1
TABLE OF CONTENTS
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Lock Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Lock Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
PowerLever Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Lock Entry Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Additional Materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Lock Personnel Classifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Combinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
User IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
User PINs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
User ID Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Communicating with the Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Operating Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Lock Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7
Programmable Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Re-Lock Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Passage Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Wrong Try Limit and Penalty Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Operational Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Shelved Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
Activated Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Lock Setup Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Lock Startup Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Additional Lock Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Lock Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Open Shelved Lock Using Default Combination . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Change User ID and PIN Lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-13
Activate the Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-14
Activate the Manager User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Set the Re-Lock and Wrong Try Limit and Penalty Times . . . . . . . . . . . . . . . . . . . . . .15
Add Access User(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Change PIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Open the Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Determine Model Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Issue Service User Combination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Remove Service User Combination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Disable a Specific User ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Enable a Specific User ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Disable a Group of User IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Enable a Group of User IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Switch Passage Function (On/Off) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Delete Access User(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26-27
Deactivate Manager User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Change Master User Combination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Shelve the Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Quick Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
PowerLever Door Lock Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Introduction
Lock Description
The PowerLever
®
Door Lock is an advanced design electronic lock that oper-
ates using internally-generated power, “PowerStarTM technology”, and includes
a microprocessor and a cylindrical lock mechanism.
The lock consists of the following major assemblies:
•
Outside cover assembly - includes a keypad for entry of control data, a
pair of LEDs (red and green) for visual feedback, a beeper for audio feed-
back, and the outside lever with a return of
1
⁄
2
" to the door (unassembled).
•
Inside cover hardware - includes system electronics and the inside lever
with a return of
1
⁄
2
" to the door (unassembled).
•
Cylindrical lock hardware - includes a Grade 1 lock mechanism with free-
wheeling system and stainless steel retractor, a 6-pin standard key cylinder
with tailpiece and two keys (unless prepared for interchangeable core), a
9
⁄
16
" throw latchbolt with adjustable bevel, and either a 2
3
⁄
4
" T-strike with box or
a 4
7
⁄
8
" ASA strike, and a screw pack.
Lock Users
The table below denotes the number of users for the Model 15xx lock. The num-
ber of users will vary depending on whether you define a 1 or 2-digit User ID.
Model
Users
UID Range
Users
UID Range
15xx
10
0 - 9
23
00 – 99
The Model 15xx does not maintain an audit trail.
PowerLever Operation
The PowerLever Lock is designed to operate using internally-generated power.
The self-contained PowerStarTM generator is triggered by depressing the out-
side lever. Each 67-degree open and 67-degree restore rotation of the lever
constitutes a charging cycle. A door open operation will require only one charg-
ing cycle if the period of door lever inactivity does not exceed a weekend (ap-
proximately 65 hours) when operating at normal room temperature. Periods of
non-use beyond a weekend will require two charging cycles for a door open
operation. One simultaneous flash of the green and red LEDs accompanied by
a low volume beep indicates that the lock is powered. Each additional depres-
sion of the lever will result in this same response.