background image

PROGATE User manual                                                 V-2022-09-20 

 

47  | 

E N

   

This  system  has  been  carefully  designed  to  be  as  effective  as  possible.  There  are  circumstances,  however,  involving  fire,  burglary,  or  other  types  of 
emergencies where it may not provide protection. Any alarm system of any type may be compromised deliberately or may fail to operate as expected for 
a variety of reasons. Some but not all of these reasons may be: 
• Inadequate Installation 
The module must be installed properly in order to provide adequate protection.  
• Criminal Knowledge 
This system contains security features which were known to be effective at the time of manufacture. It is possible for persons  
With criminal intent to develop techniques which reduce the effectiveness of these features. It is important that a system be reviewed periodically to ensure 
that its features remain effective and that it be updated or replaced if it is found that it does not provide the protection expected. 
• Access by Intruders 
Intruders may enter through an unprotected access point, circumvent a sensing device, evade detection by moving through an area of insufficient coverage, 
disconnect a warning device, or interfere with or prevent the proper operation of the system. 
• Power Failure 
Control units, intrusion detectors, smoke detectors and many other security devices require an adequate power supply for proper operation. If a device 
operates from batteries, it is possible for the batteries to fail. Even if the batteries have not failed, they must be charged, in good condition and installed 
correctly. If a device operates only by AC power, any interruption, however brief, will render that device inoperative while  it does not have power. Power 
interruptions of any length are often accompanied by voltage fluctuations which may damage electronic equipment. After a power interruption has occurred, 
immediately conduct a complete system test to ensure that the system operates as intended. 
• Failure of Replaceable Batteries 
Ambient conditions such as high humidity, high or low temperatures, or large temperature fluctuations may reduce the expected battery life. While each 
transmitting device has a low battery monitor which identifies when the batteries need to be replaced, this monitor may fail to operate as expected. Regular 
testing and maintenance will keep the system in good operating condition. 
• Compromise of GSM network 
Signals may not reach the receiver under all circumstances which could include metal objects placed on or near the radio path or deliberate jamming or 
other inadvertent signal interference. 
• System Users 
A user may not be able to operate a panic or emergency switch possibly due to permanent or temporary physical disability, inability to reach the device in 
time, or unfamiliarity with the correct operation. It is important that all system users be trained in the correct operation  of the module and that they know 
how to respond when the system indicates an alarm 
• Smoke Detectors 
Smoke detectors may not properly alert occupants of a fire for a number of reasons, some of which follow. The smoke detectors may have been improperly 
installed or positioned. Smoke may not be able to reach the smoke detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of 
closed doors. Smoke detectors may not detect smoke from fires on another level of the residence or building. 
Every fire is different in the amount of smoke produced and the rate of burning.  Smoke detectors cannot sense all types of fire is equally well. Smoke 
detectors may not provide timely warning of fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping gas, and 
improper storage of flammable materials, overloaded electrical circuits, and children playing with matches or arson. 
Even if the smoke detector operates as intended, there may be circumstances when there is insufficient warning to allow all occupants to escape in time 
to avoid injury or death. 
• Motion Detectors 
Motion detectors can only detect motion within the designated areas as shown in their respective installation instructions. They cannot discriminate between 
intruders and intended occupants. Motion detectors do not provide volumetric area protection. They have multiple beams of detection and motion can only 
be detected in unobstructed areas covered by these beams. They cannot detect motion which occurs behind walls, ceilings, floor, closed doors, glass 
partitions, glass doors or windows. Any type of tampering whether intentional or unintentional such as masking, painting, or spraying of any material on 
the lenses, mirrors, windows or any other part of the detection system will impair its proper operation. 
Passive infrared motion detectors operate by sensing changes in temperature. However their effectiveness can be reduced when the ambient temperature 
rises near or above body temperature or if there are intentional or unintentional sources of heat in or near the detection area. Some of these heat sources 
could be heaters, radiators, stoves, barbeques, fireplaces, sunlight, steam vents, lighting and so on. 
• Warning Devices  
Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone sleeping if there is an intervening wall or door. If warning 
devices are located on a different level of the residence or premise, then it is less likely that the occupants will be alerted or awakened. Audible warning 
devices may be interfered with by other noise sources such as stereos, radios, televisions, air conditioners or other appliances, or passing traffic. Audible 
warning devices, however loud, may not be heard by a hearing-impaired person. 
• GSM network 
If GSM network are used to transmit alarms, it may be out of service for certain periods of time.  
• Insufficient Time 
There may be circumstances when the system will operate as intended, yet the occupants will not be protected from the emergency due to their inability 
to respond to the warnings in a timely manner. If the system is monitored, the response may not occur in time to protect the occupants or their belongings. 
• Component Failure 
Although  every  effort  has  been  made  to  make  this  system  as  reliable  as  possible,  the  system  may  fail  to  function  as  intended  due  to  the  failure  of  a 
component. 
• Inadequate Testing 
Most problems that would prevent the module from operating as intended can be found by regular testing and maintenance. The complete system should 
be tested weekly and immediately after a break-in, an attempted break-in, a fire, a storm, an accident, or any kind of construction activity inside or outside 
the premises.  
•Security and Insurance 
Regardless of its capabilities, the module PROGATE is not a substitute for property or life insurance. The module PROGATE also is not a substitute for 
property owners, renters, or other occupants to act prudently to prevent or minimize the harmful effects of an emergency situation. 
 

Summary of Contents for PROGATE

Page 1: ...PROGATE Installation Programming Manual Cellular Gate controller PROGATE Multifunctional device access control security home automation This manual includes steps to install set up and use your system...

Page 2: ...customizable The controller is capable of sending event messages to the receiver of a security company PROGATE designed to be easy to use Once installed module can be programmed remotely via GPRS con...

Page 3: ...8 5 1 1 Output PGM wiring Bell Relay Led Wiring 18 5 1 2 Output programming 19 5 1 3 Access control output with logging 20 6 INPUTS 22 6 1 Input zones wiring EOL NO NC 22 7 SERA2 configuration softwar...

Page 4: ...Analog inputs I O1 I O2 0 30V Programmable selectable input or output SMS text for input alarm and restore Burglary alarm zones Input type NC NO EOL EOL TAMPER 5 6K 5 6K Algorithm for zones operation...

Page 5: ...uploaded from the device s memory to the configuration software for further analysis The system logs all information about system configuration system actions and info messages Exit Delay A period of...

Page 6: ...tice Ask the seller before buying Table 2 Additional under request package content Mini USB cable Cellular Antenna 2 5 dBi L Type SMA Connector 4G LTE Antenna 3dBi SMA male Adhesive Mount 2m Cable 4G...

Page 7: ...Contacts Name Optional functions and Description AC DC DC 10 30V AC 12 24V Max 0 2A NC C NO Relay Output 1A 30 V DC 0 5A 125 V AC I O1 I O2 Programmable functions Input with pull up resistor 10K to th...

Page 8: ...controller 3 Flat head 2 5 mm screwdriver 4 External GSM antenna if reception is weak in the area 5 Activated nano SIM card can have turn off PIN code requests 6 Instruction manual for the automatic...

Page 9: ...he gate status can be displayed in SERANOVA More information Quick start PROGATE https www topkodas lt Downloads media Manuals PROGATE_QS_EN pdf Quick start SERANOVA APP https www topkodas lt Download...

Page 10: ...will be able to control gates and other devices remotely as well as administer users view system status and push notifications and view a log of all events 3 3 1 Steps to get started with SERANOVA To...

Page 11: ...in to the system the owner must enter the user s email and user code with which the system will be operated This is the user ID and password This is enter the user email that was used to create the S...

Page 12: ...remote connection session the data messages are queued up and will be transmitted to the monitoring station after the configuration session is over SMS text messages In order to configure and control...

Page 13: ...iguration using SERA2 software With SERA2 software you can change the controller s settings if default settings are not enough Download and Install and open free SERA2 configuration Diagnostic softwar...

Page 14: ...about SMS commands see 8 SMS Commands for remote control and configuration Figure 10System Options General System Options 3 5 4 User codes for access control via keypad and SERANOVA app Each user mus...

Page 15: ...key MASTER The total length of the 1 Wire bus is up to 100 m Depending of cable quality and environment noise iButton probe LED is without resistor External 4 7k 10k resistor required depending of po...

Page 16: ...FID reader Sent the message INST000000 063 0 You will receive the message iButton RFID Caller ID Learning Mode Stopped INST000000 063 S INST Install Configuration of the parameters 000000 Installer s...

Page 17: ...eter Default App Key is 123456 Press Connect Go to SERA2 System Options General system Options Select Dallas 1 Wire Bus for iButton keys Press Write Press Start iButton RFID Caller ID Learning Mode To...

Page 18: ...aling we recommend to use siren DC 12V up to 1500mA It is recommended to connect the siren to the system by using 2 x 0 75 sq mm double insulation cable Auxiliary BUZZER is recommended to be installed...

Page 19: ...time ON to OFF Pulse time Off 3 This cycle will repeat until output is deactivated Output signal Pulse time ON Pulse time OFF Pulse time ON Pulse time OFF Output state Output ON Output OFF Bell Output...

Page 20: ...ery OK Battery Lost Battery OK Alarm indication Output for connection of light indicator showing alarm status of the alarm system After the alarm system actuation a continuous signal is generated OFF...

Page 21: ...Events Log if output will have definition Automation CTRL it also can be controlled by user in any way but it will not generate 421 and 422 events Event log e g 1853 Event 1234 1 401 01 001 Time 2017...

Page 22: ...re sensors DS18b20 or iButton key DS1990A o Aosong 1 Wire bus Humidity Sensor AM2302 DHT22 AM2305 AM2306 6 1 Input zones wiring EOL NO NC The module PROGATE has In1 In2 I O1 I O2 Can be used as inputs...

Page 23: ...ill not be necessary again to set the same parameters If you want to save that is already recorded by the module firstly you must read configuration of the module Press Read 4 icon In order to save co...

Page 24: ...resetting 9 Door Chime When this box is checked violations of set Delay zones at the alarm turned off will be accompanied by keyboard audible Buzzer signal 10 Bell squawk on ARM DISARM The module can...

Page 25: ...module should be set again by auto synchronization or manually System clock can be synchronized in following ways 1 Cloud Server Synchronize by SERA Cloud Service SIM card must have mobile data and S...

Page 26: ...ystem is running on the backup battery and voltage is dropped below allowed value 13 System Voltage Restore The module has detected that the system voltage has been restored 14 Event Delay System low...

Page 27: ...elay zone becomes instant The system will NOT activate siren and keypad buzzer only when Instant Silent zone types is violated Any Delay type zone will operate as Instant type zone when the system is...

Page 28: ...with interruptions will be generated Recommended for smoke fire detectors ON OFF Interior STAY Similar to Instant except the module will auto bypass the zone if Armed in the Stay mode Instant STAY Sim...

Page 29: ...ystem is disturbed When the alarm system is turned off operates like keyboard buzzer 24 Flash Output for connection of light indicator When the alarm system is on a continuous signals generated and if...

Page 30: ...igure 44 Users Access control window 1 ID 2 User Name The name of users who will be able to control the module should be entered in this column 3 User Tel Telephone numbers of users who will be able t...

Page 31: ...ank than the standard Monday Sunday Temporary access that self destructed after a certain time elapses Suppose you must create a Cleaning Crew schedule The schedules are to be set up as follows Monday...

Page 32: ...xt message if programmed containing the violated name The system will send SMS text messages regarding each violated zone separately a If the user phone number is unavailable it will attempt to send t...

Page 33: ...the SMS message 5 Show Zone Number Zone number will be displayed in the SMS message 6 Show Event Time Event time will be displayed in the SMS message 7 Show CID Code Report Contact ID code 8 Zone1 Zo...

Page 34: ...in Custom SMS Text window 7 8 Event Summary Events Event Summary Events The Event Summary Events window illustrates Contact ID codes of the events and enable user to change the text that will be repo...

Page 35: ...e changed after inserting SIM card into any mobile phone 9 System Voltage Power supply voltage Nearby number is value of ADC voltage When multiplying this number by the coefficient Fig 32 voltage valu...

Page 36: ...e entered 10 ARM After pressing the button ARM arm mode should be entered 11 SLEEP After pressing the button SLEEP sleep mode should be entered 12 STAY After pressing the button STAY arm mode should b...

Page 37: ...events System start System arming disarming Zone violated restored Tamper violated restored Zone bypassing Temperature deviation by MIN and MAX boundaries System faults Configuration via USB User pho...

Page 38: ...SERA Cloud Server cloud topkodas lt Standard web browser Firefox Chrome etc Sera Cloud Server opens tunnel between module PROGATE and SERA2 or APP and lets them communicate to each other via TCP proto...

Page 39: ...trol of the module over the Internet ADDR the format of IP address xxx xxx xxx xxx the numbers from 0 to 255 should be separated by dot or domain text length of up to 47 characters PORT TCP port numbe...

Page 40: ...tem configuration control and request for information By default installer code is 000000 which is highly recommended to change User code for SMS commands 6 digit password used for system control and...

Page 41: ...mbers according the user ID number ID user ID number from 1 to 8 INST000000 004 ID TEL OUT OPT NAME e g INST000000 004 1 37066666666 1 10 Jon To enter user s telephone number for remote control via sh...

Page 42: ...ss Gained INST000000 020 N Invert output state 020 command code outputs inversion N output number from 1 to 32 INST000000 021 N ST Output activation or deactivation 021 command code Output activation...

Page 43: ...ssages 092 command code Remote reset of the module via SMS messages INST000000 093 yyyy MM dd HH mm Time of the module setting via SMS message The time is usually synchronized via a server or mobile n...

Page 44: ...N output number 1 10 TIME 0 999999 Time interval in seconds for the output activation USER123456 030 ST Change security system s mode ARM DISARM STAY SLEEP 030 command code Change security system s mo...

Page 45: ...ersion 3 Firmware Configuration software 4 Serial No Module registration number 5 IMEI GSM modem IMEI address Figure 61Explanation of every field in System Info window 9 1 Firmware Update Firmware Thi...

Page 46: ...normal use It does not cover Damage incurred in shipping or handling Damage caused by disaster such as fire flood wind earthquake or lightning Damage due to causes beyond the control of UAB Topkodas...

Page 47: ...dence or building Every fire is different in the amount of smoke produced and the rate of burning Smoke detectors cannot sense all types of fire is equally well Smoke detectors may not provide timely...

Reviews: