intrusion zone has off normal inputs (inputs that
are activated when an intrusion zone is disarmed) or open doors, regardless of whether the intrusion zone is
armed or disarmed. The figure below shows the Events tab and modes that may be configured.

Figure 11. Events Configured for Intrusion Zone Modes

Reader Display Messages

When an intrusion zone door is configured to display “status,” the active protection inputs will display on
the reader LCD in the same manner as the messages for controlled and monitored inputs. The reader LCD
will cycle through messages indicating the intrusion zone state/mode, any active input names, and text
indicating the current door mode (e.g., “Present Card” or “Unlocked.”)

28
Figure 12. Location of Door Status Display Option

29
CONFIGURING STATUS LINKS

Intrusion zones provide options that link status to events (iSTAR). Use these options to:

• Display iSTAR status and respond to violations by linking status to events (for example, display
status using indicator lights and respond to violations by sounding alarms.

Status Link Dialog Boxes

To configure event status, select:

• Configure>Intrusion Zone>iSTAR Intrusion Zone>Edit/New>Events (iSTAR)

Status Link Options


The C•CURE 800/8000 provides status links that activate when the zone is:

• Disarmed

• Armed

• Not ready to arm

• Violated.

There are specific considerations when using the iSTAR Pro 2U Rack Mount as an intrusion detection /
burglar alarm system, per ANSI/UL 1076

Table 12. Specific considerations when using the iSTAR Pro 2U Rack Mount
as an intrusion detection/burglar alarm system, per ANSI/UL 1076
UL 1076 Intrusion Detection / Burglar Alarm Recommendations
Recommended Arm/Disarm Device RM2L-4000 multi-technology reader with
keypad & display, to provide visual indication
of individual zone status to operator
AC Power Source Must use a UL-approved UPS, sized to
provide 4 hours of full operation when main
AC power is not present
Local Sounder Recommend to install local horn, activated
when the zone is in alarm
Maximum number of protection inputs per 32
zone
Maximum number of non-protection inputs per 32
zone
Maximum number of readers per zone 16

30
Operational Requirements
Operation/Testing

Inputs are tested by opening/closing (activating/deactivating) the device. Input devices must have the
proper supervision resistors installed to function with C•CURE.

When inputs are working properly, you see these messages on the Monitoring Station.

• input nnn activated

• input nnn deactivated

Shorting or opening the cable is indicated as:

• input nnn shorted

• input nnn open loop

Outputs are tested by performing a manual action in the Monitoring Station application. You can
momentarily open a door or activate any other relay. You can then use a resistance meter to determine if the
relay contacts close and open properly.

Maintenance

For electronic modules exposed to high dust environments: Check the assemblies for excess dust
build-up every 6 months and remove the dust and dirt from the assemblies with forced air.

For power backup: Disconnect the main AC power feed to the UPS, and verify that the iSTAR Pro Rack
Mount continues full operation. Verify that the AC Fail alarm is presented in the C•CURE Monitoring
Station. Reconnect AC power to the UPS and verify that the AC Fail alarm returns to normal. Replace the
batteries on the UPS according to the manufacturer’s instructions.

31
C•CURE and Software House are registered trademarks of Tyco International Ltd. and its Respective
Companies.

Certain Product names mentioned herein may be trade names and/or registered trademarks of other
companies. Information about other products furnished by Software House is believed to be accurate.
However, no responsibility is assumed by Software House for the use of these products, or for an
infringement of rights of the other companies that may result from their use.

iSTAR Pro 2U RM Rack Mount Quick Start Installation Guide

Document Number: UM-272

Revision: B0

Release Date: August 2012


This manual is proprietary information of Software House. Unauthorized reproduction of any portion of
this manual is prohibited. The material in this manual is for information purposes only. It is subject to
change without notice. Software House assumes no responsibility for incorrect information this manual may
contain.

Copyright © 2008 - 2012 by Tyco International Ltd. and its Respective Companies.

All Rights Reserved.

32

You might also like