Individuals performing the operations described in this manual are expected to be already familiar with the concepts and terminology related to the field of security, as well as with the Siemens fire and security products, and the networks and subsystems supported by them.
Page 5
About this document 5. After the download preparation completes (Background Process …), click Download and follow the instructions of your browser. For more information such as Siemens news and announcements, visit the STEP Web portal at: https://workspace.sbt.siemens.com/content/00001123/default.aspx Operational and safety regulations Before groups of persons begin work on any DMS system, they must have read and understood the related documents.
Page 6
About this document [→92] Modification index Note: For versions more than four years old, please visit Siemens Asset Portal. Version Date Notes A6V10359489_a_en 09.2016 DMS8000 4.81. For details regarding updates/modifications, see What's new [➙ 8]. A6V10359489_a_en 09.2015 DMS8000 4.80. FlexC protocol support.
(DMS), network choices, and subsystems used in any given plant are extensive. However, the time involved with commissioning tasks can be substantial. With the aim of reducing time spent on configuration, Siemens BT FS has developed their products so that the DMS and the networks can all be configured with a single tool called WW8000 Composer.
Introduction What's new The Network Connectivity Guide (A6V10359485) contains detailed information about configuring the networks supported by DMS8000 products. Reference documents are listed in the Resource Information document (see About this document [➙ 4]). 1.2 What's new Here is the list of modifications for new functions and software improvements. Section Modifications Configuring an SPC4000/SPC5000/SPC6000...
Configuring intrusion control units Configuring a Sintony SI410 2 Configuring intrusion control units This section describes how to configure control units. The list includes: SI410 SPC4000/SPC5000/SPC6000 CS6 Guarto CS440 CZ12 2.1 Configuring a Sintony SI410 The Sintony SI410 is an intrusion detection unit with individual addressing and access control capability.
Page 10
Configuring intrusion control units Configuring a Sintony SI410 B - Network connection via NK8000 The NK8000 network allows for connecting a SI410 unit using a serial line. The NK82xx Ethernet Port unit provides an optimised (and possibly encrypted) access to the LAN (Ethernet 10-Base-T) for DMS8000. NK82xx can also handle local interactions between the connected subsystems.
Configuring intrusion control units Configuring a Sintony SI410 2.1.2 SI410 connectivity: technical notes 2.1.2.1 SI410 internal options and settings Serial ports The SI410 can provide serial connectivity to host computers on the port J1, J7 and J10 (please refer to SI410 documentation). Note: Port J7 is used for connecting to the Sylcom PC, whereas J1 or J10 is used for DMS8000.
Configuring intrusion control units Configuring a Sintony SI410 [➙ 15]). Note that the Sintony IP port field is used for the Sylcom network link only. SI410 configuration for network connectivity Further options required in the Sylcom tool - System page In order to be able to reset alarms from DMS8000 with no need of unsetting the Ward, make sure to enable the Clear Al.Mem Full Set option in the System Properties.
Configuring intrusion control units Configuring a Sintony SI410 Configuration overview 1. Generate the SI410 metafile. 2. Add the folder(s) required for identifying the location of the SI410 in the project structure tree. 3. Add SI410 system node to the new folder. 4.
Page 14
Configuring intrusion control units Configuring a Sintony SI410 (see Configuration procedures [➙ 15]). - Download the configuration on the NK8000 unit (see the Network Connectivity Guide ). - Connect the SI410 port to the COM port of the appropriately configured NK82xx port.
Configuring intrusion control units Configuring a Sintony SI410 6. Then press the Start button. Note: In case of errors, check the SI410 firmware release (compare with latest requirements in the DMS8000 product Release Notes). a The software starts communicating with the SI410 and acquiring the configuration data over the serial line.
Page 16
Configuring intrusion control units Configuring a Sintony SI410 Adding the intrusion system node 1. Select the new folder. 2. In the left-hand bar, select the Intrusion folder icon . 3. In the menu that appears, select the appropriate icon to add a new intrusion system node.
Page 17
Configuring intrusion control units Configuring a Sintony SI410 1. Expand the network folders until you reach the node that represents the NK8000 network node physically connected to the SI410. 2. Select the SI410 node. 3. Drag and drop the SI410 Sintony node to the serial port of the NK82xx node. 4.
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 In case of network link (see Figure Setting the network communication – options ), set the IP address of the SI410 control unit and the TCP Port Number used in the network communication. Setting the serial communication options Setting the network communication options 2.2 Configuring an SPC4000/SPC5000/SPC6000...
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 The support of the FlexC protocol by MM8000/MK8000 systems has the following restriction: The redundancy mechanism is not supported. Only the fixed key encryption method is supported ( AutoEncryption is not supported). If you use the FlexC protocol, take note also of the following: You can reset fault events (like Warning Fault , Hold Up Fault , and Detector Fault ) only if the grade of the panel is set to Unrestricted or Grade 2.
Page 20
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 – Time Sync Limit: suggested value is 120 seconds (max value is 999).The time synchronization command is only accepted by the panel if the new time and actual time of the control panel are outside of the defined time interval;...
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 8. Select Panel Settings > System Settings > All Zones and check for the Local attribute of each zone: the Local attribute must not be selected. 9. Save and export the SPC configuration file. a SPC Pro exports a [file_name].cfg configuration file.
Page 22
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 2. Select the path: Supervisor System Settings > MM8000 System > Physical configuration > Station (e.g. My Station) > Channels Collection 3. Click the NS8021 FlexC Driver or the NS8013 SPC Driver icon in the icon toolbar to add the driver to the channels collection.
Page 23
Configuring intrusion control units Configuring an SPC4000/SPC5000/SPC6000 Adding a new SPC node Importing the SPC metafile 1. Select the SPC node. 2. Select Tools > Import in the Composer menu to start the SPC import. a The software presents a browsing window to search for the file to import. 3.
Configuring intrusion control units Configuring a CS6 Guarto 3. Drag and drop the SPC node to the driver. a A new node appears in the tree under the driver representing the link. Note: If the driver settings do not match any of the client settings in the imported SPC configuration, the link is declined.
Configuring intrusion control units Configuring a CS6 Guarto – (NK822x only) Subnet, Node, and Logical address for each CS6. – (NK823x only) Subnet and Node of the CS6. The connection to the CS6 network: – (NK822x only) Connection to Cercom/LON. –...
Page 26
Configuring intrusion control units Configuring a CS6 Guarto 3. In the menu that appears, select the appropriate icon to add a new intrusion system node. a A new node is added to the project structure. Note: You can customise the default name of the new node typing in a new name in the Description field of the Node tab, but do not customise it now since it will be renamed during the metafile import.
Page 27
Configuring intrusion control units Configuring a CS6 Guarto 2. In the left-hand bar, select the communication node: – For NK822x, click the LON icon – For NK823x, click the USB icon Linking the CS6 to the communication network Drag and drop the CS6 node to the CerCom/LON node (for NK822x) or to the USB node (for NK823x).
Page 28
Configuring intrusion control units Configuring a CS6 Guarto Linking CS6 to NK823x Setting CerCom/LON bus addresses (NK822x only) 1. Select the CS6 link in the LON node. 2. Set the CerCom/Lon addresses associated to the CS6 unit: – LON Subnet (high and low hex digit) –...
Configuring intrusion control units Configuring a CS6 Guarto Setting CerCom/LON addresses for NK823x 2.3.3 Commissioning tips Commissioning procedure To assure that the Logical Address is correctly assigned to the CS6 control unit, we recommend the following procedure: 1. Switch off power of the CS6 control unit(s). 2.
Page 30
Configuring intrusion control units Configuring a CS6 Guarto Serial loop Com1 SWE6 Tool between SWE6 port RCCS6 and RCCS6 Com... port Ethernet Ethernet Tunnelling SWE6 Tool data NK822x RS-232 BACnet/LON Guarto Tunnelling for remote CS6 configuration Hardware and software prerequisites 1.
Configuring intrusion control units Configuring a CS4 3. When finished, stop SWE6 and then disconnect and close RCCS6. RCCS6 tool Note: - When the remote tunnelling technique is used, the CS6 download time can be significantly longer than the local download time. - During the CS6 configuration download, the communication over the LON bus stops functioning.
Configuring intrusion control units Configuring a CS4 Note: The CDI-Net/NK8000 requires a serial line available on the gateway. Plug-ins needed: – #350301 Note: Plug-ins are installed during the software setup procedure. You can check that the Plug-ins are actually available using the Composer Plug-in Installer in the DMS8000 start menu.
Page 33
Configuring intrusion control units Configuring a CS4 Adding a new CS4 node Setting the CS4 Local Address, Vitality Timer and Sub type 1. Select the CS4 node. 2. In the Node tab, set the Local Address, Vitality Timer and Sub type. Please note that: The address value should range from 111 to 248 according to the DMS7000 addressing scheme (last digit cannot be 0 or 9), and it should match what is set...
Page 34
Configuring intrusion control units Configuring a CS4 a In a few moments, the CS4 structure is imported, and the node is represented in the Composer tree. Note: The node is renamed to match the metafile name. To customise the name, click the node text, type in a new name, and press ENTER.
Configuring intrusion control units Configuring a CS440 2.5 Configuring a CS440 The CS440 is a large intrusion detection system with individual addressing. It consists of the CS440 control unit and the CT411 operating units. The ADI addressing elements transmit the detector signals to the control unit. The structure of the CS440 is divided into logical system levels, and planning and parameterisation determines its allocation to software and hardware.
Configuring intrusion control units Configuring a CS440 2.5.2 Configuration procedures Adding the intrusion system folder 1. In the left-hand bar, click the Generic Template icon a A new node is added to the project structure. 2. Select the new folder and name it in the Description field of the Node tab. Adding the intrusion system node 1.
Page 37
Configuring intrusion control units Configuring a CS440 Note: The value to set in the Vitality Timer depends on the type of network. The following rule applies: - In Cerloop network, the MK7022 already handles the vitality check, and the DMS host does not receive the heartbeat messages. In this case, set the timer value = 0.
Configuring intrusion control units Configuring a CZ12 Linking CS440 to NK82xx (NK8223, COM3) 2.6 Configuring a CZ12 The CZ12, the predecessor of the CS4, is a control unit for intrusion detection. It was developed as part of the DMS7000 system. The CZ12 is physically composed of a central module, which is housed inside a cabinet, and connected to detection lines and alarming devices.
Configuring intrusion control units Configuring a CZ12 Note: The CZ12 configuration structure does not need to be entered again in Composer when there is an existing DMS7000 or LMSmodular configuration. In this case, you can import: - Export metafile from DMS7000, a text file including all the DMS7000 point texts. - LMSmodular database, specifically DB_PUL.DBF and a DB_SUB.DBF files.
Page 40
Configuring intrusion control units Configuring a CZ12 2. Select the new folder and name it in the Description field of the Node tab. Adding the intrusion system node 1. Select the new folder. 2. In the left-hand bar, select the Intrusion folder icon . 3.
Page 41
Configuring intrusion control units Configuring a CZ12 Note: The value to set in the Vitality Timer depends on the type of network. The following rule applies: - In Cerloop network, the MK7022 already handles the vitality check, and the DMS host does not receive the heartbeat messages. In this case, set the timer value = 0.
Page 42
Configuring intrusion control units Configuring a CZ12 - Door monitoring zones - Users - Time programs Linking the zones to the sections Drag and drop the zones to the sections where they belong. Linking the CZ12 to the Communication network Link the CZ12 node to the Cerloop, CDI-Net, or NK8000: 1.