background image

 

 

 

 

PROGRAMMING MANUAL 

 

 

 

 

 

 

MULTI-FUNCTION INTRUSION 

SYSTEM 

 

 
 

 
 
 

 

 
 

On the website 

www.elkron.com

you may find updated information  

relating to the documentation provided with the product 

 

 

EN 

DS80

M

P1

R

-00

2

  

  

L

BT8

1

0

1

1

 

Summary of Contents for MEDEA

Page 1: ...PROGRAMMING MANUAL MULTI FUNCTION INTRUSION SYSTEM On the website www elkron com you may find updated information relating to the documentation provided with the product EN DS80MP1R 002 LBT81011 ...

Page 2: ...ase contact your local city office your household waste disposal service or the shop where you purchased the product The information contained in this manual was gathered and checked with care but the manufacturer cannot be held liable for errors or omissions The manufacturer reserves the right to implement improvements or changes to the products described in this manual without prior notice This ...

Page 3: ... session with the time programmer enabled 18 3 3 Home page 19 3 3 1 Information panels 20 3 3 2 Menu 21 3 3 3 Application management and data export import buttons 21 3 4 Programming procedure 21 3 4 1 Programming a new control panel 21 3 4 2 Importing an existing configuration 22 3 4 3 Changing the configuration 22 3 4 4 Configuring parameters 22 3 4 5 Copying the configuration 22 4 CONFIGURATION...

Page 4: ...r Codes 67 5 10 User keys 69 5 11 Contacts 71 5 11 1 Contacts 71 5 11 2 SIAIP Advance Parameters 74 5 11 3 Sending Message in Contact ID Format 74 5 11 4 Base Messages 75 5 12 Audio generation 76 5 13 Event alerts 77 5 14 Time scheduler 79 5 14 1 Scheduler configuration procedure 79 5 15 Expansion modules 83 5 16 Keypads 83 5 17 Readers 86 5 18 Power supply units 88 5 19 Wireless inputs 89 5 20 Ra...

Page 5: ...117 8 14 Test menu 118 8 15 Connectivity menu 119 8 16 Output control menu 120 8 17 Manutenzione menu 121 8 18 System Info menu 121 8 19 Isolation menu 122 8 20 Time Date menu 122 8 21 Display menu 123 8 22 USERS menu 123 8 23 KEYS Menu 124 8 24 Contats menu 125 8 25 Program Hourly menu 126 8 26 Enable USER menu 128 8 27 Enable KEY menu 128 8 28 Abilita Radiocomando menu 129 8 29 State Connettivit...

Page 6: ... Wireless keypads 43 Figure 33 Acquisition and removal of ZigBee devices 44 Figure 34 ZigBee photo sensor 44 Figure 35 ZigBee video sensor 45 Figure 36 ZigBee repeaters 45 Figure 37 ZigBee flashers 46 Figure 38 ZigBee relay modules 46 Figure 39 ZigBee shutter modules 46 Figure 40 ZigBee scenario controls 47 Figure 41 Heat adjustment 47 Figure 42 In Out points PrIO 48 Figure 43 Balancing customisat...

Page 7: ... 89 Remote controls 90 Figure 90 Remote control customisation 91 Figure 91 Remote control customisation 91 Figure 92 Wireless keypads 92 Figure 93 Wireless keypad customisation 92 Figure 94 ZigBee repeaters 93 Figure 95 ZigBee flashers 94 Figure 96 Zigbee home automation modules relays and shutters 95 Figure 97 ZigBee scenario controls 96 Figure 98 ZigBee scenario controls 96 Figure 99 ZigBee phot...

Page 8: ...mation panels 20 Table 7 Cloud connection 20 Table 8 Telephone alarm sending mode 28 Table 9 Call cycle examples 29 Table 10 Bus device identification signals 39 Table 11 States recognised by different balancing types 49 Table 12 Arming behaviour of sectors 53 Table 13 Possible actions of the daily schedule 81 Table 14 Menu navigation buttons 109 Table 15 Buttons and associated charactersi 109 Tab...

Page 9: ...ity This symbol indicates an important warning This symbol indicates advice This symbol indicates the compatibility with EN 50131 grade 3 certification The overall certification of the system is equal to the minimum certification of the devices installed and the functions enabled This symbol indicates the compatibility with EN 50131 grade 2 certification The overall certification of the system is ...

Page 10: ...arms sent Input A point terminal block for the physical connection of a detector usually a sensor or a contact The input is defined as being open when the sensor signals that it is no longer in stand by for example because an attempted intrusion has occurred An input can be connected to multiple sensors which are perceived as a single physical entity The latter configuration does not comply with E...

Page 11: ... a signal voltage of control that can inhibit the functioning of a sensor or of a signalling device for example by putting it in stand by Entry delay The time that the user has available from the moment he opens the delayed input to the moment in which the alarm is generated to disarm the respective sector s It can be programmed for each individual input There are three possible delays for each se...

Page 12: ...s for residential premises with a high value The system is usually connected with a Security Service Grade 4 High risk To be used when security has the priority over all other factors It is expected that the intruders have the skills and resources to plan a detailed intrusion and have a complete set of tools available including the means for substituting components of an intruder alarm system This...

Page 13: ...s by anyone Level 2 Access by the user e g an operator Level 3 Access by the maintainer Level 4 Access by the manufacturer Table 3 Access Level EN50313 1 IMQ mark IMQ is a Notified Organism or a structure authorised by the national government authority and notified to the European Commission The Notified Organism is responsible for evaluating with skill transparency neutrality and independence the...

Page 14: ...e USB Type B connector on the CPU of the control panel The USB port works as a virtual network connection the operating system recognises the control panel and automatically installs the driver For some operating systems you may need to manually install the driver on your computer Type in the browser the address https 192 168 82 83 to access the control panel web server see paragraph 3 1 1 1 3 Con...

Page 15: ...ault 00000 on the keypad and press the MENU button on the keypad 2 Use the button to scroll through the menu until CONNECTIVYTI appears and press the OK button 3 Use the button to scroll through the menu until WIFI appears and press the OK button 4 If WIFI appears OFF press the button which changes the message to WIFI ON 5 Press WIFI appears SSID Press the OK button and use the keypad to enter the...

Page 16: ... can reset the other access codes to default defaults Technical Manager code The code is enabled by the Master It can be programmed to never be enabled to always be enabled to be automatically disabled two hours after being enabled or to be automatically disabled as soon as a valid user code is entered It can be used to access a limited number of system configuration functions Each access code is ...

Page 17: ...nabled when leaving the factory Enable time once enabled User 2 See Table 5 Sector 1 No Until expressly disabled Master 2 111111 All Yes Permanent Technical Manager 3 222222 All Yes As programmed always never timed 2 hours until the first valid user code is entered Installer 3 000000 All Yes As programmed always never timed 2 hours until the first valid user code is entered Table 4 Access codes CP...

Page 18: ...fter a few seconds Figure 1 Login Enter the Installer code default code 000000 and click on the Login button to access the configuration pages Notes The communication with the control panel is always in secure mode https If at the first access to the control panel you receive the message the conncetion is not safe click on the Advanced button and then on Proceed defining the web site as safe IMPOR...

Page 19: ... was made Figure 2 Example of edited parameter indication Tooltip This copy of the programming data remains valid for the duration of the session Press Apply for the programming to become effective i e to be used by the control panel for operation Once the commissioning request has been confirmed the control panel reboots with the new configuration Figure 3 Control panel reboot with new configurat...

Page 20: ...t In this case the 10 minute maximum session time will start again The session is terminated after the available time has elapsed if no choice is made Figure 4 Session expired The next time you log in you will be asked whether to continue with the previous session or to start again with a new copy of the programming data 3 2 2 Entry the session with the time programmer enabled The following messag...

Page 21: ... 3 Home page Figure 5 Home page The Home page provides information on the control panel and its operation The navigation menu panel appears on the left It can be closed and reopened by clicking on the icon in the upper left corner ...

Page 22: ...battery Current Bus The current absorption of the BUS section supplied by the control panel Battery Charge This indicates the absorption of the control panel battery Optional modules This shows the optional modules installed in the control panel form of icon PSTN interface GSM or 4G interface ZigBee interface WiFi interface The icon colour of each module indicates its status GREY Disabled The modu...

Page 23: ...n check the input and output status interact with scenarios and sectors perform tests measure current and voltage on the devices get information on connectivity simulate calls and send notifications view the event history etc to check the system during installation or perform remote diagnostics in case of anomalies UTILITY This can be used to export and import system programming 3 3 3 Application ...

Page 24: ...rt menu so you can easily revert to the initial setup if needed 3 4 4 Configuring parameters The parameters are configured within the submenus or their sections The following operations can be performed according to the parameter Activayion of the parameter The parameter or function can only take on two states active or inactive To change the status just click on the slide switch icon Parameter se...

Page 25: ... as to manage the daylight saving time switch in countries where it is adopted Usage Mode sets the control parameters to check compatibility of the configuration of the control panel with the safety levels according to EN 50131 IMPORTANT Set Mode 3 to maintain compliance with EN 50131 Grade 3 Set Mode 2 to maintain compliance with EN 50131 Grade 2 The Anti theft Code function is used to create a s...

Page 26: ...e The time is displayed in 12 hour format e g 3 30 PM o European The time is displayed in 24 hour format e g 15 30 Time Automatic Update The clock is synchronised using an NTP Network Time Protocol server The server address is predefined and the control panel must be connected to the Internet The time display format is determined by the Geographic Zone set in the Parameters menu In this mode the s...

Page 27: ...isconnects and the login page must be accessed again 4 If there are no updates available it appears IMPORTANT Wait a few minutes before logging in again 4 1 4 Control Unit Update from File It is accessed through the CONFIGURATION Central Unit Global Parameters menu Figure 10 Firmware and software update To update the firmware or software 1 Click on the corresponding Load File button and select the...

Page 28: ...rs at the end of the various modules 4 2 1 Phone General Parameters This can be used to configure the operating parameters that concern all types of telephone connection It is accessed through the CONFIGURATION Central Unit Optional Modules menu Figure 11 General telephone parameters The menu shows the following items and can be used to set Line Priority If the control panel can make the telephone...

Page 29: ...ll call the next number and so on until the event to be transmitted is correctly sent received or until the attempts are finished if the calls are not successful If the Remote Surveillance Backup function is disabled the dialler will call all the programmed numbers regardless of the received replies Contact ID Supervision This determines whether the CID supervision function must be activated The s...

Page 30: ...section following the sequence of calls The time interval between calls is the technical time to enter the new number How to stop the call cycle A telephone call cycle cannot be stopped once it has started and the system will continue to call the given number until the end of the attempts Otherwise dial 12 on the phone during the message According to the value of the Stop Cycle of calls by Code pa...

Page 31: ...on alarm Number Power failure alarm sector status For the sake of simplicity in this example we will assume that no called number picks up when a called number picks up it is deleted from the call cycle for that event Event Mode 1 cycle Mode 2 cycle System arming intrusion alarm Disarming with hold up code Power failure alarm and intrusion alarm shortly after intrusion intrusion Mains failure alar...

Page 32: ...ule is installed in the control panel If available indicates whether 2G or 4G Enable Module this can be used to enable and disable the GSM module SIM Expiry This can be used to enter the expiration date of the prepaid SIM Card to receive an alert for the event It is advisable to set the month before the actual expiry date for example set March if the SIM Card expires in the month of April Reset th...

Page 33: ...the chosen operator to make a correct connection Number In Italy the default displayed string 99 1 works in most cases User Name the field can be left blank unless otherwise specified by the network operator Password Leave blank unless otherwise specified by the operator Interval of GSM Line Availability This can be used to set every how many minutes the GSM line presence is checked Number of Retr...

Page 34: ...he module is installed in the control panel PSTN Firmware Version This displays the firmware version of the PSTN module Enable PSTN Module This can be used to enable and disable the PSTN module Phone Network This can be used to automatically set the technical parameters for connection to the telephone network in use simply by selecting the country to which the network belongs Control Tone of Free ...

Page 35: ... the Interval of PSTN Line Availability is run Number of Retries This can be used to set the number of consecutive failed attempts after which the PSTN Fault event is generated IMPORTANT To ensure conformity to EN 50136 2 it is necessary to enable the PSTN line presence test and to set the PSTN line presence interval and number of attempts for a total of not more than 30 minutes if 25h PSTN Test M...

Page 36: ...e from File for more details 4 2 4 ZigBee Module This can be used to configure the operating parameters that concern the wireless links with ZigBee communication protocol It is accessed through the CONFIGURATION Central Unit Optional Modules menu Figure 14 ZigBee module The menu shows the following items and can be used to set ZigBee Module Availability This indicates that the module is installed ...

Page 37: ... not mandatory but strongly recommended It is accessed through the CONFIGURATION Central Unit Automated Test menu Figure 17 Cyclical alert The menu shows the following items and can be used to set Cyclic Notification Mode This determines how the alert is performed The possible options are o Disarmed No control indications is made o 24 on 24 The check is run even when the system is off at the time ...

Page 38: ... To go directly to the type of connectivity you are interested in without manually scrolling through the submenu page click on the LAN Port Parameters Wi Fi Parameters Cloud links located below the title 4 4 1 LAN Port Parameter This can be used to configure the operating parameters of the LAN connection of the control panel It is accessed through the CONFIGURATION Central Unit Connectivity menu F...

Page 39: ...rimary DNS is unreachable The default value is 8 8 4 4 Google 4 4 2 WiFi Parameter This can be used to configure the operating parameters of the control panel WiFi connection wireless connection of devices based on IEEE 802 11 standards including modem routers It is accessed through the CONFIGURATION Central Unit Connectivity menu Figure 20 WiFi parameters The menu shows the following items and ca...

Page 40: ...isable the Cloud connection IMPORTANT The functions offered by the Elkron Cloud require that the UID of the control panel has been associated with an installer registered to Elkron Cloud services 4 5 Bus Peripherals This function can be used to configure all the devices connected to the bus of the control panel All devices have a unique serial number through which the control panel is able to reco...

Page 41: ...ion This can be used to add replace remove and configure the PrIO expansions connected to the bus It is accessed through the CONFIGURATION Bus Peripherals menu Figure 23 Expansions The list of all expansions which are part of the system is displayed in table form Missing expansion modules are highlighted by a message under the table titles The following information is provided for each expansion m...

Page 42: ...if their number is greater than the number that can be displayed in a single screen 4 5 3 Radio Expansions This can be used to add replace remove and configure the wireless receivers connected to the bus It is accessed through the CONFIGURATION Bus Peripherals menu Figure 24 Wireless receivers The available parameters and functions are the same as those of the expansions paragraph 4 5 2 to which y...

Page 43: ...d to add replace remove and configure proximity readers connected to the bus It is accessed through the CONFIGURATION Bus Peripherals menu Figure 27 Readers The available parameters and functions are the same as those of the expansions paragraph 4 5 2 BUS Expansion to which you can refer for descriptions Select the desired inserter and press the key acquisition button to acquire the DK70 proximity...

Page 44: ...whether the sensor is enabled or disabled When the sensor is disabled the lettering is light grey TYPE This shows the sensor model SERIAL This shows the unique identifier of the recognised wireless device Read only data RECEIVER Physical address of the radio receiver that acquired the radio device Double click on the device control line to open a pop up window that can be used to enable and disabl...

Page 45: ... Commands It is accessed through the CONFIGURATION Radio Peripherals menu Figure 31 Remote controls The available parameters and functions are the same as those of the sensors paragraph 4 6 1 Inputs to which you can refer for descriptions 4 6 4 Keypads This is used to enable or disable the wireless keypads It is accessed through the CONFIGURATION Radio Peripherals menu Figure 32 Wireless keypads T...

Page 46: ... 7 1 Detectors with Camera This can be used to enable disable and delete ZigBee photo sensors It is accessed through the CONFIGURATION Zigbee Peripherals menu Figure 34 ZigBee photo sensor The list of all ZigBee photo sensors in the system is displayed in table form Missing photo sensors are highlighted by a message under the table titles The following information is provided for each photo sensor...

Page 47: ...umber is greater than the number that can be displayed in a single screen 4 7 2 Detectors with Video Camera This can be used to enable and disable the ZigBee video sensors It is accessed through the CONFIGURATION Zigbee Peripherals menu Figure 35 ZigBee video sensor The available parameters and functions are the same as those of the photo sensors paragraph 4 7 1 to which you can refer for descript...

Page 48: ...sable the ZigBee relay modules It is accessed through the CONFIGURATION Zigbee Peripherals menu Figure 38 ZigBee relay modules The available parameters and functions are the same as those of the photo sensors paragraph 4 7 1 to which you can refer for descriptions 4 7 6 Shutter modules This can be used to enable and disable the ZigBee shutter modules It is accessed through the CONFIGURATION Zigbee...

Page 49: ...d functions are the same as those of the photo sensors paragraph 4 7 1 to which you can refer for descriptions 4 7 8 Thermoregulation This can be used to enable and disable temperature control devices timer thermostats or thermostatic valves It is accessed through the CONFIGURATION Zigbee Peripherals menu Figure 41 Heat adjustment The available parameters and functions are the same as those of the...

Page 50: ...tifies point 3 of expansion 1 DESCRIPTION This is the description of the PrIO The field is read only and must be edited in the PROGRAMMING Input Output menu ENABLED This indicates whether the point is enabled or disabled When the point is disabled the lettering is light grey MODE This shows whether the point is configured as an input or output INPUT TYPE This applies only to inputs and shows the t...

Page 51: ...cutting wires Fault or masking Table 11 States recognised by different balancing types o Shade This must be used when a specific detector for roller shutters is connected to the input The movement of the shutter opening or closing makes the detectors generate a series of pulses proportional to the movement of the shutter The control panel monitors two configurable parameters number of pulses and p...

Page 52: ...at can be displayed in a single screen 4 8 1 Balance customizations Press the Advanced settings button placed at the bottom of the table you can access the input customisation that can be used to customise in eight different ways both the sensor wiring mode and the resistive value of the single balancing resistors used Figure 43 Balancing customisations The list of balance customisations is displa...

Page 53: ...sistive value of the resistor named R1 according to the suggested diagram here Resistance R2 KΩ Enter the resistive value of the resistor named R2 according to the suggested diagram here Resistance R3 KΩ Enter the resistive value of the resistor named R3 according to the suggested diagram here To know the value of each resistor refer to the colour code or measure with a multimeter selecting the re...

Page 54: ...is converted into an audio file for use in voice messages The description can be up to 32 characters long chosen from alphabetical characters including accented characters numbers and space no other characters such as special characters or symbols can be used ACTIVATION MODE This indicates how the sector must behave if at the insertion of the intrusion detection system one or more associated intru...

Page 55: ...age etc and configure the Arming Mode The text entered in Description is used to generate the voice messages Use only alphabetic characters including accented characters numbers and spaces Click on the Save button to save the changes the Close button to close the window and not save the changes The following buttons some are enabled only by highlighting a sector of the table are shown below Modify...

Page 56: ...RM This is the alarm output activation time in seconds e g the time for which the sirens sound for intrusion alarms IMPORTANT The minimum alarm time for an EN 50131 certified system is 90 seconds TAMPER ALARM This is the alarm output activation time in sectors e g the time for which the sirens sound for burglar alarms TECHNOLOGICAL ALARM This is the activation time of the alarm outputs for technic...

Page 57: ...w that can be used to edit the various times The range of valid values for that field is indicated in square brackets next to each input box Click on the Save button to save the changes the Close button to close the window and not save the changes The following buttons some are enabled only by highlighting a sector of the table are shown below Modify This can be used to edit the times of the secto...

Page 58: ...evice This allows the user to enter and disarm the intrusion detection system without the alarm going off o Entrance Delay 2 As Entrance Delay 1 but with Entrance Delay 2 delay time o Entrance Delay 3 As Entrance Delay 1 but with Entrance Delay 3 delay time o Manumission The opening of the input generates the Tamper event regardless of the sector arming status The input is active H24 o Technologic...

Page 59: ... Entrance specialised inputs belonging to other sectors are instead managed independently each with its own Entrance Delay 1 time o Last Exit The closing of the input interrupts all the possible active Exit Path times of the sectors associated with it it brings them to zero This interruption occurs with about 5 seconds delay compared to the real closing of the input to prevent the involuntary gene...

Page 60: ...have the same specialisation The alarm is generated only if both are kept open for the time defined by Timeout AND the first input to be opened may be closed again in the meantime AND TIMEOUT This shows the time interval within which two intrusion inputs logically connected with AND Input must both have been opened for the intrusion alarm to be triggered CATEGORY This defines which type of icon is...

Page 61: ...indow and not save the changes The following buttons some are enabled only by highlighting an input of the table are shown below Modify This can be used to edit the input configuration highlighted in the table CSV This can be used to export the inputs table to a csv file which can be opened with a spreadsheet PDF This can be used to export the inputs table to a PDF file The and buttons at the bott...

Page 62: ...Blink types EVENTS HISTORY If the parameter is activated the activation of the output is recorded in the Event History REMOTE ACTIVATION BY APP This enables the output to be controlled remotely via app FOLLOWS OUTPUT This shows any other output whose activation activates the output being configured OUTPUT GROUPS This indicates the groups to which the output is associated CATEGORY This defines whic...

Page 63: ...dow and not save the changes The following buttons some are enabled only by highlighting a sector of the table are shown below Modify This can be used to modify the configuration of the output highlighted in the table CSV This can be used to export the outputs table to a csv file which can be opened with a spreadsheet PDF This can be used to export the outputs table to a PDF file The and buttons a...

Page 64: ...ollowing buttons some are enabled only by highlighting a sector of the table are shown below Modify This can be used to modify the configuration of the output highlighted in the table CSV This can be used to export the outputs table to a csv file which can be opened with a spreadsheet PDF This can be used to export the outputs table to a PDF file The and buttons at the bottom right are used to nav...

Page 65: ... the event line opens a pop up window in which you can select from a drop down menu one or more outputs to be activated should that event occur To select multiple outputs click on each of them To deselect the output just click on it Figure 54 Association of outputs to control panel statuses The following buttons appear under the table Modify This can be used to edit the outputs associated with the...

Page 66: ...indow in which you can select from a drop down menu one for each enabled sector one or more outputs to be activated should that event occur To select multiple outputs from the same sector click on each of them To deselect the output just click on it Figure 56 Association of outputs to sector statuses The following buttons appear under the table Modify This can be used to edit the outputs associate...

Page 67: ...g sectors of the system o ON The scenario activates the associated sectors o OFF The scenario deactivates the associated sectors o Switch The scenario switches the status of the associated sectors if active it deactivates them and vice versa ASSOCIATED SECTORS This shows the list of sectors associated with the scenario OUTPUT ASSOCIATION This shows the action performed on the associated output The...

Page 68: ...he scenario Associated Sectors by selecting them one by one or selecting them all by clicking the All button The None button deletes all associations To delete a single association click on the sector number Define what the scenario will do on the associated output Output Action Define any associated output associated Output Define what the scenario will do on the associated output group Output Gr...

Page 69: ...racters long chosen from alphabetical characters including accented characters numbers and space no other characters such as special characters or symbols can be used ASSOCIATED SECTORS This is the list of sectors with which the user code can interact to activate or deactivate the intrusion alarm system ACCESS CONTROL OUTPUT This is the output that is activated when the user code is entered SYSTEM...

