
6.1.2
Communication Channel Device
←→
“Cloud”
This communication channel is used for the device service functions, such as:
∙
Remote software update on site
∙
Remote configuration of the site
∙
Remote arming and disarming of the site by the user
In case of using the public “Cloud” the device connects to the “Cloud” via the Internet. If the Private Cloud is
used, it is possible to connect through dedicated internal subnets of GSM carriers or local Ethernet networks.
To operate all service functions, the device shall have IP connection with the “Cloud” via Ethernet or GPRS.
Important:
Possible interruptions in connection of ‘device
←→
“Cloud” ’ do not affect the security functions of
the device in any way.
6.1.3
Communication Channel Receiver
←→
“Cloud”
This communication channel is used to ensure the operation of the device service functions.
The alarm monitoring software transmits the following to the “Cloud”:
∙
information about engineers and their permissions
for the engineering panel operation
∙
information about administrators of the personal account and their sites
for operation of the personal account
my.cnord.net
and the
MyAlarm
mobile application
∙
events by sites
for operation of the personal account and mobile applications
“Cloud” transmits the following to the alarm monitoring software:
∙
events about engineer’s attempts to connect to a site
for the engineering panel operation
∙
events about attempts to arm/disarm from the
MyAlarm
mobile application
for the mobile application operation
∙
events about checking the panic button using the
Call-center
for automatic check of the panic button
In case of using the public “Cloud” the alarm monitoring software connects to the “Cloud” via the Internet. If
Private Cloud is used, it is possible to connect using Ethernet LANs.
Important:
Possible interruptions in connection of ‘receiver
←→
“Cloud” ’ do not affect the security functions of
the device in any way.
6.2
Remote Access Setting
Remote access to the device is possible only if compatible software, for example, “Security Center” is installed on
the receiver to which the device is connected. To use remote access to the device, it is necessary to do the following:
1. Create an engineer in the alarm monitoring software
2. To give the engineer the right to remote access to certain sites
6.2.1
Creating Engineer
To create an account for an engineer in the Security Center software, start the “Personnel manager” module and
click the “New” button on the “Engineers” tab:
89