background image

AX Security Control Panel

UD11739B

Summary of Contents for AXHub

Page 1: ...AX Security Control Panel UD11739B ...

Page 2: ...ituation which if not avoided will or could result in death or serious injury Caution Indicates a potentially hazardous situation which if not avoided could result in equipment damage data loss performance degradation or unexpected results Note Provides additional information to emphasize or supplement important points of the main text i ...

Page 3: ...OFTWARE AND FIRMWARE ARE PROVIDED AS IS AND WITH ALL FAULTS AND ERRORS HIKVISION MAKES NO WARRANTIES EXPRESS OR IMPLIED INCLUDING WITHOUT LIMITATION MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL CONSEQUENTIAL INCIDENTAL OR INDIRECT DAMAGES INCLUDING AMONG OTHERS ...

Page 4: ...IVACY RIGHTS YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END USES INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION THE DEVELOPMENT OR PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS ANY ACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL CYCLE OR IN SUPPORT OF HUMAN RIGHTS ABUSES IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLIC...

Page 5: ...EEE directive Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union For proper recycling return this product to your local supplier upon the purchase of equivalent new equipment or dispose of it at designated collection points For more information see www recyclethis info 2006 66 EC battery directive This product contains a battery that cannot be ...

Page 6: ...se the Client Software 13 4 3 Use the Web Client 14 4 3 1 Communication Settings 14 4 3 2 Device Management 23 4 3 3 Partition Settings 29 4 3 4 Video Management 31 4 3 5 Permission Management 34 4 3 6 Maintenance 36 4 3 7 System Settings 37 4 3 8 Check Status 42 4 4 Use Mobile Client 43 4 4 1 Download and Login the Mobile Client 43 4 4 2 Activate Control Panel via Hik Connect 43 4 4 3 Add Control...

Page 7: ...e Keyfob 55 5 4 Use the Card 56 5 5 Use the Client Software 57 5 5 1 Accessing the Operation Page 57 5 5 2 Partition Operation 58 5 5 3 Zone Operating 58 5 6 Use the Web Client 58 5 6 1 Add Edit Delete Tag Card 59 5 6 2 Add Edit Delete Keyfob 59 5 6 3 Add Edit Delete User 60 5 6 4 Check Status 61 A Trouble Shooting 62 A 1 Communication Fault 62 A 1 1 IP Conflict 62 A 1 2 Web Page is Not Accessible...

Page 8: ... Started 63 A 5 Operational Failure 63 A 5 1 Failed to Enter the Test Mode 63 A 5 2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm Clearing Report 64 A 6 Mail Delivery Failure 64 A 6 1 Failed to Send Test Mail 64 A 6 2 Failed to Send Mail during Use 64 A 6 3 Failed to Send Mails to Gmail 64 A 6 4 Failed to Send Mails to QQ or Foxmail 64 A 6 5 Failed to Send Mails to Yahoo 64 ...

Page 9: ...to be changed when first connected Supports doorbell function The detector rings like a doorbell when it is triggered in disarming status Voice prompt Wi Fi settings in AP mode Configuration via Web client or mobile client Pushes alarm notification via messages or phone calls Note Only device containing 3G 4G communication method supports this function Views live videos and sends emails of alarm l...

Page 10: ...S G Wireless Device Connection Alarm Input 32 Alarm Output 32 Siren 2 Keyfob 8 Keypad 4 Tag reader 4 Partition 1 Interaction Audio Output 1 1 5W RF RF Frequency 433 868MHz depends on the model RF Modulation 2GFSK RF Distance 800m Open Area Wired Network Ethernet 10M 100M Self adaptive Cellular Network GPRS 3 4G Supports reporting push notification to ARC Cloud text notification via SMS and audio n...

Page 11: ...60Hz Max 0 3A Output 5V DC 2 0A Center positive Low voltage message 3 55V Output No outputs Current when on battery 300mA Battery Type Rechargeable Lithium ion polymer battery Model 765965 Nominal Voltage 3 8V Capacity 4520mAh 17 176Wh 24 hours to recharge to 80 Service No user serviceable parts inside Others Power 5 VDC 10 W Current Alarm current 300mA Non alarm current 240mA Consumption without ...

