4/76
MP120
2.16.1 SYSTEM REQUIREMENTS ..................................................................................................................... 41
2.17
SYSTEM
T
EST
................................................................................................................................................. 41
2.18
EVENT
MEMORY
ERASING .......................................................................................................................... 41
3 – SYSTEM MANAGEMENT .................................................................................................................................... 43
3.1
SYSTEM
ACTUATION ...................................................................................................................................... 43
3.1.1 FULL ACTUATION THROUGH THE KEYBOARD .................................................................................... 43
3.1.2 FULL ACTUATION THROUGH THE electronic key oR TRANSPONDER KEY........................................ 43
3.1.3 PARTIAL ACTUATION THROUGH THE KEYBOARD .............................................................................. 44
3.1.4 PARTIAL ACTUATION THROUGH THE electronic key OR transponder KEY ......................................... 44
3.1.5 QUICK ACTUATION .................................................................................................................................. 44
3.2
DEACTIVATION ................................................................................................................................................ 45
3.2.1 Full deactivation THROUGH THE KEYBOARD ......................................................................................... 45
3.2.2 Full deactivation THROUGH THE electronic key OR THE transponder KEY............................................ 45
3.2.3 Partial deactivation THROUGH THE KEYBOARD .................................................................................... 45
3.2.4 Partial deactivation THROUGH THE electronic key oR transponder KEY ................................................ 45
3.2.5 DEACTIVATION UNDER Threat (ANTI-ROBBERY) ................................................................................. 45
3.2.6 ALARM BLOCK IN PROGRESS ................................................................................................................ 46
3.2.7 ENTERING AN INVALID CODE ................................................................................................................ 46
3.3
ENABLING ........................................................................................................................................................ 46
3.3.1 access code ENABLING ............................................................................................................................ 46
3.3.2 USER CODE Reset .................................................................................................................................... 47
3.3.3 ENABLING THE Installer code ................................................................................................................... 47
3.3.4 time programmer ENABLE ......................................................................................................................... 48
3.3.5 time programmer DISABLE ........................................................................................................................ 48
3.3.6 RESPONDER ENABLE ............................................................................................................................. 48
3.3.7 RESPONDER DISABLE ............................................................................................................................ 49
3.3.8 ENABLING REMOTE CONTROL THROUGH THE MODEM .................................................................... 50
3.3.9 DISABLING REMOTE CONTROL THROUGH THE MODEM ................................................................... 50
3.3.10 ENABLING REMOTE CONTROL THROUGH THE TELEPHONE .......................................................... 50
3.3.11 DISABLING REMOTE CONTROL THROUGH THE TELEPHONE ......................................................... 51
3.3.12 ENABLING SECTOR DEACTIVATION THROUGH remotE CONTROL ................................................. 51
3.3.13 DISABLING SECTOR DEACTIVATION THROUGH remotE CONTROL ................................................ 52
3.3.14 KEY ENABLE ........................................................................................................................................... 52
3.3.15 KEY DISABLE .......................................................................................................................................... 53
3.3.16 Call-Back ENABLE ................................................................................................................................... 54
3.3.17 Call-Back DISABLE .................................................................................................................................. 54
3.4
M
ODIF
YING
THE
ACCESS CODE
.......................................................................................................................... 55
3.5
D
ATE CHANGE
..................................................................................................................................................... 55
3.6
T
IME CHANGE
...................................................................................................................................................... 56
3.7
EVENT
MEMORY
READING ............................................................................................................................ 56
3.7.1 REFERRING TO THE EVENT MEMORY .................................................................................................. 56
3.7.2 InterpretING THE EVENT DATA ................................................................................................................ 57
3.7.3 ADDITIONAL INFORMATION FROM THE LEDS ..................................................................................... 59
3.8
T
ELEPHONE COMMUNICATOR
................................................................................................................................ 59
3.8.1 ProgrammING A telephone number ........................................................................................................... 59
3.8.2 VOCAL CALL BLOCK ................................................................................................................................ 59
3.9
R
EMOTE CONTROL USER
...................................................................................................................................... 60
3.9.1 REMOTE CONTROL PROCEDURE ......................................................................................................... 60
3.9.2 bypass answer ............................................................................................................................................ 61
3.10
P
OST
PONING
AUTOMATIC
SYSTEM
ACTUATION ...................................................................................... 61
3.11
KEYS ............................................................................................................................................................... 62
3.11.1 ProgrammING NEW KEYS ...................................................................................................................... 62
3.11.2 AcquiRING EXISTING KEYS ................................................................................................................... 63
3.11.3 KEY SPECIALIZATION ............................................................................................................................ 64
3.11.4 KEY CHECK ............................................................................................................................................. 65
3.11.5 ERASING ALL KEYS ............................................................................................................................... 65
3.11.6 ERASING ONE SINGLE KEY .................................................................................................................. 66
3.12
INPUT
EXCLUSION
AND
INCLUSION ........................................................................................................... 67
3.12.1 INPUT EXCLUSION ................................................................................................................................. 67
3.12.2 INPUT INCLUSION .................................................................................................................................. 67
3.13
P
ERIODICAL TESTS
............................................................................................................................................ 68
3.13.1 INPUT TEST ............................................................................................................................................. 68
3.13.2 OUTPUT TEST ......................................................................................................................................... 68