43
43
EN
ESIM384 Installation and Configuration Manual v1.1
12. arMInG anD DISarMInG
the system features the following methods to carry out arming and disarming process:
•
Free of charge phone call
•
SMS text message
•
eKB2/eKB3/eKB3W/eWKB4 keypad, eWKB5 touchpad and user/master code
•
iButton key
•
eWK1/eWK2/eWK2A wireless keyfob
•
Arm-Disarm by Zone
•
eGR100 middle-ware
•
Automatic arm/disarm by scheduler
•
eLDeS Cloud Services platform
the system partitions can be armed/disarmed by the listed user phone number, eKB2/eKB3/eKB3W/eWKB4 keypad and user/master code,
iButton key, eWK1/eWK2/eWK2A wireless keyfob, automatically according to the scheduled weekday and time or zone, which is set up for
Arm-Disarm by Zone method. For example, if User 1 phone number is assigned to Partition 1, 2 and 4, the user will be able to arm/disarm
Partition 1, 2 and 4 by a single phone call to the system (see
23. PartItIonS
).
By default, when the system is successfully armed or disarmed, it replies with confirmation by SMS text message. For more details on SMS
text message regarding system arming/disarming and how to manage it, please refer to
12.10. Disabling and Enabling arm/Disarm
notifications
.
By default, it is allowed to arm the system while the following system faults are present (see
29. InDICatIon of SYStEM faUltS
):
•
Mains power is lost.
•
Low battery.
•
Battery dead or missing.
•
Battery failed.
•
Siren failed.
•
Date/time not set.
•
GSM connection failed.
•
GSM/GPRS antenna failed.
•
Wireless antenna failed.
•
Keypad lost.
•
Wireless power socket (eWM1) fault.
•
Wireless device battery low.
•
Communication to MS failed.
•
RF jammer detected.
In case of violated zone/tamper presence when attempting to arm the system by free of charge phone call, SMS text message, iButton key
and Arm-Disarm by Zone method, the system will reply with SMS text message containing violated zone/tamper number. Due to security
reasons it is highly recommended to restore the violated zone/tamper before arming the system. For more details on how to arm the sys-
tem regardless of the violated zone or tamper presence, please refer to
14.6. Zone attributes,
14.7. Bypassing and activating Zones
and
16.taMPErS
respectively.
the system ignores any incoming calls and SMS text messages from a non-listed phone number as well as it rejects the SMS text messages
containing wrong SMS password even from a listed user phone number. For more details regarding arming/disarming the system from a
non-listed phone number, please refer to
8.2. System Control from any Phone number
.
notE:
the system remembers the last status (armed/disarmed) of all partitions even after complete shut down.