Page 12: ...el will generate and report logs If the ATS fault is detected the control panel will generate and report logs indicates the fault with Alert LED solid orange and prompts fault details when the system is disarmed by authorized users DP2 While the alarm receiving center is enabled The control panel will upload alarm report to the receiver center via the main path LAN or Wi Fi or the back up path 3G ...

Page 13: ...Log 1 4 Appearance Front Panel Figure 1 1 Front Panel Table 1 4 Front Panel Description No Indicator Name Description 1 AC Power Solid Green Power on Off Power off 2 Alert Solid Orange In the disarming status the LED indicates alarm such as panic alarm zone alarm tampering alarm etc and fault such as operation fault connection fault etc Note Voice notifications that are not allowed to be indicated...

Page 14: ...el is not bound to Hik connect account 4 Arm Disarm Solid Blue for 5 s Armed Note You can set the arming indicator continuously on when armed in the web client Not compliant the EN requirement Off Disarmed 5 Alarm Flashing Red Alarm Occurred Solid Red Device Tampered Off No Alarm Component and Interface Remove the rear cover and some of the components and interfaces are on the rear panel Figure 1 ...

Page 15: ...tton Use the function button to add wireless devices and check the RF signal While the control panel is not in the configuration mode press the function button on the side of the control panel once and trigger a peripheral device While the control panel is not in the configuration mode double press the function button and you can check the RF signal strength on the peripheral device Result RSSI Ac...

Page 16: ...ou can view the RF signal strength indication on the peripheral device Connect Locally Note Add the card or keyfob via the web client before adding peripheral device for clearing tampering alarm The distance between the control panel and wireless device should be less than 50 cm While the control panel is not in the registration mode press the function button on the side of the control panel once ...

Page 17: ... Client Alarm Settings Connect via Mobile Client Add a control panel to the mobile client On the control panel settings page Click scan the QR code on the wireless device or enter the serial No of the device Note For details refer to the chapter ofConfiguration Configuration via Mobile Client Add Peripheral to the Control Panel 3 Installation Steps 1 Loosen the screw on the rear cover Slide down t...

Page 18: ...t the power adapter to the control panel and a power outlet The power indicator turns green after about 30 s which means that the device is powered on Note The conditions of no SIM card no battery AC power off or network disconnected will cause Control Panel Fault Figure 3 4 Power On 5 Connect the Ethernet cable to an internet outlet While the device is added to a Hik Connect account the Link indi...

Page 19: ...the supervised premises only 4 Configuration Configure the security control panel in the web client or the remote configuration page in client software 4 1 Activation In order to protect personal security and privacy and improve the network security level you should activate the device the first time you connect the device to a network 4 1 1 Activate Device via Web Browser Use web browser to activ...

Page 20: ... iVMS 4200 client software from the supplied disk or the official website http www hikvision com en Install the software by following the prompts The device and the PC that runs the software should be in the same subnet Steps 1 Run the client software 2 Enter Device Management or Online Device 3 Check the device status from the device list and select an inactive device 4 Click Activate 5 Create an...

Page 21: ...the online devices 2 Find and select your device in online device list 3 Input new password admin password and confirm the password Caution STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing using a minimum of 8 characters including upper case letters lower case letters numbers and special characters in order to increase the security of your product A...

Page 22: ...ress in the address bar Note When using mobile browser the default IP Address is 192 168 8 1 The device must be in the AP mode Note When connecting the network cable with computer directly the default IP Address is 192 0 0 64 4 Use the activation user name and password to login Note Refer to Activation chapter for the details 4 3 1 Communication Settings Wired Network Settings You can set the devi...

Page 23: ... 6 Set correct DNS server address if the device needs to visit server via a domain name 7 Click Save Wi Fi You can set the Wi Fi parameters if there are secure and credible Wi Fi networks nearby Steps 1 Click Communication Parameters Wi Fi to enter the Wi Fi page Figure 4 2 Wi Fi Settings Page 2 Connect to a Wi Fi Manually Connect Input the SSID Wi Fi and Wi Fi Password select Encryption Mode and ...

