Security Expert - Security Purpose Controller - Configuration Guide
Security Expert - Security Purpose Controller - Configuration Guide
Contents
Introduction 5
Controller Editions 5
About This Module 5
Hardware Configuration 53
Setting the IP Address from a Keypad 53
July 2022 3
Security Expert Security Purpose Controller
July 2022 4
Security Expert Security Purpose Controller Introduction
Introduction
This configuration guide provides programming instructions and system communication and
troubleshooting information for Security Expert controllers. For installation instructions and
technical specifications, see the appropriate controller installation manual.
Controller Editions
This configuration guide includes programming instructions for the following Security Expert
controller models:
July 2022 5
Security Expert Security Purpose Controller Introduction
Current Features
The current features of the Security Expert controllers include:
Factory loaded
HTTPS certificate
Reader ports 2 2 2 2 8 8
Bell output
USB Port
July 2022 6
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Security Expert controllers come equipped with a factory loaded HTTPS certificate,
ensuring a secure encrypted web connection. This means HTTPS must be used when
accessing the web interface (e.g. https://192.168.1.2). The factory loaded HTTPS certificate
is a self-signed certificate, so when connecting to the controller's web interface a certificate
warning may be displayed, but your connection is still secure.
For older controllers not equipped with a default certificate, HTTP must be used to connect
to the interface.
To log in to the controller for the first time, open a web browser and enter the default IP
address of 192.168.1.2 with the prefix https:// (e.g. https://192.168.1.2).
If you cannot access the controller with this URL, remove the https:// prefix and try again (e.g.
192.168.1.2).
If you are presented with a security warning when accessing the HTTPS web page, use the
advanced options to proceed to the controller web page.
Once you connect to the controller's web interface you will be prompted to create the admin
operator, which is the default login for accessing the web interface.
Earlier versions of the controller firmware have a preconfigured admin operator. If you are
not prompted to create a new operator you can log in using the default username admin with
the password admin.
1. Add a Username for the admin operator. This does not need to be 'admin'.
2. Choose a Password for the admin operator.
The password cannot be blank or 'admin' and must comply with password policy
July 2022 7
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
requirements.
3. Verify Password.
A very secure password is recommended for the admin operator (see Creating a Secure
Password).
July 2022 8
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
In order to set up DDNS, the controller must be port forwarded so that it is externally
accessible.
1. Browse to Duck DNS and create a free account by signing in with Google or another
existing account.
Take note of the Token that is generated when you create your account.
2. Create a new subdomain. The full hostname will have the form [subdomain].duckdns.org.
3. The Current IP field should automatically populate with the external IP address of your
network. Ensure that this is the controller's externally accessible IP address.
4. Access the controller's web interface by typing its IP address into the address bar of a
web browser, then log in with your username and password.
5. Navigate to the System Settings.
6. In the Adaptor - Onboard Ethernet tab, select the Enable DDNS checkbox.
7. Enter the Hostname [subdomain].duckdns.org and DDNS Server duckdns.org.
8. Leave the DDNS Username blank. For the DDNS Password, enter the Token generated
by your Duck DNS account.
9. Save your settings.
10. Confirm that the controller is externally accessible by browsing to the hostname on
another PC.
If the controller's external port is not the default port, you will need to append the port
number to the URL (e.g. controller.duckdns.org:1000).
Setting Up No-IP
The free No-IP Dynamic DNS service does not support third-party certification. This is only
supported with the additional Plus Managed DNS service.
1. Browse to No-IP and create a Dynamic DNS account (free or paid as required).
Free Dynamic DNS hostnames provided by No-IP require confirmation every 30 days,
whereas paid accounts do not.
2. Create a new Hostname and select a Domain.
3. Ensure that the IP Address matches the controller's externally accessible IP address.
4. Access the controller's web interface by typing its IP address into the address bar of a
web browser, then log in with your username and password.
5. Navigate to the System Settings.
6. In the Adaptor - Onboard Ethernet tab, select the Enable DDNS checkbox.
7. Enter the Hostname and DDNS Server.
8. Enter the Username and Password that you used to sign up to No-IP.
9. Save your settings.
July 2022 9
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
10. Confirm that the controller is externally accessible by browsing to the hostname on
another PC.
If the controller's external port is not the default port, you will need to append the port
number to the URL (e.g. controller.ddns.org:1000).
If the controller is factory defaulted, any user-created HTTPS certificates are removed and
the default certificate is reloaded. Custom certificates will need to be reinstalled.
Two different connection methods are available, each of which can be configured directly
within the web interface:
l Validating and installing a third-party certificate obtained from a certificate authority.
l Installing a self-signed certificate (recommended for testing only).
For configuration and version requirements refer to AN-314: HTTPS Connection to the
Security Expert Controller.
Operating on an active network requires knowledge of the configuration and structure of the
network. Always consult the network or system administrator before you begin.
For detailed networking information, see the Security Expert Network Administrator Guide.
Port 80
Router Internet
Controller (External IP HTTP Request
(IP 192.168.1.2) 203.97.123.169)
Port 80
July 2022 10
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Once this port has been forwarded, the controller will be accessible via the external IP address
of the network. In this example, typing 203.97.123.169 into an external web browser will open
the controller's web interface.
External access via HTTP is only required in order to validate and install your certificate. Once
the certificate has been installed, HTTP access will be disabled because the more secure
HTTPS connection is available. Therefore it will no longer be necessary to forward external
port 80 to the controller.
Port forwarding is configured from the router's utility interface, which can be accessed by
browsing to the router's IP address. Different routers have different interfaces, so it is
recommended that you consult the documentation for your router.
After you have installed a certificate and established an HTTPS connection to the controller,
you may wish to continue accessing the controller over the internet. To achieve this, the
controller must be accessible via its HTTPS port. The default HTTPS port is internal port 443,
but this can be changed if necessary in the System Settings (available once Use HTTPS is
enabled).
The easiest method is to configure the router to forward all traffic from external port 443 (the
default HTTPS port) to the controller's internal HTTPS port, as in the image below.
Port 443
Router Internet
Controller (External IP HTTPS Request
(IP 192.168.1.2) 203.97.123.169)
Port 443
In this case, all traffic directed to the external HTTPS IP address will be forwarded to the
controller. The controller's web interface could be accessed by typing https://203.97.123.169
into an external web browser.
However, it is possible to grant external access by forwarding any external port to the
controller's HTTPS port. This is especially useful if external port 443 is not available on your
network.
Port 443
Router Internet
Controller (External IP HTTPS Request
(IP 192.168.1.2) 203.97.123.169)
Port 1000
In this case, any traffic directed to external port 1000 will be forwarded to the controller's
HTTPS port. The controller's web interface can be accessed simply by appending the external
port number onto the end of the URL: e.g. https://203.97.123.169:1000.
Note: If the controller does not have a factory loaded certificate, it will not be accessible via
HTTPS until an HTTPS certificate has been installed, regardless of whether port forwarding
has been configured.
July 2022 11
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Third-Party Certificate
This method uses a certificate generated by a recognized third-party certificate authority (CA)
to encrypt the HTTPS connection. Unlike the self-signed certificate method, third-party
certificates generally require an annual fee; however, they are trusted by web browsers.
The process has five main stages:
1. The installer generates a private/public encryption key pair and certificate signing request
for their domain.
2. The installer submits the certificate signing request to the certificate authority.
3. The certificate authority provides a validation file which is loaded onto the controller.
4. The certificate authority validates the domain and provides the certificate.
5. Finally, the installer converts the certificate format (if necessary) and installs the certificate
onto the controller.
July 2022 12
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Purchasing a Certificate
Below are very basic instructions for purchasing a third-party certificate from a CA. Every CA
will have different processes and requirements - this is only intended to be a rough guide to
what is required for implementation on a controller.
1. Begin the process of generating a certificate from a recognized CA such as:
l GoDaddy: https://nz.godaddy.com/web-security/ssl-certificate
l Network Solutions: https://www.networksolutions.com/
l RapidSSL: https://www.rapidsslonline.com/
It is important that you select File-Based or HTTP-based Validation (or equivalent)
when asked to choose an authentication/validation method. You will require a .txt file to
upload to the controller.
2. When prompted, upload the text of your Certificate Signing Request (.csr).
3. Follow the CA's instructions to complete the request. You should be prompted to
download a .txt validation file.
DO NOT change the name or contents of this file.
July 2022 13
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Android devices will fail to connect if intermediate certificates are not included in the
certificate loaded onto the device.
3. Enter the passphrase for the private key (set above) to continue.
Note that passphrase characters will not be displayed in the console.
4. Enter an export password when requested. This will be required when installing the
certificate on the controller.
5. This process will generate a [name].pfx file in the current OpenSSL directory. This is your
third-party certificate. Store this file in a safe, known location.
July 2022 14
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
4. Click Save, then restart the controller using the button on the top right to implement the
new settings.
Once the restart process is complete, the controller will restart but the web page will not
automatically refresh.
5. Browse to the controller web page by adding the prefix https:// to the beginning of the IP
address or URL.
A lock or similar icon in the browser toolbar should indicate that the connection is secure. Click
on this icon to see details about the certificate, including the information you entered in the
certificate signing request.
Self-Signed Certificate
Self-signed certificates do not require the certificate to be validated by an authority, or for the
controller to be accessible over the internet. They can also be created for free. However, self-
signed certificates are not considered secure by web browsers, which will generate warnings
whenever the web interface is accessed. This method is fine for testing and development but is
not recommended for live sites.
July 2022 15
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
6. To export your certificate, enter the following command, replacing [name] with your
desired filename:
pkcs12 -export -certpbe PBE-SHA1-3DES -keypbe PBE-SHA1-3DES -
nomac -out [name].pfx -inkey [name].key -in [name].crt
7. Enter the passphrase assigned above when prompted.
8. Create an export password when prompted. This will be required when installing the
certificate on the controller.
This process will generate a [name].pfx file in the current OpenSSL directory. This is your
self-signed certificate. Store this file in a safe, known location.
July 2022 16
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Signing In
To access the system after the initial setup you need to sign in with a valid operator username
and password.
1. Open a web browser and enter the controller's IP address, with the prefix https:// (e.g.
https://192.168.1.2).
If you cannot access the controller with this URL, remove the https:// prefix (e.g.
192.168.1.2).
2. If you are presented with a security warning when accessing the HTTPS web page, use
the advanced options to proceed to the controller web page.
3. The Sign In window is displayed.
4. Enter your operator Username and Password.
5. Click Sign In.
Repeatedly entering incorrect passwords at the sign in window forces a login stand down.
Three consecutive incorrect attempts will result in the sign in process being locked for 5
seconds. If another three attempts fail, the sign in process is locked for 60 seconds between all
subsequent attempts until a valid login is made. It is not possible to configure the length of time
for the login stand down.
Home Page
Controller Status
l Health: Displays the health status of the controller.
l Voltage: Shows the voltage passing through the controller.
l Memory Usage: Shows the current memory usage of the controller, along with a
breakdown of what that memory is being used for.
l Status: Displays the current serial number of the controller.
Operator Details
l Logged on as: Shows the username of the current operator.
l Logged on at: Shows the time and date this operator logged in.
Options
l Display Theme: Switch between the dark (dark background, white text) and light (white
background, dark text) display themes for the web interface.
l Display Color: Select the display color used for the web interface. This selection will
persist whenever this operator logs in to the controller with the same web browser.
l Logout: Log out and return to the login screen.
l Change Password: Change the password used by this operator.
July 2022 17
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
System Settings
This page can be saved or refreshed using the toolbar buttons in the top right. The Restart
button can be used to reboot the controller, which is required to apply any changes to the fields
marked with an asterisk *.
Communications: Ports
l Event Port*: The default port is 22000. This must match the port defined in Global |
Event server in the Security Expert software.
l Download Port*: The default port is 21000. This must match the port defined in Sites |
Controllers | General in the Security Expert software.
l Control Port*: The default port is 21001. This must match the port defined in Sites |
Controllers | General in the Security Expert software.
HTTPS
Security Expert controllers have HTTPS connection enabled by default with a pre-loaded
certificate. However, an alternative certificate can be installed if preferred.
For older controllers not equipped with a default certificate, Schneider Electric strongly
recommends that all live Security Expert sites establish an HTTPS connection between the
controller web interface and the web browser. This is especially important if the controller can
be accessed onsite via a router, or externally via the internet.
If the controller is factory defaulted, any user-created HTTPS certificates are removed and
the default certificate is reloaded. Custom certificates will need to be reinstalled.
July 2022 18
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Hostname
l Controller Hostname: If the controller is accessible via an external hostname it can be
entered here.
July 2022 19
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
This is only required if the DDNS or HTTPS options are being used.
Dynamic DNS
l Enable DDNS*: The controller has an in-built DDNS (Dynamic Domain Name Server)
application, which allows it to dynamically connect to an external hostname even if its
external IP address is not static. Enable this option and enter the required details to
activate DDNS.
l DDNS Server: Enter the name of the DDNS server which is being used.
Currently Duck DNS (www.duckdns.org) and No-IP (www.noip.com) are supported
DDNS providers.
l DDNS Username/Password: Enter the required credentials for your DDNS provider.
l Duck DNS: The username should be left blank. The password is the Token
generated by your Duck DNS account.
l No-IP: The username and password are the credentials used to log in to your No-IP
account.
Connection
l Cellular Modem: This option configures the controller to communicate with the Security
Expert Security Purpose DIN Rail Cellular Modem connected to its USB port. This is
currently the only USB Ethernet connection option.
When this option is enabled the details of the cellular connection will be displayed.
For cellular modem information and programming instructions, see the Security Expert
Security Purpose DIN Rail Cellular Modem Installation Manual and Security Expert Security
Purpose DIN Rail Cellular Modem Configuration Guide.
Cellular Options
l Enable Debug*: When enabled, debug events are logged to the event log to help
diagnose setup issues with the cellular modem. This would generally be enabled only
during initial configuration or troubleshooting and should be disabled during standard
operation.
l Enable Watchdog*: When enabled, this option will prompt an automatic restart of the
controller in the event that a critical fault is detected with the cellular modem that cannot be
resolved. This option would typically only be enabled during fault finding.
Cellular Information
The cellular information section displays the cellular network connection status and details.
l External Modem Detected: Indicates whether the controller is able to communicate with
the cellular modem connected to its USB port.
July 2022 20
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
l SIM Detected: Indicates whether the controller is able to detect the cellular modem's SIM.
l SIM Provider: Displays the provider of the SIM, if detected.
l Signal Strength: The current strength of the wireless connection.
The signal strength can only be displayed once a connection to a cell tower is
established. When the cellular modem is performing initial configuration, has been
automatically reset, or is initially searching for a network, Signal Not Measured will be
displayed. This does not indicate a problem with the signal.
l Network Registration Status:
l Registered (home): Displayed when the cellular modem is successfully connected to a
network inside the SIM home region.
l Registered (roaming): Displayed when the cellular modem is successfully connected
to a network outside the SIM home region.
l Not registered: Displayed when the cellular modem is detected but no connection has
been established.
l Not registered, seeking: Displayed when the cellular modem is actively seeking a
network to connect to.
l Denied: The network actively refused the connection attempt by the cellular modem.
l Unknown: The cellular modem cannot currently determine network connection status.
l Current Network Provider: The mobile network operator that the cellular modem is
currently connected to.
l Current Technology: The cellular technology that the cellular modem is connected with.
l Internet Connection Status: Identifies whether the cellular modem's internet connection
is valid.
l IP Address: The IP address assigned to the cellular modem by the network provider.
If there is an error with the cellular connection the controller may automatically reset the
modem to attempt to resolve the connection. When this occurs the controller interface will
momentarily display the External Modem Detected disconnected icon. This is expected and
only indicates a problem if it remains disconnected .
Operators
Operators can be created, deleted and saved using the toolbar buttons at the top right. Note
that these are operators for the controller's web interface and do not correspond to operators
in the Security Expert software.
l Name: A name for the operator record in the web interface.
Do not enter more than 40 characters for the operator name. This is the maximum
supported length.
Configuration
l Username/Password: The operator's login credentials for the controller's web interface.
l Change Password: Click this button to change the password of the operator.
It is recommended that you give each operator a secure password. Passwords must
comply with password policy requirements.
l Default Language: Select a default language for the operator. This language will be
displayed when the operator uses the web interface.
Operator Timeout
l Enable Operator Timeout: When this option is enabled, the operator will be
automatically logged out of the web interface after a defined period of inactivity.
l Operator Timeout: Set the length of time in minutes before the operator will be
automatically logged out.
July 2022 21
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Password Policy
A password policy represents a set of guidelines designed to enforce a higher level of security.
Security Expert systems enable you to define your own password policy that other users of the
system are required to follow.
Configuration
l Minimum Password Length: Defines the character length required for a password.
In the future this will be configurable, but is currently fixed at 8 characters.
l Minimum Number Of Uppercase Characters: This option is reserved for future
development.
l Minimum Number Of Digits: This option is reserved for future development.
l Minimum Number of Special Characters: This option is reserved for future
development.
l Compare Against Username: This option is reserved for future development.
July 2022 22
Security Expert Security Purpose Controller Configuring a Controller via the Web Interface
Application Software
Controller Software
l Current Version: Displays the current firmware version of this controller. Click on this field
to display further version information.
Warning: Updating module firmware will put the entire network into maintenance mode,
preventing normal activity for the duration of the update process. Module firmware must
not be updated remotely.
Force Update
In situations where a module becomes stuck in the bootloader mode and the application is not
running, it may become necessary to perform a force update.
This hidden feature in the Update Module Firmware section of the web interface provides the
ability to update module firmware on an inoperable module where it is not possible through the
regular update process.
Clicking Module will expand the hidden section, making the Force Update panel available.
1. Select the Force Update - Module, carefully selecting the module type and model.
2. Select the Force Update - Address, which is the configured Physical Address of the
module.
3. The Skip Verification option will bypass the firmware check and allow firmware that does
not match the module type of the module to be loaded.
This option should only be selected at the direction of Schneider Electric Technical
Support .
4. Click Upload Firmware to browse to the firmware file (.bin format) supplied by Schneider
Electric, and open the file to install the firmware on the selected module.
Note: The maximum address that can be selected for force update is 32. If the module has
an address greater than 32 it cannot be upgraded via this method. You will need to contact
Schneider Electric Technical Support for assistance.
July 2022 23
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Once the controller record has been created, bring it online by entering the Serial number, IP
address, Download port, Download server and Control and status request port in the
General tab. If the controller does not come online, you will need to troubleshoot the
connection (see page 59).
General
l Name: The name of the controller in the Security Expert software.
l Count: The number of controllers that will be added with the same default records. If more
than one controller is added the subsequent controllers will be assigned default names
that can be edited later.
l Prepend controller name to added records: When this option is enabled, all new
records generated by the wizard will include the controller name at the start of the record
name. For example, if the controller is named Office, the first output on the controller will
have the name Office CP1 Bell 1.
Controller
l Type: The model code of the controller that is being added to the system. This is displayed
on the upper right of the controller face.
l Inputs: The number of onboard inputs that will be created for the controller. This is set
automatically based on the Type of controller selected.
Not all controller inputs may be required if the onboard reader expander is being used,
as the inputs can be assigned to the reader expander record.
l Outputs: The number of onboard outputs that will be created for the controller. This is set
automatically based on the Type of controller selected.
July 2022 24
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
This number includes only the bell and relay outputs (outputs 1, 3 and 4). Reader outputs
are assigned to the onboard reader expander record (even if not used for connected
readers).
Controller output 2 only exists on legacy hardware. This address is skipped when the
wizard automatically adds the default records.
l Add trouble inputs: Enable this option to automatically add the trouble inputs associated
with the controller.
If the controller's onboard reader expander is being used it should be included in the number
of reader expanders so that the relevant programming can be created.
Options
l Create "Installer" menu group: Creates a menu group with every menu enabled for use
by site installers.
l Create floor plan: Creates a floor plan including all inputs and outputs on the controller.
This is useful for small sites with only a few inputs and outputs. For larger sites it is
generally better to create the floor plans manually.
l CID report map: The Contact ID report map that will be used for assigning the Reporting
ID to each input. The options are:
l Standard: Suitable for small burglary and access control installations.
l Large: Suitable for intrusion detection installations with a large number of input
expanders.
l SIMS II: A variant of the Contact ID format which can send a much larger number of
inputs. For this mapping to function correctly the service must also be configured for
SIMS II by setting the Cid mapping option for a Contact ID service, or the CID map
settings option for a Report IP service.
For more information, see Application Note 316: Contact ID Reporting in Security Expert
and SP-C-WEB.
Doors
l Doors: Automatically creates the defined number of door records. Typically this should be
2 doors per reader expander.
l Assign to reader expanders: Automatically assigns the doors to reader expander ports,
in order of creation.
l Add door trouble inputs: Creates the relevant trouble inputs for each door record.
l Assign reader lock output to door configuration: Automatically sets the Lock output
for each door to the relay output on the associated reader expander.
l Assign reader beeper to door alarm configuration: Automatically sets the Pre alarm
output, Left open alarm output and Door forced output for each door to the beeper
output on the associated reader expander.
July 2022 25
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
The new controller record will have a blank Serial number, IP address and Download
server.
l Site (copy from): Defines the site that the programming will be copied from.
l Controller (copy from): Defines the controller that the programming will be copied from.
l New controller name: The name of the new controller in the Security Expert software.
l Name (second language): The name of the new controller in the second language.
l Prepend controller name to all record names: When this option is enabled, all new
records generated by the copy process will include the new controller's name at the start of
the record name. This means all new records will have the same name as those on the
original controller, with the new controller's name added.
If the original records included the controller's name, this name will still be included in the
new records (i.e. will not be replaced by the new name).
l Copy access levels: When this option is enabled the access levels of the original
controller are copied for the new controller. The new access levels are assigned the
equivalent doors, areas and other records from the new controller, but are not assigned to
any users.
l Copy global records: When this option is enabled, site-wide records such as schedules
and function codes will be copied for use with the new controller.
July 2022 26
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Configuring a Controller
Once added, the controller needs to be configured to define settings including the serial
number and communication parameters.
Controllers | General
General
l Name: The name of the record in English. This name is used everywhere the record
appears in the English version of the software.
l Name (second language): The name of the record in the second language (as installed
with the software). This name is used everywhere the record appears in the second
language version of the software. Alternatively, additional information about the record
may be included in this field.
l Record group: The record group this item belongs to. This allows records to be organized
by categories such as building, branch or company. Using roles and security levels, you
can restrict operator access so that operators can only see or control the records in
specific record groups.
Some record types, such as outputs, inputs, trouble inputs and expander modules,
inherit the record group assigned to the controller.
Communications
l Serial number: The serial number of the controller. This can be obtained from the
configuration page of the built-in web interface, or the label on the side of the controller.
l IP address: The IP address of the controller. The default IP address is 192.168.1.2, which
can be changed via the built-in web interface.
In general the IP address should be the same here and in the controller web interface.
Alternatively, if the controller is external to the server network you may need to enter the
external IP address of the router which is forwarding traffic to the controller.
Programming the IP address, subnet mask, and default gateway requires knowledge of
the network and subnet that the system is connected to. You should always consult the
network or system administrator before programming these values.
l Dynamic IP address update: When this option is enabled the software automatically
detects the IP address of the controller from incoming messages and updates the IP
address field automatically. Use this for situations where the controller's IP address may
change unexpectedly, or when the controller is configured to use DHCP.
l Username / Password: If the single record download service is in use, you must enter a
username and password for the controller so that the service can make a connection.
These must match an operator in the controller's web interface.
Ensure that the Username is entered in all lowercase letters, otherwise the connection
will fail.
These fields are not required when the single record download service is not in use.
l Download port: The TCP/IP port that is used by the download service to send
programming downloads to the controller. By default, this is port 21000.
l Single record download port: The TCP/IP port that will be used by the single record
download service (if in use) to send programming downloads to the controller. This should
match the HTTPS Port of the controller. By default, this is port 443.
l Download server: Defines the download server which will send downloads to the
controller. If this field is <not set> the controller will not receive any downloads.
July 2022 27
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
l Control and status request port: This field specifies the port that will be used to send
manual commands and status requests to the controller over TCP/IP. By default, this is
port 21001.
l Last known IP address: Shows the last IP address that the controller used to
communicate with the server (read only).
l Last downloaded: Shows the date and time of the last download to the controller (read
only).
Display
l Panel name: The name used to identify the controller to IP reporting services.
Diagnostic windows
l Open download server diagnostic window: Opens a window listing transactions
between the controller and the download server. This can be useful for checking whether
recent programming changes have been downloaded successfully.
l Open event server diagnostic window: Opens a window showing the current status of
the event server. This can be useful for diagnosing controller connection issues.
Commands
l This field is used to send programming commands to the device. It should only be used
when specifically advised by Schneider Electric documentation or technical support.
Record history
Each record displays its programming history, including the time and date it was created, the
time and date it was last modified and the operator who last modified it.
Controllers | Configuration
Configuration
l Test report time (HH:MM): The controller periodically tests the reporting service by
opening the predefined Service Report Test trouble input. This field sets the time of day
the trouble input will be opened.
When the Test report time is periodic option is enabled in the Options tab, the time
programmed will be used as a period between reports in hours and minutes. Otherwise it
is treated as a time of day.
l Automatic offline time: This is a legacy option that has no effect.
l AC restore delay time: This is a legacy option that has no effect.
l AC fail time: This is a legacy option that has no effect.
l Module UDP port: Some modules, such as the Security Expert Security Purpose
COMMS Expander, can communicate with the controller over an ethernet connection
using the UDP protocol. This field defines the UDP port that will be used for these
communications. The default port is 9450. If this port is changed at the controller it must
also be updated at all relevant modules.
July 2022 28
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Encryption
l Initialize controller encryption: Enables encryption of the messages sent between the
controller and the Security Expert server. Selecting this option initiates a one-off process
that randomly generates a 256 bit AES encryption key. Using an RSA algorithm, this key is
exchanged and stored in both the controller and the Security Expert database.
July 2022 29
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Version 3 settings
This is a legacy section that does not require configuration.
Controllers | Options
Options
l Test report time is periodic: When this option is enabled the Test report time set in the
Configuration tab will be treated as a frequency rather than a time of day. For example, a
Test Report Time of 12:00 AM will cause the Service Report Test trouble input to be
opened every 12 hours if this option is enabled, or every day at 12AM if this option is
disabled.
l Weekly test report: When this option is enabled the test report is sent once a week based
on the day of the week selected. The Service Report Test trouble input will be opened at
the time specified in the Test report time field in the Configuration tab. When this option
is disabled the trouble input will be opened once a day.
l Day of the week: Defines the day of the week that the weekly test report is sent.
l Troubles require acknowledge: System troubles are displayed in the trouble view menu
of the keypad ([Menu] [5] [2]). Normally if the trouble condition ends (i.e. the trouble input
closes) the trouble is no longer included in this list; however, with this option enabled the
trouble condition remains in the list until it is acknowledged by an authorized user.
Users must have Acknowledge system troubles enabled in Users | Users | Options
and access to the View (5) menu from their menu group.
l Generate input restore on test report input: When this option is enabled the controller
will generate a restore event for the Service Report Test trouble input closing after the
regular test report. This occurs one minute after the Service Report Test trouble input has
been activated.
l Report short duration module communication failure: When this option is enabled the
controller will always generate trouble events for any module communications failure,
without allowing any grace period for the module to come back online.
l Advance UL operation: When this option is enabled the Security Expert system runs in
UL compliance mode.
This setting has the following effects:
l Adds a 10 second grace period following a failed poll before a module is reported as
offline.
Each module sends a poll message to the controller every 250 seconds. The module
will be reported as offline if no poll has been received for the duration of this poll time
plus the 10 second grace period.
l Suppresses reporting of all alarms and/or reportable events to a monitoring station
within the first two minutes of the controller powering up. The system will continue to
send poll messages as usual.
July 2022 30
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
l Reports 'Input Tamper' events as 'Input Open' events when the area that the input is
assigned to is armed. If the area is disarmed an 'Input Tamper' message will be sent.
l Limits the Dial attempts for reporting services to a maximum of 8.
This setting must be used in conjunction with the other configuration requirements in the
controller installation manual.
l Duplex inputs: With this option enabled the controller can support twice the number of
inputs, wired in duplex configuration. For more information, see the relevant controller
installation manual.
Misc options
l Enable automatic offline download: This is a legacy option that has no effect.
l Modem backup if IP fails: When this option is enabled the controller will dial out through
the onboard modem if it cannot connect to the software via ethernet to report events. The
Modem backup phone number must be set in the Configuration tab.
This setting is only supported by controller models with onboard modem dialers.
l Backup only alarm events: With this option enabled, when the controller has lost
ethernet connection it will only report alarms and other reportable events over the phone
line. All stored events will be reported when the ethernet link is restored.
This setting is only supported by controller models with onboard modem dialers.
l Invert controller tamper input: This is a legacy option that has no effect.
l Log all access level events: This is a legacy option that has no effect.
l Do not wait for dial tone when modem dials out: When this option is enabled, modem
dialing occurs even when no dial tone is detected.
This setting is only supported by controller models with onboard modem dialers.
See Sites | Credential types for alternative options for configuring custom credentials.
July 2022 31
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
All parity options that are not in use must be set to 255.
l Parity type 1-4: The method of calculating the parity for the block. This is either even or
odd parity.
l Parity location 1-4: The position of the parity bit in the received data. The count starts at
zero.
l Parity start 1-4: The index where the parity block starts in the received data. The count
starts at zero.
l Parity end 1-4: The index where the parity block ends in the received data. The count
starts at zero.
Bit options
All bit options that are not in use must be set to 255.
l Set bit 1-4: The index of a set bit (a logical '1') in the received data. The count starts at
zero.
l Clear bit 1-4: The index of a clear bit (a logical '0') in the received data. The count starts at
zero.
This field sets the card data AES encryption key for all reader ports associated with this
controller.
July 2022 32
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Update modules
Programming changes that alter the way hardware will operate require a module update to
download the hardware-specific settings. A module update command causes the module to
restart.
Use this option to perform a module update on the controller and all connected modules.
Warning: Sending this command will cause the controller and every connected module to
temporarily go offline as they restart. This option should not be used in an active system.
To update only a specific module (such as a keypad or reader expander), right click on the
specific record in the Expanders programming and click Update module.
Force download
In normal operation the download service checks each controller for changes in order by
Database ID. If any changes are detected the services downloads the changes to that
controller, then continues on to the next controller.
An operator can use the Force download command to increase the priority of a specific
controller, so that it will be next in line after the previous controller has been completed. The
Download retry delay period will be ignored so that the download is sent as soon as possible.
In addition, the download service will download to the controller even if no changes are
detected.
The health status window is static. Resolving or clearing notices will not cause the status to
update until the Get health status command is sent again.
Module addressing
The Module addressing command is used to view the hardware that is connected to the
system network, and to set the addresses of modules. Selecting this option opens a window
showing the details of all modules that are currently connected, as well as those that have
registered previously but are currently offline.
July 2022 33
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
By default, Security Expert modules are shipped from the factory with an address of 254. This
is outside the range that the controller will accept, so the address must be set by the installer.
For some modules, such as keypads, the network address can be set in the module itself (see
the relevant installation manual). For most Security Expert modules the address is set in the
Module addressing window.
The address of the controller's onboard reader expander is set by the Register as reader
expander setting in Sites | Controllers | Configuration.
July 2022 34
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
l If the address has changed but the module is not registered or online, check the
address is in the valid address range and that it is not a duplicate of another module
address.
Once all modules are online and registered with the desired addresses the addressing process
is complete.
Legacy Security Expert PCB modules cannot be addressed by this process. They must be
addressed using DIP switches as described in the relevant installation manual.
The Security Expert controller has a set limit on the number of modules of each type that it can
support. This applies to both physical and virtual modules. The maximum addresses available
for each type of module are outlined in the table below:
Reader Expander 64
Output Expander 32
Analog Expander 32
Any module with an address higher than these limits will not come online to the controller. A
message will be generated in the controller's health status.
xP Module Connection
Note: These modules must only be connected or disconnected while the power is removed.
Connected modules are auto detected by the ACX controller, so no addressing is required.
AC POWER
AC POWER 24 VAC
24 VAC 90 VA
90 VA 50/60 HZ
50/60 HZ 1
1
2N -
2N -
3 L +
3 L + DC POWER
DC POWER 12-28 VDC
12-28 VDC 25W
25W
DIGITAL OUTPUTS
DIGITAL OUTPUTS
SVC PORT
SVC PORT
CPU
CPU
OFF AUTO ON
OFF AUTO ON 1 86
1 86 10/100
10/100
ETHERNET 85
ETHERNET 85 PORT
PORT 84
84
OFF AUTO ON
OFF AUTO ON 2 83
2 83 RX
RX
4 + 82
4 + 82
5 - RS-485 81
5 - RS-485 81
6 SHLD OFF AUTO ON 80
6 SHLD OFF AUTO ON 80 3
3 TAMPER TX 79
TAMPER TX 79 R
7 IN
7 IN R E 78
E 78 S
S 8 RTN T
8 RTN T A OFF AUTO ON 77
A OFF AUTO ON 77 R 4
4 9 IN7
9 IN7 R
10 IN1
T 76
10 IN1
T 76
11 IN8
11 IN8 75
75 12 IN2
UNIVERSAL INPUTS
12 IN2 13 RTN
UNIVERSAL INPUTS
13 RTN 14 RTN
0-5.0 VDC
14 RTN 15 IN9
0-5.0 VDC
15 IN9 16 IN3
16 IN3 17 IN10
17 IN10 18 IN4
18 IN4 19 RTN
19 RTN 20 RTN
20 RTN 21 IN11
21 IN11 22 IN5
22 IN5 23 IN12
23 IN12 24 IN6
24 IN6 25 RTN
25 RTN 26 RTN
26 RTN
3 5
3 5 1 7
1 27 PWR
7 74 28
27 PWR
73
74
PWR
28 PWR 73 29 GND 72
29 GND 72 30 GND 71
30 GND 71 31 DATA1 70
31 DATA1 70 32 DATA1 69
32 DATA1 69 33 CLK0 68
33 CLK0 68 34 CLK0 67
34 CLK0 67 35 LED1 66
35 LED1 66 36 LED1 65
36 LED1 65 37 LED2 64
37 LED2 64 38 LED2 63
38 LED2 63 39 PWR 62
39 PWR 62 40 PWR 61
40 PWR 61 41 GND 60
41 GND 60 42 GND 59
42 GND 59 43 DATA1 58
43 DATA1 58 44 DATA1 57
44 DATA1 57 CLK0
45 CLK0
CARD 56 46
45
CARD CLK0 55
56
46 CLK0 55 LED1
47 LED1
READERS 54 48
47
READERS LED1 53
54
48 LED1 53 49 LED2 52
49 LED2 52 POWER RATING
POWER RATING 50 LED2 51
50 LED2 51 4 5V, 120mA 6
4 5V, 120mA 6 2 8
2 OR
8 24VDC OR
24VDC 360mA 12V, 180mA
360mA 12V, 180mA EXP PORT PWR
EXP PORTPWR
July 2022 35
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Update firmware
Use the Update firmware option to update the firmware of one or more controllers.
Controllers do not support defaulting and firmware upgrade at the same time. Before you
upgrade the controller firmware, ensure that the wire link used to default the controller is not
connected.
1. Click on the ellipsis [...] button and browse to the .bin firmware file. Click Open.
2. Check the boxes of the controller(s) that you wish to update.
3. Click Update.
This process will take approximately 10 minutes per controller and it is recommended that
firmware updates are performed when the site is closed for maintenance or at times of low
activity. The controller will not be able to perform its normal function while firmware is being
updated.
A popup message may appear in the user interface with the message 'Update Interrupted'.
This is expected behavior for some firmware versions and does not indicate that the update
has failed.
July 2022 36
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Any inputs that are not configured for use with the onboard reader may be used as general
purpose inputs. If you wish to use an access control input as a general input, you will need to
disable the associated function input in the door programming section of the Security Expert
user interface.
July 2022 37
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Any inputs that are not configured for use with the onboard reader may be used as general
purpose inputs. If you wish to use an access control input as a general input, you will need to
disable the associated function input in the door programming section of the Security Expert
user interface.
Input Duplexing
Input duplexing allows the controller to support twice the number of inputs, wired in duplex
configuration using 1K and 2K4 resistors. For more information about the wiring requirements,
see the relevant installation manual.
1. To enable this feature, check the Duplex inputs option in Sites | Controllers | Options.
2. In addition, you will need to manually add the additional input records in Programming |
Inputs with the correct addresses as outlined below.
Enabling duplex inputs will not change the programming of any existing inputs. These must
be reprogrammed to match the new addressing scheme.
The following table indicates the position and resistor configuration corresponding to each
input address:
2 Z1 2K4
3 Z2 1K
4 Z2 2K4
5 Z3 1K
6 Z3 2K4
7 Z4 1K
8 Z4 2K4
9 Z5 1K
10 Z5 2K4
11 Z6 1K
12 Z6 2K4
13 Z7 1K
14 Z7 2K4
15 Z8 1K
16 Z8 2K4
July 2022 38
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Trouble Inputs
Trouble inputs are used to monitor the status of the controller and in most cases are not
physically connected to an external input. These can then be used to report a message to a
monitoring station, remote computer, keypad or siren.
The following table details the trouble inputs that are configured in the controller and the
trouble type and group that they activate.
CP001:03 Reserved - -
CP001:07 Phone Line Fault (modem model only) Phone Line Lost General
CP001:10 Reserved - -
CP001:12 Reserved - -
CP001:15 Reserved - -
CP001:16 Reserved - -
CP001:17 Reserved - -
CP001:18 Reserved - -
CP001:19 Reserved - -
CP001:21 Reserved - -
CP001:25 Reserved - -
CP001:26 Reserved - -
CP001:27 Reserved - -
CP001:28 Reserved - -
CP001:30 Reserved - -
July 2022 39
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
CP001:32 Reserved - -
|||| || | |
CP001:64 Reserved - -
1. Log in to the controller web interface and navigate to the System Settings page.
2. In the Adaptor - USB Ethernet tab, check Enable USB Ethernet to configure the
controller to look for an ethernet adaptor connected to its USB port.
3. If not automatically enabled, set the Connection to Cellular Modem to configure the
controller to communicate with the cellular modem connected to its USB port.
When this option is enabled the details of the cellular connection will be displayed.
4. Configure the Cellular Network Connection:
l Cellular APN: The APN is specified by the mobile network operator (MNO) and is
unique to that network. It is important to use the correct APN for the cellular service
required.
l Cellular Username: The username for the cellular network account.
l Cellular Password: The password for the cellular network account.
5. Click Save.
6. Restart the controller.
For cellular modem information and programming instructions, see the Security Expert
Security Purpose DIN Rail Cellular Modem Installation Manual and Security Expert Security
Purpose DIN Rail Cellular Modem Configuration Guide.
July 2022 40
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Reader Programming
Some programming is required within the Security Expert software to use the controller's
onboard reader ports.
l For SP-ACX controllers the reader ports must be configured for Wiegand reader
connection (see next page). SP-ACX controllers do not support RS-485 connections.
l For SP-ACX-V2 controllers both Wiegand (see next page) and RS-485 (see page 43)
reader connections can be configured, with different programming requirements for each.
After completing RS-485 reader expander programming, you must perform a module
update on each individual reader expander by right clicking on each expander record
and selecting Update module. Performing a full module update on the system from the
controller record does not send the initial reader format configuration to the expander,
and connected readers will return a 'Read Control Error'.
It is recommended that, even if not using all of the SP-ACX-V2 reader ports for RS-485
readers, you create the relevant reader expander records and name them as 'Reserved' for
the controller. This prevents the controller from receiving programming intended for another
module. Any unused reader ports should have their Port 1/2 network type set to Wiegand
mode (in Expanders | Reader expanders | General tab).
July 2022 41
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
ACX Smart
Onboard Reader Onboard Reader
Reader Reader Direction
Expander Address Expander Port
Port Address
1 1 1 1 Entry or Exit
2 1 1 2 Entry or Exit
3 1 1 3 Entry or Exit
4 1 1 4 Entry or Exit
5 1 1 5 Entry or Exit
6 1 1 6 Entry or Exit
7 1 1 7 Entry or Exit
8 1 1 8 Entry or Exit
July 2022 42
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Entry
2 2 2
Exit
Entry
3 3 1
Exit
Entry
4 3 2
Exit
Entry
5 4 1
Exit
Entry
6 4 2
Exit
Entry
7 5 1
Exit
Entry
8 5 2
Exit
July 2022 43
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Module Inputs
The following table defines the Module input value required for mapping each Security Expert
input record to its corresponding physical input.
... ...
... ...
... ...
July 2022 44
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
If you are using one of these EOL configurations, in the Security Expert software navigate to
Programming | Inputs | General and enter the following in the Commands field:
Command Description
EOL = NO-S 10K normally open series
These commands apply to inputs on the ACX controllers but are not supported on all
Security Expert field modules.
Trouble Inputs
Each controller can monitor up to 64 local trouble inputs. Trouble inputs are used to monitor
the status of the controller and in most cases are not physically connected to an external input.
These can then be used to report a message to a monitoring station, remote computer, keypad
or siren.
The following table details the trouble inputs that are configured in the controller. The trouble
type and group define the trouble that is generated by the trouble input when it is activated.
CP001:03 Reserved - -
CP001:06 Reserved - -
CP001:07 Reserved - -
CP001:08 Reserved - -
CP001:09 Reserved - -
CP001:10 Reserved - -
CP001:11 Reserved - -
CP001:12 Reserved - -
CP001:15 Reserved - -
CP001:16 Reserved - -
CP001:17 Reserved - -
CP001:18 Reserved - -
July 2022 45
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
CP001:21 Reserved - -
CP001:25 Reserved - -
CP001:26 Reserved - -
CP001:27 Reserved - -
CP001:28 Reserved - -
CP001:30 Reserved - -
CP001:31 Reserved - -
CP001:32 Reserved - -
|||| || | |
CP001:64 Reserved - -
July 2022 46
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
July 2022 47
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
For information on analog input mapping indexes, see Analog Input Mapping (see
below).
3. Add a command (on a new line) for each input to be configured as an analog input.
4. Click Save.
... ...
July 2022 48
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Outputs
The controller has 20 onboard outputs. There are four relays for door lock control and 16 LED
outputs for the 8 readers.
Outputs can be programmed using the Security Expert software. Outputs CP001:01 to
CP001:04 represent the controller's onboard outputs. The 16 reader LEDs are mapped as
outputs. If readers are not attached to the reader ports then the Reader 1 - 8 L1 and L2 outputs
can be used as general purpose outputs. Outputs CP001:20 to CP001:35 represent the 16
reader LED outputs.
Additional outputs are supported through the use of two xP expansion modules and are
mapped as if they are on the controller itself. Outputs CP001:05 to CP001:08 represent the
first module and CP001:09 to CP001:12 represent the second module.
l For modules that support digital outputs (xPDO2, xPDO4, xPBD4) the outputs can be
configured as general purpose outputs.
l The voltage at the outputs of xP modules that support analog output (xPAO2, xPAO4,
xPBA4) can be mapped to data values in the Security Expert system, monitored and
controlled from a floor plan, and used in programmable functions.
For more information on xP module output configuration and supported modules, see
Application Note-310: xP Module Configuration in Security Expert.
Module Outputs
The following table defines the Module output value required for mapping each Security
Expert output record to its corresponding physical output.
July 2022 49
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
Reader Outputs
The 16 reader LEDs are mapped as outputs. If readers are not attached to the reader ports
then the Reader 1 - 8 L1 and L2 outputs can be used as general purpose outputs. These can
be controlled by assigning the respective controller output (CP001:20 to CP001:35) to a
programmable function, etc.
21 LED 2 on Reader 1
22 LED 1 on Reader 2
23 LED 2 on Reader 2
24 LED 1 on Reader 3
25 LED 2 on Reader 3
26 LED 1 on Reader 4
27 LED 2 on Reader 4
28 LED 1 on Reader 5
29 LED 2 on Reader 5
30 LED 1 on Reader 6
31 LED 2 on Reader 6
32 LED 1 on Reader 7
33 LED 2 on Reader 7
34 LED 1 on Reader 8
35 LED 2 on Reader 8
July 2022 50
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
July 2022 51
Security Expert Security Purpose Controller Configuring a Controller via the Security Expert Software
For information on analog output mapping indexes, see Analog Output Mapping (see
below).
3. Add a command (on a new line) for each output to be configured as an analog output.
4. Click Save.
To view and manually control the value set for each output, you can assign the respective data
values to variables then display the variables on a floor plan. Data values can also be
controlled from programmable functions, allowing for further automation.
Data Values
The output voltage is written in 100mV increments, meaning that the voltage range 0-20V
maps to values 0 - 200 in a data value. 100mV maps to a value of 1, 2V maps to 20, etc.
July 2022 52
Security Expert Security Purpose Controller Hardware Configuration
Hardware Configuration
Setting the IP Address from a Keypad
If the current IP address of the controller is not known it can be viewed and changed using a
Security Expert keypad.
1. Connect the keypad to the module network.
2. Log in to the keypad using any valid installer code. The default installer code is 000000.
If the default code has been overridden and you do not know the new codes you will need
to default the controller (see Defaulting the Controller in this document) to reset the code.
Note that this will erase all existing programming as well as setting up the default
installer code.
3. Once logged in select Menu 4 (Install Menu) then Menu 2 (IP Menu) and view or edit the
IP address, network mask, and gateway as required.
Once the settings have been changed you must save the settings by pressing the [Arm] key.
You will be prompted to confirm the changes by pressing [Enter]. You must then restart the
controller, either through the menu [4], [2], [2] or by cycling the power, for the settings to
take effect.
July 2022 53
Security Expert Security Purpose Controller Hardware Configuration
This defaults the IP address for as long as power is applied, but does not save the change
permanently. Once the link is removed and power is cycled to the unit the configured IP
address is used.
D1/ D0/
BZ L1
NB NA
READER 1
4. Power up the controller. Wait for the status indicator to begin flashing steadily.
July 2022 54
Security Expert Security Purpose Controller Hardware Configuration
This defaults the IP address for as long as power is applied, but does not save the change
permanently. Once the link is removed and power is cycled to the unit the configured IP
address is used.
July 2022 55
Security Expert Security Purpose Controller Hardware Configuration
Defaulting a Controller
The controller can be factory defaulted, which resets all internal data and event information.
This allows you to remove all programming and start afresh.
Defaulting the controller resets the IP address to the factory default IP of 192.168.1.2
D1/ D0/
BZ L1
NB NA
READER 2
4. Power up the controller. Wait for the status indicator to begin flashing steadily.
5. Remove the wire link before making any changes to the controller's configuration.
The system will now be defaulted with all programming and System Settings returned to
factory configuration, including resetting the IP address and all network configuration, and
removing all operator records.
l Defaulting the controller resets the IP address to the factory default IP of 192.168.1.2.
Earlier versions of the controller firmware do not reset the IP address. If the controller is
not available on 192.168.1.2 you will be able to connect to it via its previous IP address.
l Any configured system settings (e.g. Default Gateway, Event Server) are reset to their
default values.
l Any custom HTTPS certificates are removed and the default certificate is reinstalled.
Earlier versions of the controller do not have a default HTTPS certificate installed. If the
controller is not available via HTTPS, connect to it via HTTP.
l All operator records are removed and the admin operator must be recreated.
l All other programming is removed.
Before making any changes to the controller's configuration or upgrading the firmware,
remove the wire link used to default the controller.
After defaulting a controller a number of essential steps will need to be performed to resume
normal operation. Not all of the following steps will necessarily be required, depending on your
site configuration:
1. Connect to the controller's web interface using HTTPS, unless it is an older controller with
no default certificate loaded, then it will connect using HTTP.
2. Recreate the admin operator and log in to the controller's web interface.
If you are not prompted to create the admin operator, the default username is admin with
the password admin.
3. Reset the controller's IP address to its previous value.
4. Reconfigure any additional network settings.
July 2022 56
Security Expert Security Purpose Controller Hardware Configuration
July 2022 57
Security Expert Security Purpose Controller Hardware Configuration
Defaulting the controller resets the IP address to the factory default IP of 192.168.1.2
Before making any changes to the controller's configuration or upgrading the firmware,
remove the wire link used to default the controller.
After defaulting a controller a number of essential steps will need to be performed to resume
normal operation. Not all of the following steps will necessarily be required, depending on your
site configuration:
1. Connect to the controller's web interface using HTTPS, unless it is an older controller with
no default certificate loaded, then it will connect using HTTP.
2. Recreate the admin operator and log in to the controller's web interface.
If you are not prompted to create the admin operator, the default username is admin with
the password admin.
3. Reset the controller's IP address to its previous value.
4. Reconfigure any additional network settings.
5. Reinstall previously installed custom HTTPS certificates.
6. Restore any other system settings as required by your site configuration.
July 2022 58
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
Communication Requirements
For the server and controller to communicate, the following are required:
1. The controller must be physically networked to the server, or connected over the web.
2. The Security Expert services must be running.
3. The server must have the correct IP address for the controller.
4. The server must have the correct controller serial number to properly identify incoming
messages from it.
5. The controller must have the event server IP address and port set correctly (port 22000 by
default).
6. The controller must be contactable on the download and control ports (ports 21000 and
21001 by default).
7. Security Expert must have the correct computer name configured for the download and
event servers.
8. The Security Expert software and databases must have the same database version.
9. Encryption must either be disabled at both ends or enabled at both ends with the correct
encryption key.
July 2022 59
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
From firmware version 2.08.911 controller ping is disabled by default. If the controller is
receiving downloads you can allow ping by adding the command EnablePing = true in
the controller commands.
July 2022 60
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
If you have two controllers with the same IP address or serial number anywhere on your
server, there will be communication problems with at least one of them.
Confirm Ports
Next, ensure that the download and control ports set on the server match those set in the
controller interface.
July 2022 61
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
1. In Security Expert, navigate to Sites | Controllers | General and check these values:
l Download port (default 21000)
l Control and status request port (default 21001)
2. In the controller web interface, on the System Settings page, ensure that the Download
Port and Control Port match those defined in the software.
3. If you have changed any settings on the controller, save your changes and restart the
controller for the changes to take effect.
1. On the server computer, open Control Panel > All Control Panel Items > System to
view computer information.
2. Copy the Computer Name.
3. In Security Expert, navigate to Global | Download server and check that the Computer
name matches the name of the server machine. If not, paste in the name copied earlier.
4. Navigate to Global | Event server and again check and correct the Computer name.
5. If you have changed the computer name for either server, you must restart the
corresponding service.
1. Open the Services snap-in by:
l Pressing the Windows + R keys
l Typing services.msc into the search bar and pressing Enter
6. Locate the Security Expert services. Right click on the download service and/or event
service and click Restart.
A backup taken from a newer version of Security Expert cannot be restored to an older
version.
Windows Firewall
When the controller and server are on the same local network the only place a firewall can be
blocking messages is on the server machine itself. This is called the Windows Firewall.
July 2022 62
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
Server
Switch
Firewall (Events on
Download Controller
port 22000)
Server
Event
Server
1. Open the Windows Firewall settings at Control Panel > All Control Panel Items >
Windows Firewall. If the firewall is on, it is shown in green.
2. To eliminate the Windows Firewall as a cause of communication problems, turn it off
temporarily by clicking Turn Windows Defender on or off at the left of the screen.
Disable the firewall for each network location.
Check whether this resolves the issue. If so, you can turn the Firewall back on and allow
the Security Expert services through the Firewall.
3. Click the Allow an app or feature through Windows Defender Firewall link on the left
of the screen.
Third-party antivirus or firewall software may prevent modification of Windows Firewall
rules. If this is the case, refer to the third-party manufacturer for details on allowing
programs through the firewall.
4. Select Allow another app... to add a program as an exception.
5. Click Browse..., then navigate to the Security Expert installation directory.
The default installation directory is C:\Program Files (x86)\Schneider Electric\Security
Expert.
6. Select (double click or select and Open) the executable that you want to allow, then click
Add.
Add the following Security Expert executables, one by one:
l SecurityExpertSV.exe
l SecurityExpertSV2.exe
l SecurityExpertSV3.exe
l SecurityExpert.exe
l SecurityExpertEvtSvr.exe
l SecurityExpertDVR1.exe
l SecurityExpertDVR2.exe
This allows the necessary Security Expert services access through the Windows firewall.
The above process will only allow access through your primary network connection.
If you have multiple networks connected you will need to manually allow access (tick
the checkbox in the network column) for each additional network that the Security
Expert executable requires access through.
Multiple Firewalls
On corporate networks there can be multiple firewalls.
July 2022 63
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
Server
Status, control + downloads
on ports 21000 + 21001
Event
Server
To ensure these are configured correctly, provide the Security Expert Network Administrators
Guide to the appropriate IT staff member.
Encryption
Both Server and Controller Encryption Enabled
Encryption relies on a shared key that both the sender and receiver of a message know. The
message is encrypted using the key, then decrypted by the receiver using the same key. If the
message is intercepted, it will make no sense to anyone without the encryption key.
Disabling Encryption
Defaulting the controller is the only way to remove the encryption key. This is by design and
intended as a security feature. It means that physical access to the controller must be gained
before encryption can be disabled.
If you are unsure of the state of encryption of either the server or controller, disable encryption
at the server, then default the controller. This ensures that neither is encrypted and rules this
out as a cause of communications problems. Encryption should then be re-enabled once
communications are established.
July 2022 64
Security Expert Security Purpose Controller Troubleshooting Controller Connectivity
Telnet
To confirm a network path exists from the server to the controller and the correct ports are
open, you can telnet to the controller on the download port (by default port 21000).
1. If the Telnet feature is not turned on, open the Control Panel > All Control Panel Items
> Programs and Features.
2. Click Turn Windows features on or off. Locate the Telnet Client, check the box next to
it and click OK.
3. Open a command prompt and attempt to telnet to the controller.
For example, enter the command telnet 192.168.1.2 21000
l If the controller can accept the connection, a clear screen appears with a cursor
blinking in the top left corner.
l If there is no connection, a message will advise there is still a problem between the
server and controller. If you can web browse to the controller, it is likely a firewall is
blocking the connection somewhere.
Finally, to confirm the event server is able to accept connections, configure a laptop with the
same IP settings as the controller.
1. Remove the ethernet plug from the controller and plug into your laptop.
2. Try to telnet to the server IP address on the event server port (22000 by default):
telnet 192.168.1.100 22000
l If the server is able to accept connections, the clear screen and blinking cursor
appear.
l If the server is not reachable, a message will advise there is still a problem, indicating
a firewall is blocking port 22000 to the server.
July 2022 65
Schneider Electric
www.schneider-electric.com
© 2022 Schneider Electric. All rights reserved.
July 2022