21
Installation and Operation Manual
Monitor Blocks
When an arming option with a block display method has been selected, the
Block #
field is activated. This field is used
to add the monitor to a block. A monitor block can consist of any set of connected monitors—the monitors do not need
to be contiguous. Double-click in the field and enter the number of desired monitor block.
For example, if an alarm is set to call a salvo when it is triggered, the salvo will be displayed on all monitors that have
been allocated this block number.
Notes
•
The alarm clearance method for the block is set by the arming code of the lowest number monitor of the block only.
•
The queuing method can be set differently for each monitor in the block. Queuing restrictions only apply if the
monitor block is to display system or link salvos. To arm a monitor block salvo for hold queuing, all monitors in the
block must be set to a hold queuing method. To arm a monitor block salvo for sequence queuing, arm the lowest
number monitor of the block to a sequence queuing method and arm the remaining monitors to a hold queuing
method.
•
Associate alarm contacts with the first monitor of the block only. Do not associate any alarm contacts to the remaining
monitors in the block. See pages 36-39 for more details on creating alarm associations.
Text Format
The
Text Format
field enables the choice of one of two monitor display formats. When Format 1 is selected, camera
number, status line, camera title, and date & time are displayed at the bottom of the screen. When Format 2 is selected,
the time and date fields appear at the top of the screen and all other information appears at the bottom.
It should be noted that on-screen text display is available on monitors X1-X8 and also on any monitors connected to
secondary matrices. It is not available on monitors X9-X16.
Users/Priorities
To display the
Users/Priorities
screen, click the
Users/Priorities
node on the left-hand side of the display area. This
screen is used to set user numbers and passcodes. It is also used to set priority levels for keyboards or users, and to
configure each of the eight priority levels.
Notes
•
Keyboards are added to the system in the
Ports
screen. See page 13 for more details.
•
The way the
Users/Priorities
screen looks depends on whether the
User IDs
checkbox is ticked in the
Options
screen (see page 16). If the checkbox is ticked, the lower half of the screen is used to issue users with priority levels
and passcodes. If the checkbox is left unticked (default), then the lower half of the screen is used to issue priority
levels to keyboards. Consequently, the priority levels configured in the top half of the screen can refer to either users
or keyboards.
•
In this screen, it is possible to use the drag down method to change multiple fields in a column to the same setting.
Enter the required text or select the required option in the uppermost field and then click and drag the cursor over
the fields below that are to be set the same. Press the
Enter
key to copy the setting to the highlighted fields.
Creating Users Profiles
If the
User IDs
checkbox is ticked in the
Options
screen, use the lower half of the
Users/Priorities
screen to set a
priority level and unique passcode for each user. The screen allows a maximum of 64 users to be defined with a unique
passcode for each.
Double-click in the
Password
field for the desired user and enter a unique numeric passcode for the user. This
passcode can be up to six digits in length. From then, when the user attempts to access a system keyboard, the
keyboard displays the letters “UC” on the monitor display. This indicates that the user must log on to the system
before gaining access to any keyboard operating or programming functions.
It is also necessary to specify the priority level for each user. To do this, double-click in the
Priority
field for the
desired user and enter the priority level (1-8). The priority level issued to the user defines the system functions that
they will be able to access. Priority levels are configured in the top half of the
Users/Priorities
screen.
Note
User 1 defaults to passcode
914365
. All other users default to level 8 priority, with no passcode. After startup, the
User 1 passcode should be changed to guard against unauthorized access to the system.