Page 24: ...evice can upload alarm notifications to the alarm center Before You Start Insert a SIM card into the device SIM card slot Steps 1 Click Communication Parameters Cellular Data Network to enter the Cellular Data Network Settings page Figure 4 4 Cellular Data Network Settings Page 2 Enable Wireless Dial 3 Set the cellular data network parameters Access Number Input the operator dialing number User Na...

Page 25: ...r Center as 1 or 2 for configuration and slide the slider to enable the selected alarm receiver center Note Only if the alarm receiver center 1 is enabled you can set the alarm receiver center 2 as the backup channel and edit the channel parameters 3 Select the Protocol Type as ADM CID EHome SIA DCS SIA DCS ADM CID or PSTN CID to set uploading mode Note Standard DC 09 Protocol ADM CID The data pre...

Page 26: ...e Set the heartbeat interval with the range from 10 to 3888000 seconds EHome You do not need to set the EHome protocol parameters Figure 4 7 EHome SIA DCS or ADM CID You should select the Alarm Receiver Type as IP or Domain name and enter the IP domain name port number account code retry timeout period attempts heartbeat interval encryption arithmetic password length and secret key 18 ...

Page 27: ...rmat of DC 09 a key should be set when you configure the ARC The key would be issued offline by ARC which would be used to encrypt the message for substitution security PSTN CID You should enter the center name center number dialing times and select communication protocol transmission mode receiver account Figure 4 9 PSTN CID 4 Click Save Notification Push When an alarm is triggered if you want to...

Page 28: ...notifications when the user operate the device Note If you want to send the alarm notifications to the mobile client you should also set the Mobile Phone Index Mobile Phone Number and check the Notification Type Note For message notification in alarm receiving center select the center index before settings 3 Click Save Result Table 4 1 Options of Notifications Option Notification iVMS 4200 Alarms ...

Page 29: ... up connection or Wi Fi connection Set the device IP address subnet mask gateway and DNS server in the LAN Steps 1 Click Communication Parameters Hik Connect Registration to enter the Hik Connect Registration Settings page Figure 4 10 Hik Connect Registration Settings Page 2 Check Register to Hik Connect Note By default the device Hik Connect service is enabled You can view the device status in th...

Page 30: ...twork Cellular Data Network The system will select cellular data network only 5 Optional Change the authentication password Note By default the authentication password is displayed in the text box The authentication password should contain 6 to 12 letters or digits For security reasons an 8 character password is suggested which containing two or more of the following character types uppercases low...

Page 31: ...able the UPnP function and you don t need to configure the port mapping for each port and the device is connected to the Wide Area Network via the router Steps 1 Click Communication Parameters NAT to enter the page Figure 4 12 NAT Settings 2 Check the checkbox to enable UPnP 3 Optional Select the mapping type as Manual 4 Set the HTTP port and the service port 5 Click Save to complete the settings ...

Page 32: ...imer Ensure that timer is no longer than 45 seconds in order to comply with EN50131 1 Follow Zone The zone acts as delayed zone when it detects triggering event during system Entry Delay while it acts as instant zone otherwise Perimeter Zone The system will immediately alarm when it detects a triggering event after the system is armed There is a configurable interval timer between the alarm activa...

Page 33: ...expired 1 to 599 Seconds It can be used in places equipped with magnetic contacts that require access but for only a short period e g fire hydrant box s door or another external security box door Disabled Zone Alarms will not be activated when the zone is triggered or tampered It is usually used to disable faulty detectors 5 Enable Stay Arming Bypass Chime or Silent Alarm according to your actual ...

Page 34: ...d 3 Click and the Relay Settings window will pop up 4 Edit the relay name select a link event and set the output delay time duration Note If the relay has linked to the wireless output module the wireless output module information will be displayed in the Link Wireless Output Module area 5 Click OK Note After the relay is configured you can click Status Relay to view the output status Siren The si...