Page 70: ...ed according to time and day slots Restore the default numeric value of the code if you have forgotten the custom numeric value To do this just click the Set factory Code button and confirm the action for default code values see paragraph 2 1 1 Click on the Save button to save the changes the Close button to close the window and not save the changes IMPORTANT Users created in this way must be enab...

Page 71: ...r symbols can be used ASSOCIATED SECTORS This is the list of sectors with which the user key can interact to activate or deactivate the intrusion alarm system ACCES CONTROL OUTPUT This is the output that is activated when the user key is entered SYSTEM ACTION This shows the actions that the user key can perform on the intrusion detection system limited to the associated sectors The possible option...

Page 72: ...he sector number Associate the key with an output that is activated when the user code is entered access Control Output Determine the actions that the key can perform on the intrusion detection system System Action Associate the key with a Group which can be enabled or disabled according to time and day slots Click on the Save button to save the changes the Close button to close the window and not...

Page 73: ... This is the alphanumeric label used to identify the recipient more easily It can be up to 32 characters long ASSOCIATED SECTORS The sectors associated with the phone number SEND TYPE Type of communication used The possible options are o Voice Call The alarm messages are sent in voice form The messages are built from files generated with the Genera audio submenu o SMS The alarm messages are sent a...

Page 74: ...king the All button The None button deletes all associations To delete a single association click on the sector number Enter the phone number Phone Valid characters numbers and Do not insert spaces Choose the message Base Message used at the beginning of each text or voice message you send Define the number of call attempts Retries to be made on the number If Contact ID was chosen as Format then i...

Page 75: ...sable the secondary IP address SIAIP Secondary Path Enter the code SIAIP Account Code with which the MEDEA control panel is recognised by the SIA server This information is provided by the security company that will carry out the service Click on the Save button to save the changes the Close button to close the window and not save the changes The following buttons appear under the table Modify Thi...

Page 76: ...IP receiver Supervision Supervision is a DC 09 message that is sent periodically to the receiver at an interval of time equal to that set to check reachability If the security company does not respond the control panel classifies it as a system failure If Disabled is selected no check is performed IMPORTANT To ensure compliance with EN 50136 2 supervision must be enabled if SP6 for a time not exce...

Page 77: ...t at the beginning of voice and text communications when paired with a phone number Figure 68 Common messages for voice and text communications Double click on a common message to open a pop up window in which you can enter the Description i e the text that will be sent as a text or voice message The description can be up to 80 characters long chosen from alphabetical characters including accented...

Page 78: ...al characters or symbols can be used The various descriptions are sent to the Elkron Cloud which via Google Cloud Services transforms them into audio files The audio files are then sent back to the control panel and saved only in the control panel These audio files are not transferred with the data export and import procedures see paragraph 3 3 3 Utility import Export menu The function is accessed...

Page 79: ...the following information for each event NUMBER This is the sequential number attributed to the event EVENT This is the alphanumeric label used to identify the event CONTACTS The phone numbers or IP addresses associated with the event PUSH E MAIL If the PUSH E MAIL function is enabled the control panel sends an alert to the Elkron Cloud for the event The user can then choose among the PUSH E MAIL ...

Page 80: ...f the contacts will be followed with equal priority The priority applies only to uniform types of mail However data alerts and SMS always take priority over voice calls Activate and deactivate the Push E mail function Click on the Save button to save the changes the Close button to close the window and not save the changes IMPORTANT To ensure compliance with EN 50131 all intrusion hold up failure ...

Page 81: ...fy This can be used to edit the program or action or day etc highlighted in the table CSV This can be used to export the table data to a csv file which can be opened with a spreadsheet PDF This exports the table data to a PDF file The and buttons in the bottom right are used to navigate between table pages 5 14 1 Scheduler configuration procedure To configure the time scheduler 1 Define how many d...

Page 82: ...ions Figure 76 Daily schedule actions Double click on the first action of the day Figure 77 Daily schedule action customisation In the pop up window that opens enter the time Hours and Minutes when the action is to take place Define which action Action will be executed at the set time When you choose the action type specific fields are automatically activated for selecting the parameters specific ...

Page 83: ...d group All the keys of the group obey the same choice within their prerogatives Lock the key is inhibited Insert only the key can only be used to arm the intrusion alarm Unlock the key can be used to perform all the permitted actions Scenario This activates the selected scenario None no scenario selected All scenarios of the system are listed Table 13 Possible actions of the daily schedule NOTES ...

Page 84: ...be up to 32 characters long the date Day and Month of the holiday and the schedule to be run on that date Click on the Save button to save the changes the Close button to close the window and not save the changes Repeat the operation for all the holidays on which you want to run a different schedule from the one planned for that day of the week according to the weekly schedule 6 In the Recurring H...

Page 85: ...o other characters such as special characters or symbols can be used Double click on the expansion line to open a pop up window where you can type the alphanumeric label Description that is used to more easily identify the expansion module The label can be up to 32 characters long The following buttons appear under the table Modify This can be used to modify the description of the expansion highli...

Page 86: ... always possible to view the status of the system by entering a valid code When you return to the default display the display will still last for about 20 seconds and then turn off IMPORTANT Do not enable masking to maintain EN 50131 compliance BUZZER If the function is enabled the buzzer will signal the elapsing of any Entrance Path x and Exit Path times IMPORTANT EN 50131compliance will be cance...

Page 87: ...ority over any scenario associated with the button Click on the Save button to save the changes the Close button to close the window and not save the changes The following buttons appear under the table Modify This can be used to modify the configuration of the keypad highlighted in the table CSV This can be used to export the keypad table to a csv file which can be opened with a spreadsheet PDF T...

Page 88: ...NARIO This shows the scenario paired to LED 1 LED2 SCENARIO This shows the scenario paired to LED 2 LED3 SCENARIO This shows the scenario paired to LED 3 LED4 SCENARIO This shows the scenario paired to LED 4 GONG This enables the reader buzzer to perform the Gong function MASKING If the masking function is enabled the system status active or inactive is not permanently displayed leaving the LEDs o...

Page 89: ...MEDEA Programming Manual 87 Double click on the inserter line to open a pop up window Figure 84 Reader customisation ...

Page 90: ... a csv file which can be opened with a spreadsheet PDF This can be used to export the readers table to a PDF file Locate This activates the procedure for locating the device End Locate This ends the localisation procedure The and buttons at the bottom right are used to navigate between the pages of the readers if their number is greater than the number that can be displayed in a single screen 5 18...

Page 91: ...cters including accented characters numbers and spaces Enable or disable the wireless module wireless supervision Click on the Save button to save the changes the Close button to close the window and not save the changes The following buttons appear under the table Modify This can be used to configure the wireless module highlighted in the table CSV This can be used to export the wireless modules ...

Page 92: ...sed to export the wireless sirens table to a PDF file It is possible to activate system status signalling on radio sirens Under Signal Type select the option from Nothing Optical and Optical and Acoustic 5 21 Remote controls This can be used to view the remote controls of the system It is accessed through the PROGRAMMATION Radio Peripheral Remote Command menu Figure 89 Remote controls The table sh...

Page 93: ...tion click on the sector number Associate the scenario with the Key A Key B and Key C The key D can perform two functions If a scenario is entered in the Key D field and the Key D Action field has the value None pressing button D will launch the indicated scenario If there is a value other than None in the Key D Action field pressing button D will launch the action panic alarm silent panic emergen...

Page 94: ...pads of the system It is accessed through the PROGRAMMATION Radio Peripheral Wireless Keypads menu Figure 92 Wireless keypads The table shows NUMBER This is the sequential number of acquisition of the wireless keypad PHYS ADDRESS This is the physical address of the wireless keypad DESCRIPTION This is the alphanumeric label used to identify la wireless keypad more easily SECTORS This shows the sect...

Page 95: ...ATION Zigbee Peripheral Zigbee repeaters menu Figure 94 ZigBee repeaters The table shows NUMBER This is the sequential number of acquisition of the repeater PHYS ADDRESS This is the physical address of the repeater DESCRIPTION This is the alphanumeric label used to identify the repeater more easily ZIGBEE SUPERVISION This shows whether supervision is enabled or disabled Double click on the repeate...

Page 96: ...d Double click on the flasher line to open a pop up window Enter the identification label of the flasher in Description Use only alphabetic characters including accented characters numbers and spaces Enable or disable ZigBee supervision of the flasher The following buttons appear under the table MODIFY This can be used to configure the flasher highlighted in the table CSV This can be used to expor...

Page 97: ... for the shutter modules APERTURE TIME This is the pre set time for opening the shutter CLOSURE TIME This is the pre set time for closing the shutter Double click on the flasher line to open a pop up window where it is possible to enter the identification label of the module in Description Use only alphabetic characters including accented characters numbers and spaces The following buttons appear ...

Page 98: ...easily SECTORS This displays the sectors associated with the scenario control device BUTTON 1 Scenario associated with button 1 BUTTON 2 Scenario associated with button 2 BUTTON 3 Scenario associated with button 3 BUTTON 4 Scenario associated with button 4 ZIGBEE SUPERVISION This shows whether supervision is enabled or disabled Figure 98 ZigBee scenario controls Double click on the flasher line to...

Page 99: ...the alphanumeric label used to identify the photo sensor more easily PHOTOS NUMBERS This shows how many photos are taken in case of an alarm PHOTOS QUALITY This shows the resolution high or low with which to take the picture a high resolution picture needs a longer transmission time PHOTOS COLORS This shows if the photo will be colour or greyscale ZIGBEE SUPERVISION This shows whether supervision ...

Page 100: ...YS ADDRESS This is the physical address of the video sensor DESCRIPTION This is the alphanumeric label used to identify the video sensor more easily ZIGBEE SUPERVISION This shows whether supervision is enabled or disabled Double click on the video sensor line to open a pop up window Figure 102 ZigBee video sensor In the pop up window you can Enter the identification label of the video sensor in De...

Page 101: ...is is the sequential number of acquisition of the camera ENABLED This shows whether the camera is enabled DESCRIPTION This is the alphanumeric label used to identify the IP camera more easily TYPO This is the type make of the camera IP ADDRESS This shows the IP address of the camera USERNAME This is the user name used to log in to the camera PASSWORD This is the access code of the camera NUMBER OF...

Page 102: ...stored in the event of an alarm The Configure button provides access to the configuration page of the camera when connected locally The Test Presence Test button is used to verify the presence of the camera on the network at the configured address The following buttons appear under the table Add This can be used to add a new camera Modify This can be used to configure the camera highlighted in the...

Page 103: ...CS Central Unit menu Figure 105 Control panel status The Power supplies table shows the following values Power supply Output voltage from the control panel power supply unit Battery Voltage at the battery terminals Bus 1 Voltage present at power terminals of BUS 1 Bus 2 Voltage present at power terminals of BUS 2 V1 Voltage present on terminals V1 and V1 V2 Voltage present on terminals V2 and V2 S...

Page 104: ...Mobile Network ZigBee PSTN indicating whether each one is Present Enabled Connected and if there are any anomalies Figure 110 Operator search If 2G or 4G modules are present and enabled press the Search Operators button on the control panel to search for the available operators with their network coverage where the control panel is installed This important function can be used to select the best S...

Page 105: ...mentary Power Supplies table shows the following values LOGIC ID Logical address assigned to the power supply unit DESCRIPTION This is the alphanumeric label used to identify power supply unit more easily POWER SUPPLY VOLTAGE Voltage measured at power supply unit output terminals PS BATTERY VOLTAGE Voltage measured at the battery terminals BATTERY CHARGE CURRENT Current drawn by the battery for ch...

Page 106: ... PDF file 6 1 5 Radio Peripherals This can be used to view all the information and all the values related to the wireless devices and automatically enables the walk test procedure to test the quality of the wireless link with the peripheral devices It is accessed through the DIAGNOSTIC Radio Peripherals menu Figure 114 Wireless devices The Radio Peripherals table shows the following values CATEGOR...

Page 107: ...to 100 expressed as a percentage This indicates that communication is optimal values between 50 and 100 This indicates that the communication with the control panel is not optimal values between 0 and 49 BATTERY STATUS This indicates the battery status of the wireless devices TAMPER This indicates whether there is a tamper condition on the device Tamper OK Tamper open Tamper not available The foll...

Page 108: ...list of inputs to a PDF file R reset the open input memory The and buttons in the bottom right are used to navigate between table pages 6 1 8 Output This enables and disables individual outputs It is accessed through the DIAGNOSTIC INPUT OUTPUT menu Figure 117 Manual activation of the outputs The following information is included in the table concerning the outputs LOGIC ID This shows the logical ...

Page 109: ...y menu Figure 118 Events Events are shown in reverse chronological order from most recent to oldest The date and time and the self explanatory description of the event itself are shown for each event Inputs and outputs involved are specified with their logical identifier Keyboards readers and concerned sectors are specified with their physical address When configured the custom description of the ...

Page 110: ... previous tests fail check the devices involved and the programming and repeat the test 7 UTILITY 7 1 UTILITY Menu The UTILITY menu can be used to save the programming of the system and reload it in the control panel Importantly the control panels must be of the same size EXPORT can be used to export the programming IMPORT can be used to import in the control panel a previously saved programming 8...

Page 111: ...hes between upper and lower case characters The following table shows the characters and symbols associated with each button Button Upper case Lower case 1 1 İ 1 İ 2 AB C 2 a b c 2 3 D E F 3 d e f 3 4 G H I 4 g h i 4 5 J K L 5 j k l 5 6 M N O 6 m n o 6 7 P Q R S 7 p q r s 7 8 T U V8 t u v 8 9 W X Y Z 9 w x y z 9 0 whitespace _ 0 whitespace _ 0 Table 15 Buttons and associated characters Press to de...

Page 112: ...the settings M Not armed Enable Installer Users Keys etc M T Not armed Run tests System Status menu page 111 Open Tamper menu page 111 Alarms Memory menu page 112 Tamper Memory menu page 113 Settings menu page 116 Enable menu page 117 Test menu page 118 Connectivity menu page 119 Output control menu page 120 Maintenance menu page 121 OK OK OK OK OK OK OK OK OK OK OK OK UT01 MASTER ALARMS MEM OK Ta...

Page 113: ...d O sector disarmed with open inputs Use the and buttons to change the status Click on OK to confirm IMPORTANT If open inputs or faults are present acknowledge with OK or ignore with ON 8 7 Open Input Tamper menu This shows whether there are open or tamper inputs Available for Master Installer User It is accessed through the Main menu OPEN TAMPER menu If there are no open inputs the display shows ...

Page 114: ...gh the various submenu screens The first screen shows the complete description of the alarm Long descr the physical address of the input d in where d is the device with UC control panel EP expansion module KP keypad DK key reader and in is the identification in the device and the custom description Label The second indicates the concerned sector The third screen shows the input type and the physic...

Page 115: ...ing event Use the and buttons to scroll through the various submenu screens The first screen shows the complete description of the tampering event Long descr the physical address of the device UC control panel EP expansion module KP keypad DK key reader and the custom description Label The second indicates the concerned sector The third shows the device type Device Press the ESC button to go back ...

Page 116: ... Press the OK button to open the submenu to display the details of the fault memory On the first screen there is the complete description of the fault Long descr the indication of the sector or physical address of the device affected by the fault ind and the custom description Label Press the ESC button to go back to the fault memory list You can clear the entire stored fault list by pressing the ...

Page 117: ...oll through the various submenu screens On the first screen there is the complete description of the fault Long Descr the indication of the possible sector or physical address of the device affected by the event ind and the custom description Label The second screen shows the concerned sector and the third screen shows the sector or physical address of the device affected by the event ind and the ...

Page 118: ...ATION SETTINGS TIME DATE M U T R Isolate the inputs SETTINGS CHANGE CODE SETTINGS USERS SETTINGS KEYS SETTINGS PROGRAM HOURLY SETTINGS CONTACTS M T Set time and date of the control panel M T U R Change your code only M U T Configure users M T Configure keys M T Configure the time scheduler M T Configure phone numbers Isolation menu page 122 Time Date menu page 122 Users menu page 123 Keys menu pag...

Page 119: ...d disable the Technical Manager with the and buttons M Enable and disable users M Enable and disable keys M Enable and disable the time scheduler with the and buttons Enable User menu page 128 Enable Key menu page 128 PROGRAMMER OFF M This determines how the Installer code and Technical Manager code are disabled Use the and buttons to select the desired option MAI always enabled DOPO 2 ORE automat...

Page 120: ...t open the various inputs The open inputs will be listed in continuous cycle on the display with their physical address and description TEST BATTERY TEST M T Test the outputs Test the outputs M T Test the backup batteries of the control panel and the additional power supply unit INPUT TEST IN PROGRESS OUTPUT PANEL OUTPUT EXPANSIONS UC U1 R U001 OFF BATTERY TEST PANEL BATTERY TEST POWER PANELS TEST...

Page 121: ...CONNETTIVITY WIFI M T Configure the connection via LAN port CONNETTIVITY MOBILE DATA CLOUD ON STATE CONNETTIVITY M T Configure the WiFi connection M T Configure the data connection via cellular telephone network M U T Show the status of Ethernet WiFi mobile data and cloud connections with any assigned addresses Connectivity menu LAN port page 129 Connectivity menu WiFi page 131 Connectivity menu M...

Page 122: ...deactivated Use the and buttons to scroll through the output list The and buttons can be used to reverse the output status OUTPUT PANEL OUTPUT ESPANSIONS M T Show the outputs of the control panel activate and deactivate them OUTPUT KEYPAD OUTPUT CAP KEYPAD OUTPUT READERS OUTPUT WIRELESS M T Show the outputs of the expansion modules activate and deactivate them M T Show the outputs of the keypad ac...

Page 123: ... identification code Available for Master Installer It is accessed through the Main Menu SYSTEM INFO menu MAINTENANCE SYS LOG T Show system log MAINTENANCE PARTIAL RESET MAINTENANCE GLOBAL RESET T Press the OK button and follow the instructions to perform the partial reset See the Installation Manual for more information T Press the OK button and follow the instructions to perform the total reset ...

Page 124: ...er It is accessed through the Main Menu SETTING TIME DATE menu See paragraph 4 1 2 Date and TimeDate and for more details ISOLATION INPUTS ISOLATION In001 Descr ISOLATION In002 Descr In001 Descr ISOLATE OK ISOLATION TAMPER PANEL TAMPER PANEL ISOLATE OK If the input is already insulated the insulation can be removed If the tamper is already isolated the isolation can be removed TIME MODE AUTOMATIC ...

Page 125: ...T To ensure compliance with EN 50131 Grade 3 no system keypad must display the status of the system 8 22 Users menu This can be used to configure new users and edit existing ones Available for Master User user NAME item only Installer It is accessed through the Main Menu SETTING USERS menu Users can access the USERS menu and only edit their own user Description USERS CONFIGURE USERS CONFIGURE USER...

Page 126: ... menu CONFIG KEYS KExx Description SYSTEM ACTION ARM DISARM PAIR OUTPUT NONE For details on the individual parameters and the values which can be configured see section 5 10 Keys PAIR KEY associates the key to one or more readers Follow the instructions on the display to carry out the operation PAIR SECTORS KEYS GROUP 1 0 16 DESCRIPTION KEYS CONFIG KEYS PAIR KEYS OK OK ...

Page 127: ...ragraphs 5 11 Contacts and 5 13 Event alerts for more details Available for Master and Installer It is accessed through the Main Menu SETTING CONTATS menu CONTACT CN01 Description CONTACT CN16 Description SECTOR PAIRED DESCRIPTION SEND TYPO PHONE CONTACT ON BASIC MESSAGGE ATTEMPS 2 0 10 OK Limited to voice text voice text ...

Page 128: ... PROGRAMME OFF PROGRAMMES PROGRAMME PR01 Description NAME corresponds to DESCRIPTION ACTION HOURLY WEEKDAYS Notice before the intrusion alarm system is armed HOLIDAYS EASTER PROGRAMME 1 NONE OK PROGRAMME PR08 Description A WEEKDAY 7 SUNDAY DAY 1 NONE DESCRIPTION 1 HOLIDAYS 1 HOLIDAYS 32 PROGRAMME 1 NONE OK MONTH 1 NONE PROGRAMME 1 NONE EASTER 1 EASTER MONDAY OK OK OK OK OK OK Select the program wi...

Page 129: ...ou want to use with the button FUNCTION 1 LOCK Use the button to select whether to lock unlock or allow entry only for the selected code group G KEYS GROUP KEYS 1 1 1 16 Select the key group you want to use with the button FUNTION 1 LOCK Use the button to select whether to lock unlock or allow entry only for the selected key group SCENARIOS SCENARIO 1 NONE Select the scenario you want to use with ...

Page 130: ...accessed through the Main Menu ENABLE KEY menu If are no keys are present the following message will appear ENABLE USER ACCESS FROM APP YES CODE OFF Enable and disable remote access via app with the button Enable and disable the code with the button ENABLE USER UT03 Description ENABLE USER UT02 Description ENABLE KEY KEY OFF Enable and disable the button with the button ENABLE KEY KE02 Description...

Page 131: ...s connection modes If the connection is active the main parameter of the connection is also shown The data is read only Available for Master Installer It is accessed through the Main Menu CONNETTIVITY STATE CONNECTIVITY menu ENABLE REMOTE CONTROL REMOTE CONTROL DISABLED Enable and disable the remote control with the button ENAB REM CONTROL 02 Description ENAB REM CONTROL 01 Description OK OK IP LA...

Page 132: ...u CONNECTIVITY CONNECTIVITY PORTA LAN menu LAN PORT ON Change the parameter with the and buttons DHCP OFF IP 192 168 1 100 DNS SECOND 8 8 4 4 DNS PRIM 8 8 8 8 GATEWAY 192 168 1 1 SUBNET MASK 255 255 255 0 Change the parameter with the and buttons Press OK to enter the value This appear only if DHCP is disabled Press OK to enter the value This appear only if DHCP is disabled Press OK to enter the v...

Page 133: ...WIFI menu WIFI ON SSID NETW NAME PASSWORD GATEWAY 192 168 1 1 SUBNET MASK 255 255 255 0 IP 192 168 1 10 DHCP OFF DNS PRIM 8 8 8 8 DNS SECOND 8 8 4 4 Press OK to enter the value Press OK to enter the value This appear only if DHCP is disabled Change the parameter with the and buttons Press OK to enter the value This appear only if DHCP is disabled Press OK to enter the value This appear only if DHC...

Page 134: ...ys Log menu This can be used to examine and delete the list of stored events Available for Installer when the system is not armed It is accessed through the Main Menu MAINTENANCE SYS LOG menu MOBILE DATA ON APN SIM EXPIRY Press OK to enter the value This appear only if MOBILI is enabled Change the parameter with the and buttons Press OK to enter the value SYS LOG READ LOG 002 hh mm dd mm Descripti...

Page 135: ...date file names use the following conventions Update type Description File name Application Control panel software which manages the entire system _APPLICATION_ BIN Control panel Firmware of the control panel which manages the inputs and outputs of the control panel expansion modules keypads readers wireless receivers and supervised power supply units _CARRIER_BOARD_ BIN Expansion modules _EXP_MOD...

Page 136: ...EDEA Programming Manual Tel 39 011 3986711 Fax 39 011 3986703 www elkron com info elkron it Elkron è un marchio commerciale di URMET S p A Via Bologna 188 C 10154 Torino TO Italy www urmet com MADE IN ITALY ...

Reviews: