SP-C Security Expert - System Controller - Installation Guide
SP-C Security Expert - System Controller - Installation Guide
Contents
Introduction 6
About This Module 6
Controller Editions 6
Installation Requirements 7
Wiring 7
Grounding Requirements 8
Safety Grounding 8
Earth Ground Connection 8
Mounting 10
Removal 10
Wiring Diagram 11
Connections 12
Power Requirements 12
Auxiliary Outputs 14
Encrypted Module Network 14
Module Wiring 14
End of Line (EOL) Resistors 15
Telephone Dialer 16
Cellular Modem 16
Ethernet 10/100 Network Interface 17
Inputs 30
EOL Resistor Value Options 31
Duplex Inputs 31
Trouble Inputs 32
Outputs 35
June 2024 3
Security Purpose Controller
Bell/Siren Output 35
Relay Outputs 36
Reader Outputs 36
Hardware Configuration 37
Configuring a Controller via the Web Interface 37
Setting the IP Address from a Keypad 37
Temporarily Defaulting the IP Address 38
Defaulting a Controller 39
LED Indicators 41
Power Indicator 41
Status Indicator 41
Fault Indicator 41
Ethernet Link Indicator 41
Modem Indicator 42
Reader Data Indicators 42
Bell Indicator 42
Relay Indicators 42
Input Indicators 43
Mechanical Diagram 44
Mechanical Layout 45
Technical Specifications 46
Current and Validation Example 48
European Standards 54
UK Conformity Assessment Mark 57
UK PD 6662:2017 and BS 8243 57
June 2024 4
Security Purpose Controller
June 2024 5
Security Purpose Controller Introduction
Introduction
This installation manual provides instructions and technical specifications for physical
installation of the Security Expert Security Purpose Controller module. For system
communication and programming information, see the Security Expert Security Purpose
Controller Configuration Guide.
Controller Editions
There are two editions of the SP-C controller:
l The SP-C-IP can communicate alarms and upload information to remote systems over
IP, or via connection to the SP-4G-USB Security Purpose DIN Rail Cellular Modem.
l The SP-C can communicate alarms and upload information to remote systems over IP, or
via connection to the SP-4G-USB Security Purpose DIN Rail Cellular Modem.
It also includes a built-in 2400bps modem dialer which allows it to communicate alarms
and upload information to remote systems via PSTN using Contact ID or SIA protocols.
June 2024 6
Security Purpose Controller Installation Requirements
Installation Requirements
This equipment is to be installed in accordance with:
l The product installation instructions
l UL 294 - Access Control System Units
l UL 681 - Installation and Classification of Burglar and Holdup Systems
l UL 827 - Central-Station Alarm Services
l CAN/ULC-S301, Central and Monitoring Station Burglar Alarm Systems
l CAN/ULC-S302, Installation and Classification of Burglar Alarm Systems for Financial and
Commercial Premises, Safes and Vaults
l CAN/ULC-S561, Installation and Services for Fire Signal Receiving Centres and Systems
l CAN/ULC-60839-11-1, Alarm and Electronic Security Systems – Part 11-1: Electronic
Access Control Systems – System and Components Requirements
l The National Electrical Code, ANSI/NFPA 70
l The Canadian Electrical Code, Part I, CSA C22.1
l AS/NZS 2201.1 Intruder Alarm Systems
l The Local Authority Having Jurisdiction (AHJ)
Wiring
June 2024 7
Security Purpose Controller Grounding Requirements
Grounding Requirements
An effectively grounded product is one that is intentionally connected to earth ground through
a ground connection or connections of sufficiently low impedance and having sufficient
current-carrying capacity to prevent elevated voltages which may result in undue hazard to
connected equipment or to persons.
Grounding of the Security Expert system is done for three basic reasons:
1. Safety
2. Component protection
3. Noise reduction
Safety Grounding
The object of safety grounding is to ensure that all metalwork is at the same ground (or earth)
potential. Impedance between the Security Expert system and the building scheme ground
must conform to the requirements of national and local industrial safety regulations or
electrical codes. These will vary based on country, type of distribution system and other
factors. The integrity of all ground connections should be checked periodically.
General safety dictates that all metal parts are connected to earth with separate copper wire or
wires of the appropriate gauge.
June 2024 8
Security Purpose Controller Grounding Requirements
DIN Rail Ground Connections (one or more cabinets installed in the same room)
Module Network
(RS-485 N+, N-, NA, NB)
V-
Output Expander
AC Mains Wiring
Earth Ground
Link Connection
DIN Rail Ground Connections (multiple cabinets in different rooms, sectors, or buildings)
Module Network (RS-485 N+, N-, NA and NB)
V-
Earth Ground
Link Connection
The Dialer's Earth Ground Connection applies to modem model controllers only.
Note that the DIN rail enclosure earth terminal is connected to the power supply V- terminal.
There must be only one single earth grounding point per system.
June 2024 9
Security Purpose Controller Mounting
Mounting
Security Expert DIN rail modules are designed to mount on standard DIN rail either in
dedicated DIN cabinets or on generic DIN rail mounting strip.
When installing a DIN rail module, ensure that there is adequate clearance around all sides of
the device and that air flow to the vents of the unit is not restricted. It is recommended that you
install the module in a location that will facilitate easy access for wiring. It is also recommended
that the module is installed in an electrical room, communication equipment room, secure
cabinet, or in an accessible area of the ceiling.
1. Position the DIN rail module with the labeling in the correct orientation.
2. Hook the mounting tabs (opposite the tab clip) under the edge of the DIN rail.
3. Push the DIN rail module against the mount until the tab clips over the rail.
Removal
A Security Expert DIN rail module can be removed from the DIN rail mount using the following
steps:
1. Insert a flat blade screwdriver into the hole in the module tab clip.
2. Lever the tab outwards and rotate the unit off the DIN rail mount.
June 2024 10
Security Purpose Controller Wiring Diagram
Wiring Diagram
CAUTION: Incorrect wiring may result in damage to the unit.
1K 1K REX REX 1K 1K
1K 1K REN REN 1K 1K
Shield Shield
N.O Input Contact N.O Input Contact
Red Red
Black Black
Green Green
White White
Orange Orange
Brown Brown
Blue Blue
Yellow Yellow
Optional UL Optional UL
Listed Reader Violet Violet Listed Reader
Controller
UL listed power N+ N- NA NB
supply or module
supplying power to
White
Black
Blue
Red
Brown
Green
Grey
Red
networked devices
RJ31X
+
Security System
Lock Power User Interface
Supply
Cold water
N+ N- NA NB 1N4007 earth pipe
Diode
+
Electric Locking
Device
Next modules
on network
+
Lock Power
Supply
1N4007
Diode 1K
1N4007
Diode
+
++
--
+
June 2024 11
Security Purpose Controller Connections
Connections
Power Requirements
Power is supplied to the controller by a 12V DC power supply connected to the N+ and N-
terminals. The controller does not contain internal regulation or isolation and any clean 12V
DC supply is suitable for this purpose.
Termination of wiring to the module while power is applied or the battery is connected may
cause serious damage to the unit and will VOID ALL WARRANTIES OR GUARANTEES.
Power the unit only after all wiring, configuration and jumper settings are
completed.
A battery backup must be connected to the module network to provide a monitored supply.
The battery plays an important role in power conditioning and provides a continuous source of
power in the event of a power outage.
For UL applications, must be powered by a UL Listed (UL 603 or UL 294) power
limited power supply capable of supplying at least 4 hours of standby power.
For cUL applications, must be powered by a cUL Listed (CAN/ULC S318 or
CAN/ULC S319) power limited power supply capable of supplying at least 24
hours of standby power.
June 2024 12
Security Purpose Controller Connections
In a small installation this same power supply can be used to supply the module network as
well, so long as the maximum load of the power supply is not exceeded. In larger installations,
the power supply may need to be split to allow for load sharing between several supplies.
To comply with EN 50131-1 only one battery can be connected and monitored per system.
If more capacity is required a single larger battery must be used.
When using multiple power supplies it is important to ensure that all ground connections
(V-) are connected between all power supplies and that no power connections (V+) are
connected between any power supplies.
June 2024 13
Security Purpose Controller Connections
Auxiliary Outputs
The auxiliary outputs (V- V+) of the controller can be used to supply other equipment. Note that
there is no onboard regulation or isolation for these outputs; they are a fused feed-through
from the N+ N- input terminals. When using these outputs to supply other devices, be sure not
to exceed the rating of the internal fuses as outlined in the Technical Specifications.
PSU or
equivalent 12V DC
supply
Always connect the controller's NA and NB terminals to the NA and NB terminals of the
expansion devices and keypads. The N+ and N- must connect to a 12V power supply source
capable of supplying the peak current drawn by all modules. If a shielded cable is used, the
shield must be connected at only one end of the cable. DO NOT connect a shield at both ends.
The 12V N+ and N- communication input must be supplied from only one point.
Connections from more than one 12V supply may cause failure or damage to the unit or the
device supplying network power. Make sure that the power supply can supply enough
current for the peak load drawn by all modules connected to the 12V supply, including the
controller itself.
Module Wiring
The recommended module network wiring specifications are:
l Minimum 24AWG (0.51mm) shielded twisted pair with characteristic impedance of 120
ohm
l Maximum total length of cable is 900m (3000ft)
l CAT5e / CAT6 are also supported for data transmission when using ground in the same
cable (to a maximum length of 100m (328ft))
Warning: Unused wires in the cable must not be used to carry power to other devices.
June 2024 14
Security Purpose Controller Connections
N+ N- NA NB N+ N- NA NB
330R 330R
To From
Next Previous
Module Module
June 2024 15
Security Purpose Controller Connections
Telephone Dialer
The controller provides the ability to communicate alarms and upload information to remote
systems using the onboard 2400bps modem. The telephone line can be connected directly to
the controller using the onboard telephone connection terminals.
Cellular Modem
The controller provides the ability to communicate alarms and upload information to remote
systems via the Security Expert Security Purpose DIN Rail Cellular Modem (SP-4G-USB).
The modem can be connected directly to the controller using the Type-A USB port.
Security Expert controllers which do not have a physical USB port are incompatible and
cannot be retrofitted.
SIM ANT
Cellular
Controller Modem
N+ N-
USB USB 12VDC IN
For more information, see the Security Expert Security Purpose DIN Rail Cellular Modem
Installation Manual and Security Expert Security Purpose DIN Rail Cellular Modem
Configuration Guide.
June 2024 16
Security Purpose Controller Connections
Installing the module on an active network requires knowledge of the configuration and
structure for the network. Always consult the network or system administrator and ask them
to provide you with a fixed IP address that can be assigned to the module.
When installing an ethernet connection the module should be interfaced using a standard
segment (<100m in length) and should be connected to a suitable ethernet hub or switch:
Controller
Controller
Temporary direct connections can be used for onsite programming by using a standard
ethernet cable.
Controller
June 2024 17
Security Purpose Controller Door Access Control
Recommended Cabling
The recommended cable types for RS-485 are:
l Minimum 24AWG (0.51mm) shielded twisted pair with characteristic impedance of 120
ohm
Maximum distance: 900m (3000ft)
All UL listed Security Expert readers are shipped with single LED mode set as
default and are fully compatible with the Security Expert system.
Shield Connection
Important:
l The card reader must be connected to the module port using a shielded cable.
l The shield must only be connected at one end of the cable in the metallic enclosure
(frame grounded).
l Do not connect the cable shield to an AUX-, 0V or V- connection on the module.
l Do not connect the cable shield to any shield used for isolated communication.
l The reader pigtail shield and cable shield wires should be joined at the reader pigtail
splice.
l Do not terminate the reader shield wire inside the reader.
Always refer to the card reader manufacturer for detailed installation guidelines.
June 2024 18
Security Purpose Controller Door Access Control
Third-party RS-485 readers can only be connected using the OSDP protocol (see page 21).
D1/ D0/
BZ L1 NB NA Z4 V- Z3 Z2 V- Z1 V- V+
June 2024 19
Security Purpose Controller Door Access Control
D1/ D0/
BZ L1 NB NA Z4 V- Z3 Z2 V- Z1 V- V+
Configuration Location
Reader address = 0 Entry
June 2024 20
Security Purpose Controller Door Access Control
All Schneider Electric readers use address 0 (entry) by default, unless configured otherwise.
The reader's address can be configured by applying the required reader address TLV setting
to the reader programming.
For programming instructions, see the Security Expert Card Reader Configuration Guide.
SX readers are hardwired to use address 1 when the reader's green and orange wires are
joined together. For more information, see the SX reader installation manual.
Connection of two OSDP readers to provide an entry/exit configuration follows the same
connection requirements as connecting two RS-485 readers (see previous page).
D1/ D0/
BZ L1 NB NA Z4 V- Z3 Z2 V- Z1 V- V+
This connection example shows wiring for Security Expert readers. Other readers may use
different color configurations. Always refer to the card reader manufacturer for detailed
installation guidelines, and see the table below.
Consult the manufacturer's documentation for wiring instructions for the specific reader
being connected.
June 2024 21
Security Purpose Controller Door Access Control
June 2024 22
Security Purpose Controller Door Access Control
D1/ D0/
BZ L1 NB NA Z4 V- Z3 Z2 V- Z1 V- V+
This connection example shows wiring for Security Expert readers. Other readers may use
different color configurations. Always refer to the card reader manufacturer for detailed
installation guidelines, and see the table below.
June 2024 23
Security Purpose Controller Door Access Control
To connect two Wiegand readers to a reader port the Multiple reader input port 1/2 option
must be enabled in the reader expander programming. When this option is disabled the
reader port will only process a single reader.
The following shows the connection of two Wiegand readers to provide an entry/exit
configuration.
This connection example shows wiring for Security Expert readers. Other readers may use
different color configurations. Always refer to the card reader manufacturer for detailed
installation guidelines, and see the table below.
June 2024 24
Security Purpose Controller Door Access Control
Wiegand LED control Join to entry reader Wiegand LED control wire
Wiegand beeper control Join to entry reader Wiegand beeper control wire
June 2024 25
Security Purpose Controller Door Access Control
OUT COM IN
V+
GREEN 0V 0V
V-
RED
D1/ D0/
NB NA
BROWN
ORANGE
L1
L2
BZ
C
Magnetic card readers are typically operated by 5 volts. Before connecting the magnetic card
reader to the controller, ensure that the supply voltage is correct and if required insert the
inline 5 Volt regulator as shown in the diagram above.
The magnetic reader connection has not been evaluated for UL/cUL
applications.
June 2024 26
Security Purpose Controller Door Access Control
1K 1K
REN Input
Bond Sense
1K 1K
Z4
V-
N.O. Input Contact
Z3
N.C. Input Contact
Z2
1K 1K
V-
REX Input
Z1
V-
V+
Door Contact
1K 1K
Inputs 1-4 and 5-8 can operate as either general purpose inputs or as onboard reader inputs. If
used as general purpose inputs, make sure that these inputs are not defined in the onboard
reader set up.
When connected the REX input can be programmed to operate regardless of the door contact
state. The REX input can also be programmed to recycle the door alarm time to prevent
nuisance alarms when the door is held open to permit longer entry.
When inputs are configured as bond sense and/or general purpose inputs
(access control and burglar installations), remaining inputs cannot be used for
fire.
June 2024 27
Security Purpose Controller Door Access Control
To use the lock outputs in conjunction with the onboard reader, the lock output for the door
associated with the reader port must be configured to be the desired lock output on the
controller. This is not configured by default.
B+
B- NO COM NC NO COM NC
+
1N4007 Diode
12VDC Electric
Locking Device
+
Power Supply
The locking device is connected to the NO terminal, as displayed above, for power to unlock /
fail secure devices. For power to lock / fail safe devices the locking device is connected to the
NC terminal.
The 1N4007 diode is supplied for lock output connections and must be installed at the
electric strike terminals.
Warning: Relay outputs can switch to a maximum capacity of 7A. Exceeding 7A will
damage the output.
REX and REN devices must be listed to UL 294 for UL installations and
CAN/ULC-S319 for cUL installations, and be compatible with the system.
June 2024 28
Security Purpose Controller Door Access Control
Reader 1
RDxxx:12 System System Tamper
Tamper
Reader 2
RDxxx:13 System System Tamper
Tamper
Replace 'xxx' with the appropriate address of the module that you are programming.
'xxx' refers to the Name of the door in the Security Expert system.
June 2024 29
Security Purpose Controller Inputs
Inputs
The controller has 8 onboard inputs for monitoring the state of devices such as magnetic
contacts, motion detectors and temperature sensors. Devices connected to the inputs can be
installed to a maximum distance of 300m (1000ft) from the module when using 22 AWG wire.
l Magnetic contacts shall be listed to UL 634 to comply with UL installation
standards and ULC/ORD-C634 to comply with cUL installation standards.
l Motion detectors and temperature sensors shall be listed to UL 639 to
comply with UL installation standards and ULC-S306 to comply with cUL
installation standards.
l The controller has been evaluated for UL 294, UL 1076, UL 1610, UL 1635,
CAN/ULC-S304, CAN/ULC-S319 and CAN/ULC-S559.
Inputs can be programmed using the Security Expert software. Inputs CP001:01 to CP001:08
represent the controller's onboard inputs. Additional inputs are supported through the use of
expansion modules.
The controller supports normally opened and normally closed configurations with or without
EOL resistors. When using an input with the EOL resistor configuration, the controller
generates an alarm condition when the state of an input changes between open and closed
and generates a tamper alarm condition when a wire fault (short circuit) or a cut wire
(tampered) in the line occurs. Inputs default to require the EOL resistor configuration.
V+
N.C Tamper 1K 1K
V-
Z1
V-
Z2
Z3
V-
Z4
Inputs 1-4 and 5-8 can operate as either general purpose inputs or as onboard reader inputs.
If used as general purpose inputs you must ensure that they are not defined in the onboard
reader set up.
Each input can use a different input configuration. To program a large number of inputs with
the same configuration use the multiple selection feature within the Security Expert software.
When using the 'No Resistor' configuration the controller only monitors the opened and closed
state of the connected input device, generating the alarm (open) and restore (closed/sealed)
conditions.
June 2024 30
Security Purpose Controller Inputs
V+
N.C Input Contact
V-
Z1
V-
Z2
Z3
V-
Z4
EOL Resistor Value Options
When using the EOL resistor configuration, the EOL resistor option must be configured based
on the site requirements. Note these resistor options are supported on the controller but not all
resistor options are supported on all Security Expert field modules.
The 5k6 Value 1 and Value 2 have not been evaluated by UL, cUL.
Duplex Inputs
The controller is able to support up to 16 inputs when duplex mode is enabled.
To enable this feature, check the Duplex inputs option in Sites | Controllers | Options.
In addition, you will need to manually add additional inputs with addresses 9-16 in
Programming | Inputs.
June 2024 31
Security Purpose Controller Inputs
Input 2 Input 1
N.C Input Contact N.C Input Contact
V+
2K4 1K
V-
N.C Tamper
Z1
V-
Z2
Z3
V-
Z4
The following table indicates the position and resistor configuration corresponding to each
input address:
2 Z1 2K4
3 Z2 1K
4 Z2 2K4
5 Z3 1K
6 Z3 2K4
7 Z4 1K
8 Z4 2K4
9 Z5 1K
10 Z5 2K4
11 Z6 1K
12 Z6 2K4
13 Z7 1K
14 Z7 2K4
15 Z8 1K
16 Z8 2K4
Enabling duplex inputs will not change the programming of any existing inputs. These must
be reprogrammed or rewired to match the new addressing scheme.
Trouble Inputs
Each controller can monitor up to 64 local trouble inputs.
June 2024 32
Security Purpose Controller Inputs
Trouble inputs are used to monitor the status of the controller and in most cases are not
physically connected to an external input. These can then be used to report a message to a
monitoring station, remote computer, keypad or siren.
The following table details the trouble inputs that are configured in the controller and the
trouble groups that they are associated with.
CP001:03 Reserved - -
CP001:10 Reserved - -
CP001:12 Reserved - -
CP001:15 Reserved - -
CP001:16 Reserved - -
CP001:17 Reserved - -
CP001:18 Reserved - -
CP001:19 Reserved - -
Report IP Reporting
CP001:20 System Hardware Fault
Failure
CP001:21 Reserved - -
Modbus Communication
CP001:22 System Hardware Fault
Fault
CP001:25 Reserved - -
CP001:26 Reserved - -
CP001:27 Reserved - -
June 2024 33
Security Purpose Controller Inputs
CP001:30 Reserved - -
CP001:31 Reserved - -
CP001:32 Reserved - -
|||| || | |
CP001:64 Reserved - -
June 2024 34
Security Purpose Controller Outputs
Outputs
The controller has 7 onboard outputs. These outputs are used to activate bell sirens, lighting
circuits, door locks, relay accessory products and other automation points. The first output on
the controller has a special hardware design that allows it to monitor for fault conditions and is
ideally suited to driving sirens or warning devices.
Bell/Siren Output
The + and - terminals of the bell output (CP001:01) are used to power bells, sirens or any
devices that require a steady voltage output. The bell output supplies 12VDC upon alarm and
supports one 30-watt siren. The bell output uses an electronically fused circuit and
automatically shuts down under fault conditions.
Connecting a Piezo siren may result in a dull noise being emitted. This is caused by residual
current from the monitoring circuit. To prevent this occurring, connect two 1K resistors in
parallel.
B+
1k Resistors
B-
-
NO COM NC NO COM NC
12VDC siren
warning device
If the load on the bell terminals returns to normal, the controller reinstates power to the bell
terminals on the next transition of the output.
When the bell output is not used, the appropriate trouble input will be activated. This can be
avoided by connecting a 1K resistor (provided in the accessory bag) across the bell output. If
the bell is not being used for another function, and the trouble input is not programmed in the
system, a resistor is not required.
June 2024 35
Security Purpose Controller Outputs
Relay Outputs
The relay outputs (CP001:03 and CP001:04) on the controller are Form C relays with normally
open and normally closed contacts. These outputs can be used to activate larger relays,
sounders and lights, etc.
Z4
B+
V-
B-
1K5 OHM
Z3
NO COM NC NO COM NC
Z2
V-
Z1
V-
V+ LED
Warning: Relay outputs can switch to a maximum capacity of 7A. Exceeding 7A will
damage the output.
Reader Outputs
If readers are not attached to the reader ports then the Reader 1 L1 and BZ, and the Reader 2
L1 and BZ outputs can be used as general purpose outputs. These can be controlled by
assigning the RDxxxGreen R1, RDxxx Beeper R1, RDxxxGreen R2 and RDxxx Beeper R2
outputs of whichever reader module has been configured as the onboard reader module.
These are open drain outputs which switch to the V- reference.
Z4
DO
V-
L1 D1
1K5 OHM
Z3
Z2
BZ
V-
LED
Z1
V-
V+
Warning: The reader outputs can switch to a maximum capacity of 50mA. Exceeding this
amount will damage the output.
June 2024 36
Security Purpose Controller Hardware Configuration
Hardware Configuration
Configuring a Controller via the Web Interface
The controller's built-in web interface allows you to configure system communication and
security settings, including login, IP address, subnet mask, gateway and DNS settings, as well
as security certificates.
For information on using the controller's web interface to configure IP network and security
settings, see the Security Expert Security Purpose Controller Configuration Guide.
June 2024 37
Security Purpose Controller Hardware Configuration
This defaults the IP address for as long as power is applied, but does not save the change
permanently. Once the link is removed and power is cycled to the unit the configured IP
address is used.
D1/ D0/
BZ L1
NB NA
READER 1
4. Power up the controller. Wait for the status indicator to begin flashing steadily.
June 2024 38
Security Purpose Controller Hardware Configuration
Defaulting a Controller
The controller can be factory defaulted, which resets all internal data and event information.
This allows you to remove all programming and start afresh.
Defaulting the controller resets the IP address to the factory default IP of 192.168.1.2
D1/ D0/
BZ L1
NB NA
READER 2
4. Power up the controller. Wait for the status indicator to begin flashing steadily.
5. Remove the wire link before making any changes to the controller's configuration.
The system will now be defaulted with all programming and System Settings returned to
factory configuration, including resetting the IP address and all network configuration, and
removing all operator records.
l Defaulting the controller resets the IP address to the factory default IP of 192.168.1.2.
Earlier versions of the controller firmware do not reset the IP address. If the controller is
not available on 192.168.1.2 you will be able to connect to it via its previous IP address.
l Any configured system settings (e.g. Default Gateway, Event Server) are reset to their
default values.
l Any custom HTTPS certificates are removed and the default certificate is reinstalled.
Earlier versions of the controller do not have a default HTTPS certificate installed. If the
controller is not available via HTTPS, connect to it via HTTP.
l All operator records are removed and the admin operator must be recreated.
l All other programming is removed.
Before making any changes to the controller's configuration or upgrading the firmware,
remove the wire link used to default the controller.
After defaulting a controller a number of essential steps will need to be performed to resume
normal operation. Not all of the following steps will necessarily be required, depending on your
site configuration:
1. Connect to the controller's web interface using HTTPS, unless it is an older controller with
no default certificate loaded, then it will connect using HTTP.
2. Recreate the admin operator and log in to the controller's web interface.
If you are not prompted to create the admin operator, the default username is admin with
the password admin.
3. Reset the controller's IP address to its previous value.
4. Reconfigure any additional network settings.
June 2024 39
Security Purpose Controller Hardware Configuration
June 2024 40
Security Purpose Controller LED Indicators
LED Indicators
Security Expert DIN rail modules feature comprehensive diagnostic indicators that can aid the
installer in diagnosing faults and conditions. In some cases an indicator may have multiple
meanings depending on the status indicator display at the time.
Power Indicator
The power indicator is lit when the correct input voltage is applied to the controller.
Note that this indicator may take several seconds to light up after power has been applied.
State Description
On (green) Correct input voltage applied
Status Indicator
The status indicator displays the status of the controller.
State Description
Flashing (green) at 1 second intervals Controller is operating normally
Fault Indicator
The fault indicator is lit any time the controller is operating in a non-standard mode. During
normal operation the fault indicator is off.
State Description
Off Controller is operating normally
State Description
Valid link with a hub, switch or direct connection to a personal computer
On (green)
detected
Flashing
Data is being received or transmitted
(green)
June 2024 41
Security Purpose Controller LED Indicators
Modem Indicator
Modem model only.
State Description
On (green) Modem has control of telephone line
State Description
Short flash A SHORT flash (<250 milliseconds) will show that data was received but was
(red) not in the correct format
Long flash A LONG flash (>1 second) indicates that the unit has read the data and the
(red) format was correct
Bell Indicator
The Bell indicator shows the status of the bell output and the over current or circuit fault
conditions.
State Description
Off Bell is connected, output is OFF
On (green) Bell is ON
Single flash (green) Bell is ON, the circuit is in over current protection
Two flashes (green) Bell is OFF, the circuit to the siren/bell is cut, damaged or tampered
Relay Indicators
The relay indicators show the status of the lock output relays.
State Description
Constantly on (red) Relay output is ON
June 2024 42
Security Purpose Controller LED Indicators
Input Indicators
Whenever an input on the module is programmed with an input type and area, the input status
will be displayed on the front panel indicator corresponding to the physical input number. This
allows for easy test verification of inputs without the need to view the inputs from the keypad or
the Security Expert software.
State Description
Constantly off Input is not programmed
June 2024 43
Security Purpose Controller Mechanical Diagram
Mechanical Diagram
The mechanical diagram shown below outlines the essential details needed to help ensure the
correct installation of the controller.
POWER
1 2 3 4
Status Indicators ETHERNET R1 RELAY 1
Input Status
READER
STATUS
BELL
FAULT
5 6 7 8
R2 RELAY 2
June 2024 44
Security Purpose Controller Mechanical Layout
Mechanical Layout
The mechanical layout below outlines the essential details needed to help ensure correct
installation and mounting. All measurements are shown in millimeters.
156.80
90.00
44.68
Front
156.80
(2x)
Scre 4.67
w Ho
le
35.40
Back
139.18
June 2024 45
Security Purpose Controller Technical Specifications
Technical Specifications
The following specifications are important and vital to the correct operation of this product.
Failure to adhere to the specifications will result in any warranty or guarantee that was
provided becoming null and void.
Ordering Information
SP-C Security Expert Security Purpose Controller
Power Supply
Operating Voltage 11-14V DC
Communication
Ethernet 10/100Mbps ethernet communication link
USB Type-A
Readers
2 reader ports, independently configurable for either
Wiegand (up to 1024 bits configurable) or RS-485, allowing
connection of up to 4 readers providing entry/exit control for
Readers two doors **
Inputs
Inputs (System Inputs) 8 high security monitored inputs
Outputs
4 (50mA max) open collector outputs for reader LED and
Outputs
beeper or general functions
Dimensions
Dimensions (L x W x H) 156 x 90 x 60mm (6.14 x 3.54 x 2.36")
June 2024 46
Security Purpose Controller Technical Specifications
Operating Conditions
UL/cUL 0° to 49°C (32° to 120°F) : EU EN -10° to 55°C (14°
Operating Temperature
to 131°F)
Mean Time Between Failures 560,421 hours (calculated using RDF 2000 (UTE C 80-810)
(MTBF) Standard)
* The total combined current refers to the current that will be drawn from the external power
supply to supply the expander and any devices connected to its outputs. The auxiliary outputs
are directly connected via thermal resettable fuses to the N+ N- input terminals, and the
maximum current is governed by the trip level of these fuses. The Bell output is connected in
the same way.
** Each reader port supports either Wiegand or RS-485 reader operation, but not both at the
same time. If combining reader technologies, they must be connected on separate ports.
The size of conductor used for the supply of power to the unit should be adequate to prevent
voltage drop at the terminals of no more than 5% of the rated supply voltage.
Schneider Electric continually strives to increase the performance of its products. As a result
these specifications may change without notice. We recommend consulting our website
(www.schneider-electric.com) for the latest documentation and product information.
June 2024 47
Security Purpose Controller Technical Specifications
Example
Current Consumption
Total Combined Current before
3.4A (3400mA)
shutdown
Validation
Is the total DC Output (AUX1) current less or equal to 1.1A
Yes, it is 60mA
(1100mA)?
Yes, it is 1.1A
Is the Bell current output less or equal to 1.1A (1100mA)?
(1100mA)
June 2024 48
Security Purpose Controller New Zealand and Australia
Peripheral Devices
This section outlines specific routine maintenance procedures for Security Expert controllers
and expander modules which are used for intruder detection. It does not include specific
instructions for peripheral devices connected to the Security Expert system, such as motion
detectors, smoke detectors and warning devices. Although many of these peripheral devices
will be operated as part of the maintenance procedures described below, this may not meet
the routine maintenance procedures recommended for those devices.
As a minimum, we recommend that you follow the AS/NZS 2201.1-2007 standards relating to:
l Detection devices for internal use (AS/NZS 2201.3 Part 3)
l Audible and visible alarm and warning devices
Testing Frequency
The maintenance procedures outlined below meet the requirements of AS/NZS 2201.1-2007,
which specifies that testing of the intruder detection system must be carried out at least once a
year. However, the testing frequency of detection devices, alarm warning devices and
reporting operations should be determined according to the needs of the particular installation
and local body regulations.
For some clients or sites it may be prudent to perform more frequent testing to ensure the
integrity of the system. For example:
l Sites which require a higher rate of security or are heavily affected by environmental
conditions may choose to have testing carried out more frequently.
l Very large sites with hundreds of detection devices may prefer to arrange multiple testing
rounds per year, with a percentage of the devices tested in each round.
In contrast, sites where automated testing functions have been implemented may find that
annual maintenance visits are adequate.
June 2024 49
Security Purpose Controller New Zealand and Australia
Check wiring Visually inspect all wiring and cable protection systems
and cable Once per year (conduits, trunking, etc.). Record any damage or
protection deterioration.
Check the Check that all power supplies are properly connected to
Once per year
power supply a mains outlet and are operational.
June 2024 50
Security Purpose Controller New Zealand and Australia
Once per 3-5 Replace each power supply battery as required with
years, or as another of equivalent or better specifications. Record the
Replace
specified by the installation date of the new battery in the system
battery
battery maintenance records and in a clearly visible location
manufacturer within the equipment enclosure or on the battery itself.
As agreed
between Note: This procedure must be pre-arranged in
Test the consultation with the monitoring station.
monitoring
primary
company and l Ensure that the system is 'on test'.
reporting
client, but not l Perform an operation that triggers reporting.
service
less than once l Check that the system reports successfully.
per year
June 2024 51
Security Purpose Controller New Zealand and Australia
June 2024 52
Security Purpose Controller New Zealand and Australia
Follow-up Procedures
At the
conclusion of
Obtain client Obtain the signature of the client or the client's
each
sign off representative on the maintenance record.
maintenance
visit
June 2024 53
Security Purpose Controller European Standards
European Standards
CE Statement
Conforms where applicable to European Union (EU) Low Voltage Directive (LVD) 2014/35/EU,
Electromagnetic Compatibility (EMC) Directive 2014/30/EU, Radio Equipment Directive
(RED)2014/53/EU and RoHS Recast (RoHS2) Directive: 2011/65/EU + Amendment Directive
(EU) 2015/863.
This equipment complies with the rules, of the Official Journal of the European Union, for
governing the Self Declaration of the CE Marking for the European Union as specified in the
above directive(s).
WEEE
Information on Disposal for Users of Waste Electrical & Electronic Equipment
This symbol on the product(s) and / or accompanying documents means that used electrical
and electronic products should not be mixed with general household waste. For proper
treatment, recovery and recycling, please take this product(s) to designated collection points
where it will be accepted free of charge.
Alternatively, in some countries you may be able to return your products to your local retailer
upon purchase of an equivalent new product.
Disposing of this product correctly will help save valuable resources and prevent any potential
negative effects on human health and the environment, which could otherwise arise from
inappropriate waste handling.
Please contact your local authority for further details of your nearest designated collection
point.
Penalties may be applicable for incorrect disposal of this waste, in accordance with your
national legislation.
For business users in the European Union
If you wish to discard electrical and electronic equipment, please contact your dealer or
supplier for further information.
Information on Disposal in other Countries outside the European Union
This symbol is only valid in the European Union. If you wish to discard this product please
contact your local authorities or dealer and ask for the correct method of disposal.
EN50131 Standards
This component meets the requirements and conditions for full compliance with EN50131
series of standards for equipment classification.
EN 50131-1:2006+A2:2017, EN 50131-3:2009, EN 50131-6:2008+A1:2014, EN 50131-
10:2014, EN 50136-1:2012, EN 50136-2:2013, EN 60839-11-1:2013
This component meets the requirements and conditions for full compliance with EN50131-3
(2010) 8.10.1 and EN50131-1 (2006) 8.10 when connected to a compliant ARC (Alarm
Reporting Centre).
June 2024 54
Security Purpose Controller European Standards
Security Grade 4
Environmental Class II
Equipment Class: Fixed
Readers Environmental Class: IVA, IK07
SP1 (PSTN – voice protocol)
SP2 (PSTN – digital protocol),
SP6 (LAN – Ethernet) and DP1 (LAN – Ethernet + PSTN)
SP6 (LAN – Ethernet) and DP1 (LAN – Ethernet + USB-4G modem)
SSF 1014 Larmklass 4 (System components - Intruder alarm systems)
Tests EMC (operational) according to EN 55032:2015
Radiated disturbance EN 55032:2015
Power frequency magnetic field immunity tests (EN 61000-4-8)
EN50131
In order to comply with EN 50131-1 the following points should be noted:
l Ensure for Grade 3 or 4 compliant systems, the minimum PIN length is set for 6 digits.
l To comply with EN 50131-1 Engineer access must first be authorized by a user, therefore
Installer codes will only be accepted when the system is unset. If additional restriction is
required then Engineer access may be time limited to the first 30 seconds after the system
is unset.
l Reporting delay –Violation off the entry path during the entry delay countdown will trigger a
warning alarm. The warning alarm should not cause a main alarm signal and is not
reported at this time. It can be signaled locally, visually and or by internal siren type. If the
area is not disarmed within 30 seconds, the entry delay has expired or another instant
input is violated, the main alarm will be triggered and reported.
l To comply with EN 50131-1 neither Internals Only on Part Set Input Alarm nor Internals
Only on Part Set Tamper Alarm should be selected.
l To comply with EN 50131-1 Single Button Setting should not be selected.
l To comply with EN 50131-1 only one battery can be connected and monitored per system.
If more capacity is required a single larger battery must be used.
l For Security Grade 4 installations, two forms of reporting are required. This can be
satisfied using the onboard 2400bps modem included with the modem controller model, or
through the incorporation of the SP-4G-USB cellular modem module into the installation
with the non-modem controller model.
Anti Masking
To comply with EN 50131-1 Grade 3 or 4 for Anti Masking, detectors with a separate or
independent mask signal should be used and the mask output should be connected to another
input.
I.e. Use 2 inputs per detector. One input for alarm/tamper and one input for masking.
To comply with EN 50131-1:
l Do not fit more than 10 unpowered detectors per input,
l Do not fit more than one non-latching powered detector per input,
l Do not mix unpowered detectors and non-latching powered detectors on an input.
To comply with EN 50131-1 the Entry Timer should not be programmed to more than 45
seconds.
To comply with EN 50131-1 the Bell Cut-Off Time should be programmed between 02 and 15
minutes.
EN 50131-1 requires that detector activation LEDs shall only be enabled during Walk Test.
This is most conveniently achieved by using detectors with a Remote LED Disable input.
June 2024 55
Security Purpose Controller European Standards
To comply with EN 50131-1, EN 60839-11 Security Grade 4 and AS/NZS2201.1 class 4&5
Vibration Detection for PreTamper Alarm, protection is provided by a DSC SS-102 Shockgard
Seismic vibration sensor mounted within the system enclosure. Alarm output is provided by a
pair of non-latching, N.C. (normally closed) relay contacts, opening for a minimum of 1 second
on detection of an alarm connected in series with the 24Hr tamper input (TP) on the PSU (or
any other system input designated/programmed as a 24Hr Tamper Alarm).
This relay is normally energized to give fail-safe operation in the event of a power loss.
Indication of detection is provided by a LED situated on the front cover. The vibration sensor is
fully protected from tampering by a N.C. micro switch operated by removal of the cover.
Enclosure SX-DIN-24 has been tested and certified to EN50131.
By design, all Security Expert EN-DIN-XX DIN Rail Enclosures comply with the EN50131
standards. Tamper protection against removal of the cover as well as removal from mounting
is provided by tamper switch.
Warning: Enclosures supplied by 3rd parties may not be EN50131-compliant, and
should not be claimed as such.
June 2024 56
Security Purpose Controller UK Conformity Assessment Mark
June 2024 57
Security Purpose Controller UL and cUL Installation Requirements
For UL 1610, ULC S304 and ULC S559 installations where a secondary method of reporting is
required, use the onboard 2400bps modem included with the modem controller model, or
incorporate the SP-4G-USB cellular modem module into the installation with the non-modem
controller model.
All cabinet installations of this type must be located inside the Protected Area.
Not to be mounted on the exterior of a vault, safe or stockroom.
All cabinet internal covers and lids/doors must be connected to the cabinet's main ground
point for electrical safety and static discharge protection.
UL Operation Mode
UL operation mode should be enabled in Security Expert system settings. Select Sites |
Controllers | Options and then select Advance UL Operation for the Security Expert
system to operate in UL compliance mode.
This setting has the following effects:
June 2024 58
Security Purpose Controller UL and cUL Installation Requirements
l Adds a 10 second grace period following a failed poll before a module is reported as
offline.
Each module sends a poll message to the controller every 250 seconds. The module will
be reported as offline if no poll has been received for the duration of this poll time plus the
10 second grace period.
l Suppresses reporting of all alarms and/or reportable events to a monitoring station within
the first two minutes of the controller powering up. The system will continue to send poll
messages as usual.
l Reports 'Input Tamper' events as 'Input Open' events when the area that the input is
assigned to is armed. If the area is disarmed an 'Input Tamper' message will be sent.
l Limits the Dial attempts for reporting services to a maximum of 8.
This setting must be used in conjunction with the other configuration requirements as noted in
this section.
CAN/ULC-S304
l Auto Arming
Control units that support auto arming shall provide an audible signal throughout the
protected area not less than 10 min prior to the auto arming taking place. The control unit
shall allow authorized users to cancel the auto arming sequence and transmit such
cancelation to the signal receiving center with the identification of the authorized user that
canceled the action.
The following options must be enabled in the Security Expert system when using the Auto
Arming feature. When the defer warning time is programmed to 10 minutes, the output
group will be activated 10 minutes before the system performs the Auto Arming in the
associated Area.
l The Defer Output or Output Group must be programmed. Refer to the section
Areas | Outputs in the Operator Reference Manual for programming instructions.
June 2024 59
Security Purpose Controller UL and cUL Installation Requirements
l The Defer Warning Time must be programmed to not less than 10 minutes. Refer to
the section Areas | Configuration in the Operator Reference Manual.
l The Defer Automatic Arming option must be enabled. Refer to the section Areas |
Options (2) in the Operator Reference Manual.
l Arming Signal
A bell or visual indicator used as an arming acknowledgment signal must be listed to a cUL
security, signaling or fire standard. If intended to be mounted outside, it must be rated for
outdoor use.
l Double EOL Input Configuration
Only double EOL Input Configuration shall be used. Refer to the Inputs section of this
manual and the section Inputs | Options in the Operator Reference Manual.
l Multiplex System and Poll Time
The Security Expert controller is compatible with the ArmorIP Internet Monitoring
Receiver. Poll Time must be set to 40 seconds and the Grace Time must be set to 20
seconds.
In the Security Expert system, the reporting service must be configured to 40 seconds.
The following options are required for the service selected as Report IP type:
l The Log Polling Message option must be enabled. Refer to the section Report IP |
Options in the Operator Reference Manual.
l The Poll Time must be programmed to 40 seconds. Refer to the Report IP | General
section in the Operator Reference Manual.
l Central Station Signal Receiver
The common equipment of each signal receiving center control unit shall be limited to
1000 alarm systems.
l Number of attempts
In the event of unsuccessful communication, a digital alarm communicator transmitter
shall make a minimum of 5 and a maximum of 10 attempts. Where the maximum number
of attempts to complete the sequence is reached, an indication of the failure shall be made
at the premises.
In the Security Expert system, the reporting service selected as Contact ID must have the
number of attempts programmed to 5 attempts. The Dial Attempts option must be
programmed. Refer to the section Contact ID | Settings in the Operator Reference Manual.
If the SP-4G-USB cellular modem is being used as the secondary reporting option in the
installation, the Report IP service assigned to the cellular modem must be programmed
as above.
l Check-In Time
DACT communication channel check-in time is not to exceed 24 hrs.
l Trouble Input Service Test Report
l The Test Report Time must be programmed. Refer to the section Controllers |
Configuration in the Operator Reference Manual.
l The Generate Input Restore on Test Input option must be enabled. Refer to the
section Controller | Options in the Operator Reference Manual.
l The Test Report Time is Periodic option must be enabled. Refer to the section
Controller | Options in the Operator Reference Manual.
l Primary Communication Channel
The first attempt to send a status change signal shall utilize the primary communication
channel.
An ethernet Report IP service must be used as the primary service. The backup service
may use Contact ID over the phone line or Report IP over the cellular network if the SP-
4G-USB cellular modem is being used as the secondary communication channel.
The following options are required:
June 2024 60
Security Purpose Controller UL and cUL Installation Requirements
l The primary service (Report IP) must have the Backup service set to the secondary
reporting service (Contact ID or Report IP over 4G modem). The Service mode must
be set to 1 - Start with controller OS.
l The backup service must have Service operates as backup enabled. For ULC-S304
P3 applications, Enable offline polling must be enabled and configured so that the
backup service is monitored even when it is not active.
l For Report IP services, the Reporting protocol must be set to Armor IP.
l Refer to the Services section in the Operator Reference Manual.
l Status Change Signal
An attempt to send a status change signal shall utilize both primary and secondary
communication channels.
l Local Annunciation if Signal Reporting Failure
Failure of the primary communication channel or secondary communication channel shall
result in a trouble signal being transmitted to the signal receiving center within 240
seconds of the detection of the fault. Failure of either communication channel shall be
annunciated locally within 180 seconds of the fault.
The following options must be enabled in the Security Expert system:
l The Ethernet Link Failure trouble input must be programmed.
l The Trouble Input Area must be armed. Refer to the section Trouble Inputs | Areas
and Input Types in the Operator Reference Manual.
l Network and Domain Access
Neither the subscriber control unit nor the signal receiving center receiver shall be
susceptible to security breaches in general-purpose operating systems.
Network access policies should be set to restrict unauthorized network access and
"spoofing" or "denial of service" attacks.
l Ethernet Connections
All ethernet network connections shall be installed within the same room as the
equipment.
l Encryption
For active communications channel security, encryption shall be enabled at all times.
The ArmorIP-E (UDP) protocol must be used and the Encryption Type must be set to AES-
256.
The following options must be enabled for the Report IP service in the Security Expert
system.
l The Reporting Protocol must be set to ArmorIP (UDP) Encrypted. The AES key
must be set as specified by monitoring station.
l Refer to the section Report IP | General in the Operator Reference Manual.
l Server Configuration
Where a server is employed for control over network addressing, encryption or re-
transmission, such shall be designed to remain in the "on state" at all times.
Communicators are not suitable for active communication channel security and medium or
high risk applications unless such can be "online" at all times, have a minimum 128 bit
encryption scheme, have encryption enabled, network and domain security implemented.
Network access policies shall be set to restrict unauthorized network access and
"spoofing" or "denial of service" attacks.
l Internet Service Provider (ISP)
The Internet Service Provider (ISP) providing service shall meet the following
requirements:
l redundant servers/systems
l back-up power
June 2024 61
Security Purpose Controller UL and cUL Installation Requirements
CAN/ULC-S319
l The Security Expert controller and reader expander module are intended to be mounted
within the enclosure (refer to UL/cUL Installation Cabinet Options), installed inside the
protected premise, and are CAN/ULC-S319 Listed for Class I applications only.
l Exit devices and wiring must be installed within the protected area.
l For the Security Expert controller and reader expander module, all RS-485 and reader
terminal connections must be made using shielded grounded cable.
l All readers must be connected with shielded, grounded cable.
June 2024 62
Security Purpose Controller UL and cUL Installation Requirements
l A bell or visual indicator used as an arming acknowledgment signal must be listed to a cUL
security, signaling or fire standard. If intended to be mounted outside, it must be rated for
outdoor use.
l Fail secure locking mechanisms shall only be installed where allowed by the local
authority having jurisdiction (AHJ) and shall not impair the operation of panic hardware
and emergency egress.
l If fire resistance is required for door assembly, portal locking device(s) must be evaluated
to ULC-S533 and CAN/ULC-S104.
l Must be installed with CAN/ULC-S319 listed portal locking device(s) for cUL installations.
l If a flexible cord is used to connect to line voltage, strain relief must be provided for the
cord inside the enclosure or at the knockout.
l The power supply is not intended to be mounted on the exterior of vault, safe, or
stockroom.
CAN/ULC-S559
l Signal Reporting
Any fault of an active communication system shall be annunciated and recorded at the
signal receiving center within 180 s of the occurrence of the fault.
The Report IP and Contact ID services must be programmed and enabled within the
Security Expert system. The following options are required:
l The Contact ID Reporting Service must be enabled and the Service Mode must be
configured to start with the operating system.
l Refer to the section Contact ID in the Operator Reference Manual.
l The Report IP Service must be enabled as the primary communication channel, the
Service Mode must be configured to start with the operating system, and the
Reporting Protocol must be set to ArmorIP.
l Refer to the section Report IP in the Operator Reference Manual.
l The Trouble Area must be armed. Refer to the section Trouble Inputs | Areas and
Input Types in the Operator Reference Manual.
In the ArmorIP Internet Monitoring Software the Poll Time must be set to 40 seconds and
the Grace Time must be set to 20 seconds. Refer to the section Poll/Grace Time in the
ArmorIP Version 3 Internet Monitoring Application User Manual.
l Central Station Signal Receiver
The maximum number of signal transmitting units connected to any transmission channel
shall conform to the manufacturer's recommendations. The ArmorIP Receiver supports up
to 10000 simultaneous connections.
Refer to the section Internet Connections Requirements in the ArmorIP Receiver
Installation Manual for further details.
l Number of attempts
In the event of unsuccessful communication, a digital alarm communicator transmitter
shall make a minimum of 5 and a maximum of 10 attempts. Where the maximum number
of attempts to complete the sequence is reached, an indication of the failure shall be made
at the premises.
In the Security Expert system, the reporting service selected as Contact ID must have the
number of attempts programmed to 5 attempts. The Dialing Attempts option must be
programmed. Refer to the section Contact ID | Settings in the Operator Reference Manual.
If the SP-4G-USB cellular modem is being used as the secondary reporting option in the
installation, the Report IP service assigned to the cellular modem must be programmed
as above.
l Check-In Time
DACT communication channel check-in time is not to exceed 24 hrs.
l Trouble Input Service Test Report
June 2024 63
Security Purpose Controller UL and cUL Installation Requirements
l The Test Report Time must be programmed. Refer to the section Controllers |
Configuration in the Operator Reference Manual.
l The Generate Input Restore on Test Input option must be enabled. Refer to the
section Controller | Options in the Operator Reference Manual.
l The Test Report Time is Periodic option must be enabled. Refer to the section
Controller | Options in the Operator Reference Manual.
l Ethernet Connections
All ethernet network connections shall be installed within the same room as the
equipment.
l External Wiring
All wiring extending outside of the enclosure must be protected by conduit.
l Power Supply Mains Power Connection
If a flexible cord is used to connect to line voltage, strain relief must be provided for the
cord inside the enclosure or at the knockout.
The power supply is not intended to be mounted on the exterior of vault, safe, or
stockroom.
l Arming Signal
A bell or visual indicator used as an arming acknowledgment signal must be listed to a cUL
security, signaling or fire standard. If intended to be mounted outside, it must be rated for
outdoor use.
l Keypad Wiring
The RS-485 connection to the keypad must be wired such that the shorts and other faults
on the RS-485 line connection of the keypad will not cause the controller to malfunction.
l Fire Areas
Fire areas shall be separated from burglar areas through area partitioning.
NOTE: Any available dry relay contact on the Security Expert controller or output
expander may be used for the FACP system, provided the selected output is programmed
as the Report OK output.
June 2024 64
Security Purpose Controller UL and cUL Installation Requirements
CAN/ULC-S559
CONTROLLER
ACTIVE COMMUNICATION
Metal Conduit Note: All cables shall be protected within metal conduits.
ENCLOSURE
12V DC
MAINS SUPPLY AC + +
(120V AC) TELECOM
AC - - ETHERNET
EQUIPMENT
INTERNET
485 485
AC BATT
12VDC FAIL FAIL
+ - C NC C NC
FIRE Z1
SUPERVISORY Z2
Programmable Z4
COM STATUS / FB
Output
* The AC FAIL output on the Power Supply MUSTbe programmed to follow the AC Trouble Input as follows:
AC FAIL = OPEN on fail
* Fire zones shall be separated from burglar zones through area partitioning.
* Fire zones Z1-Z3 shall be used exclusively for fire monitoring and cannot be programmed to activate the bell output
* Fire Zone Z4 N.O Push Button to be used as monitoring reset switch.
* EOL resistor must be installed at the Fire Alarm Control Panel Output.
June 2024 65
Security Purpose Controller UL and cUL Installation Requirements
CAN/ULC-S559
CONTROLLER
PASSIVE COMMUNICATION: MODEM DIALER
Metal Conduit Note: All cables shall be protected within metal conduits.a
ENCLOSURE
12V DC
MAINS SUPPLY AC + +
(120V AC) TELECOM
AC - - ETHERNET
EQUIPMENT
INTERNET
485 485
AC BATT
12VDC FAIL FAIL
+ - C NC C NC
PSTN
DIALER TELECOM
EQUIPMENT
FIRE ALARM PANEL
FIRE Z1
SUPERVISORY Z2
Z4
Programmable
COM STATUS / FB
Output
* The AC FAIL output on the Power Supply MUSTbe programmed to follow the AC Trouble Input as follows:
AC FAIL = OPEN on fail
* Fire zones shall be separated from burglar zones through area partitioning.
* Fire zones Z1-Z3 shall be used exclusively for fire monitoring and cannot be programmed to activate the bell output
* Fire Zone Z4 N.O Push Button to be used as monitoring reset switch.
* EOL resistor must be installed at the Fire Alarm Control Panel Output.
June 2024 66
Security Purpose Controller UL and cUL Installation Requirements
CAN/ULC-S559
CONTROLLER
ACTIVE COMMUNICATION: CELLULAR MODEM
Metal Conduit Note: All cables shall be protected within metal conduits.
ENCLOSURE
12V DC
MAINS SUPPLY AC + +
(120V AC) TELECOM
AC - - ETHERNET
EQUIPMENT
INTERNET
485 485
AC BATT
12VDC FAIL FAIL USB
+ - C NC C NC
CELLULAR MODEM
SIM ANTENNA ANTENNA
CELLULAR
NETWORK
FIRE ALARM PANEL
12VDC IN
USB N+ N-
FIRE Z1
SUPERVISORY Z2
Programmable Z4
COM STATUS / FB
Output
* The AC FAIL output on the Power Supply MUSTbe programmed to follow the AC Trouble Input as follows:
AC FAIL = OPEN on fail
* Fire zones shall be separated from burglar zones through area partitioning.
* Fire zones Z1-Z3 shall be used exclusively for fire monitoring and cannot be programmed to activate the bell output
* Fire Zone Z4 N.O Push Button to be used as monitoring reset switch.
* EOL resistor must be installed at the Fire Alarm Control Panel Output.
June 2024 67
Security Purpose Controller UL and cUL Installation Requirements
UL Compliance Requirements
UL1610
For Security Grade 4 installations, two forms of reporting are required. This can be satisfied
using the onboard 2400bps modem included with the modem controller model, or through the
incorporation of the SP-4G-USB cellular modem module into the installation with the non-
modem controller model.
l A local alarm sounding device, alarm housing, and control unit shall comply with the
mercantile requirements in the Standard for Police Station Connected Burglar Alarm Units
and Systems, UL365.
l A bell or visual indicator used as an arming acknowledgement signal must be listed to a
UL security, signaling or fire standard. If intended to be mounted outside, it must be rated
for outdoor use.
l Exit and entry delay must not exceed 60 seconds. To program the entry and exit delay
time, refer to the section Areas | Configuration in the Operator Reference Manual.
l All ethernet network connections shall be installed within the same room as the
equipment.
l Signals between the premises control unit and the receiving equipment, when not carried
by wireless means, shall be protected by the following method:
l Onboard modem telco connection must be dedicated to the Security Expert controller.
