13
HDE 04.
12.
200
9
Ma
ß
e
in
mm – Dimensions in mm
–
Dime
n
sions en mm
– Medi
das
e
n
mm
- Misure
in
mm
Cat
. No.
73
2.2
9
.136
4. Installation
The installation instructions are a separate document and are enclosed with the
product. They are exclusively intended for:
• The
operator
,
• The
installation and start-up personnel
.
After these groups of people have read chapters 1 - 3 of these operating instructions,
they should now obtain and read the separate “
Installation instructions
” document
for installation purposes.
5. Start-up
The product is supplied in so-called “simple mode” for stand-alone operation (SA).
These instructions only describe how to start up in this mode.
• Details of use of the product with software applications (Dialock HOTEL,
PERSONNEL, Hotel Management Systems etc.) can be found in the relevant
software documentation.
5.1 Initial start-up
The work operations only need to be carried out once during initial start-up. The
individual work operations must be carried out within a short time window. Therefore:
• First study every work operation and have the keys that are needed at the ready
before commencing with initial start-up.
• Perform the work operations quickly and without interruptions.
6. Allocating locking authorisation
Locking authorisations for user keys can be allocated in 3 different categories:
•
Normal user keys
All doors to which the user key has locking authorisation can be opened with
these user keys. The locks lock again automatically after 3 seconds. Doors with
the "do not disturb" function activated cannot be opened.
For step-by-step instructions “
Start-up
” see
illustrations starting on page
42.
NOTE
Warning of abuse!
Unauthorised persons can gain access to rooms using the
programming and clearing keys.
> Only personnel who are authorised by the operator may
allocate locking authorisations!
> Take care when allocating locking authorisations to avoid
overlapping or mistakes.
> Keep programming and clearing keys in a safe place and
protect from abuse.
For step-by-step instructions “
Allocating locking
authorisation - normal user keys
” see illustrations
starting on page
43
.