Inhalt
1
Einführung ..............................................................................................................................5
1.1
Zeichenerklärung ......................................................................................................................5
2
3
Sicherheit ................................................................................................................................8
3.1
3.2
Sicherheitsvorschriften..............................................................................................................8
3.2.1
3.2.2
3.2.3
3.2.4
Entsorgung................................................................................................................................9
3.3
Einsatzbedingungen..................................................................................................................9
4
Security ...................................................................................................................................13
4.1
5
Beschreibung .........................................................................................................................14
5.1
Funktionsweise .........................................................................................................................14
5.2
Zugangspunkte .........................................................................................................................15
5.3
Toter-Winkel-Prüfung ................................................................................................................16
5.4
Anlagenarchitekturen ................................................................................................................17
5.5
Anmeldeliste..............................................................................................................................18
6
Betrieb .....................................................................................................................................19
6.1
6.2
6.3
7
7.1
Systemübersicht........................................................................................................................27
7.2
Systemausbau ..........................................................................................................................28
7.3
Installation .................................................................................................................................28
7.3.1
PITreader anschließen..............................................................................................................28
7.3.2
7.4
PITreader anschließen..............................................................................................................29
7.5
7.6
Visualisierung............................................................................................................................30
7.6.1
PITreader-Status anzeigen .......................................................................................................30
7.6.2
Anmeldeliste anzeigen ..............................................................................................................30
7.6.3
7.7
Diagnose ...................................................................................................................................35
7.8
Beispiele....................................................................................................................................36
7.8.1
7.8.2
8
8.1
Systemübersicht........................................................................................................................40
Systembeschreibung Wartungssicherung Key-in-Pocket
1006613-DE-02
| 3