iii
Table of Contents
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
Conventions Used in This Manual .................................................................................................................vii
Section 1 – Introduction ..................................................................................................................................1–1
General Information ........................................................................................................................................1–1
VistaKey Features ...........................................................................................................................................1–1
Compatible Fire/Burglary Alarm Systems ....................................................................................................1–2
VistaKey-SK Description ................................................................................................................................1–2
Peripheral Devices...........................................................................................................................................1–3
VistaKey-SK Installation Steps......................................................................................................................1–3
Section 2 – Access Control Integration ........................................................................................................2–1
Introduction .....................................................................................................................................................2–1
Overview ..........................................................................................................................................................2–1
Step One – Lay Out Access Control and Security System ............................................................................2–1
Step Two – Establish Access Group Privileges..............................................................................................2–3
Step Three – Program the System..................................................................................................................2–3
Access Points..................................................................................................................................................2–4
Description .................................................................................................................................................2–4
How this feature is used in our example ..................................................................................................2–4
Where to program ......................................................................................................................................2–4
Executive Privilege ........................................................................................................................................2–5
Description .................................................................................................................................................2–5
How this feature is used in our example ..................................................................................................2–5
Where to program ......................................................................................................................................2–5
Armed Restriction..........................................................................................................................................2–6
Description .................................................................................................................................................2–6
How this feature is used in our example ..................................................................................................2–6
Where to program ......................................................................................................................................2–6
Time Windows and Timed Events................................................................................................................2–7
Description .................................................................................................................................................2–7
How this feature is used in our example ..................................................................................................2–7
Where to program ......................................................................................................................................2–7
VISTA User Code Authority Level ...............................................................................................................2–8
Description .................................................................................................................................................2–8
How this feature is used in our example ..................................................................................................2–8
Where to program ......................................................................................................................................2–9
VISTA User Code Partition Assignment....................................................................................................2–10
Description ...............................................................................................................................................2–10
How this feature is used in our example ................................................................................................2–10
Where to program ....................................................................................................................................2–10
Conclusion ......................................................................................................................................................2–13
Section 3 – Quick Installation ........................................................................................................................3–1
General Information ........................................................................................................................................3–1
Installing the Equipment ................................................................................................................................3–1
Mounting and Connecting.............................................................................................................................3–1
Mapping VistaKey Zones for Test ..................................................................................................................3–2
Initial System Test ..........................................................................................................................................3–3
Summary of Contents for VistaKey-SK
Page 2: ......
Page 6: ...vi...
Page 8: ...viii...
Page 40: ...VistaKey Installation Guide 4 10...
Page 107: ......
Page 108: ...165 Eileen Way Syosset New York 11791 Copyright 2000 PITTWAY CORPORATION l K4005 6 00...