The Galaxy Control Systems engineering team has put together a series of As-Built drawings to assist our integrators with site proposals, commissioning, and/or site planning. These drawings are available for use by qualified GCS surveyors, consultants, or technicians.
635 Series Board Only
CAD drawings of the individual 635 component boards. These are basic outline/major components only – and are best suited for tasks like wiring diagrams. They are available in bitmap and dxf format.
- 600 DRM
- 635 DRM
- 600 DIO
- 600 DSI
- 635 DSI
Get Tiny CAD Here
Galaxy.TCLib Compatible with TinyCad
TinyCAD is a program for drawing electrical circuit diagrams commonly known as schematic drawings. It supports standard and custom symbol libraries.
600 Series System Drawings
The following files are posted in a DWG file format.
- 635 Sys-Config Ethernet 635 DPI Indala Magstripe – Fail Secure Wiring
- 635 Sys-Config Badging 635 DPI Indala Magstripe – Fail Safe Wiring
- 600 Sys-Topology Intelliserver
- 635 DPI Indala Magstripe Wiring
- 635 Sys-Topology Web
- 635 DPI Magstripe Wiring
- 635 Panel 8-Door w/ DIO
- 635 DPI Farpointe Wiring
- 635 Panel CPU-DSI-2Relays
- 600 DPI Farpointe Wiring 2
- 635 Door Rex-MD
- 635 DPI XceedID Wiring
- 635 Door Rex-BTN
- 635 DSI to 1 Relay Board
- 635 Door ElecStrk Kpad-2Man
- 635 DSI Comp – Layout Rev B
- 635 Relay Comp – Layout Rev C
- 600 Dialer Comp
500 Series Board/System
The following files are posted as a DWF file format.
Click here to download the viewer.
- PC to 502 (RS-232)
- PC to 508 (RS-232)
- PC to 502 (RS-232 UL)
- PC to 508 (RS-232 UL)
- PC to 502 (Dial-Up)
- PC to 508 (Dial-Up)
- PC to 502 (Dial-Up UL)
- PC to 508 (Dial-Up UL)
- PC to 502 (Lantronix)
- PC to 508 (Lantronix)
- PC to 502 (Lantronix UL)
- PC to 508 (Lantronix UL)
- PC to 502i (RS-232)
- PC to 508i (RS-232)
- PC to 502i (RS-232 UL)
- PC to 508i (RS-232 Side view)
- PC to 502i (TCP/IP)
- PC to 508i (RS-232 UL)
- PC to 502i (TCP/IP UL)
- PC to 508i (RS-232 UL Side view)
- PC to 508i (TCP/IP UL)
- PC to 508i (TCP/IP)
System Galaxy ARCAT Specification
AIA COURSE INFORMATION
Needing some LU/HSW credits? As an authorized AIA provider, Galaxy offers on-site, instructor led sessions centering around Access Control, Security, Incident Command & Emergency Planning.
Future courses will be listed as they are available.
For More Information, Contact:
CREDIT: 1 LU/HSW COURSE # EAC101616
Electronic Access Control (EAC) is a swiftly evolving component in the Security puzzle. In order to recognize the benefits of new technologies, one needs to have the basic understanding of access control architecture, components & functionality. This course will be an introduction to electronic access control touching on all major facets of an access control system. Starting with a â€˜typicalâ€™ application, all required components will be identified and described.
- Identify & understand the operation of door/portal components.
- Understand how integrated systems can save time & increase functionality.
- Evaluate project requirements & determine system topology applying examples in this course.
- Describe which credentials are most effective and secure.
Intro into Emergency Planning/Incident Command
CREDIT: 1 LU/HSW COURSE # EPLAN101
Encompassing much more than just physical space, an introduction into Incident Command/Emergency Planning will give the attendee the broad overview of major components & resources.
- Participants will be able to refine existing security protocols by assigning degrees of resource typing usage when assisting clients to identify and leverage assets.
- Participants will be able to apply established operational ICS/NIMS protocols by clearly communicating the ICS/NIMS hierarchy when assisting clients with Emergency Operations Plan development.
- Participants will be able to assess risks in any environment by identifying all stakeholders when assisting clients to evaluate risk mitigation policies.
- Participants will be able to demonstrate Incident Command Structure (ICS) and National Incident Management System requirements (NIMS) by providing the client with specific examples, guidelines and exercises.
Access Control in the Cloud
CREDIT: 1 LU/HSW COURSE # ACC10219
The internet is everywhere. As the availability of ‘reliable’ connectivity increases, so does the opportunity for product and services to take advantage of the internet as a resource. Also known as ’The Cloud’, or ‘Cloud Computing’, it offers programs & services that are de-centralized and maintained by cloud service providers. This course identifies and defines in general terms the basics of the cloud in everyday life and applies those terms specifically to cloud-based/Hosted physical access control.
- Attendees will understand what the ‘Cloud’ in its basic form is. Using everyday examples, the cloud will be demystified, and terms defined allowing the attendee to identify their own personal experiences in the ‘cloud’ for a relatable comparison to the course topic.
- Attendees will learn common industry terms/definitions that apply to cloud based access control. Utilizing these terms, the attendee will discover the differences (both physically & functionally) of cloud-based hosted solutions vs. traditional on-premise. The course will demonstrate the importance of meeting the facility’s needs to gain a greater adoption and compliance of the access system by administrators & users, resulting in a more secure environment.
- The attendee will get a better understanding of the security concerns of cloud-based systems. Identify the important features to look for when evaluating in-cloud access control solutions, and how those features protect the integrity of the access control system from outside threats. Attendees will understand how the ‘hardening’ of systems against the risk of outside threats is critical for system security, as well as, business continuity
- Applying information learned in this course, the attendee will be shown how to recognize opportunities for in-cloud hosting vs. on-premise systems. Benefits (LEEDS/power consumption/ hot-redundancy/etc.) will be defined and used in real-world examples to help determine the best access control model to use. Identifying and applying the correct model will help the end-user meet their security requirements of protecting their employees and property, while taking full advantage of the benefits & features that are important to them.