Modem model only.
l Ethernet connection to the Internet Service Provider (ISP) with a fixed IP Address
must be dedicated to the Security Expert controller.
l To comply with the dual signal line transmission system requirement, both transmission
lines (onboard modem and IP reporting) must be enabled. Signals shall be sent
simultaneously to both the primary communications channel and the Backup Service.
The Report IP and Contact ID services must be programmed and enabled within the
Security Expert system. The following options are required:
l The Contact ID Reporting Service must be enabled and the Service Mode must be
configured to start with the operating system.
l Refer to the section Contact ID in the Operator Reference Manual.
June 2024 68
Security Purpose Controller UL and cUL Installation Requirements
l The Report IP Service must be enabled as the primary communication channel, the
Service Mode must be configured to start with the operating system, and the
Reporting Protocol must be set to ArmorIP.
l Refer to the section Report IP in the Operator Reference Manual.
l When more than one means of signal transmission is used, loss of communication with
the receiving system shall be annunciated at the receiver within 200 seconds. If a fault is
detected on any of the signal transmission means, at least one of the signal transmission
channels shall send a signal to the central-station to report the fault within 200 seconds.
The Report IP and Contact ID services must be programmed and enabled within the
Security Expert system.
The Security Expert controller is compatible with the ArmorIP Internet Monitoring
Receiver. Poll Time must be set to 40 seconds and the Grace Time must be set to 20
seconds.
In the Security Expert system, the reporting service must be configured to 40 seconds.
The following options are required for the service selected as Report IP type:
l The Poll Time must be programmed to 40 seconds. Refer to the Report IP | General
section in the Operator Reference Manual
l The Contact ID Reporting Service must be enabled and the Service Mode must be
configured to start with the operating system.
l Refer to the section Contact ID in the Operator Reference Manual
l The Report IP Service must be enabled as the primary communication channel, the
Service Mode must be configured to start with the operating system, and the
Reporting Protocol must be set to ArmorIP.
l Refer to the section Report IP in the Operator Reference Manual.
l The Trouble Input Area must be armed in 24h mode. Refer to the section Trouble
Inputs | Areas and Input Types in the Operator Reference Manual.
In the event of unsuccessful communication, a digital alarm communicator transmitter
shall make a minimum of 5 and a maximum of 10 attempts. Where the maximum number
of attempts to complete the sequence is reached, an indication of the failure shall be made
at the premises.
In the Security Expert system, the reporting service selected as Contact ID must have the
number of attempts programmed to 5 attempts. The following options are required:
l The Dial Attempts option must be programmed. Refer to the section Contact ID |
Settings in the Operator Reference Manual.
l DACT communication channel check-in time is not to exceed 24 hrs.
l Trouble Zone Service Test Report
l The Test Report Time must be programmed. Refer to the section Controllers |
Configuration in the Operator Reference Manual.
l The Generate Input Restore on Test Input option must be enabled. Refer to the
section Controller | Options in the Operator Reference Manual.
l The Test Report Time is Periodic option must be enabled. Refer to the section
Controller | Options in the Operator Reference Manual.
l ArmorIP detects the reception of any invalid packet on the programmed port as a
potential system compromise attempt. Each compromise attempt sends a
notification to the receiver, and logs a Compromise Attempt event under the Live
Panel Events.
The event is sent with the following details:
n Account Code as defined in the Serial Receiver settings
n Event Code 0x163
n Group Code as defined in the Serial Receiver settings
n Point Code as defined in the Serial Receiver settings
June 2024 69
Security Purpose Controller UL and cUL Installation Requirements
Refer to the section Global Settings | Serial Receiver in the ArmorIP Version 3 Internet
Monitoring Application User Manual.
For UL and cUL installations the Central Station Receiving software must have the
Contact ID details as specified, programmed for the Compromise Attempt event.
l If a flexible cord is used to connect to line voltage, strain relief must be provided for the
cord inside the enclosure or at the knockout.
l The power supply is not intended to be mounted on the exterior of vault, safe, or
stockroom.
UL294
l The Security Expert controller and reader expander module are intended to be mounted
within the enclosure (refer to UL/cUL Installation Cabinet Options), installed inside the
protected premise, and are UL 294 Listed for Attack Class I applications only.
l Exit devices and wiring must be installed within the protected area.
l For the Security Expert controller and reader expander module, all RS485 and reader
terminal connections must be made using shielded grounded cable.
l All readers must be connected with shielded, grounded cable.
l A bell or visual indicator used as an arming acknowledgment signal must be listed to a UL
security, signaling or fire standard. If intended to be mounted outside, it must be rated for
outdoor use.
l Fail secure locking mechanism shall only be installed where allowed by the local authority
having jurisdiction (AHJ) and shall not impair the operation of panic hardware and
emergency egress.
l If fire resistance is required for door assembly, portal locking device(s) must be evaluated
to UL10B or UL10C.
l Must be installed with UL 1034 listed electronic locks for UL installations.
l AC power on shall be indicated by an external panel mount LED (Lumex SSI-LXH312GD-
150) and fitted into a dedicated 4mm hole in the cabinet to provide external visibility. This
shall be wired between 12V and a PGM output that is programmed to follow the AC trouble
input as shown below:
LED
1K5 OHM
BZ L1 D1 DO Z4 V- Z3 Z2 V- Z1 V- V+
READER 1 INPUT 1-4 12VDC OUT
l If a flexible cord is used to connect to line voltage, strain relief must be provided for the
cord inside the enclosure or at the knockout.
l The power supply is not intended to be mounted on the exterior of vault, safe, or
stockroom.
June 2024 70
Security Purpose Controller FCC Compliance Statements
IMPORTANT INFORMATION
This equipment complies with Part 68 of the FCC Rules and the requirements adopted by the
ACTA. Inside the cover of this equipment is a label that contains, among other information, a
product identifier in the format US: AAAEQ##TXXXX. If requested, this number must be
provided to the telephone company.
FCC REGISTRATION NUMBER: US: 48DMM00BPRTCTRLDI
RINGER EQUIVALENCE
0.0
NUMBER:
USOC Jack: RJ-31X
June 2024 71
Security Purpose Controller FCC Compliance Statements
Incidence of Harm
If this equipment (Security Expert controller) causes harm to the telephone network, the
telephone company will notify you in advance that temporary discontinuance of service may be
required. But if advance notice isn't practical, the telephone company will notify the customer
as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if
you believe it is necessary.
The telephone company may make changes in its facilities, equipment, operations or
procedures that could affect the operation of the equipment. If this happens the telephone
company will provide advance notice in order for you to make necessary modifications to
maintain uninterrupted service.
Additional Information
Connection to party line service is subject to state tariffs. Contact the state public utility
commission, public service commission or corporation commission for information. Alarm
dialing equipment must be able to seize the telephone line and place a call in an emergency
situation. It must be able to do this even if other equipment (telephone, answering system,
computer modem, etc.) already has the telephone line in use. To do so, alarm dialing
equipment must be connected to a properly installed RJ-31X jack that is electrically in series
with and ahead of all other equipment attached to the same telephone line. Proper installation
is depicted in the figure below. If you have any questions concerning these instructions, you
should consult your telephone company or a qualified installer about installing the RJ-31X jack
and alarm dialing equipment for you.
June 2024 72
Security Purpose Controller FCC Compliance Statements
Telephone
Line
Telephone
Network
Demarcation Unused
Telephone Fax Machine RJ-11 Jack
Point
Answering
System Telephone
June 2024 73
Security Purpose Controller Industry Canada Statement
June 2024 74
Schneider Electric
www.schneider-electric.com
© 2024 Schneider Electric. All rights reserved.
June 2024