Page 35: ...d duration of the device is longer than the configured value 6 Click OK Note After the siren is configured you can click Status Siren to view the siren status Keypad You can set the parameters of the keypad that is enrolled to the control panel Steps 1 Click Device Management Keypad to enter the page Figure 4 16 Keypad Page 2 Click to enter the Keypad Settings page 3 Set the keypad name 4 Check th...

Page 36: ...ers of the tag reader that is enrolled to the control panel Steps 1 Click Device Management Card Reader to enter the page Figure 4 17 Tag Reader Settings 2 Click to enter the reader settings page 3 Set the tag reader name 4 Check the check box to enable the buzzer 5 Select the keypad linked partition 6 Set the Disconnectin Duration and the system determins connection fault if the disconnected dura...

Page 37: ...gs Definition Public partition is considered a special one which can be shared to other partitions It is usually applied to manage or control the public area related with other areas controlled by other partitions in one building Steps 1 Click Partition Management Public Partition to enter the page Figure 4 19 Public Partition Settings 2 Check the checkbox to enable the public partition function N...

Page 38: ...on of Delay 1 Delay 2 or Exit Delay respectively Delay 1 Delay 2 If you have set the delayed zone you can set the delayed time duration here Note The available time duration range is from 5s to 600s Exit Delay If you want to exit the zone without triggering the alarm you can set the exit delay duration Note The available time duration range is from 5 s to 600 s 4 Optional Set the following paramet...

Page 39: ...e public partition is enabled the partition 1 dose not support auto disarming Late to Disarm Enable the function and set the time If the alarm is triggered after the configured time the person will be considered as late Note You should enable the Panel Management Notification function in Communication Parameters Event Communication before enabling the Late to Disarm function Weekend Exception Enab...

Page 40: ... IP address and port No and select the protocol type 3 Enter the user name and password of the camera 4 Click OK 5 Optional Click Edit or Delete to edit or delete the selected camera Link a Camera with the Zone Steps 1 Click Wireless Device Zone to enter the configuration page Figure 4 22 Zone Management 2 Select a zone that you wish to include video monitoring and click the Settings icon 3 Select...

Page 41: ...parameters FTP Protocol FTP and SFTP are selectable The files uploading is encrypted by using SFTP protocol Server Address and Port The FTP server address and corresponding port User Name and Password The FTP user should have the permission to upload pictures If the FTP server supports picture uploading by anonymous users you can check Anonymous to hide your device information during uploading Dir...

Page 42: ...ut the better bandwidth is required 4 3 5 Permission Management Add Edit Delete User Administrator can add user to the security control panel edit the user information or delete the user from the security control panel You can also assign different permissions to the new user Steps 1 Click User Management User to enter the User Management page 2 To compliant the EN requirement slide the block to e...

Page 43: ...Delete a single user or check multiple users and click Delete to delete users in batch Note The admin and the setter cannot be deleted Add Edit Delete Keyfob You can add keyfob to the security control panel and you can control the security control panel via the keyfob You can also edit the keyfob information or delete the keyfob from the security control panel Steps 1 Click User Management Keyfob ...

Page 44: ...nt Card to enter the management page 2 Click Add and place a tag card on the tag card area of the control panel 3 Customize a name for the tag card in the pop up window 4 Select the card type and tag card linked partition 5 Select the permission for the tag card Note You should allocate at least a permission for the tag card 6 Click OK and the tag information will be displayed in the list Note The...

Page 45: ...is module Or you can select Custom and enter the custom command 1 64 characters 3 Click Diagnosis to start the operation 4 View the diagnosis result in the information box Export File You can export debugging file to the PC Steps 1 Click Maintenance Export File to enter the page Figure 4 28 Export File Page 2 Check the check box to enable the function 3 Click Export to save the debugging file in t...

Page 46: ... Arming When you enable the function during the device arming procedure the system will check the configured fault checklist When there is fault occurred during the arming procedure the procedure will be stopped Note PKG keypad and the keyfob do not support this function If this function is enabled the arming will fail if there is a fault It is necessary to eliminate the fault or close the Enable ...

