MEDEA Programming Manual
69
5.10
User keys
This can be used to manage the user keys of the system.
It is accessed through the
PROGRAMMING
→ Keys
menu.
Figure 61 - User keys
The following information is shown for each user key:
•
NUMBER
: This is the sequential number of the user key.
•
DESCRIPTION
: This is the alphanumeric label used to identify the user key, e.g. with the user's name,
more easily. With the Generate audio function (
see paragraph 5.12 Audio
) the text entered is
converted into an audio file for use in voice messages. The description can be up to 32 characters
long, chosen from alphabetical characters, including accented characters, numbers and space; no
other characters, such as special characters or symbols, can be used.
•
ASSOCIATED SECTORS
: This is the list of sectors with which the user key can interact to activate
or deactivate the intrusion alarm system.
•
ACCES CONTROL OUTPUT
: This is the output that is activated when the user key is entered.
•
SYSTEM ACTION
: This shows the actions that the user key can perform on the intrusion detection
system, limited to the associated sectors. The possible options are:
o
Disabled
: The key does not perform any action on the sectors.
o
Insert/Deinsert
: The user key can insert or disarm the associated sectors.
o
Insert
: The user key can only enter the associated sectors.
o
Deinsert
: The user key can only disarm the associated sectors.
•
KEYS GROUP
: This associates the user key with a group of codes. The groups are used by the time
scheduler to enable and disable the associated keys for arming and disarming the intrusion alarm
system according to programmed schedules.