Professional Documents
Culture Documents
Description
Fortress RFID Access Network Keys (FRANK)
Access control via RFID can be integrated into any Fortress PROFINET or Ethernet/IP enabled device. Existing site access
cards can be used by selecting the appropriate RFID reader. The FRANK industrial access control Software and Controllers
offer administrative management of who can perform certain tasks in access or machine control applications. FRANK
technology utilizes RFID cards and provides a web-based platform to assign permissions to device locations.
When an RFID card is presented to the RFID reader, the reader communicates with the FRANK System to determine
permission state. This is returned to the unit and allocated as an access control bit which is fed back to the PLC directly from
the Fortress (RFID enabled).
FRANK Systems use separated software for reliability. FRANK Local Software directly communicates with Fortress
PROFINET or Ethernet/IP enabled devices on a controls network, discovering devices and assigning them to a specified
location. FRANK Master Software communicates with any FRANK Local Controllers to update user-location permission
changes and record data.
Additional features allow the monitoring of I/O states, Combination of Locations, Access Count information amongst others;
please contact your Fortress representative for more information.
Any hardware running FRANK software is referred to as a “Controller”. Fortress provides FRANK Local Controllers with
FRANK Local Software installed. Fortress recommends customer install FRANK Master Software on a capable PC or VM,
Fortress does not provide dedicated hardware for FRANK Master Software. Small scale systems may allow both FRANK
Local Software and Master Software to be installed on a single controller - please contact your Fortress representative for
more information. These operating instructions relate to software version 1.5.1.0 & firmware version 3.6.15.
Contents
FRANK System Topology and Existing Control System Architecture & Topology
Technical Specification of the components of the FRANK system
• RFID Reader
• Local and Local-Master Controller (FACS-L1 & FACS-LM)
I/O Mapping your device with the Control System
1. Set Up of Devices – Installation of Fortress Hardware, IP address assignment and establishing PLC communication.
2. Configuration of Local Access Controller
• 2.1 Discovery and Administration of Fortress RFID enabled Devices
• 2.2 The Local Controller Menu
• 2.3 ACS (Access Control System) Info
• 2.4 Configure Devices
• 2.5 Create a Location
• 2.6 Editing a Saved Location
• 2.7 Creating a Linked Location and Accessing Count
• 2.8 Accessing Count via a WebAPI
• 2.9 Creating an I/O Monitoring Scheme
• 2.10 System Administration
3. Configuration of the Master Server
• 3.1 The Master Server Menu
• 3.2 Creating Users, Adding and Administration of Cards
• 3.3 Connections - Discovery of Local Access Server
• 3.4 Additional Permissions
• 3.5 Additional Information
4. Upgrading the Local or Local-Master Software
• 4.1 Local Software
• 4.2 Master Software
5. Installation of the Local or Local-Master Hardware
6. Managing Events
7. Service, Inspection, Disposal, and Liability
1
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Topology combined local-master hardware – the Master & Local Controller can be combined into one piece of hardware for
small scale systems up to 15 devices controlled via a single PLC.
Topology Local hardware & Master software - In larger systems, the Master and local can be separated to support system
expansion. This is required where the FRANK Access Control Systems is deployed to Fortress devices across multiple PLCs
or zones.
Local controller provides robustness and Master controller syncs with local controllers
line-side communication for central management
2
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Standard Functionality
The RFID reader is activated by presenting an RFID card to the front surface of the reader, to request access, authorisation
or register interaction. The user’s access permissions are checked against the database in the Local Access Controller.
If permission is granted, the device with the RFID reader will send the signal to the PLC. The PLC then instructions the
desired function. The RFID reader can be activated a second time by each operator who has gained access previously.
Once all operators have signalled they are out of the area, a ‘Cell Empty’ signal is sent to the PLC.
Features List
• Control access to Fortress enabled devices using unique RFID site cards
• Manage permissions of RFID cards to specific locations, functions, and actions
• View a live count of users who have presented their card to an RFID reader and received an access granted signal
• Link locations to allow users to perform actions from separate devices
• Collect date, time, user, and status on permission requests
• Collect date, time, and operation of non-safe inputs and outputs on the device
• Detect and record use of escape release and auxiliary/emergency override functions (N/A for devices without guard locking)
• Record a 32-bit numerical string of data to the event log assigned to a time and date
• Assign additional permissions to RFID cards to command external PLC instructions
Important:
All Fortress products and systems are designed for use according to the installation and operating instructions enclosed.
It must be installed by competent and qualified personnel who have read and understood the whole of the relevant
documentation prior to commencing installation. Please ensure that your current software is compatible with this version
of instruction. The Fortress Access Control System is an additional administrative layer providing access and authorization
control. It is not a safety solution. Fortress Interlocks Ltd accepts no liability whatsoever for any situation arising from misuse
or misapplication of this product.
IF YOU HAVE ANY QUESTIONS OR QUERIES OF ANY NATURE WHATSOEVER, PLEASE CONTACT THE SUPPLIER
WHO WILL BE PLEASED TO ADVISE AND ASSIST.
3
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Ethernet Port 1
Controls Network
Ethernet Port 2
Connection to Master
(Local hardware and Master software)
Connection to Local Network
(Combined Local-Master)
4
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
The FRANK system is implemented in multiple stages. A simplified process is detailed below. It is recommended that FRANK
systems are implemented by an approved installer.
Step 1 – Set Up of Devices – Fortress Networked (or proNet) devices must be installed, have assigned IP
addresses and established communication with the PLC
Please see the relevant ‘Fortress Ethernet IP - CIP Safety Configuration’ instructions or ‘PROFINET - PROFIsafe
Configuration’ instructions, available on the Fortress Website. For supply voltages and mounting guidelines see technical
detail.
The Fortress Access Control System is designed to be programmed as simple inputs to Fortress amGardpro proNet or
‘Networked’ devices. These additional inputs are shown below.
Bits
Description
0 1 2 3 4 5 6 7
Extended
Byte
I/O Data Reserved - - - - - - - -
1-4
1&2
*Additional permissions are set in the system software as a whole byte, giving 256 possible additional permissions. Alternatively, individual bits could be used.
5
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
6
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
2.3.2 Check IP (Fortress Device Communication) to controls network address. This is the port on the controller connected to
the controls network and affects how device discovery occurs.
This will use default IP address 50.47.43.250
2.3.4 If either of 2.3.3 or 2.3.4 appear incorrect, select the button at the bottom of the screen. Select the correct
address and click to save changes.
To establish a connection between installed devices and the FRANK software, each relevant Fortress PROFINET or EtherNet/
IP enabled device on the network must be discovered and configured through ‘Devices’.
2.4.3 The list of discovered devices will appear greyed out below the section ‘Non configured devices’. Ensure all installed
Fortress devices have been discovered.
2.4.4 Select on each device to be configured on the network. If more than one device is being configured, you can
click the tick-boxes alongside the devices or you can click ‘configure all’. The Image pictured below shows an example device
discovery.
2.4.5 When successful, a message will appear on screen stating ‘success’. Check all installed
Fortress devices have been discovered on the controller and configured. You will see configured
devices will appear as ‘Assigned: Not Assigned’ as a location will need to be selected for this device.
Note: If an error message appears, this could be because the device is not recognised by the PLC
(pictured, example error message). For support, contact your local Fortress representative.
Locations are set up to differentiate physical locations with installed devices. Recording of device interactions and data
collection is associated with a location.
7
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Select to stop the edit, and return the location to previous settings unsaved
Linked Locations (created from the Local Access Controller) provides a linkage between locations which provide access to the
same location. This function can be used to link operator counting in cases where operators enter through one interlock and
exit via another. Interlocks must be connected to the same Local Access Controller for linked locations.
2.7.3 Create a ‘Name’ for the Linked location under the field Name and select the doors to link at this location. Select Save to
create the linked location or cancel to remove unsaved changes.
8
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
2.7.4 A count is available for all ‘locations’ and ‘linked locations’ which allows systems to share the number of users who
have entered the linked location i.e. entering through either Door 1 or Door 2 of Zone 1, and the exact time of their entry.
2.7.5 To access the number of users in this location on the webpage, select ‘Count’. The count page can be shown even
when logged out of the system via a unique URL (this link can be bookmarked or set as the default webpage to display
automatically at power on). The number of users are listed under the ‘Count’ field, the users’ assigned name and Card Tag
listed underneath alongside the ‘Entry Time’ including both date and time fields. Select ‘Back’ to return to the Linked Locations
screen.
I/O monitoring schemes allow the operation or activation of safe and non-safe I/O to appear in the Events window as ‘True’
when a bit is set high, and ‘False’ a bit is set low following a high bit. I/O monitoring can also be used to share numeric data to
the FRANK system for data capture.
Navigate to ‘I/O Monitoring’ on the main menu. Select to create a new scheme and enter a name in to the ‘Name’ field
Byte Monitoring; utilizes a 32 bit communication from an external source via non-safe outputs Bytes 1-4 (EtherNet/IP) or
Extended I/O Bytes 1 & 2 (PROFINET)
Bit Monitoring; provides event window capture of safe and non-safe I/O activation.
9
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Bits
Description
0 1 2 3 4 5 6 7
Non-Safe Outputs (17 Bytes)
Extended
Byte Data Capture and
IO Data 1 - - - - - - - -
1-4 Byte Monitoring
&2
The 32 bit value encoded on the extended I/O is recorded in the event log as a decimal value.
2.9.2 Operator Controls Monitoring – Bit Monitoring – Non-safe Inputs
Note: A monitoring scheme is limited to monitoring a maximum of 32 bits. The I/O monitoring scheme will allow incoming data
to display use of different safe and non-safe I/O elements in the networked product. The following instructions for creating an
I/O monitoring scheme will use the pictured image for reference as an example.
Select ‘Input on the I/O Monitoring Scheme. Names are listed in reference to their position on the Fortress Memory Map
where the name is in the format Input X_Y where ‘X’ is the Byte, and ‘Y’ is the Bit.
Bits
Description
0 1 2 3 4 5 6 7
Non-Safe Inputs (17 Bytes)
Bit is set when the Blue Push
Byte 0 Byte 0 - - - - - - -
switch is pressed Button
Gate Bit is set when
Monitor Byte 5 the tongue is out Head Mon. - - - - - - -
Byte 0 of the head
Solenoid
Bit is set when the Sol.
Monitor Byte 6 - - - - - - -
gate is unlocked Mon.
Byte 0
10
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
When the Blue push button is pressed, Bit 2, Byte 0 will be set, creating an event on the Events dashboard. This appears as
(event 1) ‘Name : True’ when the button is pressed, followed by (event 2) ‘Name : False’ when the button is released.
Head and Solenoid Monitors for non-safe input of guard unlocking and guard opening are already pre-set.
When the guard is unlocked, Byte 5, Bit 0 is set (Input 5_0)
When the guard is opened, Byte 6, Bit 0 is set (Input 6_0)
The Green, Red, Blue and Yellow lamps can be named to the relevant Byte/Bit position selecting the ‘Monitor’ with a tick.
11
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
To set the Head/Sol CH1 and CH2, enter into Safety Input 0_1 and 0_2 respectively. For a emergency stop component on
your Fortress device, enter the details into the Safety Input 0_4 and Safety Input 0_5 respectively.
Input
Safety Inputs
When this is correctly applied, you will see a green message appear at the top of the screen as pictured below;
To assign the monitoring scheme to your location, select ‘Locations’ on the navigation menu at the top and edit on your
relevant location.
Set IP Address
See commissioning section page 6.
IMPORTANT Do not perform without Fortress guidance as you may permanently damage your system.
Shutdown system
This function is used to shutdown the system safely without any possibility of data loss and without removing the power
supply. To repower hardware, physical access is required.
12
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Access the Master Controller Software via an Ethernet Connection and remote desktop with the Fortress provided username
and password. Use default IP 172.16.8.10. Access to the Master Server should be protected as this platform is used to
manage permission assignment and system users.
3.1 The Master Server Menu
The Master Server Menu displays Users (operators assigned permissions on the FRANK system), Connections (Access
Control devices (or ‘Local Controllers’) connected to the network), Additional permissions (a feature to enable further logic
to be applied to particular system users), Interactions (recorded interactions with FRANK enabled devices via all established
local controllers), and Settings (General settings for further functionality).
3.1.1 Logging in and Registering an Account
Access the Master Controller using the default IP address or the address set during configuration. You may be asked to
register an account instead of ‘Login’. If you select this button you will be re-directed to set up a new username and password.
Once set up, select the button at the bottom of the screen.
3.2.1 To set up users, you must access via the master controller, located at the IP address [default IP Address].
Use your login and password to access the master server. Navigate to ‘Users’ on the top menu.
User ID : Enter a unique identifier for this individual. This field is non-editable once set.
Full Name : Enter a name reference for this individual. This is editable once set.
Card : Enter the unique RFID reference for this users’ ID card (this can be
found by either scanning a card to the FRANK enabled device to view in
the events field, or using an RFID scanning device). This field is editable if
a card requires replacing.
Enabled : to enable this user on the system, tick enabled.
13
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
14
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
To view the set time limits for a user, press ‘Edit’ on its row, and the currently set time limits will be displayed in the Valid From
and Valid Until fields.
15
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Within the Edit section, check the Timed Access checkbox, which will reveal the Valid From and Valid Until date pickers.
Select the desired dates and press Save.
16
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
To mass import users, create a CSV file with a list of values with a delimiter or as pictured below with (case sensitive) column
headers; UserId**, Full Name, Access Card, Permission* (optional). Microsoft Excel is recommended for this dataset.
*A ‘Y’ for Yes and ‘N’ for No can be applied to the permission column to assign access to all or no locations, respectively.
** UserId must be a single string of text no spaces
When complete the success message will appear and users can be edited.
3.3 Connections - Discovery of Local Access Server (when using FACS-M1 only)
Navigate to ‘Connections’ on the Master Server and select to locate all Local Access Servers on the
network.
All Local Server systems should be listed in green below displaying these are online. Ensure the status is
To change the name of a given Local Access Server, select . Select to save changes or to delete changes.
Access to a specific Local Server system is possible by selecting on the relevant listed ACS.
17
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Additional permissions are defined on the master server and provides an extra byte of information which can be attached
to a user per location. Navigate to Additional permission via the menu on the Master Server. Select ‘create new’ to build an
additional permission assigned to a whole byte.
18
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
19
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Select Frank Service (64bit) and click Uninstall and answer yes to all the prompts
20
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
The Master software is compatible with 64 bit versions of Windows Server 2012 R2 or later, and 64 bit versions of Windows 10
or later.
Ensure that the Dependencies folder is present in addition to the installer file.
You may be requested to reboot the system during the installation, the installer should automatically restart after the reboot. If
this does not happen, locate the installer and run it again.
When the installation completes you will have the option to show the Master web page, this will allow you to check that the
system is running correctly.
21
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
FACS-L1 / FACS-LM
Note: Mounting can be completed before or after configuring your FACS controller.
Note: Mounting instructions are available in the documentation shipped with the mounting device.
Align the fixing holes on the adapter plate (F51999553) with the two holes on the back of the FACS-LM or FACS-L1 controller.
Place the two M4x8mm screw fixings through the plate and secure the two components together.
Secure the DIN rail bracket (F72999357) to the adapter plate using two M4x6mm fixings and two M4 steel washers.
Place the FACS controller on the DIN-rail at an angle, and pull down to compress the springs in the top of the bracket. This will
secure the controller to the DIN-rail.
22
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Events are listed in both the local and master webpages. The local shows only 10 most recent events (intended for diagnostic
purposes). The Master displays the full list of events and contains additional fields for further analysis purposes.
Permission Events
Date Location User RFID Event Type Description
xx/xx/xx Zone 1 - Door 1 Akhila Hassan Reference Permission Request Access Granted (Enter)
xx/xx/xx Zone 1 - Door 1 Derek Parker Reference Permission Request Access Denied
xx/xx/xx Zone 1 - Door 1 Akhila Hassan Reference Permission Request Access Granted (Exit)
xx/xx/xx Zone 1 - Door 1 Akhila Hassan Reference Permission Request Cell Empty
Lock Status
Closed, Unlocked (device unlocked and closed)
Opened, Unlocked (device unlocked and opened)
Closed, Locked (device closed and locked)
Closed, Auxiliary Override (device unlocked with auxiliary means and closed)
Opened, Auxiliary Override (device unlocked with auxiliary means and opened)
Closed, Escape Release (device unlocked with escape release and closed)
Opened, Escape Release (device unlocked with escape release and opened)
Date Location User RFID Event Type Description
xx/xx/xx Zone 1 - Door 1 - - Lock Status Closed, Unlocked
xx/xx/xx Zone 1 - Door 1 - - Lock Status Opened, Unlocked
xx/xx/xx Zone 1 - Door 1 - - Lock Status Closed, Locked
xx/xx/xx Zone 1 - Door 1 - - Lock Status Closed, Auxiliary Override
23
Operating Instructions: FRANK - Industrial Access Control v1.5.1.0
Fortress Interlocks Ltd, 2 Inverclyde Drive, Wolverhampton, WV4 6FB, United Kingdom, Tel: +441902349000, Web: www.fortress-safety.com August 2023 - v1.8
24