ULC/IEC/EN 60839-11-1 Compliance Configuration for Synergis Cloud Link - This guide outlines essential custom configurations for Synergis Cloud Link using Security Center. These settings ensure compliance with the ULC/IEC/EN 60839-11-1 standard for Grade 4 installations. Neglecting these configurations will result in a lower-grade system. - Synergis Cloud Link | Security Center 5.11.3.7 and 5.12.1.0 and later | Mission Control
Product
Mission Control
Security Center
Synergis Cloud Link
Content type
Guides > Administrator guides
Language
English
Last updated
2024-07-03
Security Center configuration for compliance with ULC/IEC/EN 60839-11-1 Grade 4 requirements
ULC/IEC/EN standard requirements
Table 3, line 7: Visual annunciation, alert, and logging required for duress conditions
Table 3, line 9: Visual annunciation, alert, and logging required for denial of access due to an attempt to use a token with expired validity
Table 3, line 10: Visual annunciation, alert, and logging required for denial of access due to a configurable number of attempts to use a valid token with invalid memorized information
Table 3, line 16: Visual annunciation, alert, and logging for portal that remains closed after access is granted
Table 3, line 17: Visual annunciation, alert, and logging for denied access
Table 3, line 20: Visual annunciation, alert, and logging for primary power failure
Table 3, line 21: Visual annunciation and logging for primary power restoration
Table 3, line 22: Visual annunciation, alert, and logging for standby power supply trouble condition
Table 3, line 23: Visual annunciation and logging when users enter and leave configuration mode
Table 3, line 24: Visual annunciation, alert, and logging for loss of communication between access control unit and monitoring console
Table 3, line 30: Visual annunciation, alert, and logging on tamper detection
Table 3, line 31: Visual annunciation, alert, and logging when portal forced open
Table 3, line 32: Visual annunciation, alert, and logging on expiry of portal allowed open time (portal opened too long)
Table 3, line 35: Visual annunciation, alert, and logging when reader is offline
Table 3, line 36: Visual annunciation, alert, and logging for locking device abnormal status
Table 3, line 37: Visual annunciation, alert, and logging when 90% of maximum logging capacity has been reached
Table 3, line 47: Minimum number of system events logging capacity on average per reader
Table 4, line 14: Use of memorized information only
Table 4, line 18: Credential suspension after a predetermined number of unsuccessful attempts
Table 4, line 22: Minimum length of memorized information
Table 7, line 12: The minimum length of memorized information must be 8 characters when used alone for logical access
Table 7, line 18: Encryption required for communication signals between EACS components when using shared public networks, such as the internet
Table 7, line 24: Communication between readers and access control units shall support encryption with authentication
Table 7, line 26: The change of state (open, closed, tamper (open or closed)) of a digital input detection circuit must be designed in such a way that the tolerance for each input state of the circuit does not overlap adjacent states
Annex