Because this lock can be installed on many different styles of doors, a generic installation instruction is provided. Ensure that the lock component is mounted to the stationary part of the door, and the strike component is mounted to the moving part of the door. Ensure you have the required mounting fasteners for your specific installation scenario. The required number of fasteners are 7 (3 for the lock component, 4 for the strike component).
Mounting Lock
- Drill the lock mounting holes
The mounting holes in the YG80 lock component are sized for M8 fasteners.
Referring to the dimension drawings in Section 3.1; drill the holes at the marked location using appropriate tools, such as an M8 drill bit and power drill. If the cable is going to be run through the mounting surface, an 8mm hole can be used for the cable hole as well. - Prepare cable run
Before the lock can be mounted to the surface, the cable must be prepared. In the caseof running the cable out the back end of the lock, track the cable along the channel. If the cable is going to be run straight out of the base of the lock, completely thread the cable through the prepared cable hole in the mounting surface. If the neoprene gasket is being used, thread the cable through the hole at the centre of the cross first.
Note: Ensure the cable is not pinched or severed when mounting the lock or threading through the hole. Make sure the cable doesn’t rest on any sharp edges. - Secure the lock in position
Once the cable has been prepared, the lid of the lock must be removed to reveal the three mounting holes; this can be done by using a 4mm hex key to remove the four screws securing the lid. Once this has been done, mount the lock in place using the appropriate fasteners for the mounting surface material.
Mounting Strike
Drill the strike mounting holes
The mounting holes in the YG80 strike are sized for M8 fasteners.
Referring to the dimension drawings in Section 3.2; drill the holes at the marked location using appropriate tools, such as an M8 drill bit and power drill.
Note: Ensure the gap between the lock and strike (when the door is closed) does not exceed 15mm.
Strike Configuration
By default, the strike is configured for use when the lock and strike are mounted on the same plane, so that the top of the strike and the top of the lid of the lock align when the door is closed. If the strike needs to be installed at 90 degrees to the lock, the strike will need to be reconfigured.
To configure the strike, hold the strike with the plastic strike ring face up and remove the M3 screw in the centre at the base of the hole using a #2 Phillips screwdriver. Once removed, lift out the strike ring to reveal the magnet sitting in one of the three magnet holes. This position is determined by the location of the magnet sensor in the lock, which is above the bolt pin, near the edge of the lid.
Once you have determined this location, move the magnet to the desired location, then secure the magnet by refitting the plastic strike ring and securing with the M3 screw.
Configure and Cover
- Configure the lock
Connect the wires on the end of the cable to the power supply, access control system, alarm system, or entry/exit devices (Refer to Section 6.1 Wiring).
With the lid still removed, adjust the dip switches to the desired setting using a sharp tool such as a small flat head screwdriver (Refer to Section 6.2 Dip Switch Positions).
When power is supplied to the lock, after the 25 second start-up time the yellow LED to the left of the dip switches should blink indicating it has powered up.
When the door is in the closed position the green LED to the left of the dip switches should light up indicating that the magnet in the strike has been detected. If this does not happen, please check that the door gap is less than 15mm and the magnet is in the correct position in the strike.
Note: The micro-USB port is for factory use only.
2. Cover the lock
Finally screw the lid down onto the lock with a 4mm hex key. Ensure the lid is screwed down evenly and tight as otherwise the lock sealing may be compromised. Any remaining systems can now be activated, including those that take advantage of the anti-tamper monitor.