Installing Door Hardware

Author: Brian Rhodes, Published on Oct 23, 2013

Most access installers find themselves in this sticky situation at some point: they need to install or reinstall a door lock. The problem? Door lock installation is a whole world unto itself, and seemingly is fraught with hundreds of different problems to address. When it comes to securing doors, the lock must work perfectly, or security and even life-safety could be at risk.

In this note, we walk though the installation of a lock on our test door. While it is specific to our door and our lock, the general installation process is helpful in many situations. We document that process below.

Installation *******

*** ******* **** ******* * ******* ******* **** *** **** Door, *** ***** **** ********** ***** ** *** ************ ** every **** ****. *** ***** ** ****** ***:

  • ****/***** *********
  • **** ****
  • **** ************
  • ******** ****** *** ***** ***********

********** *** ***** ** ***** **** ****** ** ***** ********* with * **** ****** ** *********** ** *** *****.

Lock ****

*** ***** **** ** ** ********* *** **** *** *** in *** ****. **** ******* ****** ********* ** ******** *****, but *** ******* ********* *** ***** **** ** ****** *****:

  • ****** ***** ********
  • **** ****** **** ********
  • *******

****** ***** ********:******* **** ***** ******* ** *** *****, ********************** ***** ** ** **********. **** ***** ************** ** *** ***** ***** *** ******, ** *** ***** automatically ******** **** *** **** ******. ** *** ***** ********, the **** ****** **** *** ***** ******** *** ** *** latch *********** **** *** ******. **** ***** ******* * ***** that *** ** ******* ** ********* ** *** ****** *********.

** ********** **** *********,*** ******* ****(**** ****) ******** * ******** ***** **** *** ********** **** a ***********. *** ***** ***** ******* *** ********** ** **** step:

**** ****** **** ********:***** *** ********* ** **** ** ********* ********* ********* ** how/where **** *** ****. *** *******, **** ***** ************************ **** **** **** ******, *** ***** *** ****** *** retract *** ***** *** *** *** ****, *** ***** ****** may **** *** ** **** ** *** ******* ***** **** locked. **** ******** *** ********* ** ** ****** ********* ******** configurable ** *** **** ******. *** ***** ***** ** ** example ** *** ******** ********* ** *** ******* ****, ******* there ** ** '******** ***' ** ******** ********* ** ***** lock:

*** ***** ***************** ** *** **** ******* ******* ** *** specific ***** ***** *********, *** ******* ***** ******* *** *** most ************ ***** ********* *** ******************** *** ******* ********.

*******:**** **** ********** ***** ********* *** ******* **** **** ** order ** ****** *** ****. (***** ******* ***** ********* **** ******.) **** ********* ******* ***** ** *** ***** of *** ****, *** ** ** ** ********* ****** ** pull '**' ** * ****** ** **** *** ****. '***** handing' ***** **** **** ********* *** ** ******** ****** ************, usually ******* ******** * *********** ***** ** ******** *** * spring. ** ******* ***** *** ******** ** ******* **** ****, and *** ******* ***** *** ** **** **** * ***********:

Lock ************

**** *** **** *** **** *******, *** *** **** *** been **********, ** ** ***** ** ***** **** *** ****. Most ***** ** ***** *** ********* **** *** ***** *** - ******* **** ********* ** ***** **** ** *** ***** that ********* ******* *** **** *** ***** **** ******** ******* the *******. ***** ***** ********** *** *********, ***********(*** ******** ********* **** ******** *** ***** ** ********* **** the *****. **** *****, **** ******* ******************** ** ********** *****, ******* *********** ** *** ****** ***** **** **** (if ********).

  • ***** *********
  • ******** ************
  • *******
  • ****

***** *** ************ ******* ** *** ******* **** ****** **** other *****, *** ***********'* ************ ***** ** * ********************* **** *******:

Function ****** *** ***** ***********

*** *********** ** *** ******* ** ********** *** **** ***** like ** ** ********: **** ****/****** *** ****, *** ******* fully *******, *** ***** ** ** ********** ******* ** ************ between *** ****, *****, ******, *** ****. *** ***** ******** checks ********* *******:

  • *** **** ******* *** ***** ********
  • ******** ********* ** ***** *** ********** ******* **** ** *****
  • *** ****** *****
  • *** **** *** ** ******* *** ~*/*” ***** **** ************.
  • *** ******************** **** ****** *** **** **** *** **** ** ******.

** **** *****, ** *** **** ** ******** ******** ****** installation, ** **** *** ***** ** ******** ****** ***. ******** realignment ** *** ******** *** ** ******** ***** ***** ***, but *** **** ***** **** ****** ************ *** **** ** properly **********.

Comments (1)

****** ** *** *** , **** ****** ******** **** ***** door :)

**** **** ** ** **** *** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Selecting Wood Drill Bits For Installers on Nov 29, 2016
Running cables through studs is common for roughing in residential and some older commercial installs. To do this, you will need to drill holes in...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Cut Install Time 50% Claims Magdaddy on Nov 21, 2016
Modern commercial buildings frequently use open web steel joists that makes running cabling very challenging. Cables need to be run near to but not...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...
Guide To Selecting And Using Ladders on Nov 15, 2016
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...
Pimp My Integrator Truck on Nov 14, 2016
If image is everything, security installer vehicles are rolling advertising. Using vehicles for marketing means covering them with eye-catching...
Access Control Markups 2016 on Nov 09, 2016
  Access control markups have remained solid, according to new IPVM integrator survey results. Response Breakdowns We asked...

Most Recent Industry Reports

Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pelco Favorability Results on Dec 02, 2016
This is the first in a series of studies of manufacturer favorability. 100+ integrators rated and explained their views of each manufacturer. We...
Hikvision CEO Declares 'We Do Not Cut Rates" on Dec 02, 2016
Hikvision has led another press trip to China, and this time Hikvision's CEO is sharing insights into their competitive strategy, including...
Network Security Audit App (March Networks) Examined on Dec 01, 2016
Verifying one's video surveillance devices are locked down against common cybersecurity vulnerabilities is increasing important, as hacks using...
FLIR Acquires Drone Manufacturer For $134M on Dec 01, 2016
FLIR has acquired Prox Dynamics, a Norwegian maker of small military-grade drones, for $134M.  FLIR president Andy Teich provided additional...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact