![Honeywell AlarmNet 7810iR-ent Installation And Setup Manual Download Page 5](http://html.mh-extra.com/html/honeywell/alarmnet-7810ir-ent/alarmnet-7810ir-ent_installation-and-setup-manual_152329005.webp)
1-1
S E C T I O N 1
General Information
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
About the AlarmNet Enterprise Application
AlarmNet Enterprise is a fully encrypted, secure method of delivering alarm messages from
a protected premise to a local security office in a campus or gated community setting. Up to
225, 7845i-ent Internet/Intranet Alarm Communication Modules can be installed on a
network reporting to a single 7810iR-ent. In a typical system, an installed 7845i-ent routes
status, supervisory, and alarm messages to the security office using a 10-BaseT Ethernet
connection. At the security office, the 7810iR-ent validates and displays incoming messages
and optionally routes the messages to an output device. AlarmNet Enterprise is
implemented using TCP Internet protocol and 1024-bit Key Blowfish or 256-bit AES
encryption. (See Figure 1.)
Figure 1. 7810iR-ent/7845i-ent Intranet/Internet Block Diagram
About the AlarmNet-i Internet Application
AlarmNet-i is a fully encrypted, secure method of delivering alarm messages from a
protected premise to an AlarmNet equipped central station. An Alarm Receiver transmits
status, supervisory, and alarm messages to the AlarmNet Control Center using a broadband
Internet connection (See Figure 1).
The AlarmNet Control Center identifies, validates, and forwards the messages to the
appropriate AlarmNet central station using AlarmNet-A, AlarmNet-M, AlarmNet-i, or 800
plus services. An Internet receiver, 7810iR or 7810iR-ent, is required when receiving
Internet signals from the AlarmNet Control Center. AlarmNet-i has an unlimited account
capacity.
UL
The 800 PLUS has not been evaluated by UL.
Encryption (AlarmNet-i Application)
The 7845i-ent and 7810iR-ent support private key encryption. Private key encryption means
that both the sender and the receiver know the KEY used to encrypt the data. Each device
produced by Honeywell is loaded with a globally unique identifier called a MAC number, and
a large random number or KEY. This KEY and MAC number are also stored in the
AlarmNet servers. When a device contacts AlarmNet it sends the MAC number in the clear
followed by the message that is encrypted using the KEY data. The server looks up its copy
of the KEY based on the MAC number and uses that KEY to decrypt the message.
The Honeywell AlarmNet products support two forms of encryption. The standard
encryption used is called Blowfish. This encryption uses 1024 bits of the random key to drive
the encryption algorithm. Blowfish requires the least processor overhead, which makes it
the best choice for most installations. The second form of encryption is 256 bit AES
(Rijndael). This encryption option is required for certain government installation, or may be
specified in certain applications. The AlarmNet-i AES Encryption Software Module Version
Summary of Contents for AlarmNet 7810iR-ent
Page 2: ......
Page 22: ...7810iR ent Internet Intranet Alarm Receiver Installation and Setup Guide 3 4 ...
Page 66: ...7810iR ent Internet Intranet Alarm Receiver Installation and Setup Guide 5 10 ...
Page 86: ...7810iR ent Internet Intranet Alarm Receiver Installation and Setup Guide 6 20 ...
Page 97: ...Notes ...
Page 98: ...Notes ...
Page 99: ...Notes ...
Page 100: ...Notes ...
Page 101: ...Notes ...