FORT Pro Series User Manual 1-6
FORT Pro Series User Manual 1-6
Version 1.6.0 v1
FORT Robotics
1608 Walnut St floor 12
Philadelphia, PA 19103
This document shows how to integrate the FORT Pro Series devices with your smart machines to enable secure
transmission of wireless safety and control commands. It is intended for OEM developers who want to build safety
solutions into their machines as well as integrators and end users of those machines.
EQUIPMENT DAMAGE
IMPORTANT TO KNOW
Standards
This document uses the international standard (ISO 8601) for dates (YYYY-MM-DD). For example, the 31st of October,
2023 is shown as 2023-10-31.
Note that the version of this guide corresponds to the date on which it is published and uses the same format.
This document shows how to integrate the FORT Pro Series devices with your smart machines to enable secure
transmission of wireless safety and control commands. FORT helps protect people and organizations from injury,
damage, and downtime with trusted control & communication for any machine. With built in functional safety and
security, FORT’s Pro Series delivers machine control and communication you can trust.
This guide is intended for OEM developers who want to build safety solutions into their machines as well as
integrators and end users of those machines.
⚠ NOTE: Unless otherwise noted, the features described in this document are available as of the date of the
latest revision.1
1. See the “Revision History” appendix for a list of updates in the current version of the manual as well as for details about the product versions
to which it applies.
Key Features
The Safe Remote Control Pro is an easy-to-use controller designed to wirelessly operate machines. It allows a user to
take temporary manual control of equipment or activate an E-Stop from a remote location. Some key features of the
Safe Remote Control Pro are:
• Wireless interface that supports Bluetooth low energy (BLE), ISM 902-
928 MHz (NA), and ISM 868 MHz (EU).Two 2-axis joysticks, two 1-axis
finger sticks, eight programmable buttons, and a red E-Stop button.
• Safety features that meet IEC 61508 standards, including dual safety
processors, dual channel E-Stop, drop and idle detection, and vibration
feedback.
• Enclosure is IP65 rated in accordance wit1.6.0 v1 IC-60529, has
ruggedized rubber grips, a sunlight-readable LCD for device
information, and measures 181 mm x 155 mm x 83 mm.
• Security is built in through tamper proofing device, secure boot, secure
configuration, secure updates, and trusted communications.
• Operates in temperatures from -20 °C - +60 °C with a battery life of 18
hours (chargeable through USB).
See “SRC Pro Technical Specifications” on page B-1 for detailed technical specifications for the Safe Remote Control
Pro.
The Endpoint Controller makes it possible to send and receive trusted safety commands over a variety of networks.
You can mount it on a machine, or machine attachment, for remote control. You can also use it to send safety
commands to up to 30 Endpoint Controller-equipped machines simultaneously. Some key features of the Endpoint
Controller are:
• Designed for 12V DC or 24V DC systems with 8V DC to 32V
DC operating voltage.
• Wireless interface that supports Bluetooth low energy
(BLE), ISM 902-928 MHz (NA), ISM 868 MHz (EU), and Wi-
Fi.
• Electrical safeguards, including transient protection per
ISO 16750 and ISO 7637-2, reverse battery, load dump,
and jump-start protection, as well as electrostatic
discharge protection.
• IP65 rated aluminum enclosure in accordance with IEC-
60529.
• Comes with one or two RP-TNC antenna connectors and
two M12 Ethernet connectors; 23 pin main integration
connector for TE connectivity; CAN (controller area
network) bus.
• Measures 228 mm x 176 mm x 70 mm.
• Provides three dual-channel safety inputs and three dual channel safety outputs; dual safety processors are the
core of a redundant, one out of two (1oo2) safety architecture.
• Security is built in through tamper proofing device, secure boot, secure configuration, secure updates, and trusted
communications.
• Operates in temperatures from -40 °C to +85 °C.
1-2 Pro Series User Guide 1.6.0 v1
Overview
See “EPC Technical Specifications” on page A-1 for detailed technical specifications for the Endpoint Controller.
Overview
The primary function of the system is the ability to wirelessly send a safety signal from a remote device sender to one
or more receivers that are wired to pieces of equipment (henceforth known as the EUC, or equipment under control).
Additionally, a Safe Remote Control Pro provides the ability to remotely control and maneuver the EUC.
There are various ways to configure the system, using FORT Manager, depending on your specific situation, but at a
basic level, every configuration has:
• A network that allows devices to communicate.
• An Endpoint Controller wired to each EUC.
• A remote controller (an Endpoint Controller, Safe Remote Control Pro, or both) that communicates wirelessly with
the EPCs attached to the EUCs to send safety signals, and in the case of the SRC Pro, safety and control signals.2
2. How you wire the EPC to an EUC determines the effect of the safety signal. For example, you could wire the EPC to the engine (to shut off the
EUC), to the braking system (to slow it down), to a particular part of the equipment (to stop a robotic arm), etc.
The basic operational philosophy of the Endpoint Controller is that it allows the EUC to move between the safe state
and the normal state.
The safe state causes the equipment under control (EUC) to cease whatever dangerous function it is performing.
Depending on the equipment and how you wired and configured it, this could mean shutting down the machine
entirely, slowing it down, turning off a specific function such as a robotic arm, or something else entirely. Depending
on the configuration, any of the following situations trigger the safe state:
• An equipment operator perceives that the EUC has encountered a major problem that requires it to be stopped
immediately and presses the E-Stop button to do so.
• A solid state safety device (such as a programmable logic controller (PLC), or light curtain) that is wired to an EPC is
monitoring an area and a worker opens a guard or reaches into a hazardous area, which causes the EPC to initiate
the safe state.
• The system detects an automatic diagnostic fault and initiates the safe state.
The normal state means that an E-Stop command has not been requested, no diagnostic faults are detected, and the
EUC is powered.
Getting Started
The following bullets outline the process for getting your Pro Series devices up and running. Although we show Plan as
the first step, this manual assumes that you have already determined how many devices you need and have
purchased them.
• Plan — Determine the type of configuration to build. “Configurations and Use Cases” on page 2-1 provides an
overview to the types of configurations that we support and the use case for each one.
In addition, be certain to involve a safety expert in the planning process to develop a safety plan for integrating
the FORT Pro Series devices with your equipment.
• Configure — Use FORT Manager to build a logical configuration (“Configurations and Use Cases” on page 2-1):
• Log in to FORT Manager and register your devices.
• Add them to a configuration.
• Set device and network parameters, including communication channels, timeout value, and types of inputs.
• Load — Load the configuration onto each device (“Loading a Configuration onto Your Devices” on page 2-15).
• Wire — Wire the inputs and outputs (“Installation — Wire and Mount Endpoint Controller” on page 3-1).
• On the input device (sender), wire the inputs to an E-Stop type device or to a Solid State Safety Device
(SSD).
• Wire the output devices (receiver) to the EUC.
• Test — Verify that the system performs as expected before deploying it. For example, pressing an E-Stop
button stops the EUC, walking in front of a light curtain slows or stops the EUC, and so on. Be certain that a
safety expert verifies that the system is operating in accordance with your safety plan.
⚠ WARNING: Safe operation of the system requires that you thoroughly test the system before putting it into a
production environment. Testing includes training your personnel on both the manual functions
(pressing an E-Stop button, using an SRC Pro to maneuver an EUC, etc.) and automatic functions
of the system (solid state devices triggering safety, exceeding the timeout value, loss of radio
signal, etc.).
Registering Devices
Before you can use your FORT Pro series devices, you must register them in FORT Manager, which is available as a
web-based application or APIs. If you’ve already registered your devices, skip this procedure and go to the next
chapter to add the devices to a configuration.
⚠ NOTE: If you are having any problems with the FORT Manager Web App, such as launching or logging in, or
you don’t have the serial number for your devices, submit a request on the Support Portal to get help.
Click Sign up to create a Zendesk account if you don’t already have one.
After you register your FORT Pro Series devices, you can add them to a configuration in FORT Manager, which is
available as a web-based application.
You use FORT Manager to build these configurations and your laptop to tether to powered devices and apply the
configurations. You can find specific instructions at the end of each of the following sections.
For example, if a number of machines are operating in a warehouse area, you can wire a light curtain to the Endpoint
Controller sender that shuts down all the machines if someone walks into the area. Likewise, you can wire an E-Stop
switch to the Endpoint Controller sender and place it at the entrance to the area, allowing an operator to temporarily
shut down the machines if anything looks dangerous, or for another reason, such as pulling out a particular machine
for inspection or maintenance.
The following diagram shows a configuration with an Endpoint Controller sender and three Endpoint Controller (EPC)
receivers:
5. In the Devices pane, select an EPC from the list and drag it to the Configuration pane.
The device you bring in first becomes the sender and those you drag in later become receivers.
6. In the Devices pane, select an EPC to use as a receiver and drag it to the Configuration pane.
Continue to add EPC devices (up to 30) or stop at one if you only have one EUC to control.
7. From the drop-down underneath the configuration, select the communication protocol for the network.
The default is Ethernet.
8. Click Settings to set configuration wide settings:
• For Ethernet, set:
• Netmask Defaults to 255.255.255.0.
• Gateway The gateway IP address, such as 192.168.1.1.
• Name Server A name server IP address, such as 192.168.1.2
You can identify multiple name servers. Click Add after specifying each one. The order in which you add
name servers is the order in which the EPC looks for them. If it can’t reach the first server it goes to the
second server in the list, and so on until it reaches one.
• For Wi-Fi, set:
• SSID The network ID.
• Password The network password.
• Netmask Defaults to 255.255.255.0.
• Gateway The gateway IP address, such as 192.168.1.1.
Be certain to set this parameter to the router address to avoid slow connections and possible
timeouts during operation.
• Name Server A name server IP address, such as 192.168.1.2.
You can identify multiple name servers. Click Add after specifying each one. The order in which you add
name servers is the order in which the EPC looks for them. If it can’t reach the first server it goes to the
second server in the list, and so on until it reaches one.
Other settings:
• Safety Timeout: Select a value for the safety communication timeout (default is 250 msec for Ethernet or.
500 msec for Wi-Fi).
⚠ WARNING: To optimize safety, we strongly recommend that you keep the default value (Ethernet: 250 msec;
Wi-Fi 500 msec). If you consider changing the value, do so only after first consulting with your
system safety manager.
A receiver EPC expects to receive at least one valid safety message from the sender EPC within the timeout
period or else it enters the safe state (turns off its outputs). For example, a safety timeout of 500 msec means
that a receiver EPC must receive at least one valid safety message within 500 ms of receiving the last valid
safety message or it turns off its outputs.
A higher value, which makes the EPC less sensitive to communication loss, means that if an EPC loses
communication with its sender, the EUC will run for a longer period before stopping automatically. On the
other hand, a lower timeout value, which reduces the risk of the EUC running without connection to the safety
controller, increases the sensitivity to communication loss.
⚠ IMPORTANT: Wi-Fi networks vary in signal reliability. While testing your system, if you experience signal drops
with the default timeout setting, test with a higher value to see if that fixes the problem.
• Voltage Level Select the voltage from the dropdown, either 12 Volts (default) or 24 Volts.
• CAN Mode The Controller Area Network (CAN) is disabled by default. You can enable it by selecting either of
these protocols from the drop down:
• CANOpen
• J1939
• CAN Bitrate (250 kbit default): If you selected a CAN mode, accept the default bitrate, or use the drop down
menu to select a value that is more optimal for your application.
You cannot adjust the bitrate through the CANopen NMT protocol but must do so here or with the CLI
tool.
9. Click OK to save the configuration settings.
If you enable a CAN mode, each EPC receiver requires a Node ID or address; FORT Manager provides a default
value, but in Step 12you have the option to change the CAN ID.
10. Select the sender EPC (the red dot indicates that it requires one or more configuration parameters) and click
Settings in the upper right corner to set its IP address and configure its inputs:
• IP Address Enter a unique IP address for the device, for example: 192.168.1.2.
