TownSteel TSM-7100 AegisSecure Management System User Manual
- August 20, 2024
- TownSteel
Table of Contents
- TownSteel TSM-7100 AegisSecure Management System User Manual
- Introduction
- Lock Features
- **** Automatic Inhibiting
- Pin codes
- Checkout
- Passage mode schedules
- Passage mode
- Dead Bolt/Privacy Override
- Block/Unblock Function
- Internal Clock and Calendar
- Time zone in keycards
- One shot
- Areas
- LED indicators
- Low Battery
- Property entries
- Audit Trail
- Authorization
- Door Lock Programmer
- Programming locks using the Door Lock Programmer
- Setting Date and Time
- Read More About This Manual & Download PDF:
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
TownSteel TSM-7100 AegisSecure Management System User Manual
Introduction
This manual is intended for people who program and troubleshoot locks. It covers the use of special keycards, programming and interrogating locks, and lock maintenance. Before reviewing this section, you should first become thoroughly familiar with the material covered in the Aegis 7000 Management System User’s Manual. The TSM is a grade 1 heavy duty RFID electronic lock with the security afforded by using Aegis 7000 Management System for an offline access management solution. The lock accepts encrypted Mifare credentials for enhanced functionality to simplify the management of the lock.
Lock Features
**** Automatic Inhibiting
Normally, a guest room lock will be set up to operate with more than one guest Credential type (Guest keycard, Pin Codes, Alternate, backup, one shot). The lock is programmed to automatically activate inhibiting between these credential types. When a new credential is used from one of the types, it will prevent previously used credentials for the other credential types from activating the lock.
Pin codes
Pin codes are used as a form of credential key to allow access entry to the guest. This can be set up and through the Aegis 7000 software and ranges from 6-18 digit codes. This feature can be turned off through the Aegis 7000 software and is only used as a guest key.
Checkout
The checkout function is used to prevent the current Guest Credentials from entering a room. When this function is used in the Aegis 7000 software the current keys of these types will not activate the locking mechanism. This feature prevents guests who have checked out of a room from later reentering the room, and is normally used by housekeeping after the room has been cleaned.
Passage mode schedules
A lock can be programmed in the Aegis 7000 software to automatically unlatch or latch at specified times for each day of the week. A credential is not required to perform the unlatching and latching activities. When a lock is unlatched, a key is not required to open the door. The lock may have up to three different unlatch/latch times per week.
Passage mode
A credential can be programmed to latch and/or unlatch the lock. When a lock is unlatched, a credential is not required to open the door. If a credential is used, the lock will display the normal lights and will function normally. When the lock is once again latched, a valid credential is required to release the locking mechanism.
Dead Bolt/Privacy Override
Each type of credential can be programmed to indicate whether or not it will override the dead bolt/privacy function. Usually, one emergency credential type is programmed in the Aegis 7000 software with the capability, and is used only in emergency situations.
Block/Unblock Function
This function can be used in the Aegis 7000 software to temporarily prevent a specific key ID from accessing a lock or multiple locks. A specific key ID can be blocked allowing remaining key ID’s in the same key group to remain functioning. The block and unblock key can be assigned to both guest and master level key groups.
Internal Clock and Calendar
The lock contains a clock crystal that maintains actual date and time. The time is updated every minute and the crystal automatically adjusts for changes due to daylight savings and leap year.
Time zone in keycards
Certain personnel keycards can be programmed to work only during certain hours of the day. When the keycard is made, the user specify the start and end times of the shift. A keycard can have only three shifts specified. If the keycard is used outside the shift times, it will not work.
One shot
A guest credential type can be programmed to limit the number of times a valid credential will activate the lock to one use. This determination is made in advance, and the number of times the credential will work cannot be varied. You can also program a credential expiration date and time when a credential is made. The credential will cease to activate the lock when it has been used or when it expires at the specified date and time, whichever comes first.
Areas
This feature is used for special locks such as pool doors, elevators or limited access doors. Locks can be programmed as areas in the Aegis 7000 software allowing certain credentials with permissions to activate the locking mechanism. This permissions to the areas can be selected during the creation of the credentials. Both, personnel and guest credentials can have permissions to areas.
LED indicators
If a credential does not work in a lock the light indicators to display the red LED that indicates the credential did not work. If the credential is a valid credential, the indicator lights will display the green LED and the credential will work normally. LED can also be used to display a lock that has the privacy function activated.
Low Battery
If the lock’s batteries are low a yellow indicator light will flash when a
correct credential is used before displaying thegreen LED and unlocking.
The low battery indicator will only be displayed in the Aegis 7000 software as
an action item.
