TABLE OF CONTENTS
DEVICE CONNECTION ..................................................2
Wiring diagram .............................................................................2
Siren connection .........................................................................4
Additional protective contour ................................................5
Additional contour connection ..............................................5
FIRMWARE UPDATE ......................................................6
BLED 112 drivers installation ................................................6
The Author Flasher software installation .........................9
The IGLA ALARM firmware update
....................................10
Setting of the IGLA ALARM parameters ..........................13
Key fobs adding .........................................................................15
DEVICE ALIGNMENT ...................................................18
Alignment with the AUTOSTART-module........................18
Alignment with ATLAS or COMPASS GSM/GPS .............19
Alignment with TOR ................................................................21
Alignment with the CONTOUR-module ...........................22
Alignment with the KORD-module ....................................23
Alignment with the KEYLESS BLOCK ...............................24
FIRST SETTINGS ADJUSTMENT AND CHOOSING
OF THE OPTIONS .........................................................27
Initial setting of the PIN-code .............................................27
The IGLA ALARM anti-theft system options ..................28
Engine blocking method ........................................................30
Additional functions ................................................................31
Deleting of the key fobs .........................................................33
Key fobs adding .........................................................................33
Authentication by the key fobs of the KEYLESS BLOCK .....38
Key fobs indication table .......................................................39
Authorization (authentication) modes ............................. 40
Anti-hijack mode .......................................................................41
Super AntiHiJack mode ...........................................................42
Alternative service/valet button.........................................42