Knowledge Base


Find answers to frequently asked questions, easy-to-use guides to troubleshoot and perform basic functions like changing the combination or changing the battery, and more.

Advanced Access Control Features

The ESL15 is a Digital Safe Lock with many advanced features that address commercial and retail safe access control. These features include the following. Note that reference to Function Codes are abbreviated to F(2-digit code). See the Function Code Table for reference.

Time Delay

Time delay forces the User to wait a pre-determined time period before the safe can be opened. This feature is a robbery deterrent, whereby the User can cooperate with a robber in opening the safe, but forces the robber to wait before access is granted. The idea is that a robber is too impatient to wait very long and gives up. Time delay periods are typically set for 10 or 15 minutes.

  • This feature must be Enabled (F01).
  • The ESL15 can be set for a Delay Period from 1 to 99 minutes. (F02)
  • If a User keys in a valid combination, the Time Delay is started.
  • A flash of the LED lamp approximately 2 times per second indicates the Delay Period.
  • At the end of the Delay Period, a long warbling tone is sounded to indicate the completion of the delay.
  • The Open Period begins timing after the completion of the Delay Period, and is indicated by a repeating 4 beeps and LED flashes every five seconds.
  • During the Open Period, the User must key a valid combination to cause the lock to open.
  • The Open Period can be set for 1 to 9 minutes long. (F03)
  • Time Delay can be canceled during the delay period by pressing “C – (any number key) – #”.

Armored Car Time Delay Bypass

This feature allows the Time Delay to be used under normal access situations, but provides a means to bypass time delay when cash handling methods require that an Armored Car courier can take deposits without waiting for the delayed access.

  • This feature must be Enabled (F40).
  • It still requires that a valid resident User be present to open the safe.
  • The Armored Car Code (User 9) can be keyed in first, followed by a valid User code or, the Armored Car Code can be used during the Delay Period to stop the delay, then the local User can open the lock with a valid code.
  • The Armored Car Bypass can be restricted to use by only the Manager User. (F41)

Multiple Users

Many cash handling protocols require that several people have access to the safe. The ESL15 provides several tools to manage a Multi-User environment. These controls are uniquely tailored to support retail loss prevention.

  • This feature must be Enabled (F10).
  • The Master User, or Manager, is the only User with Administration capabilities. o In Multi-User mode, there is no need for all Users to share the same combination, as is the case with a mechanical combination lock.
  • This feature allows the supervisor the ability to control the subordinate Users individually and makes employee turnover easier to manage because individual Users can be added and deleted at will without affecting others.
  • The ESL15 allows up to eight (8) subordinate Users to be enrolled.
  • A “Poor Man’s Time Lock” effect can be implemented daily where the Master User can disable the Multi-User Mode (F13) at the end of the day and then re-enable the mode at the beginning of the next business day. This causes the lock to reject all the Subordinate User Codes during off-business hours. The individual subordinate User codes are not lost, just disabled.

Subordinate User Control

The Master User has the option of allowing, or not allowing, certain capabilities of the Subordinate Users as follows.

  • The Subordinate User changing their own combination. (F60)
  • Two Subordinate Users opening the safe in Dual Combo Mode. (F31)
  • The Subordinate User authorizing Armored Car Time Delay Bypass. (F41)

Dual Control

This feature provides a higher level of security, where two different combinations are required to open the safe.

  • This feature must be Enabled (F30).
  • When Dual Control is Enabled, the lock requires two Users key their individual combinations, one after the other, before the lock will open.
  • The second User has 10 seconds to start code entry before the system discards the login and goes to sleep.
  • After the first User keys a valid combination, a short warbling tone is sounded, and the second User is then required to key a valid code.
  • If no second code is keyed within 10 seconds, the lock goes to the resting condition and the process must be started again.
  • The two User Codes must be different Users.
  • A complementing feature can be enabled (F31) that prevents two subordinate Users from opening the safe. If this mode is Enabled, the Manager must be one of the two Users entering valid combinations.

Duress Alarm

This feature allows a User to secretly signal that they are under Duress, typically in the act of being forced to open the safe in a robbery situation.

  • This feature must be Enabled (F20).
  • This feature requires that one of the optional Expansion Modules (ESL20EXP1, ESL20EXP2 or ESL20EXP3) is attached to provide electrical connection to external systems like alarms and monitoring services.
  • When a User keys a combination, finishing the code entry with the last number of the combination either 1 digit high, or 1 digit low, Duress output relay in the Expansion Module responds with a contact closure of for one (1) second.
  • The Lock opens normally, allowing the User to open the safe, without revealing they have sent a silent alert.
  • This Duress output contact closure is the same as if someone had pushed a “panic” button to summon help. By signaling secretly at the safe, the User doesn’t risk angering the robber and risking possible personal injury.

Reset All Functions

A function has been provided to reset all the functions to what is considered “default” settings. It disables all of the various modes, deletes all the Users and their codes, and cleans up any unknown settings.

  • This feature is executed by F99, and a confirming acknowledgement.
  • This is useful tool to get a fresh start after programming has been lost track of or for personnel changes at the Master User level.
Download PDF
Select more than one item for comparison.