Section 2 – Access Control Integration
2–13
Notes about arming the security system:
In the above example, we have only discussed access control and disarming of the security
system. There are several options that may be used to facilitate arming of the security
system. They are as follows:
•
A key employee or employees may use their user codes to arm the security system.
•
A key employee or employees may carry an RF key to facilitate arming of the security
system.
•
An additional access card may be programmed to arm the security system when swiped at
an access point reader by using Event Actions, as discussed in this manual.
Conclusion
The reader is encouraged to study and modify as necessary the example presented in this
overview so that it meets the needs of a specific installation.
A worksheet has been provided at the end of this section to facilitate your initial installation.
Содержание VistaKey-SK
Страница 2: ......
Страница 6: ...vi...
Страница 8: ...viii...
Страница 40: ...VistaKey Installation Guide 4 10...
Страница 107: ......
Страница 108: ...165 Eileen Way Syosset New York 11791 Copyright 2000 PITTWAY CORPORATION l K4005 6 00...