You are configuring the J3 port’s IP address for use on your safety network. To avoid conflicts with the
J2 management port, which is configured by default to 192.168.3.10, don’t specify an address in the
subnet: 192.168.3.0/24.
• Input 1, Input 2 Select a value from the drop-down menus for Input 1 and Input 2 to identify the type of
device that you intend to wire to the EPC inputs. The inputs are independent of each other such that you can
wire one type of device to Input 1 and a different type to Input 2 (or wire the same type to each one). You must
specify a device for at least one input and specify Not Used for an input that you are not going to use:
• Not Used The default value; leave an input as Not used if you are not going to wire a device to it.
• E-Stop Type Device An E-Stop type switch.
• Solid State Safety Device A device such as a light curtain, PLC, etc.
• Input 3 Reserved for use with an SRC Pro and not settable in the current configuration.
11. Click OK to save the settings for the sender; the green dot indicates that you have set required parameters.
12. Select an EPC receiver in the configuration (the red dot indicates one or more configuration parameters are
required) and click Settings in the upper right corner:
a. In IP Address, type a unique IP address for the device, for example: 192.168.1.2.
You are configuring the J3 port’s IP address for use on your safety network. To avoid conflicts with the
J2 management port, which is configured by default to 192.168.3.10, don’t specify an address in the
subnet: 192.168.3.0/24.
b. Optionally, if you enabled a CAN mode, you can change the node ID or address for each EPC receiver —
however, FORT Manager applies a default value of 3 to each EPC.
You cannot change the Node ID through the CANopen NMT protocol but must do so here.
The node ID or address uniquely identifies the EPC on the CAN system. Potentially, each piece of your
equipment could have multiple CAN elements, each of which requires a unique ID. Therefore, you must be
certain that whatever value you set in FORT Manager doesn’t conflict with a different CAN element on any of
your equipment. Setting a single value for all EPCs means that you must only check one value against any CAN
components on the equipment.
If, on the other hand, to avoid conflicts you must change the CAN mode for one or more EPCs, enter a value in
CANOpen Node ID (between 1-127) or J1939 Address (1-255) depending on which CAN protocol you previously
selected.
c. Click OK to save the settings for the selected receiver.
13. Repeat the previous step to assign an IP address to every EPC receiver in the configuration (and optionally change
the Node ID or address.
14. Click Save and Assign to save the new configuration.
FORT Manager displays a message after it successfully saves the configuration. You can view and make changes to
this configuration at any time by selecting it in the Configuration Management tab.
NEXT STEPS
Go to “Loading a Configuration onto Your Devices” on page 15 for instructions on how to load the configuration
you just created onto your devices.
For example, you might store multiple machines in a yard overnight. In the morning, an operator can connect the Safe
Remote Control Pro to the Endpoint Controller on one of the machines and use the Safe Remote Control Pro to drive
the machine to a work area. At the work area the operator can disconnect the Safe Remote Control Pro from the
machine and return to the yard to connect to another Endpoint Controller and drive out a different machine.
Meanwhile, the first machine can work autonomously in autonomous (unsupervised) mode (see “Machine Select”
on page 6).
The following table shows details about a Safe Remote Control Pro to EPC configuration:
TABLE 2-2. SRC Pro to EPC configuration
Sender Inputs Receivers Communication
SRC Pro Integrated E-Stop switch Up to 30 devices in a Bluetooth or ISM
configuration, but only one
connection at a time
Machine Select
The machine select function allows a user of a Safe Remote Control Pro to select and connect to one Endpoint
Controller at a time (by picking from a list of available devices that is displayed on the LCD screen).
When the user selects a machine and successfully connects to the Endpoint Controller on that machine, the Endpoint
Controller is always put in supervised mode. The user later can change the mode to autonomous mode (if applicable
and needed).
Supervised mode means that the Safe Remote Control Pro is connected to the Endpoint Controller and is sending
input data such as joystick movements, safety messages, etc. to the selected machine. If an operator pushes the
E-Stop button, the Endpoint Controller enters the safe state. If the Safe Remote Control Pro stops communicating with
the Endpoint Controller, resulting in a timeout, the Endpoint Controller enters the safe state.
2-6 Pro Series User Guide 1.6.0 v1
SRC Pro to EPC Configuration
Autonomous (unsupervised) mode is meant to be used with machines that have autonomous capability. In
autonomous mode, the SRC Pro and the EPC are not communicating with each other, so the SRC Pro is not sending
safety or control information to the EPC. Rather, the EPC attached to the equipment monitors the customer supplied
“Connecting the SRC Pro to an EPC” on page 4-3safety signal, and if that signal changes out of the normal state, the
EPC enters the safe state and breaks the circuit to the equipment under control.
“Connecting the SRC Pro to an EPC” on page 4-3 explains how to connect an SRC Pro to an EPC and sub sections
explain how to change the mode as well as implications of operating in each mode.
Wiring an EPC for use with Machines Without Autonomous Capability
This section shows how to wire an EPC to a machine that does not have autonomous capability. Machine such as this,
can operate in supervised mode only.
As shown in the following figure, you must connect Output 3 on each of the Endpoint Controllers (EPC) to the
equipment under control (EUC). “Wiring Outputs on EPC Receivers” on page 3-8 provides details about the
wiring, but essentially, both channels of Output 3 are connected to two relays in series. The circuit that is defined by
these relays controls connection of a solenoid to the equipment under control. If safety is not requested, the Endpoint
Controller keeps the output on to keep the relays’ contactors closed. On the other hand, if safety is requested, the
Endpoint Controller turns off the outputs, which opens the relays and breaks connection of the circuit to the EUC. In
this case, if the EUC is using the circuit for power, when the contactors open, the machine shuts off.
The following figure illustrates the wiring for machines that don’t require autonomous (unsupervised) mode. See
“Input 3 Asserted on EPC Receiver” on page 2-9 for the wiring for machines that do require autonomous.
Initially, when a user selects a machine and connects to it, the Endpoint Controller is put in supervised mode. Using
the LCD display and Safe Remote Control Pro controls, the user can change the mode of the Endpoint Controller to
autonomous.
Input 3 is the way that you (the customer) control the safety system when an SRC Pro is not connected. (Note that you
could also build a hybrid configuration and use Global E-Stop with an EPC sender to control the safety system when
the SRC Pro is not connected to the EPC).
In autonomous mode, and as long as Input 3 of the Endpoint Controller is high, the Endpoint Controller keeps the two
relays connected to Output 3 powered while ignoring an E-Stop press on the Safe Remote Control Pro as well as not
responding to joystick movements and button presses on the SRC Pro.
Wiring an EPC for use with Machines With Autonomous Capability
The following figure illustrates the wiring for machines with autonomous capability that require operation in
autonomous mode.
As long as the customer safety signal to Input 3 on the Endpoint Controller remains in the normal state (high), the
machine remains powered up and running. If the customer safety signal to the Endpoint Controller changes out of the
normal state, the Endpoint Controller automatically switches to safe mode, turning off Output 3, and breaking the
power connection to the EUC.
Machines such as this can operate in supervised or autonomous mode. In fact, when first connected to an SRC Pro,
they are always in supervised mode.
⚠ NOTE: If you are planning to build a hybrid configuration, you first use the current procedure to create a base
configuration, then modify the configuration with the steps in “Building a Hybrid Configuration” on
page 2-13.
TO BUILD A CONFIGURATION WITH AN SRC PRO REMOTE:
4. In the Configuration pane, in the Name field, type a meaningful name for the configuration.
5. In the Devices pane, select an SRC Pro from the list and drag it to the Configuration pane.
The device you bring in first becomes the sender and those you drag in later become receivers.
6. In the Devices pane, select an EPC to use as a receiver and drag it into the Configuration pane.
Continue to add EPC devices (up to 30) or stop at one if you only have one EUC to control.
7. From the drop-down underneath the configuration, select the communication protocol for the network.
The default is Bluetooth. If you change it to ISM, use Settings as described in the next step to set ISM parameters.
8. Click Settings to set configuration-wide settings:
• ISM Transmission Power: (if you selected ISM) Select a value from the drop down list:
• Low Use for indoor or close range use.
• Medium (default) Use for outdoor and mid-range distance.
• High Use for outdoor and maximum range.
Although higher settings allow for greater range, they reduce battery life.
• ISM Transmission Channel: Enter a value for the transmission channel (default is 1).
European radios (EPC-SRC Pro 1002) support one channel only so the field is read-only, and you can’t change
the default value (1).
North American radios (EPC-SRC Pro 1001) support channels from 1 - 21. Your system may suffer from
interference if other ISM networks are operating in the same location. Be certain that each network has a
unique transmission channel and experiment with changing the ISM Transmission Channel to find the clearest
signal.
• Safety Timeout: Select a value for the safety communication timeout (250 msec default).
⚠ WARNING: To optimize safety, we strongly recommend that you keep the default value (250 msec). If you
consider changing the value, do so only after first consulting with your system safety manager.
A receiver EPC expects to receive at least one valid safety message from the sender within the timeout period
or else it enters the safe state (turns off its outputs). For example, a safety timeout of 250 msec means that a
receiver EPC must receive at least one valid safety message within 250 ms of receiving the last valid safety
message or else it will turn off its outputs.
A higher value, which makes the EPC less sensitive to communication loss, means that if an EPC loses
communication with its sender, the EUC will run for a longer period before stopping automatically. On the
other hand, a lower timeout value, which reduces the risk of the EUC running without connection to the safety
controller, increases the sensitivity to communication loss.
⚠ NOTE: Although signal drops should be rare with Bluetooth or ISM, if you experience them while testing your
system with the default timeout setting, test with a higher value to see if that fixes the problem.
Voltage Level: Select the voltage from the dropdown, either 12 Volts (default) or 24 Volts.
CAN Mode: The Controller Area Network (CAN) is disabled by default. You can enable it by selecting either of
these protocols from the drop down:
• CANOpen
• J1939
• CAN Bitrate (250 kbit default): If you selected a CAN mode, accept the default bitrate, or use the drop down
menu to select a value that is more optimal for your application.
You cannot adjust the bitrate through the CANopen NMT protocol but must do so here or with the CLI
tool.
If you enable a CAN mode, each EPC receiver requires a Node ID or address; FORT Manager provides a default
value, but in Step 11 you have the option to change the CAN ID.
9. Click OK to save the configuration settings.
10. Optionally, if you selected ISM, you can set a unique radio ID for each device (a green dot appears on each device
icon indicating configuration options are available)— however, FORT Manager applies default IDs for each device
(in a range, starting with 1) when you save the configuration.
a. Select a device and click Settings in the upper right corner of the Configuration pane.
b. Type a number between 1 and 128 to ID the device (FORT Manager verifies that the number isn’t already taken
for a different device) and click OK.
11. Optionally, if you enabled a CAN mode, you can change the node ID or address for each EPC receiver (a green dot
appears on each device icon indicating that configuration options are available) — however, FORT Manager
applies a default value of 3 to each EPC.
You cannot change the Node ID through the CANopen NMT protocol but must do so here.
The node ID or address uniquely identifies the EPC on the CAN system. Potentially, each piece of your
equipment could have multiple CAN elements, each of which requires a unique ID. Therefore, you must be certain
that whatever value you set in FORT Manager doesn’t conflict with a different CAN element on any of your
equipment. Setting a single value for all EPCs means that you must only check one value against any CAN
components on the equipment.
If, on the other hand, to avoid conflicts you must change the CAN mode for one or more EPCs, do the following:
a. Select a device, click Settings in the upper right corner, and enter a value in CANOpen Node ID (between 1-127)
or J1939 Address (1-255) depending on which CAN protocol you previously selected.
b. Click OK to save the value.
FORT Manager displays a message after it successfully saves the configuration. You can view and make changes to
this configuration at any time by selecting it in the Configuration Management tab.
NEXT STEPS
Go to “Loading a Configuration onto Your Devices” on page 2-15 for instructions on how to load the
configuration you just created onto your devices.
The Safe Remote Control Pro can control and send safety signals to any one Endpoint Controller at a time and the
Endpoint Controller sender can send safety signals to all the Endpoint Controllers in the configuration at once.
For example, imagine a situation in which you have a number of autonomous machines that are parked in a yard for
the night. At the beginning of the workday, you use a Safe Remote Control Pro to connect to one of the machines and
drive it to the work area. Once the machine is at the work site, you put the Endpoint Controller in autonomous
(unsupervised) mode so the machine can work autonomously. You now walk back to the yard and use the Safe
Remote Control Pro to connect to and pull out another machine.
At this point, the first machine that you moved is operating without the Safe Remote Control Pro in control. However,
with this configuration, an Endpoint Controller is still connected to the machine that is operating autonomously,
allowing a supervisor to press the E-Stop button on the sender Endpoint Controller and stop the machine if necessary.
In practice you could place an Endpoint Controller sender in a location, such as a balcony, that overlooks the entire
work area. After an operator releases one or more machines to work autonomously and walks out of the work area, a
supervisor could still monitor the autonomous machines and issue an E-Stop command at any time.
The following figure illustrates this configuration. The Endpoint Controller sender can send an E-Stop to every
Endpoint Controller that is connected to a vehicle and the Safe Remote Control Pro (using machine select) can
connect to any one Endpoint Controller at a time for safety and control functions.
• Inputs 1 and 2 are unused on the sender Endpoint Controller (single EPC on the left of the figure).
• Outputs 1 and 2 are unused on the receiver Endpoint Controllers (three EPCs on the right of the figure).
• When a Safe Remote Control Pro is connected to a receiver Endpoint Controller in supervised mode, pressing
either the global E-Stop1 on the Endpoint Controller or the E-Stop button on the Safe Remote Control Pro turns off
Output 3 on the receiver Endpoint Controller (also note that the Safe Remote Control Pro affects the connected
machine only, whereas the global E-Stop shuts off Output 3 on all devices).
• When a Safe Remote Control Pro is connected to a receiver Endpoint Controller in autonomous (unsupervised)
mode, only pressing the global E-Stop1 on the Endpoint Controller will turn off Output 3 on the receiver Endpoint
Controllers. The Safe Remote Control Pro E-Stop is ignored and will not turn off Output 3.
The following table shows details about an SRC Pro and EPC Hybrid configuration:
TABLE 2-3. SRC Pro and EPC Hybrid configuration
Sender Inputs Receivers Communication
One SRC Pro and one EPC Two safety rated inputs: one Up to 30 devices in a SRC Pro: Bluetooth or ISM
on the SRC Pro and one on configuration; all 30 in EPC: Ethernet or Wi-Fi
the EPC communication with the
controlling EPC, but only one
connection at a time to the
SRC Pro
An SRC Pro and EPC Hybrid configuration has two senders, a Safe Remote Control Pro and an Endpoint Controller, and
up to 30 Endpoint Controller receivers. To build this configuration, you first build an SRC Pro to EPC configuration
(which we call the base configuration) and then add an Endpoint Controller sender to it to create a Hybrid
configuration.
This section assumes that you have already built and identified a configuration to use as the base for the hybrid
configuration. If not, follow the steps in “Building an SRC Pro to EPC Configuration” on page 2-9 to build a
configuration with a Safe Remote Control Pro and up to 30 Endpoint Controller receivers to use as the base, then
complete the following procedure.
1. Although we refer to this as a global E-Stop on the EPC, you could use a solid state device instead of an E-Stop switch. The effect is the same:
triggering the solid state device turns off Output 3 on the connected device.
4. (Step 1/5) Select the basic configuration to use from the list and click Continue.
If you haven’t built a base configuration, follow the steps in “Building an SRC Pro to EPC Configuration” on
page 2-9 to do so.
⚠ IMPORTANT: Be certain that everything is correct with the basic configuration that you selected. Once you
complete this wizard, you can’t make any changes to the new Global E-Stop configuration, nor to
the basic configuration without deleting the Global E-Stop configuration.
At any point in the wizard, you can click Go Back to change a selection that you made.
5. (Step 2/5) Select an EPC from the list to use as the sender and click Continue.
6. (Step 3/5) Select the type of device to attach to Input 3:
Note that Input 1 and Input 2 are not available in this configuration. Both the EPC sender and the SRC Pro use
Input 3.
• Input3 Select a value from the drop-down menu for Input 3 to identify the type of device that you intend to
wire to the EPC inputs:
• E-Stop Type Device An E-Stop type switch.
• Solid State Safety Device A device such as a light curtain, PLC, etc.
7. Click Continue.
8. (Step 4/5) Adjust the configuration wide settings.
a. From the drop-down underneath the configuration, select the communication protocol for the network:
Ethernet (default) or WiFi.
• For Ethernet, set:
• Netmask Defaults to 255.255.255.0.
• Gateway The gateway IP address, such as 192.168.1.1.
• Name Server A name server IP address, such as 192.168.1.2.
You can identify multiple name servers. Click Add after specifying each one. The order in which you add
name servers is the order in which the EPC looks for them. If it can’t reach the first server it goes to the
second server in the list, and so on until it reaches one.
• For Wi-Fi, set:
• SSID The network ID.
• Password The network password.
• Netmask Defaults to 255.255.255.0.
• Gateway The gateway IP address, such as 192.168.1.1.
Be certain to set this parameter to the router address to avoid slow connections and possible
timeouts during operation.
• Name Server A name server IP address, such as 192.168.1.2.
You can identify multiple name servers. Click Add after specifying each one. The order in which you add
name servers is the order in which the EPC looks for them. If it can’t reach the first server it goes to the
second server in the list, and so on until it reaches one.
b. Click Continue.
2. A hybrid configuration was previously called a Global E-Stop configuration and the FORT Manager interface reflects this name. Subsequent
versions of FORT Manager will not use this terminology and in this guide, we refer to a hybrid configuration or a configuration with both SRC Pro
and EPC senders.
9. (Step 5/5) Enter a unique IP address for each EPC in the configuration, including the sender.
⚠ NOTE: Be certain that everything is correct with the configuration before completing the wizard. At this time,
it is not possible to make any changes once you click Finish Configuration other than delete the Global
E-Stop configuration and redo it.
However, you can click Go Back to return to a previous page and adjust settings or make different
selections.
The new configuration appears under the Global E-Stop tab with Global E-Stop appended to the basic configuration
name. In the Configuration Management tab, the basic configuration appears with Estop Added after the name.
NEXT STEPS
Go to the next section, “Loading a Configuration onto Your Devices”, for instructions on how to load the
configuration you just created onto your devices.
You configure Endpoint Controllers via Ethernet and a Safe Remote Control Pro via a USB connector.
REQUIRED ITEMS:
• A configuration that you built in FORT Manager.
• Linux computer running Ubuntu 20.04 with Ethernet networking capability
Use M12-RJ45 cable for connecting directly to an EPC (e.g., ASI-M12-RJ45-11101).
• Latest FORT CLI Configuration Tool (fort_cli_cfg-<version>.tar.gz).
If you don’t already have it, you can download it from FORT Manager. See “FORT CLI Configuration Tool” on
page D-1 for more information, including installation instructions for the tool.
• The EPC and any connected machines are in a safe state to be configured.
2. Allow up to a minute for the EPC to boot up. You can continuously ping the J2 port to see when the device has
booted up.
Connect your computer over Ethernet to port J2 on the EPC. Using the M12-RJ45 cable.
3. In a Linux environment, open a Terminal window and navigate to the folder containing the FORT CLI configuration
tool.
4. Run the following command to load the configuration for the EPC:
$ fort_cli_cfg -w -e 192.168.3.10
Where:
-w (--web)
Specifies to upload a single configuration from FORT Manager.
-e (--epc) 192.168.3.10
Specifies an EPC device and the (default) IP address for the J2 connector. Your address could be different.
The CLI tool returns a code. The browser opens a window that asks you to confirm that the displayed code
matches that in the CLI tool.
5. Press Enter to confirm that the codes match.
6. If you aren’t already authenticated, enter your FORT Manager username and password to authenticate to FORT
Manager.
7. Return to the CLI tool where you are prompted to enter the device serial number:
8. Type the serial number (found on the EPC device name place and also in FORT Manager on the Devices page) and
press Enter.
9. Press Enter to load the configuration to the device.
The tool finishes with the EPC by writing all the relevant configuration parameters.
10. Reboot the EPC.
NEXT STEPS
If your configuration has a Safe Remote Control Pro as the sender, complete the steps in the following procedure
(“Loading a Configuration onto an SRC Pro”) to load the configuration onto it.
If you don’t already have it, you can download it from FORT Manager. See “FORT CLI Configuration Tool” on
page D-1 for more information, including installation instructions for the tool).
• The SRC Pro is in a safe state to be configured.
Once you complete the steps in “Loading a Configuration onto an EPC” on page 2-15 to load the configuration
onto the Endpoint Controllers, you can connect the Safe Remote Control Pro to one of the Endpoint Controllers in the
configuration (“Connecting the SRC Pro to an EPC” on page 4-3).
When you load a configuration onto devices, as described in the previous section, each EPC receives the IP address
you assigned to it in FORT Manager.
For a Wi-Fi network, as soon as the EPCs are turned on and are in range, they automatically connect to the assigned
network and the receivers all pair with the sender. The system is ready to use.
For an Ethernet network, use an Ethernet cable to connect the J3 port on each Endpoint Controller to the network.
When all the EPCs are connected and turned on, the receivers all pair with the sender and the system is ready to use.
This chapter explains how to wire and mount an Endpoint Controller device to your equipment.
The table after the figure describes each of the connector signals. Refer to the diagram and table when wiring devices
to an Endpoint Controller sender (“Wiring Inputs on EPC Sender” on page 3-5) or receiver (“Wiring Outputs on
EPC Receivers” on page 3-8).
⚠ NOTE: The suggested mating connector to this port is a TE 770680-1 and the cable is the FORT #100-0256
Integration Cable.
a. Connector pinouts and signal descriptions are subject to change before release.
b. Wire colors apply to the FORT Part #100-0256 integration cable.
c. Connect Pins 7 & 8 together at the same place.
d. Connect Pins 14 & 15 together at the same power source.
⚠ IMPORTANT: We highly recommend ordering and using the FORT supplied integration cable (#100-0256).
Consult with customer support before using a custom cable.
Pins 14 & 15 (PVin_IN) are both required, and you should connect them together at the same power source.
Shielding
If you are using a shield, we recommend crimping a short pigtail to the shield end at each connector and then bringing
it through a separate connector pin to a ground pin located as close to the connector as possible. You should ground
the network to a single point at the source location. This prevents parasitic currents from flowing in the shield
between ground connections. If you shield individual signal pairs, use the same terminating technique as for the
overall shield.
Grounding
⚠ NOTE: Connect Pin 9 CH_GND to power supply common if an earth ground is not available (such as in a
moving vehicle).
Be certain that there is only one path for return current between the host and receiving nodes (as discussed in the
previous section, Shielding). Otherwise, if a network is grounded in more than one location, parasitic current will
flow. By grounding a network only at the source, you avoid potentially hazardous ground loops. We recommend using
digital isolators such as the ISO721 (SLLS629) if you must connect the grounds of different sources. Be certain that
unused pins in connectors as well as unused wires in cables are single point grounded at the connector. Ground
unused wires at alternate ends to nearby ground pins.
The following diagram shows examples of both correct and incorrect grounding:
Engine Cranking
If you attach the EPC to an ignition circuit, be aware that engine cranking can drop the voltage below 8 V (on a 12 V
system) causing the EPC to turn off the outputs and triggering a safe state. In addition, cranking may drop the voltage
low enough that the EPC temporarily stops functioning and resets.
You should assess whether this behavior is a safety issue for your application. It may not be. For example, if the EPC
doesn’t power up until after the equipment is running, cranking the engine shouldn’t affect the EPC.
On the other hand, you can avoid this problem altogether by making certain that the EPC is not part of an ignition
circuit.
Conversely, when Input 1 on the sender Endpoint Controller is asserted (ON state), the relays on Output 1 on the
receiver Endpoint Controller should energize, enabling the EUC.
⚠ IMPORTANT: It is up to you (the user) to properly design your application to accommodate the behavior of the
EPC’s inputs and outputs from changes in state.
Note that Output 3 is not used in an EPC to EPC configuration (it is reserved for a configuration with an SRCP) and
therefore in this configuration you should not connect safety input devices to Input 3 of the sender Endpoint
Controller nor relays to Output 3 of the receiver Endpoint Controller(s).
In an SRC Pro to EPC configuration the built-in E-Stop button is pre-defined to control Output 3 so you must connect
safety relays on the receiver Endpoint Controller(s) to Output 3.
See “I/O Connector Pinout and Cable” on page 3-1 for details of the EPC I/O connector and cable to use for
connecting input devices to an Endpoint Controller sender.
The following figure shows a diagram of a solid state device, such as a light curtain, wired to one of the dual channel
inputs on an Endpoint Controller sender.
1. You can use a PLC with no pulse testing on the PLC outputs, which provides a category 3 circuit (meeting SIL 2 and PLd standards). Getting a
SIL 3 rating ideally requires a SIL 3 or PLe rated input device. Note that you can configure the safety PLC with pulse testing enabled on the
outputs tied to the EPC, which is essentially the same as using an OSSD device.
The following figure shows a diagram of an E-Stop switch wired to one of the dual channel inputs on an Endpoint
Controller sender.
⚠ NOTE: Input 3 is reserved for use in a configuration with an SRC Pro as the sender.
The following table provides guidelines for the types of devices that you can use.
TABLE 3-2. Requirements for Devices Connected to EPC Inputs
Device Requirement
Emergency stop switches Use approved devices with direct opening mechanisms that
comply with IEC/EN 60947-5-1.
Door interlocking switches, limit switches Use approved devices with direct opening mechanisms that
comply with IEC/EN 60947-5-1 and capable of switching micro
loads of 24V DC, 3 mA.
Safety sensors Use approved devices that comply with the relevant product
standards, regulations, and rules in the country in which they
are used.
Relays with forcibly- guided contacts, contactors Use approved devices with forcibly guided contacts that comply
with EN 50205. For feedback purposes, use devices with
contacts capable of switching micro loads of 24V DC, 3 mA.
Other devices Evaluate whether devices to use are appropriate to satisfy the
requirements of safety category levels.
Keep the following points in mind when wiring inputs on an Endpoint Controller:
Pro Series User Guide 1.6.0 v1 3-7
Installation — Wire and Mount Endpoint Controller
• You must use redundant connections. Each input has two channels, and you must wire the device to both channels.
• Input 1 and Input 2 are independent of each other. Although you don’t have to use both inputs, you can do so. For
example, you can wire an E-Stop to one input and a light curtain or some other SSD to the other.
• You configure the inputs in FORT Manager when you build a configuration. Be certain that the actual wiring you do
matches the values you specify in FORT Manager (E-Stop Type Device, Solid State Device, Not Used), otherwise the
system will not perform properly.
⚠ CAUTION: Each output on the EPC is designed with short circuit protection circuitry inside the EPC device.
However, drawing more than 750 mA must be avoided since it won’t activate short circuit
protection and could potentially damage the device. To satisfy applicable wiring codes and
conditions, you are responsible for protection of field devices and wiring through appropriate
fusing of the circuitry.
The following figure shows an example of the two channels (Ch0 and Ch1) of one Endpoint Controller (EPC) output
connected to two relays in series to control the power supply of the EUC:
See “I/O Connector Pinout and Cable” on page 3-1 for details of the EPC I/O connector and cable to use for
connecting an Endpoint Controller receiver to the EUC.
See “Recommended Relays” on page E-1 for wiring diagrams for each of these relays.
The Endpoint Controller behavior is as follows: Immediately after a power up or a reset (for example, to clear an
internal fault), the Endpoint Controller enters start-up mode in which all outputs are disabled (not sourcing or sinking)
until the system successfully completes its startup tests, at which point the system enters run mode. If a startup test
fails, the Endpoint Controller will reset itself and try again to see if the fault has cleared.
While in run mode, the Endpoint Controller output(s) are turned on if there is no request for safety (e.g., E-Stop
button has not been pressed) and there are no internal faults or a timeout. On the other hand, while in run mode, the
Endpoint Controller output(s) are turned off if there is a request for safety (e.g., E-Stop switch on the Sender device is
pressed), because of internal faults, or if the Endpoint Controller encounters a timeout due to not receiving safety
messages from the sender.
In terms of your EUC, if you use a relay configured for automatic reset, then the EUC resumes automatically after a
fault is cleared or the E-Stop button is released. On the other hand, if you configure the relays for manual reset, the
EUC won’t resume operation until someone manually resets the relays.
⚠ WARNING: If your machinery is connected to relays that reset automatically, be certain that your operators
are aware that the machinery can restart suddenly without warning once a fault or E-Stop is
cleared on the EPC.
Consult the documentation that comes with your relay devices for information about how to wire
relays and configure them for manual or automatic reset.
⚠ WARNING: Do not connect latching relays to the EPC outputs because they prevent the emergency stop from
working.
Mounting an EPC
An Endpoint Controller has four mounting holes to attach it to the equipment under control (EUC) as shown in
Figure A-1, “EPC-1001 Mechanical Drawing,” on page 2. We recommend using ¼-20 or M6 machine screws for
mounting.
⚠ CAUTION: If you are locating the EPC outside or attaching it to equipment that is operating outside or can be
exposed to any amount of water, you must mount the EPC vertically. Mounting the EPC
horizontally allows water to pool and block airflow through a membrane, potentially causing the
EPC to malfunction.
In addition, avoid placing the EPC in an area or on a machine with extended exposure to direct
sunlight.
⚠ IMPORTANT: You cannot use your own antenna; you must use one of the antennas available from FORT.
Choose an antenna based on the wireless communication type you plan to use as shown in the following table
(Usage row):
TABLE 3-4. Antennas
275-0002 275-0080 275-0096
FORT Device EPC 1002, SRC Pro 1002 EPC 1001, SRC Pro 1001 EPC
Antenna Type Whip, Straight Whip, Straight Dome
Usage ISM EU Bands ISM NA Bands Wi-Fi, BLE
Frequency Range 750–950MHz 865-965MHz 2.4 - 2.5GHz
(5.1 to 5.9GHz pending tests)
Peak Gain 1.1 dBi 1.8 dBi 4.5dBi @ 5.1-5.9Ghz band and
7.2dBi in the 2.4 to 2.5Ghz
band
Ideal Placement Elevated, pointed straight up, clear Elevated, pointed straight up, Elevated, pointed straight up,
LOS clear LOS clear LOS
Termination RP-SMA Male RP-SMA Male N Type Female
⚠ CAUTION: If your device has an ISM radio, you must attach an antenna. Operating an ISM radio without an
antenna installed could damage the unit.
Ideally, you should place the antenna such that is has a clear line of sight (LOS), it’s not too high or too low, no metal is
between it and the sender, and it’s pointed straight up (whip antenna), or pointed towards other devices (puck
antenna)
The following table shows rules for using approved antennas in the USA, Canada, and Europe:
This chapter describes the features of the Safe Remote Control Pro in more detail, explains how to connect a Safe
Remote Control Pro to an Endpoint Controller, and explains the modes in which it connects to an Endpoint Controller.
JOYSTICKS
The Safe Remote Control Pro is a 6-axis controller with three on each hand. The X axis and Y axis are mapped to the
thumb stick on top of the Safe Remote Control Pro, while the Z axis is mapped to the finger stick underneath.
BUTTONS
The buttons on the Safe Remote Control Pro are configured in a diamond; those on the left hand side are: Up, Down,
Left, and Right. Those on the right are numbered 1 through 4.
POWER BUTTON
When the Safe Remote Control Pro is off, push the power button to turn it on. The LCD screen lights up and the device
vibrates when it is ready to use.
When you push the power button to turn it off, the Safe Remote Control Pro stops sending valid safety messages to
the connected Endpoint Controller, which causes it to go to safe state after the timeout period is exceeded.
PAUSE BUTTON
Press the Pause button to enter Pause Mode. See “Pause Mode” on page 4-2 for details.
Modes
This section explains the different modes for the Safe Remote Control Pro.
Pause Mode
In Pause Mode, the Safe Remote Control Pro continues to send valid safety messages to the connected Endpoint
Controller (if any) keeping the relays closed and the Endpoint Controller operating normally (not requesting safety).
The Safe Remote Control Pro also continues to output the joystick message but with all values set to 0 to guarantee
that no motion will occur.
The Safe Remote Control Pro enters pause node for any of the following reasons:
• The Safe Remote Control Pro user presses the pause button.
• The remote detects that it has been dropped (is free falling).
• The remote detects an orientation fault (such as the remote has moved to the user’s side or has been turned on its
face).
• The remote detects lack of motion for the timeout period (user configurable in one minute increments from
2 - 10).
Menu Mode
Menu Mode allows you to change system settings on the Safe Remote Control Pro.
In Menu Mode, the Safe Remote Control Pro continues to send valid safety messages to any connected Endpoint
Controller keeping the relays closed and the EPC operating normally (not requesting safety). The Safe Remote Control
Pro also continues to output the joystick message but with all values set to 0 to guarantee that no motion will occur.
5. Use the arrow keys to highlight a machine and press 1 to select it.
7. Wait for the connection to be established and when confirmed, press 1 to close the window.
At this point, the SRC Pro has transitioned to supervised mode.
If the connection attempt fails, you can repeat the connection process.
8. When it is safe to do so, release the E-Stop button.
At this point, you can use the Safe Remote Control Pro to control the movements of the EUC and if necessary, press
the E-Stop button to send a safety signal to it.
⚠ CAUTION: If you are changing the mode from supervised to autonomous, be certain that the EPC is
connected to a machine with autonomous capability and that it has been wired appropriately for
autonomous mode as shown in Figure 2-4, “Input 3 Asserted on EPC Receiver,” on page 9.
Otherwise, if the machine does not have autonomous capability, and has not been wired
appropriately, the EPC will transition to safe state when you change the mode to autonomous.
3. Press the number buttons to enter the code to confirm the selection.
If you change your mind, you can press the menu button to quit and return to the selection menu. Note that
pressing an incorrect number sequence also returns you to the selection menu.
4. Wait for the connection to be established and when confirmed, press 1 to close the window.
5. After the mode change is successful, press the Menu button to close the prompt.
The screen displays the new mode. For example, if you began in supervised mode, the screen should show: AUTO.
At any given time, an SRC Pro can only be connected to one machine in supervised mode (indicated by SUPR after the
machine name on the LCD display) The SRC Pro can also set the mode of multiple machines to autonomous (indicated
by AUTO after the machine name on the LCD display)
To see the mode of all machines in the configuration, press the Menu button, then navigate to the Machine tab of the
SRC Pro LCD screen:
• AUTO autonomous mode
• SUPR supervised mode
• <blank> unknown (or no mode)
Turning the SRC Pro Off and Back On
When you turn an SRC Pro off, machines that were in autonomous mode will continue to operate in autonomous
mode. If the SRC Pro was connected to a machine in supervised mode, that machine will experience a timeout and
transition to safe state.
After you turn the SRC Pro back on, machines that were in autonomous mode will continue to operate in autonomous
mode, but the display will show these machines as blank.
If the SRC Pro was connected to a machine in supervised mode, it will no longer have a connection unless you
reestablish one. The display mode for that machine will be blank until you reconnect.
⚠ NOTE: An SRC Pro does not remember the displayed mode after it is turned off and then turned back on.
Therefore, the displayed modes for all machines is blank after power cycling the SRC Pro.
When the EPC installed on a machine is turned off, the relays will open and put the machine in a safe state, but the
displayed mode associated with the machine will remain as before.
When the EPC is turned back on, the relays will remain open and keep the machine in a safe state until you use the
SRC Pro to connect to the EPC and change its mode to supervised or autonomous. The displayed mode on the SRC Pro
for the machine will continue to be the same as it was before the EPC was power cycled.
⚠ NOTE: The displayed mode on the SRC Pro only indicates the mode that the user set the EPC to. It does not
reflect the actual state of the EPC. For example: you set the mode of the EPC on Machine-1 to
autonomous and then use the SRC Pro to connect to Machine-2. Later, Machine-1 moves out of range
of the SRC Pro, or it is turned off, but since the SRC Pro doesn't have communication with that EPC, it
continues to show the mode as AUTO.
The EPC’s CAN application supports sending and receiving message using the CANopen or the J1939 protocol.
CANopen Implementation
This section shows how to send joystick using CANopen.
The SRC Pro-via-EPC CANopen integration provides a CiA 301 (CAN in Automation), 401 Part 1, and 401 Part 2
interoperable network slave.
⚠ WARNING: The SRC Pro commands made available on CAN network are not safety certified, therefore you
must assess the suitability of using this data in safety relevant applications.
At present, while the integration is intended to be compatible with a CANopen compliant network, the full capability
set described in the standards is not yet implemented.
You can find a sample EDS (Electronic Data Sheet) file to download from the Customer Support Portal in the Endpoint
Controller article.
The following table provides an overview of the different types of CANopen joystick data.
The following table lists the TPDO1 (0x180 + Node ID — default Node ID is 3) buttons. TPDO1 conveys the Boolean
values of the Safe Remote Control Pro’s buttons.
The following table lists the TPDO2 (0x280 + Node ID — default Node ID is 3) thumbstick axes. TPDO2 conveys the
analog values of the four axes on the face of the Safe Remote Control Pro.
Each value is a full range 16-bit signed integer (int16) that produces a zero-value when the stick is at rest/centered.
The axis shows a positive value when pushed up (Y) or right (X) and a negative value when pushed down (Y) or left (X).
TABLE 5-3. TPDO2 Thumbstick Axes
Object Dictionary Index (hex) Sub-Index Type Usage
64.01 01 INT16 Left Stick X
64.01 02 INT16 Left Stick Y
64.01 03 INT16 Right Stick X
64.01 04 INT16 Right Stick Y
The following table lists the TPDO3 (0x380 + Node ID — default Node ID is 3) trigger axes. TPDO3 conveys the analog
values of the two triggers at the rear of the Safe Remote Control Pro.
Each value is a full range 16-bit signed integer (int16) that produces a zero-value when the trigger is at rest/centered.
The axis shows a positive value when pulled up and a negative value when pushed down.
CANopen Limitations
The device implementation currently lacks some CANopen standard functionality that you should be aware of:
⚠ WARNING: The data available on CANopen is not safety rated, therefore you should not use this data to
perform safety functions.
• The default bitrate of the CAN interface is 250000. You cannot adjust the bitrate through the CANopen NMT
protocol but must do so by using FORT Manager or the FORT CLI Config Tool.
• The default device Node ID is 3. You cannot change the device address through the CANopen NMT functionality
but must do so by using FORT Manager. Contact FORT support if you require a value other than the default and
need more information.
J1939 Implementation
The Endpoint Controller’s CAN application supports sending and receiving message using the J1939 protocol. The
Endpoint Controller uses the Emota J1939 stack to provide the full functionality of the J1939 protocol. The following
table provides an overview of the J1939 messages.
⚠ WARNING: The data available on CAN J1939 is not safety rated, therefore you should not use this data to
perform safety functions.
At present, while the integration is intended to be compatible with a J1939 compliant network, the full capability set
described in the standards is not yet implemented.
You can find a sample DBC (Database Container) file to download on the Customer Support Portal in the Endpoint
Controller article.
The following table provides an overview of the different types of J1939 messages.
Address Claiming
The EPC CAN supports the standard J1939 Address Claim functionality. The Endpoint Controller’s Manufacturer Code
is 1262 (decimal).
SRCP control messages are received on CANopen via RPDO1 and RPDO2 as shown in the following tables:
TABLE 5-8. RPDO1 (0x200 + Node ID) - SRC Pro Settings Message
Object Dictionary Index (hex) Sub- Type Usage
Index
20.00 01 Octet String (0x0000a) SRC Pro Setting Message
size - 8 bytes or 64 bits 0x40 bits
TABLE 5-9. RPDO2 (0x300 + Node ID) - User Display Text String
Object Dictionary Index (hex) Sub-Index Type Usage
20.01 01 Octet String (0x0000a) Display Text Data
size - 8 bytes or 64 bits 0x40 bits
SRC Pro control messages are received on J1939 via proprietary message PGNs.
TABLE 5-10. CAN J1939 SRC Pro Settings Message
PGN PGN (Hex) Description Direction Freq
65281 0xFF01 SRC Pro Settings Command - J1939 Proprietary Message Receive N/A
65282 0xFF02 User Display Text String - J1939 Proprietary Message Receive N/A
⚠ CAUTION: Vibration messages are rate limited to 1 message per 100 ms. Additional vibration messages
received beyond the limit will be ignored.
The following table shows the SRC Pro Settings message format:
TABLE 5-11. SRC Pro Settings Message Format
Byte Offset Size Description Value
0 1 Setting Key SRC Pro Setting to Change
1 4 Setting Value Value of the setting (little endian)
5 3 Reserved for Future Use
The following table shows the Safe Remote Control Pro setting keys.
The Endpoint Controller supports receiving an SRC Pro user display text message to set the display text on the
connected Safe Remote Control Pro when the Safe Remote Control Pro is in user-text mode. You can use the SRC Pro
Settings message to change the display mode of the Safe Remote Control Pro.
This message is only supported when an Endpoint Controller is connected to a Safe Remote Control Pro.
The User Display Text String message to the Endpoint Controller allows updating the displayed text on the connected
Safe Remote Control Pro when the Safe Remote Control Pro is in user text mode. The user string is built using three
segments of six characters each to build an 18-character string.
⚠ CAUTION: This message is rate limited and only 1 message can be received per 100 ms. Additional messages
received beyond the limit will be ignored.
The following keys are currently defined by the system for user strings:
Status Messages
⚠ CAUTION: This section describes functionality that is available in EPC 1.6.0 or later. If you are using a
previous firmware version, and want to use one of these messages, update your firmware to the
latest version (see “Updating EPC Firmware”).
Status messages use custom formats that remain the same between CANopen and J1939.
The following table shows the Object Dictionary definition of all CANopen EPC Status messages:
TABLE 5-15. TPDO4: (0x480 + Node ID) - EPC Status Messages
Object Dictionary Index Sub- Data Type Name
(hex) Index
30.00 01 Octet String (0x0000a) EPC status messages
size - 8 bytes or 64 bits 0x40 bits
The following table shows the PGN for J1939 status messages.
TABLE 5-16. J1939 EPC Status Messages
The Endpoint Controller transmits a heartbeat message to provide status for various Endpoint Controller functionality.
It uses the TPDO4 protocol to transmit the heartbeat message at a rate of every 5 Hz.
The following table shows the Object Dictionary definition of the heartbeat message.
TABLE 5-22. TPDO4: (0x480 + Node ID) - EPC Heartbeat Message
Object Dictionary Index (hex) Sub- Type Usage
Index
30.00 01 Octet String (0x0000a) EPC Heartbeat Message
size - 8 bytes or 64 bits 0x40 bits
The following table shows the J1939 PGN for the EPC Heartbeat Message.
TABLE 5-23. J1939
PGN PGN Description Direction Freq
(Hex)
65280 0xFF00 EPC Heartbeat - J1939 Proprietary Message Transmit 5 Hz
1. This message format has been replaced by “EPC Output Status 1 Message” for EPC 1.6.0 and later.
CHAPTER 6 Security
The FORT Robotics security approach for Pro Series devices aligns with the National Institute of Standards and
Technology (NIST) guidance for device security best practices.
With security defined as the state of being free from danger or threat, FORT’s security mission is to ensure that every
capability we deliver in any form — hardware, software, cloud, mobile, any data, or something else — works correctly
and completely throughout its life cycle, without inspection or influence from malicious actors.
Toward that goal, we’ve built foundational cybersecurity capability into the full Pro Series hardware, software, and
cloud-connected stack, protecting those devices from the moment they start through their complete life cycle.
The Endpoint Controller and Safe Remote Control Pro provide the security features described in the following
sections:
Tamper-proofing devices
To prevent hackers from altering the hardware of the device or circumventing the startup process, each device is
hardened as its final production step, prior to delivery to customers. Hardening includes One-Time Programming
(OTP), a physical process of blowing transistors to ensure that no software attack can re-enable any interfaces used by
development and test, as well as a secure hardware linkage to prevent removal and replacement of critical hardware
elements.
The device startup process securely starts the device using three steps to ensure that only FORT-signed firmware is
running. The operating system is cryptographically validated each time the device starts up to ensure trusted machine
control.
• Step 2 - The now-trusted boot loader checks and loads the libraries that are essential for starting the rest of the
operating system.
• Step 3 - After software checks on the libraries pass, the boot process loads and checks the rest of the operating
system.
Trusted communication
To prevent FORT devices from communicating with unknown entities FORT constructs a whitelist of trusted devices.
The whitelist forms a “care list” for each device from a communication and safety perspective, helping it communicate
with only trusted devices using functional safety (FuSa) communication channels to protect the exchange:
• Each configuration contains a trusted device list that describes the only other entities with which the device is able
to communicate.
• Altering the configuration file in any way destroys its digital signature, preventing hackers from inserting their own
details.
This builds on the secure boot capability, as after a new update is applied, the device will reboot and leverage that
second series of three-step checks to ensure that the entire process executed successfully:
• The device validates the digital signature of the firmware update before installing the update.
• Images that pass validation are applied to the device.
• Devices also have update rollback capabilities — in case of failure, the device rolls back to the last known good
firmware.
Our cloud-hosted FORT Manager solution gives you the ability to securely manage and configure your Pro Series
devices, as well as the ability to manage the personnel in charge of their deployment, configuration, and upkeep.
To use FORT Manager, open a browser and navigate to the FORT Manager URL: https://app.fortrobotics.com and
log in with your email address and password.
FORT Manager is invite-only. If you don’t have an account, ask the person at your company who initially set up the
FORT Manager account (your FORT Manager Admin) to create one for you. If you don’t know your company’s FORT
Manager Admin, reach out to us at [email protected].
For more information about how to get started with FORT Manager, see our getting started guide.
Launch FORT Manager and enter your email address and password. If multi-factor authentication is enabled for your
account, follow the instructions to set it up.
Dashboard
When you first log into FORT Manager, you are in the dashboard view. If you navigate away from the dashboard, you
can return at any time by clicking Dashboard in the left navigation pane.
• [A] Items in the left pane enable you to navigate to different pages in FORT Manager, as well as to open a new
browser window to go directly to the FORT Robotics support website or to the API Portal.
This pane remains constant no matter which page you are on in the app.
⚠ NOTE: The items that are visible in the left pane (and hence the pages that you can navigate to) depend on
your assigned role. For example, if your role doesn’t have permission for user management, Users is
not visible in the navigation pane. In addition, some roles provide view-only access to certain pages;
for example, if your role provides view-only access to devices, Devices is available in the navigation
pane and you can view the devices page to see a list of devices, but you can’t add, delete, or modify a
device.
“Users” on page 7-5 explains roles and permissions in more detail.
• [B] The middle pane displays information about your configuration, for example the number of devices your
organization has registered and the number and percentage that have been added to a configuration.1
• [C] The Quick Links section allows you to do any of the following in a new browser window:
• See any of your open tickets.
• Submit a new request for technical support, to repair or RMA a device, or to provide feedback.
• View release notes and manuals.
You can also click the Support item in the left pane to go to the FORT help center and browse or search our
knowledge base for specific information.
• [D] The icon in the upper right corner allows you to view and edit your profile or to sign out.
To edit your profile, click the icon and click Settings. Click Edit next to any item to make changes (see the next
section for more details).
1. Future versions of FORT Manager will enable the display of additional information about your organization in addition to percentage of
devices that are configured. Please use the Submit Request Quick Link to ask for enhancements that you would like to see.
⚠ NOTE: Your role is set by your admin and you cannot change it. Also, although you can independently set up
multi-factor authentication for your account, if your admin has required it for your role, you won’t be
able to disable it.
Personal Settings
All users can view or change their personal settings from any page in FORT Manager, including name, icon to display,
email address, and password. You can see your role (but only an admin can change it) and you can turn on multi-factor
authentication for yourself, but if an admin has enabled it for your role, you cannot disable it.
⚠ NOTE: Your role is set by an administrator and you cannot change it.
4. To enable multi-factor authentication for yourself, move the slider next to MFA and follow the instructions to set it
up (log out and scan the QR code).
Each subsequent time that you log into FORT Manager you must provide the code from the authenticator app in
addition to your password.
⚠ NOTE: Although you may set an MFA requirement for yourself even if an admin hasn’t required it for your
role, you cannot disable an MFA requirement that an administrator has enabled.
Devices
Devices that have already been activated are visible in the center pane, along with clickable details for every device.
Additionally, if you have Admin or Device Manager permissions, you have the ability to:
• Add a new FORT device.
• Edit the custom details for a device.
TO ADD A DEVICE
We recommend assigning names that describe the function or location of the device or the equipment under control
(EUC), for example, South Tractor Remote Control, or Observation Deck Controller for sending devices, and South
Tractor, Thresher, AMR-1, etc. for receiver devices attached to EUCs.
TO EDIT A DEVICE
FORT Manager updates the name for the device and picture on the Devices page as well as anywhere else they
appear, such as on the Configurations page.
Configurations
(Requires Config Manager or Admin role to build a configuration)
The Configurations page enables you to see, as well as build or manage (with appropriate permissions), configurations
for your organization. With a configuration you build out all of the wired or wireless pairings between your Pro Series
devices.
All users can view the Configurations page but only Admins and users with Config Manager permission are able to
make updates, including building a new configuration.
The following sections explain in detail the characteristics of particular configurations and how to use Config
Management in FORT Manager to build them:
• “Building an EPC to EPC Configuration” on page 2-2
• “Building an SRC Pro to EPC Configuration” on page 2-9
• “Building a Hybrid Configuration” on page 2-13
Firmware
(Requires Device Manager or Admin role)
The Firmware page enables you to download firmware files to update the firmware on your devices. You can also
download the latest version of the CLI Tool that you can use to install the firmware files.
FORT Manager copies the file to the Download folder on your computer. Follow the appropriate instructions for the
type of file that you downloaded:
• “Loading a Configuration onto an EPC” on page 2-15
• “Loading a Configuration onto an SRC Pro” on page 2-16
• “Updating EPC Firmware” on page G-4
• “Updating SRC Pro Firmware” on page G-5
Users
(Requires Admin role)
The Users page allows you to add or delete members from your organization, as well as assign roles (permissions) to
users. The available roles are:
• Admin — Has all the permissions listed for the other roles as well as all user and organizational management
capabilities.
• Config Manager —Create, edit, and delete configurations.
• Has has read-only view of the Devices page.
• Device Manager —Create, edit, and delete devices
• Has read-only view of the Configurations page.
• Has full access to the Firmware tab to download firmware files and the CLI tool.
• Operator — Read-only permissions across FORT Manager but can’t make changes.
• Is not able to see the Users, Organization, or Firmware pages.
• (Outside of FORT Manager) Is able to execute the CLI tool to load configurations to devices or to update the
firmware on a device.
All users are able to turn on multi-factor authentication (MFA) for their own account.
When you add a user to FORT Manager, you specify their email address and assign one or more roles. FORT Manager
sends an email invite to the user and guides them through the registration process.
TO ADD A USER
You should see a message that the invitation was sent successfully and see details about it in the Pending tab. The
invitation expires after two days.
The selected user receives an email from you (the FORT Manager Admin) with a link to create an account in FORT
Manager. After the user logs in and creates an account, you can see their details on the Active tab on the Users page.
b. To remove roles, click the box for a role with a check mark to deselect it and click Save.
You cannot remove all roles for a user; you must assign at least one role.
⚠ CAUTION: To prevent your organization from ending up without an admin account, admin users are not able
to delete themselves. If you want to delete a specific admin account, you must have at least one
other admin account that you can use for that purpose.
Organization
(Requires the Admin role)
The Organization page enables an admin to view or edit basic information for the organization, and to view and
manage multi-factor authentication (MFA) settings for users.
Click the Basic Info tab to view or update information such as your organization name, logo, location, and so on. The
organization name and logo appear in the upper left corner of the page for all users.
Click the Settings tab to view or update MFA requirements. You can require MFA for your entire organization or apply
it selectively based on role.
⚠ NOTE: Individual users may set an MFA requirement for themselves even if an admin hasn’t required it for
their role, however, they cannot disable an MFA requirement that an administrator has enabled.
The first time a user logs into their account after an admin requires MFA, FORT Manager guides them through the
process of setting up an authenticator app by scanning a QR code. Subsequently, users must provide the code from
the authenticator app in addition to their password each time that they log in.
The following table shows the recommended connectors for an Endpoint Controller device.
⚠ CAUTION: Connectors are designed to be hand tightened only. Use of a wrench or other tool will cause
damage to the connector or cabling.
Input state for logic ON/HIGHa 8VDC 12VDC (or 24VDC) 32VDC
Input state for logic OFF/LOW 0VDC 0 ~ 1VDC Less Than 8VDC
Input Impedance TBD
a. This applies to 12 VDC and 24 VDC supplied EPC Equipment.
Ethernet Specifications
The following table provides Ethernet specifications:
TABLE A-8. Ethernet Specifications
Specifications Minimum Typical Maximum
Speed 10/100 Mbps
Data Interfaces
The Endpoint Controller’s integration interface is USB or CAN (Controller Area Network). “CANopen
Implementation” on page 5-1 describes CAN communication specifications (data rates and protocol). Use the
Endpoint Controller’s dual safety outputs to prevent any motion of the equipment under control (EUC) when the
Endpoint Controller receives an emergency stop from either the connected remote device or its wired emergency stop
input. The emergency stop inputs are relative to PVin. Maintain a single ground reference for all power and reverence
voltages.
This appendix provides details of the Safe Remote Control Pro hardware.
APPENDIX C Safety
This Appendix explains the safety related operations and methods used to achieve functional safety of the Pro Series
devices. This information shall be considered by the designated responsible individuals who would need and use the
following information to properly apply to the Pro Series devices.
The only safety relevant function of an EPC or SRC pro is related to handling of the emergency stop (E-Stop) command.
A given Endpoint Controller, based on how it is configured by the customer (using FORT Manager), can act as a sender
that reads the safety input state and transfers each change in state (i.e., emergency stop requests) or it can act as a
receiver that receives and acts on emergency stop requests.
The following sections of this chapter describe the operations inside the EPC and SRC Pro, including input, logic, and
output, and explain in detail all valid use cases and their functional safety operations.
The Application Processor takes the message and sends it to other receiver Endpoint Controller(s) via a
communication link.
The AMCU of the receiving Endpoint Controllers receives the safety request messages and sends them serially to the
onboard safety processors to be processed and acted upon.
The emergency stop switch that is built-into an SRC Pro generates a signal that indicates whether safety has been
requested. The safety processors of the SRC Pro read this signal, interpret it based on the voltage level of the signal,
and then generate a safety request message that indicates whether safety has been requested. The message is serially
passed to the Application Processor of the SRC pro.
The Application Processor receives the message and transmits it to a remote receiver Endpoint Controller via a
supported communication link.
The AMCU of the receiving Endpoint Controller receives the safety request message and sends it serially to the
onboard safety processors to be processed and acted upon.
Compliance with the IEC 61508 requires the system level requirements detailed in the following section.
⚠ NOTE: Although this document fulfills implied functional safety requirements in accordance with IEC 61508
and FORT Robotics engineering development processes, in the event of a conflict between the
documents referenced and the contents of this guide, the current document applies.
To comply with the 1oo2 safety architecture, the system has two redundant safety hardware components on board
the Endpoint Controller and SRC pro with their own independent input circuitry, processing, output circuitry, and
external monitoring (via a watchdog). The external watchdog is only required for EPCs and not SRC Pros.
The processors on the two redundant safety subsystems also communicate with each other through a serial link. The
following diagram shows the 1oo2 architecture used in the Endpoint Controller and SRC pro:
If one channel stops communicating with the other channel for longer than a specified period of time, then the other
channel enters a safe state as follows:
• A sending device (SRCP or EPC) sends a safety message to request safety from the remote device(s).
• A receiving device (EPC) turns off the relays or actuators that are connected to its outputs.
If either of the two channels encounters a failure, the system is not degraded from 1oo2 to 1oo1; rather, if one of the
two channels goes to a safe state the other channel is designed to enter a safe state as well.
The system is designed as a fail-safe system whereby if the system loses power:
• A sending device (SRCP or EPC) stops transmitting safety messages which triggers a timeout on receiving EPCs
which then causes the receiving devices to turn off their output relays.
• A receiving device (EPC) loses power (turns off) which causes all outputs to be open circuit, which in turn causes
the connected output relays to turn off.
The two redundant safety subsystems communicate with an onboard non-safety subsystem that sends the safety
request messages to and receives them from the safety processors. The non-safety subsystem (called Application
Processor or AMCU) functions as part of the black channel communication and transfers the safety messages to and
from SMCUs without modifying their content (Redundant with black channel requests). The following diagrams show
the flow of safety data and commands, from one Endpoint Controller (EPC) to another Endpoint Controller, and from
an SRC Pro to an EPC.
If the AMCU changes the content of a safety message because of an error, the receiving SMCU will detect the change
and will consider the changed message invalid and will not act upon it.
Safety Inputs
An Endpoint Controller (more precisely, the safety relevant portion of the Endpoint Controller) provides support for
processing and handling of two types of inputs: physical inputs and virtual inputs.
The SRC Pro supports processing and handling of the built-in emergency stop switch.
Physical Inputs
This section describes the physical inputs for the EPC and SRC Pro.
EPC Physical Inputs
Physical input circuitry interfaces with the input devices (mechanical emergency stop switches, and more complex,
solid state devices like a light curtain) that the customer connects to the Endpoint Controller. The input circuitry
conditions the input signals and provides them to the safety processors. Safety processors then calculate the
magnitude of the signals to determine if safety has been requested or not.
Each Endpoint Controller provides redundant hardware circuitry and the associated software to support the
connection of three external physical input devices that have redundant outputs.
The system reads and processes the state of each external physical input as an analog value using ADC (Analog to
Digital Conversion) and checks the processed value of analog inputs against specified voltage ranges to determine
whether the value of the signal indicates that safety has been requested.
• Solid state type devices such as a light curtain, proximity sensor, etc., that must have redundant outputs.
If the solid state type device’s signal includes a diagnostic off-pulse (known as OSSD), the system does not react to this
pulse.
An input of an input-output pair only affects the output that it is paired with; for example, the input of input-output
pair 1 can only affect the output of input-output pair 1 and cannot affect the output of input-output pair 2 or 3.
SRC Pro Physical Inputs
Physical input circuitry interfaces with the built-in mechanical emergency stop switch (which internally includes two
individual SPST switches). The input circuitry conditions the input signals and provides them to the safety processors.
Safety processors then calculate the magnitude of the signals to determine if safety has been requested or not.
The system reads and processes the state of the built-in E-Stop switch as an analog value using ADC (Analog to Digital
Conversion) and checks the processed value of analog inputs against specified voltage ranges to determine whether
the value of the signal indicates that safety has been requested.
Virtual Inputs
Virtual Inputs (applicable only to receiver EPCs) are safety request messages, generated by the SMCUs of a remote
Endpoint Controller or SRC Pro, that are serially transmitted to the AMCU of the Endpoint Controller or SRC Pro, which
then transmits them using a wired or wireless link to the Application Processor of a remote Endpoint Controller.
The Application Processor of the remote Endpoint Controller (EPC) receives the safety request message and then
serially transmits the message to the SMCUs. The following diagram shows this message transmission:
On a receiving Endpoint Controller, if the AMCU doesn’t pass the safety message to the SMCU, a timeout occurs that
puts the outputs in a safe state. If the AMCU corrupts the safety request message, the CRC (cyclic redundancy check)
and other checks will detect the error and will not use the content of the message.
In summary: only assembling the safety message and processing the incoming safety request message is safety
relevant. The rest of the communication chain is considered a black channel.
Pro Series User Guide 1.6.0 v1 C-5
Serial Communication between the two Safety Processors (SMCU)
This is applicable to both SRC Pro and EPC. If one of the two channels of the 1oo2 system fails, the system must not
degrade to 1oo1 operation. Therefore, when an SMCU detects an error and puts itself in a safe state, it must notify the
other SMCU in order for the other SMCU to also go to a safe state. Therefore, the two SMCUs periodically
communicate their state to each other by sending a message through a serial link.
Moreover, if an SMCU doesn’t receive the periodic message from the other SMCU, after a specified period it goes to a
safe state until it receives a valid safety message from the other SMCU.
This message uses the same approach to verify the message (CRC counter, and timeout) as the safety request message
(see previous section) and the content of a message that fails the sequence counter check will not be used by the
SMCU.
At least one valid message must be received by each SMCU from the other SMCU every timeout period (40ms),
otherwise the outputs (both virtual and physical) are put in a safe state. Specifically, the system sends SMCU-to-SMCU
messages every 10 ms (within every control loop), and if an SMCU doesn’t receive a valid message from the other
SMCU for four consecutive loops, it goes to a safe state.
When an SMCU receives a message from the other SMCU that indicates the other SMCU is in a safe state, the first
SMCU also transitions to a safe state and puts all of its outputs (physical or virtual) in a safe state.
Before using any other field of the safety message for any purpose, the safety processors examine the content of the
safety request message using the sequence counter and the CRC fields, to determine if the message is valid and has
not changed during its transmission from the source to the destination.
At least one valid safety request message must be received by the SMCU within the timeout period since the last valid
message, otherwise the outputs will be turned off to put the EUC in a safe state. For example, a safety timeout of 250
ms means that a receiver EPC must receive at least one valid safety message within 250 ms of receiving the last valid
safety message or else it will turn off its outputs.
The allowed timeout periods that can be chosen by the customer (using FORT Manager) are 250 ms, 500 ms, 750 ms
and 1000 ms (1 sec).
Safety Processing
To comply with the 1oo2 safety architecture and SIL requirements, the safety portion of the Endpoint Controller and
SRC Pro uses two redundant processing units, referred to as SMCU0 and SMCU1. Each double redundant input is
connected to one of the SMCUs. For example, the double redundant E-Stop switch, internally contains two mechanical
switches. One switch is connected to SMCU0 and 1 switch is connected to SMCU1.
Each safety processor reads the value of the input signal (virtual or physical) that it receives and based on the
magnitude/content of the signal will command the physical outputs to either turn on or off or transmit a message
indicating safety being requested or not.
The system complies with highly recommended safety requirements (the micro manufacturer refers to them as CoU,
Conditions of Use) that are listed in the manufacturer’s safety manual of the specific processor in use.
⚠ IMPORTANT: When any of the safety mechanisms indicates the presence of a failure, the system logs a fault
that indicates the reason for the fault, and it places the outputs (both virtual and physical when
applicable) in a safe state.
Safety Outputs
This section describes the safety outputs for the EPC and SRC Pro.
EPC Safety Outputs
An Endpoint Controller provides support for processing/handling of two types of outputs: physical outputs and virtual
outputs.
Each Endpoint Controller has 3 independent input-output pairs (input-output pair 1, input-output pair 2, input-output
pair 3). An input of an input-output pair can only affect the output that it is paired with; so, for example, input of
input-output pair 1 cannot affect the output of input-output pair 2 and the user will not be allowed to create such a
configuration.
The output of each input-output pair must be configured by the user, using FORT Manager.
SRC Pro Safety Outputs
The SRC Pro is a transmitter device and therefore only supports one virtual output that indicates the state of the built-
in emergency stop switch.
Physical Outputs
Physical outputs are only applicable to receiver EPCs. Physical output circuitry creates a link between the safety
processor and the output devices, which are typically relays (or actuators) that a user connects to the outputs of the
Endpoint Controller. Based on the state of the inputs and the safety system’s diagnostics information, the safety
processors determine whether the relays need to be turned on or off.
For example, if the state of inputs indicates that safety has been requested, the system turns off the outputs to turn
off the external relays, otherwise it keeps the outputs on to keep the external relays on.
Each Endpoint Controller provides redundant hardware circuitry and the associated software to support the
connection of three external and redundant physical output devices. The external physical output devices must be
connected in series, such that if one or both of the two devices are turned off, the EUC is turned off.
If the state of any virtual input indicates that safety has been requested by a remote device, the output of that device
is turned off.
If the system has a fault that could affect all of the outputs, all the outputs will be turned off.
The AMCU acts as part of a black channel and does not deliberately modify the content of the safety request message.
The CRC verification detects accidental corruption of the message at the destination.
The content of the safety request message also includes a sequence counter that is incremented as each new message
is transmitted to the AMCU. This enables the remote device to detect out of sequence and old messages that it must
not act upon.
A user must configure an Endpoint Controller with FORT Manager before the device can be used in a runtime
application. See “Configurations and Use Cases” on page 2-1. A subsequent power cycle of the Endpoint
Controller does not erase the configuration stored in the device. Any re-configuration of an Endpoint Controller must
be done by a user with FORT Manager.
Use FORT Manager to configure the Endpoint Controller, including the inputs and outputs of the safety portion of the
Endpoint Controller:
• Configuration: Identify the sender(s) and receivers for the network.
• Timeout Configuration: Select one of the values 250ms, 500ms, 750ms or 1 second as a timeout.
• Supply voltage configuration: For each EPC device, select the supply voltage to the EPC, which can be either 12 or
24 Volts.
• Input configuration: Identify the type of device (E-Stop, solid-state, or not used) to attach to each of the three
inputs.
• Output configuration: Derived by FORT Manager from the configuration information entered by the user.
To ensure that program file corruption or an accidental change of configurations can be detected, FORT Manager
calculates a CRC for SMCU configurations that it transmits to the AMCU and includes as part of the SMCU
configuration data. Upon completion of transfer of the configuration to its RAM, the SMCU verifies that the CRC of the
configuration matches its content, and if not, logs a fault and resets the SMCU.
After an SMCU receives its configuration, it verifies that the configuration is one of the allowed
configurations. If it isn’t, the SMCU resets itself and the EPC cannot enter a running state of operation.
Mechanical and Electrical Safety (EPC)
The Endpoint Controller is designed and built to operate in extreme environmental conditions. As such, we’ve
subjected it to rigorous mechanical and electrical tests.
Note that if the EPC is operating in an environment in which it is exposed to water you must mount it vertically.
Mounting it horizontally allows water to pool and block a breathable membrane causing the device to malfunction.
Based on your application, you should determine how frequently you must perform a proof test on the system.
See “Proof Testing” on page G-2 for a couple of suggested proof tests.
Based on your application, you should determine how frequently you must perform a proof test on the system.
See “Proof Testing” on page G-2 for some suggested proof tests.
The following two tables list the failure rates for the EPC using a site safety index (SSI) of 2 (good site maintenance
practices).
The following table lists the failure rates for the EPC according to IEC 61508.
TABLE C-5. EPC Failure Rates Good Maintenance Assumptions in FIT @SSI=2 EEC 61508
Application/Device Configuration λSD λSUa λDD λDU # SFF
Sender 9,067 120 9,558 92 522 99.5%
Receiver 9.080 178 9,534 92 567 99.5%
a. Note that No Effect Failures are no longer included in the Safe Undetected category according to IEC 61508, ed2,
2010.
Where:
λSD = Fail Safe Detected
λSU = Fail Safe Undetected
λDD= Fail Dangerous Detected
λDU= Fail Dangerous Undetected
# = No Effect Failures
The analysis shows that the EPC has a safe failure fraction (SFF) greater than 99% indicating that it meets hardware
architectural constraints for up to SIL 3 as a single device.
The following table lists the failure rates for the EPC using a site safety index (SSI) of 2 (good site maintenance
practices).
TABLE C-6. SRC Pro Failure Rates Good Maintenance Assumptions in FIT @SSI=2
Failure Category Failure Rate (FIT)
Fail Safe Detected 4779
Fail Safe Undetected 64
Fail Dangerous Detected 5021
Fail Dangerous Undetected 52
No Effect 649
Annunciation Detected 33
Annunciation Undetected 13
The following table lists the failure rates for the SRC Pro according to IEC 61508.
TABLE C-7. SRC Pro Failure Rates Good Maintenance Assumptions in FIT @SSI=2 EEC 61508
Application/Device Configuration λSD λSUa λDD λDU # SFF
SRC Pro 4811 64 5021 52 662 99.5%
a. Note that No Effect Failures are no longer included in the Safe Undetected category according to IEC 61508, ed2,
2010.
Where:
λSD = Fail Safe Detected
λSU = Fail Safe Undetected
λDD= Fail Dangerous Detected
λDU= Fail Dangerous Undetected
# = No Effect Failures
The analysis shows that the SRC Pro has a safe failure fraction (SFF) greater than 99% indicating that it meets
hardware architectural constraints for up to SIL 3 as a single device.
All the EPC and SRC Pro safety software (including diagnostic checks) run within a 10 ms control loop (except the
Short-to-Battery test, which runs every 200 ms). However, not all online tests run every 10 ms and for those that do
run every 10 ms, the software does some filtering on the faults to avoid the system entering a safe state
For example, the two safety processors (SMCU0 and SMCU1) exchange information about their state every 10 ms via
serial messages. However, they enter a safe state whenever either of the following occurs:
• They haven’t received a valid status message for four consecutive control loops (i.e., 40 ms) from the other SMCU.
• They receive a valid safety message from the other SMCU indicating that it has entered a safe state.
The following table provides a summary of the diagnostic tests that are performed on the inputs, outputs, and internal
parts of the system, how frequently they are performed, whether there is filtering, and the criteria for declaring a
fault (i.e., entering a safe state).
You use the FORT CLI Configuration tool on a Linux computer to load a configuration onto an Endpoint Controller or a
Safe Remote Control Pro, and to update the Endpoint Controller firmware (you use the FORT Configuration Tool utility
to update Safe Remote Control Pro firmware).
This chapter explains how to download and install the CLI Configuration tool and provides an overview of its
functions.
FORT Manager downloads the file: fort_cli_cfg-<version>.tar.gz to the Downloads folder on your
computer.
To get help with the options for this tool, open a terminal and type:
fort_cli_cfg –-help
This appendix describes the relays that we have tested for use with an Endpoint Controller (listed in the table). The
sections that follow provide a wiring diagram for each relay.
TABLE E-1. Table 51 Recommended and Tested Relays
Manufacturer Model Supply Voltage
Allen-Bradley MSR127TP 24V
EATON ESR5-NV3-30 24V
PILZ 751104 24V
IDEM SCR-3-1P-i 24V
OMRON G7SA-3A1B 24V
PANASONIC SFS3-L-DC12V-D 12V
ALLEN-BRADLEY, MSR127TP
PILZ 751104
This appendix provides notifications and certifications regarding the product described in the guide.
FCC Notifications
This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: 1) This device
may not cause harmful interference and 2) this device must accept any interference received, including interference
that may cause undesired operation.
IC Notifications
This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following two
conditions: (1) this device must not cause interference, and (2) this device must accept any interference, including
interference that may cause undesired operation of the device.
Ce dispositif est conforme aux norms permis-exemptes du Canada RSS d?industrie. L?opération est sujette aux deux
conditions suivates: (1) ce dispositive peut ne pas l?interférence, et (2) ce dispositif doit accepter n?importe quelle
interference, y compris l?interférence qui peut causer le fonctionnement peu desire du dispositif
Certifications
The Endpoint Controller is in the process of certification for functional safety by Exida corporation.
This section explains how to care for your devices, how to handle a device that is damaged or fails for any reason, and
how to update the firmware as necessary.
⚠ CAUTION: Do not apply harsh chemicals to clean the SRC Pro and EPC. Do not immerse them in water, avoid
spilling liquids on it (wipe them off immediately if this happens), and do not subject them to
intense water jets.
Device Failure
⚠ CAUTION: The EPC and SRC Pro have no user-serviceable parts. Do not attempt to make any changes or
repairs to these devices. If you have maintenance or repair questions fill out a request on the
customer support portal: https://support.fortrobotics.com/.
If rebooting does not resolve your issue, fill out a request on the customer support portal: https://
support.fortrobotics.com/ to address the issue.
Proof Testing
Before integrating an Endpoint Controller with your work environment — and at periodic intervals — you must
perform some basic safety (proof) tests to detect dangerous hidden failures in the EPC’s safety system. If the proof
test detects any failures, you must perform immediate repairs to restore the system to its as new condition or as close
to as new as possible.
Based on your application, you should determine how frequently you must perform a proof test on the system.
⚠ WARNING: Safe operation of the system requires that you thoroughly test the system before putting it into a
production environment. Testing includes training your personnel on both the manual functions
(pressing an E-Stop button, using an SRC Pro to maneuver an EUC, etc.) and automatic functions
of the system (solid state devices triggering safety, exceeding the timeout value, loss of radio
signal, etc.).
We recommend the tests for an EPC to EPC configuration and one for an SRC Pro to EPC configuration, but you need to
develop specific tests for each of your configurations as well.
To verify that inputs connected to a sender EPC and outputs connected to a receiver EPC are working correctly and can
cause an emergency stop on demand, perform the following procedure:
1. Make sure that the sender and receiver are up and running and communicating with each other.
2. While safety is not being requested by the sender EPC, measure the voltages at the input pins of the sending EPC.
The voltages should be high and close to the supply voltage of the EPC.
a. If any of the measured voltages is low, or much lower than the supply voltage, then a failure is present and you
must inspect the wiring and the connected components to identify the source of failure.
b. If no error is present, verify that the contactors of the relays attached to the receiver EPC(s) are all closed.
If any of the contactors is open, investigate the source of the failure.
3. Request safety (by activating the safety sensor/element attached to the input(s) of the sending EPC); the
contactors of the relays attached to the receiver EPC should all be open.
a. Verify that both of the voltages at the input pins of the sending EPC indicate a low voltage.
If one or both voltages are high, it indicates that a failure is present at the external input wiring (this includes
switches or solid state devices that are connected to the inputs of the EPC). Inspect the wiring and connected
input devices to find the source of failure.
b. Verify that both contactors on the relays connected to the receiver EPC(s) are open. If one or both contactors
are not open it indicates a failure is present. Inspect the wiring and the relays to find the source of failure.
4. Remove the request for safety and verify that the devices are up and running.
To verify that outputs connected to a receiver EPC are working correctly and can cause an emergency stop on
demand, perform the following procedure:
1. While the SRC Pro is up and running, use machine select and mode select to connect it to a running EPC in the
configuration.
2. While safety is not being requested, verify that the contactors on the receiver EPC are all closed.
If any of the contactors is open, investigate and identify the source of the failure.
3. Request safety by pressing the E-Stop button on the SRC Pro and verify that both contactors on the relay
connected to the receiver EPC are open.
If one or both contactors are not open, which indicates a failure, inspect the wiring and the relays to find the
source of the failure.
4. Remove the request for safety on the SRC Pro and verify that the devices are up and running.
During normal operation, a receiver Endpoint Controller expects to receive at least one valid safety message from the
sender Endpoint Controller within the (user-configurable) timeout period or else it enters the safe state (turns off its
outputs). If the Endpoint Controller stops receiving valid messages because of communication loss (or any other
reason), once the timeout period is exceeded, the safety processor on the Endpoint Controller opens the safety relays
to initiate the E-Stop command.
While performing safety tests on your Pro Series devices, verify that communication loss isn’t affecting the
performance of your equipment or causing unsafe operation. You can experiment with different values for the
timeout while testing — 250 ms (default value), 500 ms, 750 ms, or 1000 (1 sec) — to address any issues you find. You
set the timeout value in FORT Manager when building a configuration. See “Building an EPC to EPC Configuration”
on page 2-2 or “Building an SRC Pro to EPC Configuration” on page 2-9.
A higher value, which makes the Endpoint Controller less sensitive to communication loss, means that if an Endpoint
Controller loses communication with its sender, the EUC will run for a longer period before stopping automatically. On
the other hand, a lower timeout value, which reduces the risk of the EUC running without connection to the safety
controller, increases the sensitivity to communication loss.
⚠ IMPORTANT: Non-safety critical firmware updates are only available to customers whose device has an active
Guardian subscription. Guardian allows you to get firmware and software updates, extended
support, and warranty coverage beyond the limited one-year hardware warranty term.
FORT Customer Support notifies all customers through email regarding relevant firmware updates. The email includes
an attachment with the firmware upgrade file, which is also available for download in FORT Manager. If you are not
sure whether your firmware is up to date, or if you are eligible for updates, fill out a request on the Support Portal to
get help.
This section shows how to update firmware on an Endpoint Controller in the field. It assumes default IP values;
replace with your own as needed.
REQUIRED ITEMS
• Linux computer running Ubuntu 20.04 with Ethernet networking capability
Use M12-RJ45 cable if connecting directly to the EPC (e.g., ASI-M12-RJ45-11101).
• Firmware upgrade file for the EPC.
You can download an archive package that contains the latest version from FORT Manager (the procedure that
immediately follows these bullets provides instructions for downloading and extracting the file).
• Latest FORT CLI Configuration Tool (fort_cli_cfg).
If you don’t already have this tool, you can download it from FORT Manager. See “FORT CLI Configuration Tool”
on page D-1 for more information, including installation instructions for the tool.
• The 23-pin connector and cable and a power supply for the EPC. The mating connector to the EPC connector port is
a TE 770680-1 and the cable is the FORT #100-0256 Integration Cable. See “I/O Connector Pinout and Cable”.
Where:
-e 192.168.3.10
Specifies The EPC’s IP address (default value, yours might be different).
-m (--menu)
Specifies the interactive menu option for the configuration tool.
4. Use the arrow keys to navigate to Device Firmware Update and press Enter.
5. Use the arrow keys to navigate to Firmware Update and press Enter.
6. Type the path to the update file and press Enter, for example:
./epc-prod-update-1014.tar.zst
Note that the update process may take up to three minutes to complete.
7. Use the arrow keys to navigate to Device reboot and press Enter to reboot the device.
To verify that the device firmware was updated successfully, do the following with the Linux computer still connected
to the EPC:
1. Run the configuration tool again with the menu option:
fort_cli_cfg -e 192.168.3.10 -m
2. Use the arrow keys to navigate to (RO) Device Info and press Enter.
3. Use the arrow keys to navigate to Version Info and press Enter.
FORT Customer Support notifies all customers through email regarding relevant firmware updates. The email includes
an attachment with the firmware upgrade file. The file is also available for download in FORT Manager as described in
the following procedure. If you are not sure whether your firmware is up to date, or if you are eligible for updates, fill
out a request on the Support Portal to get help.
This section shows how to update firmware on a Safe Remote Control Pro in the field.
REQUIRED ITEMS
• Linux computer running Ubuntu 20.04 with Ethernet networking capability or a Windows machine.
Use M12-RJ45 cable to connect directly to the SRC Pro (e.g., ASI-M12-RJ45-11101).
• Firmware upgrade file for the SRC Pro.
You can download an archive package that contains the latest version from FORT Manager (the procedure that
immediately follows these bullets provides instructions for downloading and extracting the file).
• Latest FORT CLI Configuration Tool (fort_cli_cfg).
If you don’t already have this tool, you can download it from FORT Manager. See “FORT CLI Configuration Tool”
on page D-1 for more information, including installation instructions for the tool.
TO DOWNLOAD THE SRC PRO FIRMWARE UPGRADE FILE
fort_cli_cfg -n /dev/ttyACM0 -m
Where:
-n (nxp) /dev/ttyACM0
Specifies an SRC Pro device and identifies the USB port in use; your port could be different.
-m (--menu)
Specifies the interactive menu option for the configuration tool
3. Use the arrow keys to navigate to Device Firmware Update and press Enter.
4. Use the arrow keys to navigate to Update From Bundle and press Enter.
5. Type the path to the SRC Pro update bundle and press Enter, for example:
./<device_firmware_file>.zst
The device firmware file is in a compressed format, but you don’t need to uncompress it.
Note that the update process may take up to three minutes to complete.
6. Use the arrow keys to navigate to the main menu, select Device reboot and press Enter to reboot the device.
Calibrating Axis
The SRC Pro joysticks are calibrated at the factory, however, if you observe that the fingersticks and thumbsticks are
not operating properly, follow the steps in these procedures to verify that the axis values are correct and to recalibrate
them if necessary.
TO VERIFY CALIBRATION
1. Power on the SRC Pro, press the Menu button, and navigate to the Settings tab.
2. Press the down arrow key to scroll to and select Axis Values.
3. Press 1 and navigate to the Calibration tab.
4. Move each individual fingerstick and thumbstick around its full range of motion.
Each axis should read 0 when the fingerstick or thumbstick is centered and the full range should be from -2048 to
2047.
5. Press 1 to exit the menu.
If the values you see are not correct, follow the steps in the next procedure to recalibrate your device.
Troubleshooting
⚠ CAUTION: The EPC and SRC Pro have no user-serviceable parts. Do not attempt to make any changes or
repairs to these devices. If you have maintenance or repair questions fill out a request on the
customer support portal: https://support.fortrobotics.com/.
If a device is not functioning properly, for any reason, we recommend discontinuing use and rebooting it to see if that
corrects the problem. If it doesn’t, fill out a request on the customer support portal: https://
support.fortrobotics.com/ to address the issue.
The manual version corresponds to the product version1. The latest version is available on the customer support
site.
• Rewrote instructions for using the CLI tool to update firmware, including information on using FORT Manager to
download the tool and the firmware. Added the appendix: “FORT CLI Configuration Tool” that describes how to
download and install the CLI tool.
• Added a section with the FMEDA summary for the EPC (“FMEDA Summary (EPC)” on page C-11) and the SRC
Pro (“FMEDA Summary (SRC Pro)” on page C-13).
• Added a section about the “Diagnostic Test Intervals” on page C-13.
Pre-releases
Version Date Changes
A 11/30/2020 Initial Release
B 12/23/2020 Revise Figure 3 and Figure 4
C 1/13/2021 Remove Orderable Parts Tables, Revised Installation section
D 2/1/2021 Correct typo of CAN Hi pin in pinout table
E 7/14/2021 Revision History moved to top of doc, Added CANopen
Implementation Section
F 5/27/22 Complete overhaul, new organization, new title, new sections, new
style (removed numbering in heads), FORT Manager & CLI tool
configuration info, etc.
G 6/14/22 Added Title page from product marketing, formatted document for
two-sided printing (even and odd pages), fixed branding issues,
added firmware update instructions. Removed ‘Draft’ watermark.
H (draft) 8/17/22 Added Configurations and Safety (draft) sections. Rewrote and
expanded intro. Wrote section about safe state and normal state.
Added Security section outline.
I (draft)a 1/13/23 Changed Heading 1s to Chapter – Appendix format. Added some
details to Chapter 6 Security. Reorganized and simplified
Chapter 3 Configurations. Rewrote Safety chapter. Added multiple
figures and rewrote text for Chapter 3 Installation.
You can view the OEM Supply and License Agreement here: https://fortrobotics.com/oem-agreement/.
We provide non-safety critical firmware updates to customers whose device has an active Guardian subscription.
Guardian allows you to get firmware and software updates, extended support, and warranty coverage beyond the
limited one-year hardware warranty term.