Note
To compliant the EN requirement, the system will only record
the same log and CID report 3 times continuously.
2.2 Operations
You can use the client keyfob, card, client software, or mobile
client to do arming, disarming, bypass, and zone disabling.
2.2.1 Arming
You can use keyfob, card, client software, mobile client to arm
your system.
After the arming command is sending to control panel, the sytem
will check the detector status. If the detector is in fault, you will
need to choose whether to arm the system with fault.
While the system is armed, the control panel will prompt the
result in 5s, and upload the arming report.
Figure 2-1 Arming Process
Access level of Arming
The user in level 2 or 3 has the permission to arm or partly arm
the system.
Arming Indication
The arming/disaring indicator keeps solid blue for 5s.
Reason of Arming Failure
• Intrusion detector triggered (excepts the detector on the exit
route).
• Panic alarm device triggered.
• Tampering alarm occurred.
• Communication exception
• Mian power supply exception
• Backup battery exception
• Alarm receiving fault
• Siren fault
• Low battery of the keyfob
• Others
50