CyberData | 011425 | Operations Guide | Cyberdata 011425 RFID Secure Access Control Endpoint Operations Guide

Cyberdata 011425 RFID Secure Access Control Endpoint Operations Guide
The IP Endpoint Company
SIP RFID Secure Access
Control Endpoint
Operations Guide

Part #011425
Document Part #931423B
for Firmware Version 1.0.0
CyberData Corporation
3 Justin Court
Monterey, CA 93940
(831) 373-2601
SIP RFID Secure Access Control Endpoint Operations Guide 931423B
Part # 011425
COPYRIGHT NOTICE:
© 2018, CyberData Corporation, ALL RIGHTS RESERVED.
This manual and related materials are the copyrighted property of CyberData Corporation. No part of
this manual or related materials may be reproduced or transmitted, in any form or by any means
(except for internal use by licensed customers), without prior express written permission of
CyberData Corporation. This manual, and the products, software, firmware, and/or hardware
described in this manual are the property of CyberData Corporation, provided under the terms of an
agreement between CyberData Corporation and recipient of this manual, and their use is subject to
that agreement and its terms.
DISCLAIMER: Except as expressly and specifically stated in a written agreement executed by
CyberData Corporation, CyberData Corporation makes no representation or warranty, express or
implied, including any warranty or merchantability or fitness for any purpose, with respect to this
manual or the products, software, firmware, and/or hardware described herein, and CyberData
Corporation assumes no liability for damages or claims resulting from any use of this manual or such
products, software, firmware, and/or hardware. CyberData Corporation reserves the right to make
changes, without notice, to this manual and to any such product, software, firmware, and/or
hardware.
OPEN SOURCE STATEMENT: Certain software components included in CyberData products are
subject to the GNU General Public License (GPL) and Lesser GNU General Public License (LGPL)
“open source” or “free software” licenses. Some of this Open Source Software may be owned by third
parties. Open Source Software is not subject to the terms and conditions of the CyberData
COPYRIGHT NOTICE or software licenses. Your right to copy, modify, and distribute any Open
Source Software is determined by the terms of the GPL, LGPL, or third party, according to who
licenses that software.
Software or firmware developed by CyberData that is unrelated to Open Source Software is
copyrighted by CyberData, subject to the terms of CyberData licenses, and may not be copied,
modified, reverse-engineered, or otherwise altered without explicit written permission from
CyberData Corporation.
TRADEMARK NOTICE: CyberData Corporation and the CyberData Corporation logos are
trademarks of CyberData Corporation. Other product names, trademarks, and service marks may be
the trademarks or registered trademarks of their respective owners.
Technical Support 

The IP Endpoint Company The fastest way to get technical support for your VoIP product is to
submit a VoIP Technical Support form at the following website:
http://support.cyberdata.net/

Phone: (831) 373-2601, Ext. 333
Email: support@cyberdata.net
Fax: (831) 373-4193
Company and product information is at www.cyberdata.net.
CyberData Corporation
931423B
Operations Guide
Revision Information
Revision 931423B, which corresponds to firmware version 1.0.0, was released on August 20, 2018,
and has the following changes:
•
Updates Section 1.3, "Features"
•
Updates Table 1-1, "Specifications"
Browsers Supported
The following browsers have been tested against firmware version 1.0.0:
Operations Guide
•
Internet Explorer (version: 10)
•
Firefox (also called Mozilla Firefox) (version: 33.0)
•
Chrome (version 48.0.2564.116)
•
Safari (version: 5.1.7)
931423B
CyberData Corporation
Pictorial Alert Icons
General Alert
This pictoral alert indicates a potentially hazardous situation. This alert will be
followed by a hazard level heading and more specific information about the hazard.
GENERAL ALERT
Ground
This pictoral alert indicates the Earth grounding connection point.
Hazard Levels
Danger: Indicates an imminently hazardous situation which, if not avoided, will result in death or
serious injury. This is limited to the most extreme situations.
Warning: Indicates a potentially hazardous situation which, if not avoided, could result in death or
serious injury.
Caution: Indicates a potentially hazardous situation which, if not avoided, could result in minor or
moderate injury. It may also alert users against unsafe practices.
Notice: Indicates a statement of company policy (that is, a safety policy or protection of property).
The safety guidelines for the equipment in this manual do not purport to address all the safety issues
of the equipment. It is the responsibility of the user to establish appropriate safety, ergonomic, and
health practices and determine the applicability of regulatory limitations prior to use. Potential safety
hazards are identified in this manual through the use of words Danger, Warning, and Caution, the
specific hazard type, and pictorial alert icons.
CyberData Corporation
931423B
Operations Guide
Important Safety Instructions
1. Read these instructions.
2. Keep these instructions.
3. Heed all warnings.
4. Follow all instructions.
5. Do not use this apparatus near water.
6. Clean only with dry cloth.
7. Do not block any ventilation openings. Install in accordance with the manufacturer’s instructions.
8. Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus
(including amplifiers) that produce heat.
9. Do not defeat the safety purpose of the polarized or grounding-type plug. A polarized plug has
two blades with one wider than the other. A grounding type plug has two blades and a third
grounding prong. The wide blade or the third prong are provided for your safety. If the provided
plug does not fit into your outlet, consult an electrician for replacement of the obsolete outlet.
10. Protect the power cord from being walked on or pinched particularly at plugs, convenience
receptacles, and the point where they exit from the apparatus.
11. Only use attachments/accessories specified by the manufacturer.
12. Refer all servicing to qualified service personnel. Servicing is required when the apparatus has
been damaged in any way, such as power-supply cord or plug is damaged, liquid has been
spilled or objects have fallen into the apparatus, the apparatus has been exposed to rain or
moisture, does not operate normally, or has been dropped.
13. Prior to installation, consult local building and electrical code requirements.
14. WARNING: The Intercom enclosure is not rated for any AC voltages!
Warning
Electrical Hazard: This product should be installed by a licensed electrician
according to all local electrical and building codes.
GENERAL ALERT
Warning
Electrical Hazard: To prevent injury, this apparatus must be securely attached to
the floor/wall in accordance with the installation instructions.
GENERAL ALERT
Warning
The PoE connector is intended for intra-building connections only and does not
route to the outside plant.
GENERAL ALERT
CyberData Corporation
931423B
Operations Guide
Contents
i
Chapter 1 Product Overview
1
1.1 How to Identify This Product .....................................................................................................1
1.2 Typical System Installation .......................................................................................................2
1.3 Features ...................................................................................................................................4
1.4 Supported Protocols .................................................................................................................5
1.5 Supported SIP Servers .............................................................................................................5
1.6 Specifications ...........................................................................................................................6
1.7 Compliance ..............................................................................................................................7
1.7.1 CE Testing ......................................................................................................................7
1.7.2 FCC Statement ..............................................................................................................7
Chapter 2 Installing the SIP RFID Secure Access Control Endpoint
8
2.1 Parts List ..................................................................................................................................8
2.2 SIP RFID Secure Access Control Endpoint Components ........................................................9
2.3 Optimal orientation of the RFID tags and location against the RFID unit ...............................10
2.4 Device Setup ..........................................................................................................................11
2.4.1 SIP RFID Secure Access Control Endpoint Connections ............................................11
2.4.2 Using the On-Board Relay ...........................................................................................12
2.4.3 Wiring the Circuit ..........................................................................................................13
2.4.4 SIP RFID Secure Access Control Endpoint Connectors ..............................................17
2.4.5 Activity and Link LEDs .................................................................................................21
2.4.6 Restoring the Factory Default Settings .........................................................................22
2.5 Configure the SIP RFID Secure Access Control Endpoint Parameters .................................23
2.5.1 Factory Default Settings ...............................................................................................23
2.5.2 SIP RFID Secure Access Control Endpoint Web Page Navigation ..............................24
2.5.3 Using the Toggle Help Button .......................................................................................25
2.5.4 Log in to the Configuration Home Page .......................................................................27
2.5.5 Configure the Device ....................................................................................................31
2.5.6 Configure the Network Parameters .............................................................................33
2.5.7 Configure the SIP (Session Initiation Protocol) Parameters .........................................35
2.5.8 Configure the RFID Configuration Parameters .............................................................40
2.5.9 Enrollment Procedure ..................................................................................................45
2.5.10 Configure the Sensor Configuration Parameters ........................................................61
2.5.11 Configure the Audio Configuration Parameters ..........................................................64
2.5.12 Configure the Events Parameters ..............................................................................68
2.5.13 Configure the Door Strike Relay .................................................................................74
2.5.14 Configure the Autoprovisioning Parameters ...............................................................76
2.6 Upgrade the Firmware ............................................................................................................88
2.7 Reboot the Device ..................................................................................................................91
2.8 Command Interface ................................................................................................................92
2.8.1 Command Interface Post Commands ..........................................................................92
Appendix A Mounting the SIP RFID Secure Access Control Endpoint 93
A.1 Mounting Components ...........................................................................................................93
A.2 Dimensions ............................................................................................................................94
A.3 Network Cable Entry Restrictions ..........................................................................................97
A.3.1 Conduit Mounting Restrictions (Side Entry) .................................................................97
A.4 Service Loop Cable Routing ..................................................................................................98
A.5 Securing the Intercom ..........................................................................................................100
A.6 Additional Mounting Options ................................................................................................101
A.6.1 Goose Neck Mounting Option (Not Provided) ............................................................101
Appendix B Setting up a TFTP Server
102
B.1 Set up a TFTP Server ..........................................................................................................102
B.1.1 In a LINUX Environment ............................................................................................102
B.1.2 In a Windows Environment .......................................................................................102
Appendix C Troubleshooting/Technical Support
Operations Guide
931423B
103
CyberData Corporation
ii
C.1 Frequently Asked Questions (FAQ) ......................................................................................103
C.2 Documentation .....................................................................................................................103
C.3 Contact Information ..............................................................................................................104
C.4 Warranty and RMA Information ............................................................................................104
Index
Operations Guide
105
931423B
CyberData Corporation
1
1 Product Overview
1.1 How to Identify This Product
To identify the SIP RFID Secure Access Control Endpoint, look for a model number label similar to
the one shown in 
Figure 1-1. Confirm the following:
•
The model number on the label should be 011425.
•
The serial number on the label should begin with 425.
Figure 1-1. Model Number Label
www.cyberdata.net
SIP RFID SECURE ACCESS CONTROL ENDPOINT
011425A / 021495E
425000001
CAN ICES-3 (A)/NMB-3(A)
V1.0.0
00:20:F7:03:83:CA
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this device must accept any interference received, 
including interference that may cause undesired operation.
Serial number begins with 425
Model number
Operations Guide
931423B
CyberData Corporation
Product Overview 2
Typical System Installation
1.2 Typical System Installation
The following figures illustrate how the SIP RFID Secure Access Control Endpoint can be installed
as part of a VoIP phone system.
Figure 1-2. Typical Installation
802.3af Compliant Ethernet Switch
RFID Endpoint
IP Phone
IP PBX Server
Figure 1-3. Installation with the Door Strike Relay Module
802.3af Compliant Ethernet Switch
Door Strike
011269 Door Strike Relay
Module (sold separately)*
RFID Endpoint
IP Phone
IP PBX Server
*See the Quick-Reference Placemat or Operations Guide
of the relevant door strike relay for connection specifics.
Operations Guide
931423B
CyberData Corporation
Product Overview 3
Typical System Installation
Figure 1-4. Installation with the Network Dual Door Strike Relay
802.3at Compliant Ethernet Switch
Door Strike
Door Strike
011375 Network Dual
Door Strike Relay 
(sold separately)*
RFID Endpoint
IP Phone
IP PBX Server
*See the Quick-Reference Placemat or Operations Guide
of the relevant door strike relay for connection specifics.
Operations Guide
931423B
CyberData Corporation
Product Overview 4
Features
1.3 Features
The SIP RFID Secure Access Control Endpoint has the following features:
Operations Guide
•
SIP compliant
•
PoE 802.3af enabled (Powered-over-Ethernet)
•
Mifare Plus X 2K/4K cards are supported for a high level of encryption
•
IP 65 outdoor-rated
•
Optional weather shroud for even greater weather protection
•
Alert buzzer
•
Red/Green lock status lights
•
Can operate in standalone mode. PBX not required. Future-proof and adaptable when
upgrading to new VoIP PBX
•
Built in time of access scheduler
•
Local and remote logging with time stamp
•
NTP time support
•
Network web management
•
Supports 500 Access Codes
•
Blacklisted code alert via dialout and multicast stored message
•
Network downloadable firmware
•
Dry contact relay to trigger door lock or unlock gates
•
Door closure and tamper alert signal
•
Support for CyberData's Networked Dual Door Strike Relay (Part number 011375) and
Intermediate Door Strike Relay (part number 011269)
•
Security Torx screws with driver kit included
•
Device ships with packet of 5 RFID cards. Additional packets of 10 cards per packet are sold
separately (part number 011422)
931423B
CyberData Corporation
Product Overview 5
Supported Protocols
1.4 Supported Protocols
The SIP RFID Secure Access Control Endpoint supports the following protocols:
•
SIP (session initiation protocol)
•
HTTP Web-based configuration
•
Provides an intuitive user interface for easy system configuration and verification of SIP RFID
Secure Access Control Endpoint operations.
•
DHCP Client
Dynamically assigns IP addresses in addition to the option to use static addressing.
•
TFTP Client
Facilitates hosting for the Autoprovisioning configuration file.
•
RTP
•
Facilitates autoprovisioning configuration values on boot
•
Audio Encodings
PCMU (G.711 mu-law)
PCMA (G.711 A-law)
1.5 Supported SIP Servers
The following link contains information on how to configure the device for the supported SIP servers:
https://www.cyberdata.net/pages/connecting-to-ip-pbx-servers
Operations Guide
931423B
CyberData Corporation
Product Overview 6
Specifications
1.6 Specifications
Table 1-1. Specifications
Specifications
Ethernet I/F
10/100 Mbps
Protocol
SIP RFC 3261 Compatible
RFID Card Protocol
ISO/IEC 14443 Type A - 13.56 MHz Standard
Power Input
PoE 802.3af compliant or +8 to +12VDC @ 1000mA Regulated Power Supplya
On-Board Relay
1A at 30 VDC
Supported RFID cards
Mifare Plus X 2k
Mifare Plus X 4k
Operating Range
Temperature: -40o C to 55o C (-40o F to 131o F)
Humidity: 5-95%, non-condensing
Storage Temperature
-40o C to 70o C (-40o F to 158o F)
Storage Altitude
Up to 15,000 ft. (4573 m)
Payload Types
G711, A-law and µ-law, G.722
Dimensionsb
5.118 inches [130 mm] Length
2.252 inches [57.21 mm] Width
5.118 inches [130 mm] Height
Weight
2.0 lbs. (0.90 kg)
Boxed Weight
3.0 lbs. (1.36 kg)
Compliance
CE; EMC Directive – Class A EN 55032 & EN 55024, LV Safety Directive – EN 60950-1, RoHS
Compliant, FCC; Part 15 Class A, Industry Canada; ICES-3 Class A, IEEE 802.3 Compliant
Part Number
011425
011188 Weather Shroud (sold separately)
a. Contacts 1 and 2 on the terminal block are only for powering the device from a non-PoE 12VDC power source as
an alternative to Network PoE power. Use of these contacts for any other purpose will damage the device and void the
product warranty.
b. Dimensions are measured from the perspective of the product being upright with the front of the product facing you.
Operations Guide
931423B
CyberData Corporation
Product Overview 7
Compliance
1.7 Compliance
1.7.1 CE Testing
CE testing has been performed according to EN ISO/IEC 17050 for Emissions, Immunity, and Safety.
The Declaration of Conformity can be supplied upon request.
1.7.2 FCC Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference in which case
the user will be required to correct the interference at his own expense.
Operations Guide
931423B
CyberData Corporation
8
2 Installing the SIP RFID Secure Access
Control Endpoint
2.1 Parts List
Table 2-1 illustrates the SIP RFID Secure Access Control Endpoint parts.
Note
See Appendix A, "Mounting the SIP RFID Secure Access Control Endpoint" for physical
mounting information.
Table 2-1. Parts List
Operations Guide
Quantity
Part Name
1
SIP RFID Secure Access Control
Endpoint Assembly
1
Installation Quick Reference Guide
1
SIP RFID Secure Access Control
Endpoint Mounting Accessory Kit
931423B
Illustration
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 9
SIP RFID Secure Access Control Endpoint Components
2.2 SIP RFID Secure Access Control Endpoint
Components
Figure 2-1 shows the components of the SIP RFID Secure Access Control Endpoint.
Figure 2-1. SIP RFID Secure Access Control Endpoint Components
Red LED
Buzzer
Green LED
RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 10
Optimal orientation of the RFID tags and location against the RFID unit
2.3 Optimal orientation of the RFID tags and location
against the RFID unit
For best results, the tag should be oriented and touched to the location shown in Figure 2-2 and held
for at least one second.
Figure 2-2. Optimal orientation of the RFID tags and location against the RFID unit
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 11
Device Setup
2.4 Device Setup
2.4.1 SIP RFID Secure Access Control Endpoint Connections
Figure 2-3 shows the pin connections on the terminal block. This terminal block can accept 
16 AWG gauge wire.
Note
As an alternative to using PoE power, you can supply +8 to +12VDC @ 1000mA Regulated
Power Supply into the terminal block.
Caution
GENERAL ALERT
Equipment Hazard: Contacts 1 and 2 on the terminal block are only for powering
the device from a non-PoE 12 VDC power source as an alternative to Network PoE
power. Use of these contacts for any other purpose will damage the device and void
the product warranty.
Figure 2-3. Intercom Connections
Alternate Power Input:
1 = +8 to +12VDC @ 1000mA Regulated Power Supply*
2 = Power Ground*
3
Terminal block can accept up to 16 AWG wire.
Tool required for terminal block screw:
Size #00 Phillip Drive Screwdriver
Wire(s) in
Tin Wire to 0.25 inch [6mm]
4
Relay Contact:
(1 A at 30 VDC for continuous loads)
3 = Relay Common
4 = Relay Normally Open Contact
5 = Sense Input
6 = Sense Ground
7 = Remote Switch "A"
8 = Remote Switch "B"
*Contacts 1 and 2 on the terminal block are only for 
powering the device from a non-PoE 12VDC power
source as an alternative to Network PoE power. Use of
these contacts for any other purpose will damage the
device and void the product warranty.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 12
Device Setup
2.4.2 Using the On-Board Relay
Warning
Electrical Hazard: This product should be installed by a licensed electrician
according to all local electrical and building codes.
GENERAL ALERT
Warning
Electrical Hazard: The relay contacts are dry and provided for a normally open
and momentarily closed configuration. Neither the alternate power input nor PoE
power can be used to drive a door strike.
GENERAL ALERT
Warning
Electrical Hazard: The relay does not support AC powered door strikes.
Any use of this relay beyond its normal operating range can cause damage to the
product and is not covered under our warranty policy.
GENERAL ALERT
The device has a built-in relay that can be activated by a web configurable DTMF string that can be
received from a VoIP phone supporting out of band (RFC2833) DTMF as well as a number of other
triggering events. See the Device Configuration Page on the web interface for relay settings.
This relay can be used to trigger low current devices like LED strobes and security camera input
signals as long as the load is not an inductive type and the relay is limited to a maximum of 
1 Amp @ 30 VDC. Inductive loads can cause excessive “hum” and can interfere with or damage the
unit’s electronics.
We highly recommend that inductive load and high current devices use our Networked Dual Door
Strike Relay (CD# 011375) (see Section 2.4.3.2, "Network Dual Door Strike Relay Wiring Diagram
with External Power Source").
This relay interface also has a general purpose input port that can be used to monitor an external
switch and generate an event.
For more information on the sensor options, see the Sensor Configuration Page on the web
interface.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 13
Device Setup
2.4.3 Wiring the Circuit
2.4.3.1 Devices Less than 1A at 30 VDC
If the power for the device is less than 1A at 30 VDC and is not an inductive load, then see
Figure 2-4 for the wiring diagram.
When configuring with an inductive load, please use an intermediary relay with a High PIV Ultrafast
Switching Diode. We recommend using the Network Dual Door Strike Relay (CD# 011375) (see
Section 2.4.3.2, "Network Dual Door Strike Relay Wiring Diagram with External Power Source").
Figure 2-4. Devices Less than 1A at 30 VDC
Pin 3 - Relay Common
Pin 4 - Relay Normally Open Contact
Pin 5 - Sense Input
Pin 6 - Sense Ground
The terminal block can accept 16 AWG stranded wire.
LED Strobe Light
1
8
+
DC Source
Sense Input
1 A @ 30 VDC
Terminal Block of the CyberData Device
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 14
Device Setup
2.4.3.2 Network Dual Door Strike Relay Wiring Diagram with External Power Source
For wiring an electronic door strike to work over a network, we recommend the use of our external
Network Dual Door Strike Relay (CD# 011375).
This product provides an easier method of connecting standard door strikes as well as AC and
higher voltage devices. See Figure 2-5 and Figure 2-6 for the wiring diagrams.
Warning
Electrical Hazard: Hazardous voltages may be present. No user serviceable
part inside. Refer to qualified service personnel for connecting or servicing.
GENERAL ALERT
Figure 2-5. Network Dual Door Strike Relay Wiring Diagram with External Power Source
CyberData
Device
+
The relay connection maximum wire
size is 12 gauge stranded wire.
+
AC Source 1
AC Source 2
DC Source 2 OR
Door Strike
DC Source 1 OR
Door Strike
802.3af Compliant Ethernet Switch
*
*
See the Network Dual Door Strike Relay
Operations Guide for connection specifics.
Sense Input 1
See Section 2.5.13, "Configure the Door Strike
Relay" for configuration options.
Aux Button1
Sense Input 2
Aux Button 2
*Caution
GENERAL ALERT
Note
Operations Guide
Equipment Hazard: The door strike must have an internal or external mov or
diode (for over voltage protection) when connecting directly to the module.
When Activate DSR on Valid RFID is enabled, a swipe of a valid RFID card will activate
Relay 2.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 15
Device Setup
2.4.3.3 Network Dual Door Strike Relay Wiring Diagram Using PoE+
Figure 2-6. Network Dual Door Strike Relay Wiring Diagram Using PoE+
802.3at Compliant Ethernet Switch
CyberData
Device
Door Strike
Internal 12VDC
source (500 mA
maximum)
Door Strike
The relay connection maximum wire
size is 12 gauge stranded wire.
*
*
See the Network Dual Door Strike Relay 
Operations Guide for connection specifics.
Sense Input 1
See Section 2.5.13, "Configure the Door Strike
Relay" for configuration options.
Aux Button1
Sense Input 2
Aux Button 2
*Caution
GENERAL ALERT
Note
Equipment Hazard: The door strike must have an internal or external mov or
diode (for over voltage protection) when connecting directly to the module.
When Activate DSR on Valid RFID is enabled, a swipe of a valid RFID card will activate
Relay 2.
If you have questions about connecting door strikes or setting up the web configurable options,
please contact our support department at the following website:
http://support.cyberdata.net/
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 16
Device Setup
2.4.3.4 Door Strike Relay Module Wiring Diagram from the Device
For wiring an electronic door strike, we recommend the use of our external Door Strike Relay Module
(CD# 011269).
This product provides an easier method of connecting standard door strikes as well as AC and
higher voltage devices. See Figure 2-7 for the wiring diagram.
Figure 2-7. Door Strike Relay Module Wiring Diagram from the Device
1
The terminal block can accept 16 AWG stranded wire.
8
Terminal Block
See the Door Strike Relay Module Operations
Guide for connection specifics.
See Section 2.5.13, "Configure the Door Strike
Relay" for configuration options.
+
DC Source
AC Source
OR
Door Lock
Note
Sense Input
When Activate DSR on Valid RFID is enabled, a swipe of a valid RFID card will activate
Relay 2.
If you have questions about connecting door strikes or setting up the web configurable options,
please contact our support department at the following website:
http://support.cyberdata.net/
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 17
Device Setup
2.4.4 SIP RFID Secure Access Control Endpoint Connectors
See the following figures and tables to identify the connectors and functions of the SIP RFID Secure
Access Control Endpoint.
Figure 2-8. Connector Locations
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 18
Device Setup
Table 2-2. Connector Functions
Operations Guide
Connector
Function
JCAM
Camera Interface
H_AEC
Echo Cancellation Interface
JBTN
Call Button LED Interface
JMIC
Microphone Interface
JMIC2
Second Microphone Interface — Not Used
JSPKR
Speaker Interface
JKPAD
Keypad Interface — Not Used
JY
Sensor Interface — Not Used
JP3
Audio Mute — Factory Use Only
JP4
Boot from mSD Card — Factory Use Only
JP7
EPROM Write Protect — Factory Use Only
JP10
Disables the intrusion sensor when installed.
J17
Sitara Card Interface — Factory Use Only
JBT1
Touch Button -1 Interface — Not Used
JBT2
Touch Button -2 Interface — Not Used
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 19
Device Setup
Figure 2-9. Connector Locations
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 20
Device Setup
Table 2-3. Connector Functions
Connector
Function
J1
PoE Network Connection (RJ-45 ethernet)
JP5
Reset jumpera
JX
Auxiliary Strobe Interface
Q8
Intrusion Detector
JAEC
AEC Configuration Interface — Factory Use Only
JIO
Terminal Block (see Figure 2-3)
JCON
Console Port — Factory Use Only
JSPI
Reserved — Factory Use Only
SW1
See Section 2.4.6, "Restoring the Factory Default Settings"
a.Do not install a jumper. Momentary short to reset. Permanent installation of a jumper would
prevent the board from running all together.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 21
Device Setup
2.4.5 Activity and Link LEDs
2.4.5.1 Verifying the Network Connectivity and Data Rate
When you plug in the Ethernet cable or power supply to the Intercom, the following occurs:
•
The square, GREEN Link/Activity LED blinks when there is network activity (see Figure 2-10).
•
The square, AMBER 100Mb Link LED above the Ethernet port indicates that a 100Mb network
connection has been established (see Figure 2-10).
Figure 2-10. Activity and Link LED
Link/Activity
LED (GREEN)
100Mb Link
LED (AMBER)
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 22
Device Setup
2.4.6 Restoring the Factory Default Settings
When troubleshooting configuration problems, it is sometimes convenient to restore the device to a
known state.
Note
Each SIP RFID Secure Access Control Endpoint is delivered with factory set default values.
To restore the factory default settings:
1. Press and hold the RTFM button (see SW1 in Figure 2-11) for more than five seconds.
Note
The device will use DHCP to obtain the new IP address (DHCP-assigned address or default
to 10.10.10.10 if a DHCP server is not present).
Figure 2-11. RTFM Button
RTFM Button (SW1)
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 23
Device Setup
2.5 Configure the SIP RFID Secure Access Control
Endpoint Parameters
To configure the SIP RFID Secure Access Control Endpoint online, use a standard web browser.
Configure each SIP RFID Secure Access Control Endpoint and verify its operation before you mount
it. When you are ready to mount an SIP RFID Secure Access Control Endpoint, refer to Appendix A,
"Mounting the SIP RFID Secure Access Control Endpoint" for instructions.
2.5.1 Factory Default Settings
All SIP RFID Secure Access Control Endpoints are initially configured with the following default IP
settings:
When configuring more than one SIP RFID Secure Access Control Endpoint, attach the SIP RFID
Secure Access Control Endpoints to the network and configure one at a time to avoid IP address
conflicts.
Table 2-4. Factory Default Settings
Parameter
Factory Default Setting
IP Addressing
DHCP
IP Addressa
10.10.10.10
Web Access Username
admin
Web Access Password
admin
Subnet Mask
a
Default Gatewaya
255.0.0.0
10.0.0.1
a. Default if there is not a DHCP server present.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 24
Device Setup
2.5.2 SIP RFID Secure Access Control Endpoint Web Page Navigation
Table 2-5 shows the navigation buttons that you will see on every SIP RFID Secure Access Control
Endpoint web page.
Table 2-5. Web Page Navigation
Web Page Item
Description
Link to the Home page.
Link to the Device page.
Link to the Network page.
Link to go to the SIP page.
Link to the RFID page.
Link to the Sensor page.
Link to the Audiofiles page.
Link to the Events page.
Link to the Door Strike Relay page.
Link to the Autoprovisioning page.
Link to the Firmware page.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 25
Device Setup
2.5.3 Using the Toggle Help Button
The Toggle Help button allows you to see a short description of some of the settings on the
webpage. To use the Toggle Help button, do the following:
1. Click on the Toggle Help button that is on the UI webpage. See Figure 2-12 and Figure 2-13.
Figure 2-12. Toggle/Help Button
2. You will see a question mark ( ) appear next to each web page item that has been provided
with a short description by the Help feature. See Figure 2-13.
Figure 2-13. Toggle Help Button and Question Marks
Question mark 
appears next to the
web page items
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 26
Device Setup
3. Move the mouse pointer to hover over the question mark (
page item will appear. See Figure 2-14.
), and a short description of the web
Figure 2-14. Short Description Provided by the Help Feature
Question mark
Operations Guide
931423B
A short description of the 
web page item will appear
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 27
Device Setup
2.5.4 Log in to the Configuration Home Page
1. Open your browser to the SIP RFID Secure Access Control Endpoint IP address.
Note
If the network does not have access to a DHCP server, the device will default to an IP
address of 10.10.10.10.
Note
Make sure that the PC is on the same IP network as the SIP RFID Secure Access Control
Endpoint.
Note
You may also download CyberData’s VoIP Discovery Utility program which allows you to
easily find and configure the default web address of the CyberData VoIP products. 

CyberData’s VoIP Discovery Utility program is available at the following website address:
https://www.cyberdata.net/pages/discovery
Note
Operations Guide
The device ships in DHCP mode. To get to the Home page, use the discovery utility to scan
for the device on the network and open your browser from there.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 28
Device Setup
2. When prompted, use the following default Web Access Username and Web Access
Password to access the Home Page (Figure 2-15):
Web Access Username: admin
Web Access Password: admin
Figure 2-15. Home Page
CyberData RFID
425000001
v1.0.0
v1.0.0
v1.0.0
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 29
Device Setup
3. On the Home page, review the setup details and navigation buttons described in Table 2-6.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-6. Home Page Overview
Web Page Item
Description
Admin Settings
Username
The username to access the web interface. Enter up to 25 characters.
Password
The password to access the web interface. Enter up to 25 characters.
Confirm Password
Confirm the web interface password.
Current Status
Serial Number
Shows the device serial number.
Mac Address
Shows the device Mac address.
Firmware Version
Shows the current firmware version.
IP Addressing
Shows the current IP addressing setting (DHCP or static).
IP Address
Shows the current IP address.
Subnet Mask
Shows the current subnet mask address.
Default Gateway
Shows the current default gateway address.
DNS Server 1
Shows the current DNS Server 1 address.
DNS Server 2
Shows the current DNS Server 2 address.
SIP Mode
Shows the current status of the SIP mode.
Event Reporting
Shows the current status of the Event Reporting mode.
Primary SIP Server
Shows the current status of the Primary SIP Server.
Backup Server 1
Shows the current status of Backup Server 1.
Backup Server 2
Shows the current status of Backup Server 2.
Import Settings
Use this button to select a configuration file to import.
After selecting a configuration file, click Import to import the
configuration from the selected file.
Export Settings
Click Export to export the current configuration to a file.
Click the Save button to save your configuration settings.
Click on the Reboot button to reboot the system.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 30
Device Setup
Table 2-6. Home Page Overview (continued)
Web Page Item
Description
Click on the Toggle Help button to see a short description of some of
the web page items. First click on the Toggle Help button, and you will
see a question mark ( ) appear next to some of the web page items.
Move the mouse pointer to hover over a question mark to see a short
description of a specific web page item.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 31
Device Setup
2.5.5 Configure the Device
1. Click the Device menu button to open the Device page. See Figure 2-16.
Figure 2-16. Device Configuration Page
CyberData RFID
2. On the Device page, you may enter values for the parameters indicated in Table 2-7.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-7. Device Page Parameters
Web Page Item
Description
Relay Settings
Activate Relay with DTMF Code
Activates the relay when the DTMF Activation Code is entered on the
phone during a SIP call with the device. RFC2833 DTMF payload types
are supported.
Relay Pulse Code
DTMF code used to pulse the relay when entered on a phone during a SIP
call with the device. Relay will activate for Relay Pulse Duration seconds
then deactivate. Activate Relay with DTMF Code must be enabled. Enter
up to 25 digits (* and # are supported).
Relay Pulse Duration (in seconds)
The length of time (in seconds) during which the relay will be activated
when the DTMF Relay Activation Code is detected. Enter up to 5 digits.
Relay Activation Code
Activation code used to activate the relay when entered on a phone during
a SIP call with the device. Relay will be active indefinitely, or until the
DTMF Relay Deactivation code is entered. Activate Relay with DTMF
Code must be enabled. Enter up to 25 digits (* and # are supported).
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 32
Device Setup
Table 2-7. Device Page Parameters (continued)
Web Page Item
Description
Relay Deactivation Code
Code used to deactivate the relay when entered on a phone during a SIP
call with the device. Activate Relay with DTMF Code must be enabled.
Enter up to 25 digits (* and # are supported).
Activate Relay During Ring
When selected, the relay will be activated when the device is contacted
and auto answer is disabled. When Auto-Answer Incoming Calls is
enabled, this option does nothing.
Activate Relay While Call Active
When selected, the relay will be activated as long as the SIP call is active.
Misc Settings
Device Name
Type the device name. Enter up to 25 characters.
RFID LED Brightness (0-255)
The desired brightness of the leds on the rfid reader. Acceptable values
are 0-255, where 0 is off and 255 is max brightness. Enter up to 3 digits.
Auto-Answer Incoming Calls
When selected, the device will automatically answer incoming calls. When
Auto-Answer Incoming Calls is disabled, the device will enter a ringing
state until the caller disconnects.
Disable HTTPS (NOT recommended)
Disables the encrypted connection to the webpage. We do not
recommend disabling HTTPS for security reasons.
Clock Settings
Enable NTP
When selected, the time will be set with an external ntp server. Note: This
function must be selected to limit the times valid for the RFID tags.
NTP Server
Use this field to set the address (in IPv4 dotted decimal notation or as a
canonical name) for the NTP Server. This field can accept canonical
names of up to 64 characters in length.
Timezone
Enter the tz database string of your timezone.
Examples:
America/Los_Angeles
America/New_York
Europe/London
America/Toronto
See https://en.wikipedia.org/wiki/List_of_tz_database_time_zones for
a full list of valid strings.
Current Time
Displays the current time.
Click the Save button to save your configuration settings.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some of the
web page items. First click on the Toggle Help button, and you will see a
question mark ( ) appear next to some of the web page items. Move the
mouse pointer to hover over a question mark to see a short description of
a specific web page item.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 33
Device Setup
2.5.6 Configure the Network Parameters
1. Click the Network menu button to open the Network page (Figure 2-17).
Figure 2-17. Network Configuration Page
CyberData RFID
2. On the Network page, enter values for the parameters indicated in Table 2-8.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-8. Network Configuration Parameters
Web Page Item
Description
Stored Network Settings
Addressing Mode
Select either DHCP IP Addressing or Static Addressing by marking the appropriate radio
button. DHCP Addressing mode is enabled on default and the device will attempt to resolve
network addressing with the local DHCP server upon boot. If DHCP Addressing fails, the
device will revert to the last known IP address or the factory default address if no prior DHCP
lease was established. See Section 2.5.1, "Factory Default Settings" for factory default
settings. Be sure to click Save and Reboot to store changes when configuring a Static
address.
Hostname
This is the hostname provided by the DHCP server. See the DHCP/DNS server
documentation for more information. Enter up to 64 characters.
IP Address
Enter the Static IPv4 network address in dotted decimal notation.
Subnet Mask
Enter the Subnet Mask in dotted decimal notation.
Default Gateway
Enter the Default Gateway IPv4 address in dotted decimal notation.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 34
Device Setup
Table 2-8. Network Configuration Parameters (continued)
Web Page Item
Description
DNS Server 1
Enter the primary DNS Server IPv4 address in dotted decimal notation.
DNS Server 2
Enter the secondary DNS Server IPv4 address in dotted decimal notation.
VLAN Settings
VLAN ID (0-4095)
Specify the IEEE 802.1Q VLAN ID number. Enter up to 4 digits.
Note: The device supports 802.1Q VLAN tagging support. The switch port connected to the
device will need to be in “trunking mode” for the VLAN tags to propagate.
VLAN Priority (0-7)
Specify the IEEE 802.1p VLAN priority level. Enter 1 digit. A value of 0 may cause the VLAN
ID tag to be ignored.
Current Network Settings
Shows the current network settings.
IP Address
Shows the current Static IP address.
Subnet Mask
Shows the current Subnet Mask address.
Default Gateway
Shows the current Default Gateway address.
DNS Server 1
Shows the current DNS Server 1 address.
DNS Server 2
Shows the current DNS Server 2 address.
Click the Save button to save your configuration settings.
Note: You need to reboot for changes to take effect.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some of the web page items.
First click on the Toggle Help button, and you will see a question mark ( ) appear next to
some of the web page items. Move the mouse pointer to hover over a question mark to see a
short description of a specific web page item.
Note
Operations Guide
You must click on the Save button and then the Reboot button for the changes to take
effect.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 35
Device Setup
2.5.7 Configure the SIP (Session Initiation Protocol) Parameters
1. Click on the SIP menu button to open the SIP page (Figure 2-18).
Figure 2-18. SIP Configuration Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 36
Device Setup
2. On the SIP page, enter values for the parameters indicated in Table 2-9.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-9. SIP Page Parameters
Web Page Item
Description
SIP Settings
Enable SIP Operation
When enabled, the device will transmit, receive, and process SIP messages
according to the configured SIP settings below.
Primary SIP Server
Enter the SIP server address as an IPv4 address in dotted decimal notation or a
fully qualified domain name. This parameter also becomes the host portion of the
SIP-URI for the device's extension on the primary SIP server. This field can accept
entries of up to 255 characters in length.
Primary SIP User ID
Specify the SIP User ID for the Primary SIP Server. This parameter becomes the
user portion of the SIP-URI for the device's extension on the primary SIP server.
Enter up to 64 alphanumeric characters.
Primary SIP Auth ID
Specify the Authenticate ID for the Primary SIP Server. This parameter is required
for SIP registration authentication. Enter up to 64 alphanumeric characters.
Primary SIP Auth Password
Specify the Authenticate Password for the Primary SIP Server. This parameter is
required for SIP registration authentication. Enter up to 64 alphanumeric characters.
Re-registration Interval (in seconds)
The SIP Re-registration interval (in seconds) is the SIP Registration lease time, also
known as the expiry. The supported range is 30-3600 seconds. Enter up to 4 digits.
Backup SIP Server 1
Enter the backup SIP server address as an IPv4 address in dotted decimal notation
or a fully qualified domain name. This parameter also becomes the host portion of
the SIP-URI for the device's extension on the backup SIP server. This field can
accept entries of up to 255 characters in length.
Backup SIP User ID 1
Specify the SIP User ID for the first backup SIP Server. This parameter becomes
the user portion of the SIP-URI for the device's extension on the first backup SIP
server. Enter up to 64 alphanumeric characters.
Backup SIP Auth ID 1
Specify the Authenticate ID for the first backup SIP server. This parameter is
required for SIP registration authentication. Enter up to 64 alphanumeric characters.
Backup SIP Auth Password 1
Specify the Authenticate Password for the first backup SIP server. This parameter is
required for SIP registration authentication. Enter up to 64 alphanumeric characters.
Re-registration Interval (in seconds)
The SIP Re-registration interval (in seconds) is the SIP Registration lease time, also
known as the expiry. The supported range is 30-3600 seconds. Enter up to 4 digits.
Backup SIP Server 2
Enter a second backup SIP server address as an IPv4 address in dotted decimal
notation or a fully qualified domain name. This parameter also becomes the host
portion of the SIP-URI for the device's extension on the second backup SIP server.
This field can accept entries of up to 255 characters in length.
Backup SIP User ID 2
Specify the SIP User ID for the second backup SIP Server. This parameter
becomes the user portion of the SIP-URI for the device's extension on the second
backup SIP server. Enter up to 64 alphanumeric characters.
Backup SIP Auth ID 2
Specify the Authenticate ID for the second backup SIP server. This parameter is
required for SIP registration authentication. Enter up to 64 alphanumeric characters.
Backup SIP Auth Password 2
Specify the Authenticate Password for the second backup SIP server. This
parameter is required for SIP registration authentication. Enter up to 64
alphanumeric characters.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 37
Device Setup
Table 2-9. SIP Page Parameters (continued)
Web Page Item
Description
Re-registration Interval (in seconds)
The SIP Re-registration interval (in seconds) is the SIP Registration lease time, also
known as the expiry. The supported range is 30-3600 seconds. Enter up to 4 digits.
Remote SIP Port
The Remote SIP Port is the port number the device will use as the destination port
when sending SIP messages. The default Remote SIP Port is 5060. The supported
range is 0-65536. Enter up to 5 digits.
Local SIP Port
The Local SIP Port is the port number the device will use to receive SIP messages.
The default Local SIP Port is 5060. The supported range is 0-65536. Enter up to 5
digits.
Outbound Proxy
Enter the Outbound Proxy address as an IPv4 address in dotted decimal notation or
a fully qualified domain name (FQDN). When an IP address is configured, the
device will send all SIP messages to this IP address. When an FQDN is configured,
the device will run DNS NAPTR, SRV, and A queries on the FQDN to resolve an IP
address to which it will send all SIP messages. This field can accept entries of up to
255 characters in length.
Outbound Proxy Port
The Outbound Proxy Port is port number used as the destination port when sending
SIP messages to the outbound proxy. A value of 0 will default to 5060. The
supported range is 0-65536. Enter up to 5 digits.
Use Cisco SRST
When enabled, the backup servers are handled according to Cisco SRST
(Survivable Remote Site Telephony). It is required for use in clustered Cisco Unified
Communications Manager topologies.
Register with a SIP Server
When enabled, the device will attempt to register to the configured SIP Server(s) on
this page. To configure the device to send and receive point-to-point SIP calls,
enable SIP Operation and disable Register with a SIP Server (see Section
2.5.7.1, "Point-to-Point Configuration").
Disable rport Discovery
Disabling rport Discovery will prevent the device from including the public WAN IP
address and port number in the contact information that is sent to the remote SIP
servers. This will generally only need to be enabled when using an SBC or SIP ALG
in conjunction with a remote SIP server.
Unregister on Boot
When enabled, the device will send one registration with an expiry of 0 on boot.
Keep Alive Period
The minimum time in milliseconds between keep-alive packets sent for nat traversal.
A value of 0 will disable keep alive packets.
Call Disconnection
Terminate Call After Delay
Automatically terminate an active call after a given delay in seconds. A value of 0
will disable this function. Enter up to 8 digits.
Note: This setting does not require a reboot for the changes to take effect.
RTP Settings
RTP Port (even)
Specify the port number used for the RTP stream after establishing a SIP call. This
port number must be an even number and defaults to 10500. The supported range
is 0-65536. Enter up to 5 digits.
Jitter Buffer
Specify the size of the jitter buffer (in milliseconds) used for SIP calls. Valid values
are 50-1000.
Click the Save button to save your configuration settings.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 38
Device Setup
Table 2-9. SIP Page Parameters (continued)
Web Page Item
Description
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some of the web page
items. First click on the Toggle Help button, and you will see a question mark ( )
appear next to some of the web page items. Move the mouse pointer to hover over a
question mark to see a short description of a specific web page item.
Note
You must click on the Save button for the changes to take effect.
Note
For specific server configurations, go to the following website address:
https://www.cyberdata.net/pages/connecting-to-ip-pbx-servers
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 39
Device Setup
2.5.7.1 Point-to-Point Configuration
When the device is set to not register with a SIP server (see Figure 2-19), it is possible to set the
device to dial out to a specified endpoint.
To make a point to point call, enter the IP address of the remote device in the Dialout SIP Extension
setting on the RFID page, or the Dialout Extension setting of the Sensor or DSR page. Each of
these fields may have the same dialout endpoint, or different ones.
Note
Receiving point-to-point SiP calls may not work with all phones.
Figure 2-19. SIP Page Set to Point-to-Point Mode
CyberData RFID
Device is set to NOT register with a SiP server
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 40
Device Setup
2.5.8 Configure the RFID Configuration Parameters
1. Click the RFID menu button to open the RFID page (Figure 2-46).
Figure 2-20. RFID Configuration Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 41
Device Setup
Figure 2-21. RFID Configuration Page
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 42
Device Setup
2. On the Sensor page, enter values for the parameters indicated in Table 2-11.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-10. Sensor Page Parameters
Web Page Item
Description
Current Status
Display the current status of the RFID reader."
RFID Passphrase
Passphrase
The master password or phrase used to setup the authentication tokens
for your RFID tags. Make sure to write this down!
Shows the Master Key.
Launches the Set Master Key dialog box, allowing the user to set the
master key. Please note that when a master key is set, all cards
programmed with the old key will be invalidated.
Relay Settings
Activate Relay on Valid RFID
Activates the relay when a valid code is entered. This would likely be
used to open a door.
Activate DSR on Valid RFID
Activates the remote relay when a valid code is entered. This would likely
be used to open a door.
Relay Timeout (seconds)
Specifies how many seconds the relay will be activated after a valid code
entry. In a typical use case, this would specify how long the door is
unlocked.
Buzzer Settings
Buzz while Relay Active
When selected, an audible buzz will indicate the relay is active.
Buzz on Rejected RFID Card
When selected, a pattern will play on the buzzer to indicate an invalid
code was entered.
Sensor Settings
Buzz on Door Open Timeout
When selected, the buzzer will beep until the on-board door sensor is
deactivated.
Door Sensor Normally Closed
Select the inactive state of the door sensor. The door sensor is also
known as the Sense Input on the device's terminal block. See the
Operations Guide for more information.
Sensor Open Timeout (in seconds)
The time (in seconds) the device will wait before it performs an action
when the on-board door sensor is activated. The action(s) performed are
based on the configured Door Sensor Settings below. Enter up to 5
digits.
DSR Open Timeout (in seconds)
The time (in seconds) the device will wait before it performs an action
when the remote (DSR) door sensor is activated. The action(s)
performed are based on the configured Remote Door Sensor Settings
below.
Blacklist Settings
Play Message to SIP Extension
Operations Guide
When selected, the device will make a SIP call and play the "blacklist"
audio file when a blacklisted code is entered.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 43
Device Setup
Table 2-10. Sensor Page Parameters (continued)
Web Page Item
Description
Dial Out SIP Extension
The extension that will be dialed if "Play Mesage to SIP Extension" is
selected above. Enter up to 64 alphanumeric characters.
Dial Out SIP ID
Additional caller identification string added to outbound calls. Enter up to
64 alphanumeric characters.
Multicast Audio Message
When selected, the device will multicast the "blacklist" audio file to the
specified address and port.
Multicast Address
The multicast address that the "blacklist" audio file will be played to.
Multicast Port
The multicast port that the "blacklist" audio file will be played to.
Times to Play Multicast Message
The number of times the "blacklist" audio file will be played via multicast.
Enter a value between 1 and 65535.
Import Access List
After selecting an access list file, click on the Import Access List button
to import the access list from the selected file.
Use this button to select a file to import.
This button imports an access list that it is in .xml format.
Export Access List
Click on the Export Access List button to export the current access list
to a file.
Use this button to select a file to export.
This button exports the list of access records in xml format.
Access List
List of Access records.
Name
Tag user's name.
Valid From
Date and time in the form "DOWHH:MM". The field must contain a threeletter string indicating the day of week, Weekday (Wdy), Weekend (Wnd),
or "All". The optional time is in 24 hour format and the range is inclusive.
Valid To
Date and time in the form "DOWHH:MM". The field must contain a threeletter string indicating the day of week, Weekday (Wdy), Weekend (Wnd),
or "All". The optional time is in 24 hour format and the range is inclusive.
Blacklist
Mark this tag for immediate rejection and optional blacklist alerts.
Launches the Configure Access Record edit box, allowing the user to
add a new record.
Launches the Configure Access Record edit box, allowing the user to
make changes to an existing record.
Deletes a record.
Security Log
Operations Guide
A file with a maximum of three log files, each 1 M, that records security
actions.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 44
Device Setup
Table 2-10. Sensor Page Parameters (continued)
Web Page Item
Description
Downloads a file with a maximum of 3 log files, each 1 M.
Clears the on screen display of the log.
Refreshes the on screen display of the log to show the most recent
activity.
Click the Save button to save your configuration settings.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some of the
web page items. First click on the Toggle Help button, and you will see a
question mark ( ) appear next to some of the web page items. Move the
mouse pointer to hover over a question mark to see a short description of
a specific web page item.
Note
Operations Guide
You must click on the Save button for the changes to take effect.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 45
Device Setup
2.5.9 Enrollment Procedure
Welcome to the CyberData Keypad RFID, featuring two-factor authentication. This document
illustrates the user friendly, intuitive process you will use to enroll your RFID cards and set keypad
codes to enhance your security.
1. From the Home Page (Figure 2-22), click on the RFID menu button (Figure 2-22) to navigate to
the RFID page (Figure 2-23).
Figure 2-22. From the Home Page, navigate to the RFID page
Click on the RFID menu button to navigate to the RFID page
CyberData RFID
425000001
v1.0.0
v1.0.0
v1.0.0
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 46
Device Setup
Figure 2-23. RFID Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 47
Device Setup
2. From the RFID page (Figure 2-23), the user will be prompted for a Passphrase that will serve as
the Master Key. Enter a passphrase (Figure 2-24), and copy it to a secure location.
Figure 2-24. Enter a passphrase
Click on the Set Master Key button
3. When the user clicks on the Set Master Key button (Figure 2-24), a Set Master Key dialog box
will appear. See Figure 2-25.
4. In the dialog box, click on the Set Master Key button. See Figure 2-25.
Figure 2-25. Set Master Key dialog box will appear
Click on the Set Master Key button
5. The Master Key will be set. See Figure 2-26.
Figure 2-26. The Master Key will be set
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 48
Device Setup
6. To enroll a user, select an empty record and click on the Add button. See Figure 2-27.
Figure 2-27. Select an empty record and click on the Add button
Select an empty record and click on Add button
7. This is action will launch an edit box named Configure Access Record #2. See Figure 2-28.
Figure 2-28. An edit box named Configure Access Record #2
Configure Access Record #2
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 49
Device Setup
8. Click on the Enroll Tag button, and place the card flat against the RFID reader. See Figure 2-29.
Figure 2-29. Click on the Enroll Tag button
Configure Access Record #2
Click on the Enroll Tag button, and place the card flat against the RFID reader.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 50
Device Setup
9. The Tag UID field will be populated. See Figure 2-30 and Figure 2-31.
Figure 2-30. The Tag UID field will be populated
Configure Access Record #2
The Tag UID field will be populated
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 51
Device Setup
Figure 2-31. The Tag UID field will be populated
Configure Access Record #2
The Tag UID field will be populated
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 52
Device Setup
10. Click on the Toggle Help button for assistance in populating the other fields. See Figure 2-32.
11. Move the mouse pointer to hover over the question mark, and a short description of the web
page item will appear.
Figure 2-32. Use the Toggle Help button for assistance in populating the other fields
Configure Access Record #2
Move the mouse pointer to hover over the question mark, 
and a short description of the web page item will appear.
Operations Guide
931423B
Use the Toggle Help button for 
assistance in populating the other fields.
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 53
Device Setup
12. Click on the Toggle Help button for assistance in populating the Name field. See Figure 2-33.
Figure 2-33. Click on the Toggle Help button for assistance in populating the Name fields
Configure Access Record #2
For assistance in populating the Name field, click on the Toggle Help button.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 54
Device Setup
13. Use the Toggle Help button for assistance in populating the Valid From field. See Figure 2-34.
Figure 2-34. Use the Toggle Help button for assistance in populating the Valid From field
Configure Access Record #2
For assistance in populating the Valid From field, click on the Toggle Help button
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 55
Device Setup
14. Use the Toggle Help button for assistance in populating the Valid To field. See Figure 2-35.
Note
The Enable NTP setting on the Device page must be selected to limit the times valid for the
RFID tags.
Figure 2-35. Use the Toggle Help button for assistance in populating the Valid To field
Configure Access Record #2
For assistance in populating the Valid To field click on the Toggle Help button
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 56
Device Setup
15. Click on the Toggle Help button for assistance in populating the Blacklist check box. See
Figure 2-36.
Figure 2-36. Click on the Toggle Help button for assistance in populating the Blacklist check box
Configure Access Record #2
For assistance in populating the Blacklist check box, click on the Toggle Help button
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 57
Device Setup
16. Click on the Save Changes button (Figure 2-37), and your record will appear in the web page
list. See Figure 2-38.
Figure 2-37. Click on the Save Changes button
Click on the Save Changes button
Figure 2-38. Your record will appear in the web page list
Your record will appear in the web page list
Note
The CyberData RFID Keypad will accept either an RFID card or a key code. If Two Factor
Authorization is enabled, the RFID Keypad will require you to use an RFID card and to also
enter a key code into the keypad to gain entry.
17. To delete a record, click on the Delete button. See Figure 2-39.
Figure 2-39. To delete a record, select the Delete button
To delete a record, click on the Delete button.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 58
Device Setup
18. You will be prompted to delete the record. See Figure 2-40.
19. Click on the Delete button to confirm the deletion. See Figure 2-40.
Figure 2-40. You will be prompted to delete the record
You will be prompted to delete the record.
Click on the Delete button to confirm the deletion
20. The record will no longer appear in your settings. See Figure 2-41.
Figure 2-41. The record will no longer appear in your settings
21. To export the RFID records, to provide a backup copy, or to share the enrolled tags with another
device, click on the Export RFID Settings button. See Figure 2-42.
Figure 2-42. Click on the Export RFID Settings button
Click on the Export RFID Settings button
Exporting RFID will create an xml file in the directory specified in your browser’s Downloads
location. Devices that require this file may use Import Config setting on the Home Page, or use
Autoprovisioning (see the Operations Guide.)
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 59
Device Setup
22. To share the configuration via Import Config, navigate to the RFID page of the second device,
and click on the Browse (or Choose File) button to choose the Access List file. See Figure 243.
Figure 2-43. Click on the Browse button to choose the Access List file
Click on the Browse button to choose the Access list file
Click on the Import Access List
button to import the records
23. Click on the Import Config button (Figure 2-43) to import the records, and they will be added to
the RFID page. See Figure 2-44.
Figure 2-44. The imported records will be added to the RFID page
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 60
Device Setup
2.5.9.1 Optional RFID Reader Stand—used on the desktop for a dedicated reader for
the enrollment process
Note
This requires either the 011425 or 011426 reader purchase as shown in Figure 2-45.
011423A is an optional programming stand. This stand is especially useful for users who would like
to have a CyberData RFID Reader dedicated to enrolling RFID cards. Follow the enrollment process
documented in Section 2.5.9, "Enrollment Procedure".
Figure 2-45. Optional RFID Reader Stand
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 61
Device Setup
2.5.10 Configure the Sensor Configuration Parameters
The door sensor (pins 5 and 6) on the header can be used to monitor a door's open or closed state.
There is an option on the Sensor page to trigger on an open or short condition on these pins. The
door sensor alarm will be activated when the Door Open Timeout parameter has been met.
The intrusion sensor is an optical sensor installed on the board and will be activated when the device
is removed from the case.
Each sensor can trigger the following actions:
•
Activate the relay until the sensor is deactivated
•
Call an extension, with optional pre-recorded audio
Note
Calling a preset extension can be set up as a point-to-point call, but currently can't send
delayed DTMF tones.
1. Click Sensor menu button to open the Sensor page (Figure 2-46).
Figure 2-46. Sensor Configuration Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 62
Device Setup
2. On the Sensor page, enter values for the parameters indicated in Table 2-11.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-11. Sensor Page Parameters
Web Page Item
Description
Door Sensor Settings
Door Sensor Normally Closed
Select the inactive state of the door sensor. The door sensor is
also known as the Sense Input on the device's terminal block.
Door Open Timeout (in seconds)
The time (in seconds) the device will wait before it performs an
action when the on-board door sensor is activated. The action(s)
performed are based on the configured Door Sensor Settings
below. Enter up to 5 digits.
Activate Relay
When selected, the device's on-board relay will be activated until
the on-board door sensor is deactivated.
Make call to extension
When selected, the device will call an extension when the onboard door sensor is activated. Use the Dial Out Extension field
below to specify the extension the device will call.
Dial Out Extension
Specify the extension the device will call when the on-board door
sensor is activated. Enter up to 64 alphanumeric characters.
Dial Out ID
An additional Caller identification string added to outbound calls.
Enter up to 64 alphanumeric characters.
Play recorded audio
When selected, the device will call the Dial Out Extension and
play an audio file to the phone answering the SIP call
(corresponds to Door Ajar on the Audiofiles page).
Repeat Sensor Message
The number of times to repeat the audio message through the
local speaker or to the remote endpoint. A value of 0 will repeat
forever. Enter a value from 0-65536.
Intrusion Sensor Settings
Activate Relay
When selected, the device's on-board relay will be activated until
the intrusion sensor is deactivated.
Make call to extension
When selected, the device will call an extension when the
intrusion sensor is activated. Use the Dial Out Extension field
below to specify the extension the device will call.
Dial Out Extension
Specify the extension the device will call when the intrusion
sensor is activated. Enter up to 64 alphanumeric characters.
Dial Out ID
An additional Caller identification string added to outbound calls.
Enter up to 64 alphanumeric characters.
Play recorded audio
When selected, the device will call the Dial Out Extension and
play an audio file (corresponds to Intrusion Sensor Triggered
on the Audiofiles page) to the phone answering the SIP call
when the intrusion sensor is activated.
Repeat Intrusion Message
The number of times to repeat the audio message through the
local speaker or to the remote endpoint. A value of 0 will repeat
forever. Enter a value from 0-65536.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 63
Device Setup
Table 2-11. Sensor Page Parameters (continued)
Web Page Item
Description
Click the Test Door Sensor button to test the door sensor.
Click the Test Intrusion Sensor button to test the Intrusion
sensor.
Click the Save button to save your configuration settings.
Note: You need to reboot for changes to take effect.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of
some of the web page items. First click on the Toggle Help
button, and you will see a question mark ( ) appear next to
some of the web page items. Move the mouse pointer to hover
over a question mark to see a short description of a specific web
page item.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 64
Device Setup
2.5.11 Configure the Audio Configuration Parameters
The Audiofiles page is used to add custom audio to the board. User uploaded audio will take
precedence over the audio files shipped with the device.
1. Click on the Audiofiles menu button to open the Audiofiles page (Figure 2-47).
Figure 2-47. Audiofiles Configuration Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 65
Device Setup
2. On the Audiofiles page, enter values for the parameters indicated in Table 2-12.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-12. Audiofiles Page Parameters
Web Page Item
Description
Available Space
Shows the space available for the user to save custom audio files if they want to change the
message when the door or sensor is triggered.
Intrusion Sensor Triggered
Corresponds to the message “Intrusion Sensor Triggered” (24 character limit).
Door Ajar
Corresponds to the message “Door Ajar” (24 character limit).
Blacklist Message
The audio file that will play if a blacklisted security code is entered.
Click on the Browse button to navigate to and select an audio file.
The Play button will play that audio file.
The Delete button will delete any user uploaded audio and restore the stock audio file.
The Save button will download a new user audio file to the board once you've selected the
file by using the Browse button. The Save button will delete any pre-existing user-uploaded
audio files.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 66
Device Setup
2.5.11.1 User-created Audio Files
User created audio files should be saved in the following format:
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 8000 Hz
You can use the free utility Audacity to convert audio files into this format. See Figure 2-48 through
Figure 2-50.
Figure 2-48. Audacity 1
Figure 2-49. Audacity 2
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 67
Device Setup
When you export an audio file with Audacity, save the output as:
•
WAV (Microsoft) signed 16 bit PCM.
Figure 2-50. WAV (Microsoft) signed 16 bit PCM
WAV (Microsoft) signed 16 bit PCM
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 68
Device Setup
2.5.12 Configure the Events Parameters
The Events page specifies a remote server that can be used to receive HTTP POST events when
actions take place on the board.
1. Click on the Events menu button to open the Events page (Figure 2-51).
Figure 2-51. Event Configuration Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 69
Device Setup
2. On the Events page, enter values for the parameters indicated in Table 2-13.
Note
The question mark icon (
) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-13. Events Page Parameters
Web Page Item
Description
Enable Event Generation
The device will send HTTP POST events to the specified remote
server and port number whenever a certain action takes place.
Select an event type below to generate an HTTP POST event.
Note: Enabling Event Generation requires a reboot for the changes
to take effect.
Events
Enable Call Start Events
When selected, the device will report the start of a SIP call.
Enable Call Terminated Events
When selected, the device will report the end of a SIP call.
Enable Relay Activated Events
When selected, the device will report relay activation.
Enable Relay Deactivated Events
When selected, the device will report relay deactivation.
Enable Power On Events
When selected, the device will report when it boots.
Enable Sensor Events
When selected, the device will report when the on-board sensor is
activated.
Enable Remote Relay Events
When selected, the device will report when the remote relay (DSR)
is activated.
Enable Security Events
When enabled, the device will report when the intrusion sensor is
activated.
Enable 60 Second Heartbeat Events
When enabled, the device will report a Heartbeat event every 60
seconds. SIP registration is not required to generate Heartbeat
events.
Event Server
Note: Changing an Event Server setting requires a reboot for the
changes to take effect.
Server IP Address
The IPv4 address of the event server in dotted decimal notation.
Server Port
Specify the event server port number. The supported range is 065536. Enter up to 5 digits.
Server URL
Generally, the destination URL is the name of the application that
receives the events and the string in the HTTP POST command. It
can be a script used to parse and process the HTTP POST events.
Enter up to 127 characters.
Click the Save button to save your configuration settings.
Note: You need to reboot for changes to take effect.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some
of the web page items. First click on the Toggle Help button, and
you will see a question mark ( ) appear next to some of the web
page items. Move the mouse pointer to hover over a question mark
to see a short description of a specific web page item.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 70
Device Setup
Operations Guide
Note
You must click on the Save button for the changes to take effect.
Note
Selecting particular events does not require a reboot for the changes to take effect.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 71
Device Setup
2.5.12.1 Example Packets for Events
The server and port are used to point to the listening server and the 'Remote Event Server URL' is
the destination URL (typically the script running on the remote server that's used to parse and
process the POST events).
Note
The XML is URL-encoded before transmission so the following examples are not completely
accurate.
Here are example packets for every event:
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 197
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>POWERON</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 199
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>HEARTBEAT</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 196
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>BUTTON</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 201
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>CALL_ACTIVE</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 72
Device Setup
User-Agent: CyberData/1.0.0
Content-Length: 205
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>CALL_TERMINATED</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 197
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>RINGING</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 234
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>MULTICAST_START</event>
<index>8</index>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 233
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>MULTICAST_STOP</event>
<index>8</index>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 234
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>RELAY_ACTIVATED</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 73
Device Setup
User-Agent: CyberData/1.0.0
Content-Length: 234
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>RELAY_DEACTIVATED</event>
</cyberdata>
POST xmlparse_engine HTTP/1.1
Host: 10.0.3.79
User-Agent: CyberData/1.0.0
Content-Length: 234
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0" encoding="ISO-8859-1"?>
<cyberdata NAME='CyberData VoIP Device' MAC='0020f70015b6'>
<event>NIGHTRINGING</event>
</cyberdata>
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 74
Device Setup
2.5.13 Configure the Door Strike Relay
The Door Strike Relay (DSR) is a network device designed to control an electronic door strike. The
DSR is meant to be used as a replacement for (or an addition to) the on-board relay. In addition to
being a drop-in 12 Amp relay, the DSR can monitor and record when the door is open or closed.
The DSR can be configured to trigger in the following ways: on the entry of a DTMF code, manually
through the web interface, or by using a Windows application.
This section describes operations for running firmware version 4.8 or later of the Dual Door Strike
Relay. If you have an older version of the firmware, then please contact CyberData Technical
Support. The version number appears in the Discovered Remote Relays section on the DSR page
(Figure 2-52).
Note
When Activate DSR on Valid RFID is enabled, a swipe of a valid RFID card will activate
Relay 2.
1. Click on the DSR menu button to open the DSR page (Figure 2-52).
Figure 2-52. DSR Page (not associated with any DSRs)
CyberData RFID
This is the default page when the
device is not associated with any
DSRs. Please see the Dual Door
Strike Relay Operations Guide for
more settings and options on the
DSR page when the device is
associated with a DSR.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 75
Device Setup
2. On the DSR page, enter values for the parameters indicated in Table 2-14.
Note
The question mark icon (
) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-14. DSR Configuration Parameters (not associated with any DSRs)
Web Page Item
Description
Remote Relay Settings
The settings in this section will activate an associated door strike relay. If a door
strike relay is not associated with the device, then you will only see the words Not
associated with any DSRs.
Click the Save button to save your configuration settings.
Note: You need to reboot for changes to take effect.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of some of the web page
items. First click on the Toggle Help button, and you will see a question mark ( )
appear next to some of the web page items. Move the mouse pointer to hover over a
question mark to see a short description of a specific web page item.
Discovered Remote Relays
The Discovered Remote Relays section lists all of the networked door strike relays
on the network. To associate your device with a door strike relay, click on the
Associate button. This action allows the user to configure the door strike relay. Keep
in mind that a device may only be associated with one door strike relay.
Product Type
Displays the product type of the remote relay.
IP Address
Displays the IP address of the remote relay.
MAC Address
Displays the MAC address of the remote relay.
Serial Number
Displays the serial number of the remote relay.
Name
Displays the name of the remote relay.
Version
Displays the version of the remote relay.
Use this button to search for and find any remote relays that are available on the
network.
Use this button to view the settings of a remote relay that has been “discovered” after
pressing the Discover button.
Use this button to associate the remote relay with the device. Only one relay may be
associated with a device.
Use this button to disassociate the remote relay from the device. Only one relay may
be associated with a device. This button is only available when a relay is associated
with a device.
Operations Guide
Note
You must click on the Save button and then the Reboot button for the changes to take
effect.
Note
Associating a DSR does not require a reboot. However, you should reboot the device after
disassociating a DSR.
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 76
Device Setup
2.5.14 Configure the Autoprovisioning Parameters
Autoprovisioning can be used to automatically configure your device. The autoprovisioning file is an
xml file with the device configuration. Values found in this file will override values stored in on-board
memory.
Note
By default, the device will try to set up its configuration with autoprovisioning.
1. Click the Autoprov menu button to open the Autoprovisioning page. See Figure 2-53.
Figure 2-53. Autoprovisioning Page
CyberData RFID
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 77
Device Setup
2. On the Autoprovisioning page, you may enter values for the parameters indicated in Table 215.
Note
The question mark icon ( ) in the following table shows which web page items will be defined
after the Toggle Help button is pressed.
Table 2-15. Autoprovisioning Page Parameters
Web Page Item
Description
Disable Autoprovisioning
Prevent the device from automatically trying to download a
configuration file. See Section 2.5.14.1, "Autoprovisioning" for
more information.
Autoprovisioning Server
Enter the IPv4 address of the provisioning server in dotted
decimal notation.
Autoprovisioning Filename
The autoprovisioning filename is the configuration filename.
The default autoprovisioning filename is in the format of
<mac address>.xml.
Supported filename extensions are .txt, and .xml. The current
filename is denoted by an asterisk at the bottom of the
Autoprovisioning Page. Enter up to 256 characters.
A file may have any name with an xml extension. If a file
name is entered, the device will look for the specified file
name, and only that file.
Use tftp
The device will use TFTP (instead of http) to download
autoprovisioning files.
Username
The username used to authenticate with an autoprovisioning
server. Leave this field blank to disable authentication.
Password
The password used to authenticate with an autoprovisioning
server. Leave this field blank to disable authentication.
Autoprovisioning Autoupdate 
(in minutes)
The reoccurring time (in minutes) the device will wait before
checking for new autoprovisioning files. Enter up to 6 digits. A
value of 0 will disable this option.
Autoprovision at time (HHMMSS)
The time of day the device will check for a new
autoprovisioning file. The time must be 6 characters in length
and in HHMMSS format. An empty value will disable this
option.
Autoprovision when idle
(in minutes > 10)
The idle time (in minutes greater than 10) after which the
device will check for a new autoprovisioning file. Enter up to 6
digits. A value of 0 will disable this option.
Click the Save button to save your configuration settings.
Click on the Reboot button to reboot the system.
Click on the Toggle Help button to see a short description of
some of the web page items. First click on the Toggle Help
button, and you will see a question mark ( ) appear next to
some of the web page items. Move the mouse pointer to
hover over a question mark to see a short description of a
specific web page item.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 78
Device Setup
Table 2-15. Autoprovisioning Page Parameters (continued)
Web Page Item
Description
Press the Download Template button to create an
autoprovisioning file for the device. See Section 2.5.14.3,
"Download Template Button"
Autoprovisioning log
The autoprovisioning log provides information about the latest
autoprovisioning attempt (i.e. dhcp options and server
accessed and files parsed or not found).
2.5.14.1 Autoprovisioning
On boot, the device will look for an autoprovisioning server configured on the Autoprovisioning Page
or specified as a DHCP option. When it finds a server, it will try to download the following (in order of
preference):
1. The file configured on the autoprovisioning page.
2. A file named according to it's mac address (for example: 0020f7350058.xml).
3. The file 000000cd.xml
The file can be hosted using a standard web server (like apache, IIS, or nginx), and the device can
download over SSL. The file server can be an ipv4 address in dotted decimal notation or a fully
qualified domain name.
By default, the device will get its autoprovisioning server from the DHCP options. See Section
2.5.14.2, "Sample dhcpd.conf" for an example of how to configure dhcpd to offer autoprovisioning
server addresses. If multiple options are set, the device will attempt to download autoprovisioning
files from every server.
The DHCP option determines the protocol used to download the autoprovisioning file. The device
looks for DHCP options in the following order:
1. Option 43 - a FQDN or an IP address to an http server
2. Option 72 - an IP address to an http server
3. Option 150 - an IP address to a tftp server
4. Option 66 - an IP address to a tftp server or if the entry starts with 'http', a FQDN to a http server.
You can download an autoprovisioning template file from the Autoprovisioning Page using the
Download Template button (see Table 2-15). This file contains every configuration option that can
be set on the board.
Autoprovisioning files can contain the whole configuration or a subset of this file. The first
autoprovisioning file can also contain links to other autoprovisioning files.
The <MiscSettings> section contains some examples of additional autoprovisioning files:
<MiscSettings>
<DeviceName>CyberData VoIP Device</DeviceName>
<!-<AutoprovFile>common.xml</AutoprovFile>-->
<!-<AutoprovFile>sip_reg[macaddress].xml</AutoprovFile>-->
<!-<AutoprovFile>audio[macaddress]</AutoprovFile>-->
<!-<AutoprovFile>device[macaddress].xml</AutoprovFile>-->
</MiscSettings>
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 79
Device Setup
After downloading the first autoprovisioning file, the device will step through up to twenty additional
<AutoprovFile> entries and try to download these files from the same server.
When the device finds a filename with the string [macaddress], it will replace this string with the
mac address.
As an example, the user has configured option 43 on their DHCP server to “http://example.com,” and
on their server, they have a file named 0020f7123456.xml (the same as the mac address of the
device).
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 80
Device Setup
The file 0020f7123456.xml contains:
<?xml version="1.0" encoding="utf-8" ?>
<specific>
<MiscSettings>
<DeviceName>Newname</DeviceName>
<AutoprovFile>common.xml</AutoprovFile>
<AutoprovFile>sip_reg[macaddress].xml</AutoprovFile>
<AutoprovFile>audio[macaddress]</AutoprovFile>
<AutoprovFile>device.xml</AutoprovFile>
</MiscSettings>
</specific>
1. The device will first set it's name to 'Newname'.
2. It will try to download http://example.com/common.xml.
3. It will try to download http://example.com/sip_reg0020f7123456.xml.
4. It will try to download http://example.com/audio0020f7123456.
5. It will try to download http://example.com/device.xml.
The device is reconfigured every time it downloads a new file so if two files configure the same
option the last one will be the one that is saved.
It is possible to autoprovision autoprovisioning values (for example, to disable autoprovisioning or to
configure a time to check for new files).
Checking for New The device will always check for an autoprovisioning files on boot but it can be configured to also
Autoprovisioning check after a periodic delay, when idle, or at a specified time. When one of these options is set, the
Files after Boot
device will download its autoprovisioning files again, and if it finds any differences from the files it
downloaded on boot, it will force a reboot and reconfigure.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 81
Device Setup
The
Autoprovisioning
Filename
The autoprovisioning filename can contain a file, a file path, or a directory.
Table 2-16. Autoprovisioning File Name
Autoprovisioning
Filename
Autoprovisioning
Server
File Downloaded
config.xml
10.0.1.3
10.0.1.3/config.xml
/path/to/config.xml
10.0.1.3
10.0.1.3/path/to/config.xml
subdirectory/path/
10.0.1.3
10.0.1.3/subdirectory/path/0020f7020002.xml
TFTP options may not support subdirectories. If a directory is set in the filename field, firmware and
audio files will also be downloaded from this subdirectory.
If the filename ends with a forward slash “/,” the device will treat it as a subdirectory.
For example:
The autoprovisioning server is set to “https://www.example.com”
The autoprovisioning filename is set to “cyberdata/”
On boot, the device will try to download:
https://www.example.com/cyberdata/0020f7123456.xml
...and if this fails:
https://www.example.com/cyberdata/000000cd.xml
Audio files and firmware files will also add “cyberdata” to the URL before downloading.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 82
Device Setup
Autoprovisioning <FirmwareSettings>
Firmware Updates
<FirmwareFile>505-uImage-ceilingspeaker</FirmwareFile>
<FirmwareServer>10.0.1.3</FirmwareServer>
<OutdoorIntercom30>firmware_file_v9.3.0</OutdoorIntercom30>
<OutdoorIntercom31>firmware_file_v10.3.0</OutdoorIntercom31>
<CallButton31>firmware_file_v10.3.0</CallButton31>
</FirmwareSettings>
In the <FirmwareSettings> section, the <FirmwareServer> element can be used to specify a
different server for hosting firmware files. When this element is not available, the device will try to
download the file from the autoprovisioning server.
The device will use the filename to determine when to autoprovision firmware updates. The default
configuration is blank, so the first time you set a value in your autoprovisioning file, it may force a
firmware update even if the firmware version has not changed.
The <FirmwareFile> name can contain path elements (i.e. /path/to/firmware/10.3.0-uImage[device_file_name]).
The device also supports product strings for downloading firmware. If the <FirmwareFile> option is
not set, the device will look for its particular product string for a firmware filename. In this way, a
generic autoprovisioning file can specify unique firmware for a range of products.
The list of valid product strings:
<ProductString>CallButton31</ProductString>
<ProductString>EmergencyIntercom31</ProductString>
<ProductString>EmergencyIntercom31SW</ProductString>
<ProductString>IndoorIntercom31</ProductString>
<ProductString>IndoorIntercom31SW</ProductString>
<ProductString>IndoorKeypad31</ProductString>
<ProductString>IndoorKeypad31SW</ProductString>
<ProductString>OfficeRinger31</ProductString>
<ProductString>OfficeRinger31SW</ProductString>
<ProductString>OutdoorIntercom31</ProductString>
<ProductString>OutdoorIntercom31SW</ProductString>
<ProductString>OutdoorKeypad31</ProductString>
<ProductString>OutdoorKeypad31SW</ProductString>
<ProductString>Strobe31</ProductString>
<ProductString>Strobe31SW</ProductString>
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 83
Device Setup
Autoprovisioning
Example 1
Here's a simple example using four autoprovisioning files to configure two devices:
We boot up two devices with mac addresses 00:20:f7:02:00:01 and 00:20:f7:02:00:02 (Device1
and Device2).