Property entries
This feature is used for special locks such as perimeter entrances, elevators or limited access doors. Locks can be programmed as property entries in the Aegis 7000 software, which allow valid credentials to activate the locking mechanism. This feature can be programmed in several ways: Hotel gate – These locks will allow any credential made at the property to function in the locks. Building gate –These locks will allow any credential made for the specified building to function in the locks. Floor gate –These locks will allow any credential made for the specified floor to function in the locks. The feature is programmed and functions automatically without requiring the users to set any permissions on credential.
Audit Trail
Audit trail determines which credential was used, when an access occurred, who
owned the credential at the time of access and what action was performed.
Audit trail is stored in the lock’s nonvolatile memory. Displayed in the Aegis
7000 software in order of most recent event.
Encryption – All the data that is written on the keycards is encrypted
and can only be read by the Aegis 7000 software. Also each property will have
its own encrypted code to prohibit keycards of working from one property to
another.
MIFARE – Type of technology used for contactless smart card systems.
MIFARE is compliant with the international ISO 14443 Type A standard.
Authorization
Used to register or change the property code when installing the Aegis 7000 Management System, or if a severe security problem has occurred. The authorization keycard initializes the lock during a first-time installation. After first- time installation the authorization card prepares the lock for communication with parameter cards or DLP device.
Door Lock Programmer (DLP) – A handheld device containing the Aegis 7000 database information downloaded from the system. The DLP is used to program and audit locks and card readers.
Deadbolt and Privacy feature
Additionally to the electronic features, the lock is also equipped with a
deadbolt That can be thrown from the inside of the room. The deadbolt is set
by turning the deadbolt latch to the locked position.
When the deadbolt is in the locked position, a flashing red LED will appear.
If a keycard is used on the reader a red LED will flash and beep, and the door
will remain locked. A keycard with the override option enabled will produce a
green LED and will override the deadbolt and allow access to the room.
To unlock the lock from the inside while the deadbolt is thrown, turn the door
handle. This action will retract both the latch and the deadbolt.
Select models of the TSM have an automatic deadbolt feature that automatically
projects the 1” deadbolt when the door is closed. This feature provides
latching security against forced entry. Keycards require to have the DND
override option enabled in order to gain access.
To open the door from the inside after the deadbolt has been thrown, simply
depress the door handle. This action will override the privacy feature and
allow the guest to exit
Programming Locks
When the locks are shipped from the factory, the batteries are not installed. The locks will be fully functioning when four AA batteries are installed on a lock. After installing the batteries the locks will only be operable via construction cards since all locks are initially on factory default settings. To program the locks to accept other credentials, you must use the Door Lock Programmer (DLP), along with the computer that is on the same network as the locks.
Door Lock Programmer
The Door Lock Programmer is a handheld device containing the Aegis 7000
database information downloaded from the system. The DLP acts an interface
between the lock and the Aegis 7000 Client and is used to enter lock code
information directly from the computer into the lock.
The DLP connects to the computer and downloads information using a micro-USB
mini-b cable. The DLP communicates with the locks using NFC communication.
Programming locks using the Door Lock Programmer
To program the locks using the DLP, you must first download the database
information from the Aegis 7000 Client. For more information regarding
downloading the database information please review the Aegis 7000 Management
System User’s Manual.
Once the database information is downloaded from the client to the DLP, you
can disconnect the DLP from the cable and transport the DLP to the lock.
In order to program the lock you will need to have the Authorization keycard
that was delivered with your copy of the
Aegis 7000 Management System. Follow the steps for lock programming:
From the DLP’s main menu, select option 2. Lock Functions. Four new options
will appear onscreen, select 1. Program Room. The list of possible room
numbers that can be programmed into the lock will appear. These room are based
off of the user’s database information that was downloaded into the DLP.
Select the room number and press set and follow the onscreen instructions
Setting Date and Time
The lock’s embedded system maintains the actual date and time. The time is
automatically updated every minute and the clock is automatically adjusted for
changes due to Daylight Saving Time, and Leap Year. The date and time are
initially updated when the DLP is used to program the door lock and it is
updated when the DLP is used to interrogate the lock for audit trials. The
time can be manually updated using the DLP if there are any changes needed.
For example: if the lock’s batteries are disconnected for a period of time.
If the lock experiences a low battery condition.
If the lock’s clock has not been updated via the DLP for a 12-month period.
Low Battery Warning
Each lock contains batteries, which are used to power the lock’s circuit board
and to release the locking mechanism. The lock uses four AA alkaline
batteries. Lithium batteries although long lasting, are not recommended to be
used due to their lower voltage output.The lock’s batteries may need to be
replaced
when one of the following symptoms appear:
- A Standard keycard alternately flashes the yellow LED 5 times before the green LED flashes on the RFID reader and the lock
- The DLP report indicates that the batteries are
If the low battery warning is displayed follow the step‐by‐step procedures for replacing lock batteries on each type of lock are provided in the Lock Installation Manual.
Reset Lock to Factory Default Settings
Steps
- Bring the flat surface of your Authorization keycard near the circular or rectangular RFID When the keycard is close enough to be read, the green LED will flash on the RFID reader and beep.
- Leave the Authorization keycard in that same position for 7 The green LED will remain solid on the RFID reader and the lock will beep two more times.
hd/KE͗ Z/^< K& yW>K^/KE /& dd Zz /^ Z W> z E /E KZZ d dzW ͘ /^WK^ K& h^ dd Z/ ^ KZ /E’ dK d, /E^dZh d/KE^͘
& tĂƌŶŝŶŐ͗
dŚŝƐ ĞƋƵŝƉŵĞŶƚ ŚĂƐ ďĞĞŶ ƚĞƐƚĞĚ ĂŶĚ ĨŽƵŶĚ ƚŽ ĐŽŵƉůLJ ǁŝƚŚ ƚŚĞ ůŝŵŝƚƐ ĨŽƌ Ă ůĂƐƐ ĚŝŐŝƚĂů ĚĞǀŝĐĞ͕ ƉƵƌƐƵĂŶƚ ƚŽ ƉĂƌƚ ϭϱ ŽĨ ƚŚĞ & ZƵůĞƐ͘ dŚĞƐĞ ůŝŵŝƚƐ ĂƌĞ ĚĞƐŝŐŶĞĚ ƚŽ ƉƌŽǀŝĚĞ ƌĞĂƐŽŶĂďůĞ ƉƌŽƚĞĐƚŝŽŶ ĂŐĂŝŶƐƚ ŚĂƌŵĨƵů ŝŶƚĞƌĨĞƌĞŶĐĞ ŝŶ Ă ƌĞƐŝĚĞŶƚŝĂů ŝŶƐƚĂůůĂƚŝŽŶ͘ dŚŝƐ ĞƋƵŝƉŵĞŶƚ ŐĞŶĞƌĂƚĞƐ͕ ƵƐĞƐ ĂŶĚ ĐĂŶ ƌĂĚŝĂƚĞ ƌĂĚŝŽ ĨƌĞƋƵĞŶĐLJ ĞŶĞƌŐLJ ĂŶĚ͕ ŝĨ ŶŽƚ ŝŶƐƚĂůůĞĚ ĂŶĚ ƵƐĞĚ ŝŶ ĂĐĐŽƌĚĂŶĐĞ ǁŝƚŚ ƚŚĞ ŝŶƐƚƌƵĐƚŝŽŶƐ͕ ŵĂLJ ĐĂƵƐĞ ŚĂƌŵĨƵů ŝŶƚĞƌĨĞƌĞŶĐĞ ƚŽ ƌĂĚŝŽ Žƌ ƚĞůĞǀŝƐŝŽŶ ƌĞĐĞƉƚŝŽŶ͕ ǁŚŝĐŚ ĐĂŶ ďĞ ĚĞƚĞƌŵŝŶĞĚ ďLJ ƚƵƌŶŝŶŐ ƚŚĞ ĞƋƵŝƉŵĞŶƚ ŽĨĨ ĂŶĚ ŽŶ͕ ƚŚĞ ƵƐĞƌ ŝƐ ĞŶĐŽƵƌĂŐĞĚ ƚŽ ƚƌLJ ƚŽ ĐŽƌƌĞĐƚ ƚŚĞ ŝŶƚĞƌĨĞƌĞŶĐĞ ďLJ ŽŶĞ Žƌ ŵŽƌĞ ŽĨ ƚŚĞ ĨŽůůŽǁŝŶŐ ŵĞĂƐƵƌĞƐ͗
ZĞŽƌŝĞŶƚ Žƌ ƌĞůŽĐĂƚĞ ƚŚĞ ƌĞĐĞŝǀŝŶŐ ĂŶƚĞŶŶĂ͘
/ŶĐƌĞĂƐĞ ƚŚĞ ƐĞƉĂƌĂƚŝŽŶ ďĞƚǁĞĞŶ ƚŚĞ ĞƋƵŝƉŵĞŶƚ ĂŶĚ ƌĞĐĞŝǀĞƌ͘
ŽŶŶĞĐƚ ƚŚĞ ĞƋƵŝƉŵĞŶƚ ŝŶƚŽ ĂŶ ŽƵƚůĞƚ ŽŶ Ă ĐŝƌĐƵŝƚ ĚŝĨĨĞƌĞŶƚ ĨƌŽŵ ƚŚĂƚ ƚŽ ǁŚŝĐŚ
ƚŚĞ ƌĞĐĞŝǀĞƌ ŝƐ ĐŽŶŶĞĐƚĞĚ͘ ͻ ŽŶƐƵůƚ ƚŚĞ ĚĞĂůĞƌ Žƌ ĂŶ ĞdžƉĞƌŝĞŶĐĞĚ ƌĂĚŝŽͬds
ƚĞĐŚŶŝĐŝĂŶ ĨŽƌ ŚĞůƉ͘
ĂƵƚŝŽŶ͗ ŶLJ ĐŚĂŶŐĞƐ Žƌ ŵŽĚŝĨŝĐĂƚŝŽŶƐ ƚŽ ƚŚŝƐ ĚĞǀŝĐĞ ŶŽƚ ĞdžƉůŝĐŝƚůLJ ĂƉƉƌŽǀĞĚ ďLJ
ŵĂŶƵĨĂĐƚƵƌĞƌ ĐŽƵůĚ ǀŽŝĚ LJŽƵƌ ĂƵƚŚŽƌŝƚLJ ƚŽ ŽƉĞƌĂƚĞ ƚŚŝƐ ĞƋƵŝƉŵĞŶƚ͘ dŚŝƐ ĚĞǀŝĐĞ
ĐŽŵƉůŝĞƐ ǁŝƚŚ ƉĂƌƚ ϭϱ ŽĨ ƚŚĞ & ZƵůĞƐ͘ KƉĞƌĂƚŝŽŶ ŝƐ ƐƵďũĞĐƚ ƚŽ ƚŚĞ ĨŽůůŽǁŝŶŐ
ƚǁŽ ĐŽŶĚŝƚŝŽŶƐ͗
;ϭͿ dŚŝƐ ĚĞǀŝĐĞ ŵĂLJ ŶŽƚ ĐĂƵƐĞ ŚĂƌŵĨƵů ŝŶƚĞƌĨĞƌĞŶĐĞ͕ ĂŶĚ
;ϮͿ dŚŝƐ ĚĞǀŝĐĞ ŵƵƐƚ ĂĐĐĞƉƚ ĂŶLJ ŝŶƚĞƌĨĞƌĞŶĐĞ ƌĞĐĞŝǀĞĚ͕ ŝŶĐůƵĚŝŶŐ
ŝŶƚĞƌĨĞƌĞŶĐĞ ƚŚĂƚ ŵĂLJ ĐĂƵƐĞ ƵŶĚĞƐŝƌĞĚ ŽƉĞƌĂƚŝŽŶ͘
dŚĞ & ĐĞƌƚŝĨŝĐĂƚŝŽŶ ĨŽƌ ƚŚŝƐ ĚĞǀŝĐĞ ƉĞƌƚĂŝŶƐ ƚŽ ƚĞƐƚŝŶŐ ĨŽƌ Z& ĞdžƉŽƐƵƌĞ ƵŶĚĞƌ ƐƚĂŶĚĂƌĚ ŽƉĞƌĂƚŝŶŐ ĐŽŶĚŝƚŝŽŶƐ͘ dŚĞƐĞ ĐŽŶĚŝƚŝŽŶƐ ƐƉĞĐŝĨLJ ƚŚĂƚ Ă ƉĞƌƐŽŶ ƐŚŽƵůĚ ŵĂŝŶƚĂŝŶ Ă ĚŝƐƚĂŶĐĞ ŽĨ ŶŽ ůĞƐƐ ƚŚĂŶ ϮϬ ĐĞŶƚŝŵĞƚĞƌƐ ĨƌŽŵ ƚŚĞ ĚĞǀŝĐĞΖƐ ƐƵƌĨĂĐĞ Ăƚ Ăůů ƚŝŵĞƐ͕ ĞdžĐĞƉƚ ĨŽƌ ŽĐĐĂƐŝŽŶĂů͕ ƐŚŽƌƚͲƚĞƌŵ ŝŶƐƚĂŶĐĞƐ ůĂƐƚŝŶŐ ĂƌŽƵŶĚ ƐĞĐŽŶĚƐ͘ dŚĞ ĚĞǀŝĐĞ ŝƐ ĚĞŵŽŶƐƚƌĂƚĞĚ ƚŽ ŵĞĞƚ ƚŚĞ & Z& džƉŽƐƵƌĞ ƌĞƋƵŝƌĞŵĞŶƚƐ ŽƵƚůŝŶĞĚ ŝŶ < ϰϰϳϰϵϴ ŽŶůLJ ƵŶĚĞƌ ƚŚĞ ƐƉĞĐŝĨŝĞĚ ĐŽŶĚŝƚŝŽŶƐ͘
Read More About This Manual & Download PDF:
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>