1. System Architecture Overview Software to Hardware Flow Access Professional (Software) Network (TCP/IP) AMC2 / B9512G (Controller) Wiegand / OSDP Card Reader Relay Output Electric Lock 2. OSDP vs Wiegand Comparison Feature Wiegand OSDP (Open Supervised Device Protocol) Security Low (vulnerable to wire-tapping) High (bidirectional, encrypted) Wire Count Typically 3-5 wires 2 wires (RS-485) Max Distance ~150m (500ft) ~1200m (4000ft) Multi-Drop No (dedicated wires per reader) Yes (multiple readers on one bus) Reader Supervision No Yes (tamper detection, health monitoring) Compliance Legacy standard SIA Standard (secure, future-proof) 3. Technical Wiring Diagram: Access Control 3.1 General Principles Use shielded cable for readers (e.g., 22 AWG, 6-8 conductors). Separate low-voltage (reader, data) and high-voltage (lock power) wiring. Always include a protection diode for inductive loads (locks). 3.2 Lock Wiring Examples Protection Diode: For all inductive loads (maglocks, electric strikes), install a 1N4004 or 1N4007 diode across the lock terminals, with the band (cathode) towards the positive (+) supply of the lock. This protects the controller's relay from back-EMF. Maglock (Fail-Safe / NC - Normally Closed) Power applied = Locked. Power removed = Unlocked (e.g., during power failure). Controller NO C NC Power Supply + - Maglock Diode Connections: Controller C to Power Supply (+), Controller NC to Maglock (+), Maglock (-) to Power Supply (-). Electric Strike (Fail-Secure / NO - Normally Open) Power applied = Unlocked. Power removed = Locked (e.g., during power failure). Controller NO C NC Power Supply + - Electric Strike Diode Connections: Controller C to Power Supply (+), Controller NO to Electric Strike (+), Electric Strike (-) to Power Supply (-). 4. Controller to Feature Wiring 4.1 AMC2 (Access Professional Edition) Reader: Wiegand: Data 0, Data 1, LED, Buzzer, +12V, GND. OSDP: RS-485 A (Data-), RS-485 B (Data+), +12V, GND. Lock Relay (R1/R2): Terminals: C (Common), NO (Normally Open), NC (Normally Closed). Connect as per Fail-Safe/Fail-Secure requirements (see above). Maximum current: 2A @ 30VDC (check specific model for details). Door Contact (Input): Connect NC (Normally Closed) loop to designated input terminals (e.g., IN1, GND). Request to Exit (REX) (Input): Connect NC (Normally Closed) pushbutton to designated input terminals (e.g., IN2, GND). Power: +12VDC from dedicated power supply. Network: RJ45 Ethernet port for TCP/IP communication to Access Professional server. 4.2 B9512G / B8512G (Integrated System) These panels integrate access control with intrusion. Access control points are typically handled by on-board or expansion access modules. Reader: Similar Wiegand/OSDP connections to AMC2, often via dedicated reader ports on an access module. Lock Relay: Integrated relays (e.g., on B9512G, up to 4 on-board relays). Connect C, NO, NC as required. Ensure relay capacity matches lock requirements. Inputs (Door Contact, REX): Utilize general-purpose zone inputs or dedicated access control inputs. Program zone type as "Access Door Contact" or "Request to Exit." Power: Primary 18VAC transformer, with battery backup. Internal power supply provides +12VDC for readers/locks. Network: Built-in Ethernet port for communication to central station and/or Access Professional (if integrated). 5. Software Configuration UI Steps (General) These steps outline a typical workflow in Access Professional or similar software. Add Controller: Navigate to "Hardware" or "Controllers" section. Add new controller (e.g., AMC2, B9512G IP address/serial). Configure network settings if necessary. Configure Doors/Readers: Select the added controller. Go to "Doors" or "Access Points." Add a new door. Assign reader type (Wiegand/OSDP), reader number/address. Assign associated inputs (Door Contact, REX) and outputs (Lock Relay). Set lock type (Fail-Safe/Fail-Secure), unlock time. Define Access Levels & Schedules: Create "Schedules" (e.g., "Mon-Fri 8 AM - 5 PM"). Create "Access Levels" and assign doors/schedules to them. Enroll Users & Credentials: Add new "Users" to the system. Assign "Credentials" (card numbers, mobile credentials) to users. Assign "Access Levels" to users. Monitor & Report: View real-time events (access granted, access denied, alarms). Generate audit trails and access reports.