Frequently asked questions about Siedle Secure
Secure Controller: installation and commissioning
Where can the Siedle Secure Controller be installed?
The Siedle Secure Controller is designed for installation in a distribution's security switch cabinet and for surface mounting.
Can the Siedle Secure Controller be installed on a top hat rail?
Yes, an adapter for top hat rail mounting is included with the Siedle Secure Controller.
How do you remove or re-fit the cover for the Siedle Secure Controller?
To remove the cover:
Unscrew the small cross-head screw on the front
Slightly open the cover on the side with the cross-head screw
Remove the cover by pulling it forwards.
To re-fit the cover, follow the steps in reverse.
What are the technical requirements for commissioning the Secure Controller?
To set up an access control system controlled by the Siedle Secure Controller, all you need is a standard computer and a network connection. Commissioning is web-based. All login information can be found in the product information.
Can the Secure Controller be configured by remote access?
Yes, all the installation and administration of the Secure Controller takes place via the web. It doesn't matter where the computer that is being used is located. It just needs to be networked with the Secure Controller. The person who is accessing the Secure Controller must have the relevant rights ('role').
How many doors can be created in the Secure Controller using the wizard?
All doors that a Secure Controller controls are created in its wizard – so up to four. This also applies if several Secure Controllers are networked with one another: Doors can only be created in the wizard of the Secure Controller which controls those doors. Programming is web-based; the IP address of each Secure Controller must be used.
Where can I find instructions for installing the Secure Controller?
Our Secure Controller can be commissioned without instructions and programmed without extensive expert knowledge: The integrated wizard guides you through the web-based installation in six easy steps. The user interface – also used for further administration (user administration, reporting, etc.) – is designed to be intuitive.
Our Quick Guide describes these commissioning steps with images. It also explains how to add users and ID.
Of course, detailed commissioning instructions are included with every Secure Controller and these can also be downloaded .
Secure Controller: cabling
Which network cable is to be used for connecting the Siedle Secure Controller?
At least a CAT6 network cable is needed for the Ethernet power supply (LAN) and the Siedle Secure Controller network connection.
Which cable is used to connect the Siedle Secure Controller and the bus connections?
A J-Y(St)Y cable must be used for connecting the bus lines. The shield must be applied to the cable inlet on the Siedle Secure Controller.
Are the terminal designations of the Secure Controller's four switching contacts identical?
Yes, the terminal designations are identical (NO/COM/NC). The switching contacts are visually separated from one another by a white frame on the circuit board.
Secure Controller: time and user management
Can different time profiles be created in the Siedle Secure Controller?
Yes, the following time profiles can be created: For doors: Here you can define time periods when certain doors are permanently open and access to the building is permitted without ID, for example. For users: These profiles can be used to define a time frame, for example, in which a user can access a building or part of a building.
How many users can be managed by the Siedle Secure Controller?
The number of users is, for all intents and purposes, unlimited; in terms of numbers, the Secure Controller can manage up to 500,000 users.
Who can manage users and access profiles with the Secure Controller?
All access profiles and users can be managed by a person who has the relevant access rights to the system – for example, building owners, caretakers, property management and HR department employees or the system installer. Specialist prior knowledge is not required; the web-based user interface is intuitive. Detailed commissioning instructions are also available to download .
What settings can users make on the Secure Controller?
In the Secure Controller, you can define the functions that each person can access. Three authorisation levels, called roles, are provided, which can be assigned to as many people as desired:
Facility:
This authorisation can be used, for example, to create, delete and modify users (cards/codes), user groups and week programs as well as track reporting. This role is normally assigned to building owners, caretakers or property management/HR department employees.
Service:
This role is used by the person carrying out the commissioning. This can be used to set read devices at the entrance, doors, property managers and roles, for example.
Root:
This role is reserved for the Siedle factory service team.
Where is user data saved when several Secure Controllers are used in master-slave mode?
All user data is created in the master, which then synchronises with all the slaves. The slaves store the information in their own memories so that each slave can continue to work independently should the master controller fail.
If a transponder is found, is it possible to find out which user it belongs to?
Yes, this is possible: If a readID One reader is available, the ownerless transponder can be read in with ease and the user can be determined using the system administrator's list. Without a readID One, the transponder data can be read using the Siedle electronic key reader which was previously assigned the role of teach-in reader.
What do I do if someone forgets a password?
If someone forgets a password, a new one must be assigned. Please contact Siedle customer service and have the MAC address of the Secure Controller to hand. This can be found on its type plate.
Secure Controller: function
Can I control more than four doors in one project?
Yes, this is possible. Siedle recommends networking several Secure Controllers in a master-slave topography for fail safety and due to the specification. An I/O extension with the relevant Siedle module, available from Siedle Engineering, is also conceivable. However, this extension should only be used for lift control.
Can the Siedle Secure Controller also control lifts?
Yes, it can. A Siedle I/O extension module may be needed for this. This can be obtained from Siedle Engineering.
Can the Siedle Secure Controller handle two different protocols simultaneously?
Yes, the Siedle Secure Controller can handle one protocol on each of its two bus lines. For example, Siedle Vario bus on line A and the Open Supervised Device Protocol (OSDP) on line B.
How many function modules can one Siedle Secure Controller control?
The Secure Controller has two bus lines. Up to eight modules can be connected to each of these – so up to 16 function modules in total.
How many Secure Controllers can be supplied with the NG 706-30/33-… line rectifier?
Our NG 706-30/33-… line rectifier is suitable for supplying two Secure Controllers.
How many electrical inputs – for exit buttons and door status, for example – can be created in an access control system with Secure Controllers?
Each Secure Controller has four relays, which each have two connections – for exit buttons and door status, for example. So each Secure Controller has eight inputs and four outputs (relays). As up to 64 Secure Controllers can be networked in a Siedle access control system, up to 512 inputs can be created in total (64 Controllers each with four relays with two inputs each).
Does the Secure Controller's contact load of 30 V DC 10 A apply?
Yes, this contact load corresponds to the CE certification. Therefore, higher values are not possible.
Is the ELM 611-02 electronic key reader compatible with the Siedle Secure Controller?
Yes, it is possible to use this electronic key reader (ELM 611-02), for example if this module is already installed in a system. However, we recommend using the ELM 600 electronic key reader, which uses MIFARE DESfire V2 technology – currently the highest security standard for electronic identification. For commissioning, the ELM 600-0 option must be selected in the Secure Controller's menu.
Can third-party read devices be used with the Siedle Secure Controller?
Yes, this may be possible, however these must be checked on a case-by-case basis due to differing technical prerequisites. Our ordering department will take care of this for you.
How are updates and upgrades installed in the Secure Controller?
All information about system updates and firmware downloads is available online on the Secure Controller product page .
readID One: Frequently asked questions (FAQ)
Does the readID One reader also work for the Siedle entrance controller Siedle transponders?
Yes, this is possible: The readID One is detected by the Siedle system as a keyboard. Transponder data can thus be transferred to our programming software (PRS) which is also compatible with the entrance controller.
Can transponder data from another manufacturer be used in a Siedle access control system?
No, this is not possible for security and data protection reasons.
If a transponder is found, can the readID One be used to find out which user it belongs to?
Yes, this is possible: Simply hold the ownerless transponder over the readID One's read area to read the data. This can then be compared with the system administrator's list to determine the user.