The devices are set to use DHCP and that server provides an autoprovisioning server address with
option 43. The address is “https://autoprovtest.server.net.” The files on this server are as follows:
000000cd.xml
<MiscSettings>
<DeviceName>CyberData Autoprovisioned</DeviceName>
<AutoprovFile>sip_common.xml</AutoprovFile>
<AutoprovFile>sip_[macaddress].xml</AutoprovFile>
</MiscSettings>
sip_common.xml
<SIPSettings>
<SIPServer>10.0.0.253</SIPServer>
<RemoteSIPPort>5060</RemoteSIPPort>
</SIPSettings>
sip_0020f7020001.xml
<SIPSettings>
<SIPUserID>198</SIPUserID>
<SIPAuthPassword>ext198</SIPAuthPassword>
<DialoutExtension0>204</DialoutExtension0>
</SIPSettings>
sip_0020f7020002.xml
<SIPSettings>
<SIPUserID>500</SIPUserID>
<SIPAuthPassword>ext500</SIPAuthPassword>
<DialoutExtension0>555</DialoutExtension0>
</SIPSettings>
On boot, Device1 tries to fetch the file 0020f7023614.xml from “https://autoprovtest.server.net”. This
file is not available, so device1 then tries to fetch the file 000000cd.xml. This file exists, and Device1
parses the three elements.
1. Device1 changes its device name to CyberData Autoprovisioned.
2. Device1 finds an AutoprovFile element containing the filename sip_common.xml. The device
downloads sip_common.xml from “https://autoprovtest.server.net,” and imports this
configuration, setting the sip server to 10.0.0.253 and the remote port to 5060.3.
3. Device1 finds another AutoprovFile element containing the filename sip_[macaddress].xml.
The device replaces the [macaddress] with its own mac address value creating
sip_0020f7020001.xml, downloads this file from “https://autoprovtest.server.net,” and imports
this configuration. This sets the user ID to 198, the password to ext198, and the dialout
extension to 204. Device1 is now finished with autoprovisioning.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 84
Device Setup
Device2 goes through the same steps by setting its device name to CyberData Autoprovisioned,
its SIP server to 10.0.0.253, and its port to 5060. When Device2 “sees” sip_[macaddress].xml,
Device2 replaces it with its own mac address and downloads sip_0020f7020002.xml from “https://
autoprovtest.server.net.” Device2 sets the SIP User ID to 500, the password to ext500, and the
dialout extension to 555.
Autoprovisioning
Example 2
Here is another example of setting up your autoprovisioning files:
We boot up two devices with mac addresses 00:20:f7:02:00:01 and 00:20:f7:02:00:02 (Device1
and Device2) and boot them on a network with a DHCP server configured with an autoprovisioning
server at 10.0.1.3 on option 150. Our TFTP server has three files:
0020f7020001.xml
<MiscSettings>
<AutoprovFile>common_settings.xml</AutoprovFile>
</MiscSettings>
<SIPSettings>
<SIPUserID>198</SIPUserID>
<SIPAuthPassword>ext198</SIPAuthPassword>
<DialoutExtension0>204</DialoutExtension0>
</SIPSettings>
0020f7020002.xml
<MiscSettings>
<AutoprovFile>common_settings.xml</AutoprovFile>
</MiscSettings>
<SIPSettings>
<SIPUserID>500</SIPUserID>
<SIPAuthPassword>ext500</SIPAuthPassword>
<DialoutExtension0>555</DialoutExtension0>
</SIPSettings>
common_settings.xml
<MiscSettings>
<DeviceName>CyberData Autoprovisioned</DeviceName>
</MiscSettings>
<SIPSettings> <SIPServer>10.0.0.253</SIPServer>
<RemoteSIPPort>5060</RemoteSIPPort>
</SIPSettings>
1. On boot, Device1 downloads 0020f7020001.xml from 10.0.1.3 and imports these values. The SIP
User ID is 198, the password is ext198, and the dialout extension is 204.
2. Device1 then gets the filename common_settings.xml from the AutoprovFile element and
downloads this file from the TFTP server at 10.0.1.3. and imports these settings. The device name is
set to CyberData Autoprovisioned, the SIP server is set to 10.0.0.253, and the port is set to 5060.
Device2 does the same except it downloads 0020f7020002.xml on boot and imports these values
instead. The Sip User ID is 500, password is ext500, and dialout extension is 555. Device2 then
downloads the common_settings.xml file and imports those values. The device name is set to
CyberData Autoprovisioned, the SIP server is set to 10.0.0.253, and the port is set to 5060.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 85
Device Setup
XML Files
XML files can contain <AutoprovFile> elements. If multiple DHCP options are specified, the device
will try to download autoprovisioning files from each in turn. The device will only look for
<AutoprovFile> elements in the first file downloaded from each server. You can specify up to 20
<AutoprovFile> elements in the first autoprovisioning file.
There are numerous ways to change an element of the configuration(xml) file. Using sip ext as an
example, the extension can be changed:
Within the device-specific xml, i.e. [macaddress].xml, via the AutoprovFile element:<SIPSettings>/
<SIPExt>
From the device specific xml, a pointer to a sip_common file
From the device specific xml, a pointer to the device specific sip_[macaddress].xml
From the common file, a pointer to sip_common.xml
From the common file, a pointer to the device specific (sip_[macaddress].xml)
Autoprovisioned
Audio Files
Audio files are stored in non-volatile memory and an autoprovisioned audio file will only have to be
downloaded once for each device. Loading many audio files to the device from the web page could
cause it to appear unresponsive. If this happens, wait until the transfer is complete and then refresh
the page.
The device uses the file name to determine when to download a new audio file. This means that if
you used autoprovisioning to upload a file and then changed the contents of this file at the TFTP
server, the device will not recognize that the file has changed (because the file name is the same).
Since audio files are stored in non-volatile memory, if autoprovisioning is disabled after they have
been loaded to the board, the audio file settings will not change. You can force a change to the audio
files on the board by clicking Restore Default on the Audio page or by changing the
autoprovisioning file with “default” set as the file name.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 86
Device Setup
2.5.14.2 Sample dhcpd.conf
#
# Sample configuration file for ISC dhcpd for Debian
#
ddns-update-style none;
option domain-name "voiplab";
option domain-name-servers 10.0.0.252;
option option-150 code 150 = ip-address;
option ntp-servers north-america.pool.ntp.org;
option space VendorInfo;
option VendorInfo.text code 10 = { text };
authoritative;
log-facility local7;
subnet 10.0.0.0 netmask 255.0.0.0 {
max-lease-time 3600;
default-lease-time 3600;
option routers
option subnet-mask
10.0.0.1;
255.0.0.0;
option domain-name
option domain-name-servers
"voiplab";
10.0.0.252;
option time-offset
-8;
# Pacific Standard Time
#
option www-server
99.99.99.99;
#
#
option tftp-server-name
option tftp-server-name
"10.0.1.52";
"http://test.cyberdata.net";
# OPTION 66
# OPTION 66
#
option option-150
10.0.0.252;
# OPTION 150
# These two lines are needed for option 43
#
vendor-option-space VendorInfo;
#
option VendorInfo.text "http://test.cyberdata.net";
# OPTION 72
# OPTION 43
# OPTION 43
range 10.10.0.1 10.10.2.1; }
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 87
Device Setup
2.5.14.3 Download Template Button
The Download Template button allows the user to generate, download, edit, and then store an
autoprovisioning template on the server that serves the autoprovisioning files for devices.
To generate an autoprovisioning template directly from the device, complete the following steps:
1. On the Autoprovisioning page, click on the Download Template button.
2. You will see a window prompting you to save a configuration file (.xml) to a location on your
computer (Figure 2-54). The configuration file is the basis for the default configuration settings
for your unit).
3. Choose a location to save the configuration file and click on OK. See Figure 2-54.
Figure 2-54. Configuration File
4. At this point, you can open and edit the autoprovisioning template to change the configuration
settings in the template for the unit.
5. You can then upload the autoprovisioning file to a TFTP or HTTP server where the file can be
loaded onto other devices.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 88
Device Setup
2.6 Upgrade the Firmware
Note
CyberData strongly recommends that you do not upgrade the firmware when the device is
likely to be in use.
To upgrade the firmware of your device:
1. Download the latest firmware file from the Downloads tab at the following webpage:
https://www.cyberdata.net/products/011425
2. Unzip the firmware version file. This file may contain the following:
•
Firmware file
•
Release notes
•
Autoprovisioning template
3. Log in to the Home page as instructed in Section 2.5.4, "Log in to the Configuration Home
Page".
4. Click on the Firmware menu button to open the Firmware page (Figure 2-55).
Caution
GENERAL ALERT
Equipment Hazard: CyberData strongly recommends that you first reboot the
device before attempting to upgrade the firmware of the device. See Section 2.7,
"Reboot the Device".
Figure 2-55. Firmware Page
CyberData RFID
5. Click on the Browse button, and then navigate to the location of the firmware file.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 89
Device Setup
6. Select the firmware file. This reveals the Upload button (Figure 2-56).
Figure 2-56. Upload Button
CyberData RFID
Upload button
Status Messages
Upload Post Processing bar
Upload Progress bar
7. Click on the Upload button. After selecting the Upload button, you will see the progress of the
upload in the Upload Progress bar.
8. When the upload is complete, you will see the words Upload finished under Status Messages.
9. At this point, you will see the progress of the upload’s post processing in the Upload Post
Processing bar.
Note
Do not reboot the device before the upgrading process is complete.
10. When the process is complete, you will see the words SWUPDATE Successful under Status
Messages.
11. The device will reboot automatically.
12. The Home page will display the version number of the firmware and indicate which boot
partition is active.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 90
Device Setup
Table 2-17 shows the web page items on the Firmware page.
Table 2-17. Firmware Page Parameters
Web Page Item
Description
Use the Browse button to navigate to the location of the firmware file that you
want to upload.
Click on the Upload button to automatically upload the selected firmware and
reboot the system.
Note: This button only appears after the user has selected a firmware file.
Upload progress
Status bar indicates the progress in uploading the file.
Upload Post Processing
Status bar indicates the progress of the software installation.
Status Messages
Messages relevant to the firmware update process appear here.
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 91
Reboot the Device
2.7 Reboot the Device
To reboot the device, complete the following steps:
1. Log in to the Home page as instructed in Section 2.5.4, "Log in to the Configuration Home
Page".
2. Click on the Reboot button on the Home page (Figure 2-57). A normal restart will occur.
Figure 2-57. Home Page
CyberData RFID
425000001
v1.0.0
v1.0.0
v1.0.0
Reboot
Operations Guide
931423B
CyberData Corporation
Installing the SIP RFID Secure Access Control Endpoint 92
Reboot the Device
2.8 Command Interface
Some functions on the device can be activated using simple POST commands to the web interface.
The examples in Table 2-18 use the free unix utility, wget commands. However, any program that
can send HTTP POST commands to the device should work.
2.8.1 Command Interface Post Commands
Note
These commands require an authenticated session (a valid username and password to
work).
Table 2-18. Command Interface Post Commands
Device Action
HTTP Post Commanda
Reboot
wget --user admin --password admin --auth-no-challenge --quiet O /dev/null --no-check-certificate "https://10.10.1.154/command" -post-data "request=reboot"
Place call to extension (example: extension 600)
wget --user admin --password admin --auth-no-challenge --quiet O /dev/null --no-check-certificate "https://10.10.1.154/command" -post-data "request=call&extension=600"
Test Relay
wget --user admin --password admin --auth-no-challenge --quiet O /dev/null --no-check-certificate "https://10.10.1.154/command" -post-data "request=test_relay"
Swap boot partitions
wget --user admin --password admin --auth-no-challenge --quiet O /dev/null --no-check-certificate "https://10.10.1.154/command" -post-data "request=swap_boot_partition"
a.Type and enter all of each http POST command on one line.
Operations Guide
931423B
CyberData Corporation
93
Appendix A: Mounting the SIP RFID Secure
Access Control Endpoint
A.1 Mounting Components
Before you mount the SIP RFID Secure Access Control Endpoint, make sure that you have received
all the parts for each SIP RFID Secure Access Control Endpoint. Refer to the following tables.
Table A-1. Mounting Components (Part of the Accessory Kit)
Quantity
Part Name
1
T-15H Torx Key
4
Security Torx Screw
Illustration
Table A-2. Optional Accessories (for gooseneck mounting)
Quantity
Part Name
4
Carriage bolt nuts
4
Carriage bolts
4
Carriage bolt washers
Illustration
Table A-3. Optional Accessories
Operations Guide
Quantity
Part Name
1
Spacer for half-inch set conduit
connector
1
531085B hole plug assembly
931423B
Illustration
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 94
Dimensions
A.2 Dimensions
4.000 [101.6]
5.118 [130.0]
5.198 [132.0] w/HOLE PLUG
Figure A-1. Unit Dimensions—Front and Side View
4.580 [116.3]
5.118 [130.0]
DIMENSIONS ARE IN INCHES [MILLIMETER]
Operations Guide
931423B
2.172 [55.2]
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 95
Dimensions
Figure A-2. Unit Dimensions—Rear View with Mounting Hole Locations
5.1 [130]
4.6 [116]
4.0 [102]
#6-32
Threaded
Ground
Lug & Nut
3.4 [86]
Conduit
Hole
ø0.9 [ø22]
Conduit
Hole
ø0.9 [ø22]
2.6 [65]
5.1 [129]
4.6 [116]
4.0 [102]
ø0.3 [ø7]
(4 Places)
3.4 [86]
0.7 [19]
DIMENSIONS ARE IN INCHES [MILLIMETER]
Operations Guide
931423B
PROJECTION: THIRD ANGLE
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 96
Dimensions
Figure A-3. Shroud Dimensions—Front and Side View with Mounting Hole Locations
3.434 [87.23]
0.874 [22.20]
ø0.854 [ø21.69]
3.380 [85.85]
5.202 [132.13]
ø0.280 [ø7.11]
(4 PLACES)
1.690 [42.93]
5.276 [134.00]
1.690 [42.93]
3.380 [85.85]
Operations Guide
0.948 [24.07]
931423B
Dimensions are in Inches [Millimeter]
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 97
Network Cable Entry Restrictions
A.3 Network Cable Entry Restrictions
A.3.1 Conduit Mounting Restrictions (Side Entry)
See Figure A-4 for the conduit mounting restrictions (side entry).
Figure A-4. Conduit Mounting Restrictions (Side Entry)
Hole Plug
Assembly
Hole Plug [Washer]
Assembly
[Nut]
Gang Box
1/2" Set Screw
Connector Nut
1/2" Set Screw
Connector Nut
Rotate Gang Box
for Desired Conduit
Exit Direction
Hole Plug
Assembly
[Hole Plug]
1/2" Set Screw
Connector
1/2" Conduit
1/2" Conduit
Fiber Washer
(As Spacer)
Fiber Washer
(As Spacer)
Gang Box
Operations Guide
1/2" Set Screw
Connector
Side View
931423B
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 98
Service Loop Cable Routing
A.4 Service Loop Cable Routing
Figure A-5 and Figure A-6 illustrate a service loop cable routing option for the SIP RFID Secure
Access Control Endpoint.
Figure A-5. Ground Cable Service Loop Routing
Ground Cable
1X Faceplate
Mounting Screws
Flat Head Phillips or
Security Torx
Nut
Gang Box
Ground Lug
1X Faceplate
Assembly
Operations Guide
931423B
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 99
Service Loop Cable Routing
Figure A-6. Network Cable Service Loop Routing
Service Loop
Network
Cable
1X Faceplate
Mounting Screws
Flat Head Phillips or
Security Torx
Gang Box
Faceplate
Assembly
Operations Guide
931423B
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 100
Securing the Intercom
A.5 Securing the Intercom
Figure A-7 illustrates how to secure the SIP RFID Secure Access Control Endpoint with Torx screws.
Figure A-7. Securing the Intercom
Note: To mount the intercom, use methods
compliant with local electrical codes.
1X Faceplate
Mounting Screws
Flat Head Phillips or
Security Torx
Torx Key
Gang Box
Faceplate
Assembly
Caution
GENERAL ALERT
Operations Guide
Equipment Hazard: Do not use an electric or power screwdriver to fasten the
face plate and PCB assembly to the gang box. To prevent over-torque damage to
the gasket, do not apply more than 10 inch-pounds force. Over-torquing will cause
the gasket to tear, risk moisture intrusion, and effectively void the manufacturer's
warranty.
931423B
CyberData Corporation
Mounting the SIP RFID Secure Access Control Endpoint 101
Additional Mounting Options
A.6 Additional Mounting Options
A.6.1 Goose Neck Mounting Option (Not Provided)
Figure A-8 illustrates a gooseneck mounting option for the SIP RFID Secure Access Control
Endpoint.
Figure A-8. Optional Goose Neck Mounting
Note: To mount the intercom, use methods
compliant with local electrical codes.
Hole Plug
Assembly
[Nut]
Hole Plug
Assembly
[Washer]
GOOSENECK
(NOT PROVIDED)
Gang Box
1/4" Round Head
Carriage Bolt (4x)
Weather Shroud
Part Number: 011188A
(SOLD SEPARATELY)
1X Faceplate
Mounting Screws
Flat Head Phillips or
Security Torx
GOOSENECK
[CUTAWAY VIEW
TO SHOW
CABLE ROUTING]
Hole Plug
Assembly
[Hole Plug]
Nut for
Ground Lug
1/4" Washer (4x)
(REMOVE HOLE PLUG ASSEMBLY
FROM 2-GANG BOX
BEFORE FASTEN IT TO SHROUD
AND/OR GOOSENECK; OR
CONDUIT HOLE WITH HOLE PLUG
FACING BOTTOM)
1/4" Nut (4x)
Faceplate
Assembly
Operations Guide
NETWORK &
GROUND CABLE
931423B
CyberData Corporation
102
Appendix B: Setting up a TFTP Server
B.1 Set up a TFTP Server
Autoprovisioning requires a TFTP server for hosting the configuration file.
B.1.1 In a LINUX Environment
To set up a TFTP server on LINUX:
1. Create a directory dedicated to the TFTP server, and move the files to be uploaded to that
directory.
2. Run the following command where /tftpboot/ is the path to the directory you created in
Step 1: the directory that contains the files to be uploaded. For example:
in.tftpd -l -s /tftpboot/your_directory_name
B.1.2 In a Windows Environment
You can find several options online for setting up a Windows TFTP server. This example explains
how to use the Solarwinds freeware TFTP server, which you can download from the following
website address:
http://www.cyberdata.net/assets/common/Solarwinds.zip
To set up a TFTP server on Windows:
1. Install and start the software.
2. Select File/Configure/Security tab/Transmit Only.
3. Make a note of the default directory name, and then move the firmware files to be uploaded to
that directory.
Operations Guide
931423B
CyberData Corporation
103
Appendix C: Troubleshooting/Technical
Support
C.1 Frequently Asked Questions (FAQ)
To see a list of frequently asked questions for your product, click on the FAQs tab at the following
webpage:
https://www.cyberdata.net/products/011425
C.2 Documentation
The documentation for this product is released in an English language version only.
To download PDF copies of CyberData product documentation, click on the Downloads tab at the
following webpage:
https://www.cyberdata.net/products/011425
Operations Guide
931423B
CyberData Corporation
Troubleshooting/Technical Support 104
Contact Information
C.3 Contact Information
Contact
CyberData Corporation
3 Justin Court
Monterey, CA 93940 USA
www.CyberData.net
Phone: 800-CYBERDATA (800-292-3732)
Fax: 831-373-4193
Sales
Sales 831-373-2601, Extension 334
Technical 
Support
The fastest way to get technical support for your VoIP product is to submit a VoIP Technical
Support form at the following website:
http://support.cyberdata.net/
The Support Form initiates a ticket which CyberData uses for tracking customer requests. Most
importantly, the Support Form tells us which PBX system and software version that you are
using, the make and model of the switch, and other important information. This information is
essential for troubleshooting. Please also include as much detail as possible in the Comments
section of the Support Form.
Phone: (831) 373-2601, Extension 333
C.4 Warranty and RMA Information
The most recent warranty and RMA information is available at the following website address:
http://support.cyberdata.net/
Operations Guide
931423B
CyberData Corporation
105
Index
intrusion sensor 40, 61
network 33
SIP 35
configuration home page 28
configuration page
configurable parameters 31, 33
contact information 104
contact information for CyberData 104
current network settings 34
CyberData contact information 104
Numerics
16 AWG gauge wire 11
A
activate relay (door sensor) 62
activate relay (intrusion sensor) 62
activity LED 21
address, configuration login 27
alternative power input 6
audio configuration 64
audio configuration page 64
audio encodings 5
audio files, user-created 66
autoprovision at time (HHMMSS) 77
autoprovision when idle (in minutes > 10) 77
autoprovisioning 78
download template button 78
setting up a TFTP server 102
autoprovisioning autoupdate (in minutes) 77
autoprovisioning configuration 76, 77
autoprovisioning filename 77
autoprovisioning server (IP Address) 77
D
default
gateway 23
intercom settings 105
IP address 23
subnet mask 23
username and password 23
web login username and password 28
default gateway 23, 33, 34
default intercom settings 22
default IP settings 23
default login address 27
device configuration 31
device configuration parameters 77
the device configuration page 76
device configuration page 31
device configuration parameters 31
device configuration password
changing for web configuration access 31
DHCP Client 5
dial out extension (door sensor) 62
dial out extension (intrusion sensor) 62
dial out extension strings 39, 60
dimensions 6, 94
shroud dimensions and mounting hole locations 96
unit dimensions—front and side view 94
unit dimensions—rear view and mounting hole
locations 95
discovery utility program 27
DNS server 34
door sensor 61, 62
activate relay 62
dial out extension 62
door open timeout 62
door sensor normally closed 62
download autoprovisioning template button 78
DTMF tones (using rfc2833) 39, 60
B
backup SIP server 1 36
backup SIP server 2 36
backup SIP servers, SIP server
backups 36
C
changing
the web access password 31
Cisco SRST 37
command interface 92
commands 92
concrete wall mounting option (not provided) 101
conduit mounting option (not provided) 101
configurable parameters 31, 33
configuration
audio 64
default IP settings 23
door sensor 40, 61
Operations Guide
931423B
CyberData Corporation
Index 106
E
L
electric screwdriver 100
ethernet I/F 6
expiration time for SIP server lease 36, 37
export settings 29
lease, SIP server expiration time 36, 37
LED
green link LED 21
yellow activity LED 21
link LED 21
Linux, setting up a TFTP server on 102
local SIP port 37
log in address 27
F
factory default settings 22
fastening, gang box 100
firmware
where to get the latest firmware 88
M
mounting 93
additional mounting options 101
concrete wall mounting option (not provided) 101
conduit mounting option (not provided) 101
goose neck mounting option (not provided) 101
ground cable installation 98
optional accessories 93
overview of installation types 93
rear conduit network cable entry restrictions (without
shroud) 98
securing the intercom 100
service loop cable routing 98
side conduit network cable entry restrictions 97
mounting components 93
multicast configuration 64
G
gang box, fastening 100
gasket, avoid over-torque damage 100
get autoprovisioning template 78
goose neck mounting option (not provided) 101
ground cable installation 98
H
home page 28
http POST command 92
http web-based configuration 5
N
navigation (web page) 24
navigation table 24
network configuration 33
Nightringer 11, 87
NTP server 32
I
identifying your product 1
import settings 29
import/export settings 29
installation, typical intercom system 2
intrusion sensor 61, 62
activate relay 62
dial out extension 62
IP address 23, 33, 34
IP addressing
default
IP addressing setting 23
O
on-board relay 6, 12
P
part number 6
parts list 8
password
for SIP server login 36
login 28
J
J3 terminal block, 16 AWG gauge wire 11
Operations Guide
931423B
CyberData Corporation
Index 107
restoring the default 23
payload types 6
point-to-point configuration 39, 60
port
local SIP 37
remote SIP 37
POST command 92
power input 6
alternative 6
power screwdriver 100
product features 4
product overview
product features 4
product specifications 6
supported protocols 5
supported SIP servers 5
typical system installation 2
product specifications 6
protocol 6
protocols supported 5
SIP configuration 35
SIP configuration parameters
outbound proxy 37
registration and expiration, SIP server lease 36, 37
unregister on reboot 37
user ID, SIP 36
SIP registration 37
SIP remote SIP port 37
SIP server 36
password for login 36
SIP servers supported 5
unregister from 37
user ID for login 36
SIP server configuration 36
SRST 37
subnet mask 23, 33, 34
supported protocols 5
T
tech support 104
technical support, contact information 104
terminal block, 16 AWG gauge wire 11
TFTP server 5, 102
R
rear conduit network cable entry restrictions (without
shroud) 98
reboot 90
remote SIP port 37
resetting the IP address to the default 93, 103
restoring factory default settings 22, 105
RJ-45 20
rport discovery setting, disabling 37
RTFM jumper 22
RTP/AVP 5
U
unit dimensions—front and side view 94
unit dimensions—rear view and mounting hole
locations 95
user ID
for SIP server login 36
username
changing for web configuration access 31
default for web configuration access 28
restoring the default 23
S
sales 104
securing the device 100
sensor setup page 40, 61, 74
sensor setup parameters 40, 61
sensors 62
server address, SIP 36
service 104
service loop cable routing 98
setting up the device 11
settings, default 22
shroud dimensions and mounting hole locations 96
side conduit network cable entry restrictions 97
SIP
enable SIP operation 36
local SIP port 37
user ID 36
Operations Guide
V
VLAN ID 34
VLAN Priority 34
VLAN tagging support 34
VLAN tags 34
W
warranty policy at CyberData 104
web access password 23
web access username 23
931423B
CyberData Corporation
Index 108
web configuration log in address 27
web page
navigation 24
web page navigation 24
wget, free unix utility 92
Windows, setting up a TFTP server on 102
wiring the circuit 13
devices less than 1A at 30 VDC 13
Operations Guide
931423B
CyberData Corporation
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertising