Installing Door Hardware

Author: Brian Rhodes, Published on Oct 23, 2013

Most access installers find themselves in this sticky situation at some point: they need to install or reinstall a door lock. The problem? Door lock installation is a whole world unto itself, and seemingly is fraught with hundreds of different problems to address. When it comes to securing doors, the lock must work perfectly, or security and even life-safety could be at risk.

In this note, we walk though the installation of a lock on our test door. While it is specific to our door and our lock, the general installation process is helpful in many situations. We document that process below.

Installation *******

*** ******* **** ******* * ******* ******* **** *** **** Door, *** ***** **** ********** ***** ** *** ************ ** every **** ****. *** ***** ** ****** ***:

  • ****/***** *********
  • **** ****
  • **** ************
  • ******** ****** *** ***** ***********

********** *** ***** ** ***** **** ****** ** ***** ********* with * **** ****** ** *********** ** *** *****. 

Lock ****

*** ***** **** ** ** ********* *** **** *** *** in *** ****. **** ******* ****** ********* ** ******** *****, but *** ******* ********* *** ***** **** ** ****** *****:

  • ****** ***** ********
  • **** ****** **** ********
  • *******

****** ***** ********:******* **** ***** ******* ** *** *****, ********************** ***** ** ** **********. **** ***** ************** ** *** ***** ***** *** ******, ** *** ***** automatically ******** **** *** **** ******. ** *** ***** ********, the **** ****** **** *** ***** ******** *** ** *** latch *********** **** *** ******. **** ***** ******* * ***** that *** ** ******* ** ********* ** *** ****** *********.

** ********** **** *********,*** ******* ****(**** ****) ******** * ******** ***** **** *** ********** **** a ***********. *** ***** ***** ******* *** ********** ** **** step:

**** ****** **** ********:***** *** ********* ** **** ** ********* ********* ********* ** how/where **** *** ****. *** *******, **** ***** ************************ **** **** **** ******, *** ***** *** ****** *** retract *** ***** *** *** *** ****, *** ***** ****** may **** *** ** **** ** *** ******* ***** **** locked. **** ******** *** ********* ** ** ****** ********* ******** configurable ** *** **** ******. *** ***** ***** ** ** example ** *** ******** ********* ** *** ******* ****, ******* there ** ** '******** ***' ** ******** ********* ** ***** lock:

*** ***** ***************** ** *** **** ******* ******* ** *** specific ***** ***** *********, *** ******* ***** ******* *** *** most ************ ***** ********* *** ******************** *** ******* ********.

*******:**** **** ********** ***** ********* *** ******* **** **** ** order ** ****** *** ****. (***** ******* ***** ********* **** ******.) **** ********* ******* ***** ** *** ***** of *** ****, *** ** ** ** ********* ****** ** pull '**' ** * ****** ** **** *** ****. '***** handing' ***** **** **** ********* *** ** ******** ****** ************, usually ******* ******** * *********** ***** ** ******** *** * spring. ** ******* ***** *** ******** ** ******* **** ****, and *** ******* ***** *** ** **** **** * ***********:

Lock ************

**** *** **** *** **** *******, *** *** **** *** been **********, ** ** ***** ** ***** **** *** ****. Most ***** ** ***** *** ********* **** *** ***** *** - ******* **** ********* ** ***** **** ** *** ***** that ********* ******* *** **** *** ***** **** ******** ******* the *******. ***** ***** ********** *** *********, ***********(*** ******** ********* **** ******** *** ***** ** ********* **** the *****. **** *****, **** ******* ******************** ** ********** *****, ******* *********** ** *** ****** ***** **** **** (if ********).

  • ***** *********
  • ******** ************
  • *******
  • ****

***** *** ************ ******* ** *** ******* **** ****** **** other *****, *** ***********'* ************ ***** ** * ********************* **** *******:

Function ****** *** ***** ***********

*** *********** ** *** ******* ** ********** *** **** ***** like ** ** ********: **** ****/****** *** ****, *** ******* fully *******, *** ***** ** ** ********** ******* ** ************ between *** ****, *****, ******, *** ****. *** ***** ******** checks ********* *******:

  • *** **** ******* *** ***** ********
  • ******** ********* ** ***** *** ********** ******* **** ** *****
  • *** ****** *****
  • *** **** *** ** ******* *** ~*/*” ***** **** ************.
  • *** ******************** **** ****** *** **** **** *** **** ** ******.

** **** *****, ** *** **** ** ******** ******** ****** installation, ** **** *** ***** ** ******** ****** ***. ******** realignment ** *** ******** *** ** ******** ***** ***** ***, but *** **** ***** **** ****** ************ *** **** ** properly **********.

Comments (1)

Please if you can , show access controll with glass door :)

Some time it is very big trouble.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...
Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
IP Camera Installability Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Oct 08, 2018
What are the best and worst cameras from an installation standpoint? Which manufacturers make it harder or easier to install their cameras? We...
UTC Merges Lenel and S2, Creates LenelS2 on Oct 03, 2018
UTC has completed the acquisition of S2, launching literally Lenel's2 LenelS2 with UTC declaring that "LenelS2 unites two world-class teams with...
Anti-Tailgating Startup: Spyfloor on Oct 03, 2018
A Canadian startup, Spyfloor, is using a different approach to warn against tailgating, a common access control problem. By counting feet,...
Network Cable Testing Guide on Oct 02, 2018
Proper cable installation is key to trouble-free surveillance systems. However, testing is often an afterthought, with problems only discovered...
VMS Mobile App Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Oct 01, 2018
Mobile VMS apps are a critical interface for the modern surveillance user. But who does it best and worst? We tested 6 manufacturers - Avigilon,...
Favorite Power Supply Manufacturer 2018 on Sep 28, 2018
While power supplies are becoming less important as PoE matures, they remain vital to access control systems, where increased power for locks,...
AHJ / Authority Having Jurisdiction Tutorial on Sep 27, 2018
One of the most powerful yet often underappreciated characters in all of physical security is the Authority Having Jurisdiction (AHJ). Often,...

Most Recent Industry Reports

ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Dahua Face Recognition Camera Tested on Oct 15, 2018
Dahua has been one of the industry's most vocal proponents of the value that AI creates: As part of this, Dahua has released a facial...
Amazon Touts Home Security Market Disruption on Oct 15, 2018
Amazon is coming for ADT and all of home security. Indeed, Amazon is advertising this as, in their own words, calling home security a: Inside...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
Mysterious Patent Troll 'Secure Cam' Targets Industry, Sues Hanwha, Hikvison, JCI, Panasonic, More on Oct 11, 2018
A company named "Secure Cam," who is actively hiding their ownership, has acquired a slew of video patents and is systematically suing video...
Unfixed Critical Vulnerability In Millions of XiongMai Devices Disclosed on Oct 10, 2018
XiongMai, one of the biggest OEMs alongside Dahua and Hikvision, has suffered a critical vulnerability impacting millions of their devices. This...
Honeywell Hides Selling US Gov Banned Chinese Video Surveillance on Oct 10, 2018
Honeywell hides selling US government banned Chinese video surveillance as their own 'Honeywell' products, deceiving buyers and putting US security...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...
Default Passwords Outlawed in California, US To Follow on Oct 09, 2018
UPDATES A new California bill aimed at improving security for connected devices has been signed into law. The law takes aim especially at...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact