Notes for using Private, Corporate, and High Speed Data Networks:
Network access and domain access policies shall be set to restrict
unauthorized network access, and spoofing or Denial of Service (DoS)
attacks. Select an Internet Service Provider (ISP) that has redundant
servers/systems, back-up power, routers with firewalls enabled, and
methods to identify and protect against DoS attacks (e.g., via spoofing).
Notes for using Public Switched and Cellular Data Networks:
Communication channels shall be facilitated such that the com-
municator will restrict unauthorized access, which could otherwise
compromise security. The communicator shall be located in a secured
area.
• For
ULC Residential Fire and Burglary
applications the
TL2803G
(R)E/3G2080(R)E/TL280(R)E/LE2080(R)/TL280LE(R)
can be used
as primary communication channel via either cellular or Ethernet or as
a back-up in conjunction with the Digital Alarm Communicator Trans-
mitter (DACT). Test transmission every 24 hours shall be enabled on
each channel.
• For
ULC Commercial Fire and Burglary
applications the
TL2803G
(R)E/3G2080(R)E/TL280(R)E/LE2080(R)/TL280LE(R)
can be used
as a passive communication module with the following security levels:
l
P1 (each channel cellular or Ethernet is independent)
l
P2 (cellular and Ethernet in back-up configuration, panel section
[851][005] toggle option [5] OFF).
l
P3 (cellular and Ethernet in redundant configuration, panel section
[851][005] toggle option [5] ON).
The communicator can also be used as an active communication sys-
tem with the security levels A1- A4 (each channel cellular or Ethernet
independent or together in a back-up/redundant configuration). For act-
ive line security systems AES128 bit encryption shall be enabled (at
the monitoring station receiver) and the supervision heartbeat rate shall
be set as 90 seconds (panel section [851][004] = 005A/90). The super-
vision window at the Signal Receiver Center (SRC)'s receiver shall be
programmed as maximum of 180 (00B4/180) seconds.
• For
UL Residential Fire and Burglary
applications the
TL2803G
(R)E/3G2080R/TL280(R)E/LE2080(R)/TL280LE(R)
can be used as
the primary communication channel via either cellular or Ethernet, or
as a back-up in conjunction with the DACT (30 day test transmission is
required on each channel).
• For
UL Commercial Burglary
applications the
TL2803G (R) E/
3G2080R / TL280(R)E / LE2080(R) / TL280LE(R)
can be used as
dual signalling line communication system (cellular and Ethernet chan-
nels used in redundant configuration), standard line security and as
encrypted line security.
• The supervision heartbeat shall be enabled (panel section [851] [005]
toggle option [1] (Ethernet) and/or toggle option [2] (cellular) shall be
ON), toggle option [3] (supervision type) shall be ON and the super-
vision heartbeat rate shall be selected as 135 (0087/135) seconds.
Option [004] = 0087. The supervision window at the supervising station
shall be maximum 200 (00C8/200) seconds. For encrypted line secur-
ity systems the encryption AES128 bit shall be enabled at the mon-
itoring station receiver.
• For
UL Commercial Burglary
installations, the
TL2803G (R)
E/3G2080(R) E/TL280(R) E/LE2080(R) /TL280LE(R)
is listed as a
primary (sole) communication means (heartbeat must be enabled) or
for supplementary (back- up) use in conjunction with a Plain Old Tele-
phone Service (POTS) line dialer. When the heartbeat transmission
over the Ethernet or cellular network is enabled, using the TL2803G (R)
E/3G2080(R) E/TL280(R) E with a compatible control unit listed for
standard/encrypted line security, it can provide line security for the
alarm system over the primary line.
• The
TL2803G(R) E/3G2080(R) E/TL280(R) E/LE2080(R) /TL280LE
(R)
is also suitable to be used with a compatible control unit listed for
dual line security transmission when used in conjunction with a DACT
or a Public Switched Data Network (PSDN) transmitter, where the
PSDN provides the line security and is the primary line. In this mode,
alarm signals are required to be sent simultaneously over both com-
munication methods.
59