![background image](http://html.mh-extra.com/html/smc-networks/rb5701-z/rb5701-z_user-manual_1300610004.webp)
Page iv | August 17, 2010
Table of Contents
W
ELCOME TO THE
T
OUCH
S
CREEN
........................................................................................................ 1
U
NDERSTANDING
S
ECURITY
N
ETWORK
C
OMPONENTS
...................................................................................... 2
U
NDERSTANDING THE
S
ECURITY
Z
ONE
T
YPES
.................................................................................................... 3
U
NDERSTANDING
A
LARMS
......................................................................................................................................... 4
C
ONFIGURING THE
T
OUCH
S
CREEN
......................................................................................................................... 5
S
UBSCRIBER
P
ORTAL
.................................................................................................................................................... 6
U
SING THE
T
OUCH
S
CREEN
..................................................................................................................... 7
U
NDERSTANDING THE
T
OUCH
S
CREEN
C
ONTROLS
.............................................................................................. 7
L
OW
P
OWER
M
ODE
...................................................................................................................................................... 9
U
NDERSTANDING THE
S
CREEN
............................................................................................................................... 10
C
ONTENT
A
REA
...................................................................................................................................................... 11
H
OME
S
CREEN
..................................................................................................................................................... 11
W
IDGETS
............................................................................................................................................................... 11
S
ECURITY
S
TATUS
H
EADER
............................................................................................................................... 12
S
YSTEM
&
Z
ONE
T
ROUBLE
H
EADER
.............................................................................................................. 12
M
ANAGING
Y
OUR
S
YSTEM
S
ECURITY
..................................................................................................... 16
U
NDERSTANDING
A
RMING
M
ODES
....................................................................................................................... 16
A
RM
A
WAY
M
ODE
................................................................................................................................................... 16
A
RM
S
TAY
M
ODE
.................................................................................................................................................... 18
A
RM
N
IGHT
M
ODE
................................................................................................................................................. 19
A
RMING AND
D
ISARMING THE
S
YSTEM
................................................................................................................. 20
D
ISARMING THE
S
YSTEM
....................................................................................................................................... 20
A
RMING THE
S
YSTEM
............................................................................................................................................. 23
C
ANCELLING THE
A
RMING
P
ROCESS
.............................................................................................................. 25
Q
UICKARMING THE
S
YSTEM
............................................................................................................................. 26
S
ENDING A
E
MERGENCY
A
LARM
............................................................................................................................ 27
P
ROTECTION
A
GAINST
S
MASH
&
G
RAB
................................................................................................................. 28
M
ANAGING
S
ENSORS
................................................................................................................................................. 29
D
ISABLE A
S
ENSOR
................................................................................................................................................. 29
V
IEWING
Y
OUR
Z
ONE
E
VENT
H
ISTORY
........................................................................................................... 30
C
HANGING THE
O
RDER THAT
S
ECURITY
Z
ONES ARE
L
ISTED IN THE
T
OUCH
S
CREEN
........................... 31
M
ANAGING
C
AMERAS
................................................................................................................................................ 32
T
ESTING
Y
OUR
A
LARMS
............................................................................................................................................ 34
M
ANAGING
C
ONNECTIVITY
B
ETWEEN THE
T
OUCH
S
CREEN AND THE
C
ENTRAL
M
ONITORING
S
TATIONS
...................................................................................................................................................................... 39
V
IEWING
S
IGNAL
S
TRENGTH
............................................................................................................................... 39
T
ESTING
Y
OUR
C
ONNECTIVITY
.......................................................................................................................... 39
C
ONFIGURING A
N
EW OR
R
ESET
S
ECURITY
N
ETWORK
R
OUTER TO
W
ORK WITHIN THE
S
ECURITY
N
ETWORK
................................................................................................................................................................. 41
M
ANAGING
C
ONNECTIVITY
B
ETWEEN
Y
OUR
H
OME
D
EVICES AND THE
I
NTERNET
................................. 44
M
ANAGING THE
P
ASSCODES IN YOUR
S
ECURITY
S
YSTEM
................................................................................. 50
M
ANAGING YOUR
K
EYPAD
C
ODES
..................................................................................................................... 50
U
NDERSTANDING THE
D
URESS
K
EYPAD
C
ODE
.......................................................................................... 52
M
ANAGING
Y
OUR
S
ECRET
W
ORD
....................................................................................................................... 53
V
IEW
Y
OUR
S
ECURITY
A
CCOUNT
I
NFORMATION
................................................................................................ 53