Page 47: ...on is enabled when the linked network camera is disconnected an alarm will be triggered Battery Supervision If the option is enabled when battery is disconnected or out of charge the device will not upload events Wired Network Fault Check If the option is enabled when the wired network is disconnected or with other faults the alarm will be triggered Wi Fi Fault Check If the option is enabled when ...

Page 48: ...me Note While you synchronize the time manually or with the computer time the system records the log SDK Synchronization DST Management Click System Date and Time DST Management to enter the Time Management page Figure 4 30 DST Management You can enable the DST and set the DST bias DST start time and DST end time Security Settings SSH Settings Enable or disable SSH Secure Shell according to your a...

Page 49: ...e 2 Select a module from the list and click the Operation icon 3 Set the following parameters of the selected module Max Failure Attempts If a user continuously tries to authentication a password for more than the configured attempts permitted the keypad will be locked for the programmed duration Locked Duration Set the locking duration when the keypad is locked After the configured duration the k...

Page 50: ...e Standard Click System System Maintenance Certificate Standard to enter the certificate standard settings page You can switch between EN Standard and General Standard mode The device applies EN Standard by default Note When you select EN Standard the user permission and arming parameters will conform to the EN Standard Local Log Search You can search the log on the device Click System Log to ente...

Page 51: ...S and login the client before operating the security control panel Steps 1 Search and download Hik Connect mobile client from Google Play for Android or App Store for iOS 2 Optional Register a new account if it is the first time you use the Hik Connect mobile client Note For details see User Manual of Hik Connect Mobile Client 3 Run and login the client 4 4 2 Activate Control Panel via Hik Connect...

Page 52: ...Tap Manual Adding to enter the Add Device page Enter the device serial No with the Hik Connect Domain adding type 3 Tap to search the device 4 Connect to a network 1 Tap Add 2 Tap Wireless Connection on the Select Connection Type page 3 Follow the instructions on the Turn on Hotspot page and change the control panel to the AP mode Tap Next Note You need to remove the rear panel of the device and t...

Page 53: ... then log in to the device if required to enter the Partition page 2 Tap to enter the Scan QR Code page 3 Scan the QR code of the peripheral Note The QR code is usually on the back cover of the device 4 Optional If the QR code fails to be recognized tap and enter the serial number of the device and then select the device type Note The serial number is usually on the back cover of the device 5 Tap ...

Page 54: ...ter the partition page Figure 4 36 Partition Page 2 Tap User Management Card Tag Management to enter the Card Tag Management page 3 Tap 4 When hearing the voice prompt Swipe Card you should present the card on the control panel card presenting area When hearing a beep sound the card is recognized 5 Create a card name and tap Finish Note The name should contain 1 to 32 characters The card is displa...

Page 55: ... Note Axiom security control panel supports one partition On the Hik Connect page tap a security control device to enter the control panel management page Tap Away Stay Disarm to control the partition s status You can also tap Clear Alarm to clear the alarm when an alarm is triggered Figure 4 37 Control Panel Management Page 4 4 8 Bypass Zone When the partition is armed you can bypass a particular...

Page 56: ...set the zone including the zone name the zone type zone bypass linked camera stay away status the siren and the silent zone You can also view the detector serial No only device in 433 HMz and the detector type of the zone Steps 1 On the device list page tap the security control panel and then log in to the device if required to enter the control panel page 2 Tap Zone and then tap a zone in the Par...

Page 57: ...l be received while the zone is bypassed Link Camera You can link the zone to cameras When an alarm is triggered you can monitor the zone via the linked cameras Stay Away If this option is Enabled the zone will be auto bypassed when the alarm system is stay armed To re enable the zone deselect the option Chime Enable the function and the zone will be start audible alarm when it is triggered Enable...

Page 58: ...e Auto Arm Enable the partition to automatically arm itself in a specific time point Auto Arm Time Set the schedule for the partition to automatically arm itself Late to Disarm Enable the device to push a notification to the phone or tablet to remind the user to disarm the partition when the partition is still armed after a specific time point Note You should have enabled notification fuctions on ...

Page 59: ...ils about perimeter alarm see the user manual of the security control panel 4 4 11 Check System Status Zone Status Communication Status You can view the zone status and the communication status via the mobile client View Zone Status In the Partition page tap Zone to enter the Zone tab You can view the each zone s status in the list Communication Mode In the Partition page tap Device Information to...

Page 60: ... the zone has linked a camera you can view the playback when the alarm is triggered 4 4 13 Add a Camera to the Zone You can link a camera to the zone to monitor the zone You can view the alarm videos when an alarm is triggered Before You Start Make sure you have installed the camera in the target zone and the camera has connected the same LAN as the security control panel s 52 ...

Page 61: ...splayed on the right of the zone in the zone list Tap the icon to view the zone live video 5 Operations You can use the client keyfob card client software or mobile client to do arming disarming bypass and zone disabling 5 1 Arming You can use keypad keyfob card client software mobile client to arm your system After the arming command is sending to control panel the sytem will check the detector s...

Page 62: ...peration The forced arming operation will be record in the event log 5 2 Disarming You can disarm the system with keypad keyfob card client software or mobile client Disarming Indication The arming disarming indicator flashes 30s while the user successfully disarm the system through the entry exit route The system will report the disarming result after the operation completed Entry Delay Duration ...

Page 63: ...ion 1 Indicator Green Successful Operation Red Press the Key 2 Away Arming 3 Clearing Alarm 4 Stay Arming 5 Disarming 6 Panic Alarm Duress Alarm Hold the key for 2 seconds an alarm report will be send to the alarm center secretly without alerting Figure 5 3 Type Ⅱ Keyfob Table 5 2 Type Ⅱ Keyfob Keys No Description 1 Arming Lock 2 Disarming Unlock 3 Combo Function Key 55 ...

Page 64: ...ault occurring Green LED Flashes 9 Times No Arming Permission Operation failed The keyfob has no arming permission Yellow LED Flashes 4 Times Fault Checking Finished No Voice Prompt Yellow LED Flashes 4 Times Alarm Cleared Alarm cleared Green LED Flashes Once No Permission for Clearing Alarm Operation failed The keyfob has no arming permission Yellow LED Flashes 4 Times Disarmed Disarmed Green LED...

Page 65: ...Permission for the Enrolled Card No Voice Prompt Fault Checking Finished with the Enrolled Card No Voice Prompt Disarming with Enrolled Card Disarmed No Disarming Permission for the Enrolled Card No Voice Prompt Unenrolled Card Operation Invalid access 5 5 Use the Client Software Steps 1 Download install and register to the client software 2 Add device in Control Panel Device Management Device Not...

Page 66: ...clearing alarm group bypass and group bypass restoring Note The wireless security control panel only have one partition Figure 5 4 Partition Operation Click Edit to edit the partition name and display options Figure 5 5 Editing Partition Information 5 5 3 Zone Operating Click Linked Zone in the partition list of the Security Control Module You can control the selected partition related zones such ...

Page 67: ...nt Card to enter the management page 2 Click Add and place a tag card on the tag card area of the control panel 3 Customize a name for the tag card in the pop up window 4 Select the card type and tag card linked partition 5 Select the permission for the tag card Note You should allocate at least a permission for the tag card 6 Click OK and the tag information will be displayed in the list Note The...

Page 68: ...k Delete to delete the keyfobs in batch 5 6 3 Add Edit Delete User Administrator can add user to the security control panel edit the user information or delete the user from the security control panel You can also assign different permissions to the new user Steps 1 Click User Management User to enter the User Management page 2 To compliant the EN requirement slide the block to enable the setter a...

Page 69: ...us After setting the zone repeater and other parameters you can view their status Click Status You can view the status of zone relay siren battery communication and repeater Zone You can view the zone status alarm status detector battery capacity and signal strength Siren You can view siren status battery status and signal strength Relay You can view relay status battery status and signal strength...

Page 70: ...e Hik Connect is offline Solution Network configuration of the panel is error unable to access extranet A 1 4 Network Camera Drops off Frequently Fault Description System reports multiple event logs of IPC disconnection and connection Solution Check whether the network communication or camera live view is proper A 1 5 Failed to Add Device on APP Fault Description When using APP to add devices it i...

Page 71: ...hether the detector reports undervoltage Replace the detector battery A 3 2 Zone Tamper proof Fault Description View status of zones which displays tamper proof Solution Make tamper proof button of the detector holden A 3 3 Zone Triggered Fault Fault Description View status of zones which displays triggered fault Solution Reset the detector A 4 Problems While Arming A 4 1 Failure in Arming When th...

Page 72: ...o Send Mails to Gmail Fault Description The receiver s mailbox is Gmail Click Test Inbox and prompt test fails 1 Google prevents users from accessing Gmail using apps devices that do not meet their security standards Solution Log in to the website https www google com settings security lesssecureapps and start using access of application not safe enough The device can send mails normally 2 Gmail d...

Page 73: ...STARTTLS TLS Hotmail smtp office 365 com 587 STARTTLS TLS QQ smtp qq co m 587 STARTTLS TLSv1 2 Yahoo smtp mail y ahoo com 587 STARTTLS TLSv1 2 126 smtp 126 com 465 SSL TLS Sina smtp sina c om 25 465 587 SSL TLS STARTTLS SSL TLS Note About mail configuration SMTP port Default to use port 25 without encryption or using port 465 if SSL TLS is used Port 587 is mainly used for STARTTLS protocol mode Th...

Page 74: ...interval Voice Prompt Zone X perimeter alarm Delayed Zone The system provides you time to leave through or enter the defense area without alarm Audible Response Trigger the system sound and siren Voice Prompt Zone X alarm Follow Zone The zone acts as delayed zone when it detects triggering event during system Entry Delay while it acts as instant zone otherwise Audible Response Trigger the system s...

Page 75: ...tivates all the time The zone type is used to monitor and report the ACTIVE status of a zone but it will only report and alarm this status after the programmed time has expired 1 to 599 seconds Disabled Zone Alarms will not be activated when the zone is triggered or tampered Audible Response No system sound voice prompt or siren Virtual Zone Keypad Keyfob The system will immediately alarm when it ...

Page 76: ...oice prompt for fault You can handle the fault according to the voice prompt System sound for arming with card or keyfob Voice prompt for fault You can handle the fault according to the voice prompt Fault event displays on client You can handle the fault via client software or mobile client Voice Prompt Armed Arming failed 68 ...

Page 77: ...lay Alarm When alarm event occurs The alarm output will be activated after the configured exit enter delay After the configured output delay disarm the control panel or clear alarm Zone Linkage When alarm event occurs the linked relay will output alarm siganl After the configured output duration Manual Operation Enable relays manually Over the triggering time or disable the relays manually 69 ...

Page 78: ...Event Types Event Types Custo m Default 1 client softwa re notific ation Default 2 alarm receivi ng center 1 2 Default 3 mobil e client Default 4 teleph one Alarm and Tamper Life Safety Event System Status Panel Manag ement 70 ...

Page 79: ...pass zone Disabling Force Arming No Yes Yes No Adding Changing Verification Code No Yesd Yesd Yesd Adding Editing Level 2 User and Verification Code No Yes Yes No Adding Editing Configuration Data No No Yes No Replacing software and firmware No No No Yes Note a By the condition of being accredited by user in level 2 bBy the condition of being accredited by user in level 2 and level 3 dUsers can on...

Page 80: ...ission assignment of the user level 2 When the controller is bypassed the user level 3 can login the controller without the permission assignment of the user level 2 The user level 4 can login the controller only when the user level 2 or level 3 has assigned permissions to the user level 4 72 ...

Page 81: ...80 Timeout Alarm BH R780 Timeout Alarm Restored PA E120 Panic Alarm PH R120 Panic Alarm Restored BA E131 Perimeter Alarm BH R131 Perimeter Alarm Restored BA E134 Entry Exit Alarm BH R134 Entry Exit Alarm Restored TA E137 Device Tampered TR R137 Device Tamper Restored TA E383 Detector Tampered TR R383 Detector Tamper Restored TA E321 Wireless Siren Tampered TR R321 Wireless Siren Tamper Restored 73...

Page 82: ...b Panic Alarm MA E100 Medical Alarm MH R100 Medical Alarm Restored GA E151 Gas Leakage Alarm GH R151 Gas Leakage Alarm Restored FA E110 Fire Alarm FH R110 Fire Alarm Restored OP E401 Disarming CL R401 Away Arming OA E403 Auto Disarming CA R403 Auto Arming BC E406 Alarm Clearing CL R441 Stay Arming CD E455 Auto Arming Failed BB E570 Zone Bypassed BU R570 Zone Bypass Restored CT E452 Late to Disarm ...

Page 83: ...ery Fault Restored DK E501 Keypad Locked DO R501 Keypad Unlocked TS E607 Test Mode Entered TE R607 Test Mode Exited RN E305 Control Panel Reset UY E321 Wireless Siren Disconnected UJ R321 Wireless Siren Connected UY E381 Wireless Detector Disconnected UJ R381 Wireless Detector Connected XT E384 Wireless Detector Low Voltage XR R384 Normal Wireless Detector Voltage ET E333 Expander or Wireless Devi...

Page 84: ...NR R352 Cellular Data Network Connected NT E352 SIM Card Exception NR R352 SIM Card Restored NT E352 Network Flow Exceeded NT E351 IP Address Conflicted NR R351 Normal IP address NT E351 Wired Network Exception NR R351 Normal Wired Network NT E351 Wi Fi Communication Fault NR R351 Wi Fi Connected XQ E344 RF Signal Exception XH R344 Normal RF Signal E306 Expander Deleted R306 Expander Added 76 ...

Page 85: ...E130 Burglary Alarm BH R130 Burglary Alarm Restored XT E338 Low Wireless Device Battery XR R338 Low Wireless Device Battery Restored YC E354 Uploading Report Failed YK R354 Report Uploading Restored LB E627 Programming Mode Entered LX E628 Programming Mode Exited CI E454 Arming Failed R250 Patrol E306 Wireless Device Deleted R306 Wireless Device Added XT E384 Low Wireless Siren Battery 77 ...

Page 86: ...ode Description XR R384 Low Wireless Siren Battery Restored NT E351 Wired Network Wi Fi ATP Failed NR R351 Wired Network Wi Fi ATP Restored NT E352 Cellular Network ATP Failed NR R352 Cellular Network ATP Restored 78 ...

Page 87: ...3 Level 4 Any Body Basic User Admini strator Installe r Manuf acturer Arming x Accordi ng to the configu red permis sion x Disarm ing x Accordi ng to the configu red permis sion x Alarm Clearin g x Accordi ng to the configu red permis sion x Walk Test x Accordi ng to the configu red permis sion x Log Query x Accordi ng to the configu red permis sion x 79 ...

Page 88: ... 2 User and Authent ication Code x Accordi ng to the configu red permis sion x Adding Editing Locatio n x x x x Exchan ge Progra ming Firmwa re x x x x Table G 2 User Permission in Basic Standard Functio n User Permission in Basic Standard Level 1 Level 2 Level 3 Level 4 Any Body Basic User Admini strator Installe r Manuf acturer Arming x Accordi ng to the configu red permis sion x 80 ...

Page 89: ... ng to the configu red permis sion x Log Query x Accordi ng to the configu red permis sion x Bypass Disabli ng Manda tory Arming x Accordi ng to the configu red permis sion x Adding Changi ng Authent ication Code x Accordi ng to the configu red permis sion Adding Deletin g Level 2 User and x Accordi ng to the configu red permis sion x 81 ...

Page 90: ...Authent ication Code Adding Editing Locatio n x x x Exchan ge Progra ming Firmwa re x x 82 ...

Reviews: