background image

8

LINCE ITALIA S.p.A.

+A   +N +NC +C +NA  04  03            V+   D    OFF 02   01    W          AUX          L2   L1   AS  ASE  CH BA          12V

  L5            L4            L3          AUX          

A

B

C

D

D

E

E

E

G

H

F

I

L

Fig. 3 

2.3.3  Components of the 9582-GOLD-MST-E-EN 

control panel

This brief description can be useful in order to identify all the 

main parts of the control panel if, for maintenance interventions, 

it is necessary to open it.

Table 3

Item

Parts description

A

Mother board

B

Power Supply

C

Battery compartment (not supplied) max 18 Ah

D

Cable passage

E

Wall fixing holes

F

Fixing holes for expansion cards

G

Ground connection with the cover

H

Plate for tamper proof

I

Terminal block for mains connection

L

Cables for battery connection

2.3.2 9583-GOLD-MST-EN POWER SUPPLY

The power supply is switching type and supplies power to both the motherboard and the entire system. To access it, it is necessary 

to disconnect the control panel from the mains supply paying the utmost attention to the danger of electric shock

 and 

unscrew the screw that secures the power supply to the bottom of the control unit to remove the power supply from its seat. Unscrew 

screws 

A

 and 

B

 to remove the metal protection grid. Inside there are two fuses 

C

 (2.5 A, 250 V) and 

D

 (6.3 A, 250 V), which are used 

respectively for protection against overvoltages (coming from the mains supply) and from the inversion of battery polarity

An auxiliary output 

F

 is available on the power supply side, connect any load respecting the polarity indicated on the sticker above the 

terminal board; on the other side it is possible to connect the mains supply 

E

, paying the utmost attention to the indicated direction 

also in this case.

Fig. 4 

F

E

C

D

B

A

Содержание 9582-GOLD-MST-E-EN

Страница 1: ...NTROL PANEL ART ITEM 9583 GOLD MST EN 9582 GOLD MST E EN GOLD 869 MST CONTROL PANEL SERIES MADE IN ITALY The CE declaration of this item is available on www lince net website Installation operation and maintenance manual ...

Страница 2: ...es and maximum number of alarms 16 4 4 3 Options 16 4 5 BUS DEVICES 17 4 5 1 Devices storage on BUS 17 4 5 2 Partial cancellation of BUS devices 17 4 5 3 BUS devices total cancellation 18 4 6 OUTPUTS 18 4 7 ADD NEW WIRELESS DEVICE 18 4 7 1 Storage of magnetic contact 19 4 7 2 Storage of window sensor 20 4 7 3 Storing wireless sirens 21 4 7 4 Double technology motion detector storage 22 4 7 5 BABY ...

Страница 3: ...ainable This product has been Made in Italy The company has a certified system of quality management according to ISO 9001 2008 n 4796 A standard The company has a certified system of environmental management according to ISO 9001 2004 n 4796 E standard The company has a certified system of health and work security management according to ISO 45001 2018 n 4796 I standard 9 MENU BAR 41 9 1 GOLDSOFT...

Страница 4: ...agnetic contacts sirens and remote controllers The fully bidirectional communication protocol is digital and operates on frequencies from 868 00 to 869 65 MHz the wireless range from the control panel to the peripherals is up to 1 500 m in free air The safety and reliability of the wireless communication is guaranteed by FH Frequency Hopping by TDMA Time Division Multiple Access and AES Advanced E...

Страница 5: ...nd execution response from the control panel It allows you to view the system state open input and alarm memory 9509 GOLD LESW Wired contact for window blinds and roller shutters with a wireless section The detector has been designed to deliver maximum semi outdoor performance in terms of detection immunity to false alarms and wireless transmission distance Impulses are set directly from the contr...

Страница 6: ... The keyreader is available in four versions art 4132CONTACTLESS M black and 4137CONTACTLESS B M white which allow for arming disarming according to the programming of the keys master keyreader function art 4131CONTACTLESS black and 4136CONTACTLESS B white which also allow the keyreader to be sectioned by assigning it the programs that can be enabled disabled slave keyreader function For the keyre...

Страница 7: ... up to 15 Wireless sirens up to 64 up to 32 Wireless controls up to 64 up to 32 NC area 24 h 1 input Alarm output relay 8 Dual exchange Arming programs 3 Sectioning 7 different combinations Open collector outputs 4 programmable max 100 mA Non volatile events log 512 events Users 32 Access level Admin user installer Dimensions 400x250x100 mm 202x85x357mm Working temperature 5 C 40 C A N NC C NA 04 ...

Страница 8: ...witching type and supplies power to both the motherboard and the entire system To access it it is necessary to disconnect the control panel from the mains supply paying the utmost attention to the danger of electric shock and unscrew the screw that secures the power supply to the bottom of the control unit to remove the power supply from its seat Unscrew screws A and B to remove the metal protecti...

Страница 9: ...s such as broken fuses mains failure dead batteries and sabotage in pro gress without message on the display it indicates alarm memories Switched OFF Indicates that there are no anomalies in the system Blinking Indicates that at least one event is present in memory and will continue to flash until a memory a reset is performed 2 3 5 Mother board 2 3 4 9582 GOLD MST E EN power supply The power supp...

Страница 10: ...he state of alarm K The piloting capacity of this output is 80 mA Can be used as a load with SMS command W Negative output in case of fault fuse low battery or power cut the latter can be programmed from the keypad as immediate after the failure or 20 minutes after the power cut Reference mass negative power supply all the masses are common AUX Positive always present for powering external devices...

Страница 11: ...iversal pulse counter card If it is necessary to install a higher number of cards it is possible to buy the 1893 EUROSLIT kit containing 9 additional card supports separately To install them both those supplied with the control unit and those that can be purchased separately simply screw them into the appropriate spaces positioning them according to the type of board they are to be fitted with NOT...

Страница 12: ...p drivers always paying attention to the operating system used on the computer Download the latest version of the GoldSOFT program from the LINCE website 3 2 SOFTWARE UPDATE Fig 9 With the PC connected to the Internet the software automatically checks the availability of updates on the LINCE site for the Wi Fi card the GoldSOFT and the firmware of the control panel itself If new software is availa...

Страница 13: ...int it is possible to proceed with the connection with the control panel referring to what is reported in the following manual In the screen that appears as soon as you are logged in at the bottom right it is possible to read informations about the access privileges and the type of connection is shown In the example shown an installer has connected via cable The user has connected to the card via ...

Страница 14: ...d control panel Then enter the information related to the system registry and click on Save giving a different name to the one proposed by default Fig 18 Fig 19 4 2 PERSONAL DATA In this screen it is possible to set the name of the system the data relating to the customer and any notes The name assigned then appears in the list on System list ...

Страница 15: ...d By accessing this screen with Administrator privileges it is also possible to arm disarm the system and display its status If at the time of activation there are any open entrances the problem is signaled and you are asked whether to force the entry or check the status of the inputs in question Fig 20 4 4 WIRED INPUTS In the section on setting the row inputs you can configure the name programs a...

Страница 16: ...ndicates after how many alarm cycles settable from 1 to 15 or infinite the device is excluded until the next disarming of the system TAMPER N C CONTACT CONTROL PANEL Table 6 Options Option Description Excluded The input is excluded or excluded Silent If the input is violated the alarm output is not activated but remains in memory Test The control panel emits a sound whenever the entry is violated ...

Страница 17: ...ons When the message below appears open the sabotage of the device you wish to store Then enter the name in the next screen and click on Apply to confirm 4 5 BUS DEVICES 4 5 2 Partial cancellation of BUS devices To delete the devices on the BUS individually from the BUS controllers section select the item to be deleted from the drop down menu and press Delete to confirm Fig 23 ...

Страница 18: ...ller privileges Fig 25 Fig 24 4 6 OUTPUTS In the Outputs section it is possible to set the options related to the normal operation of the outputs for example if they are activated in relation to logic inputs with silent parameters electric lock etc The GSM option is exclusive to the others and allows to command output only with the dialer Press Apply to make the changes effective This operation ca...

Страница 19: ...i tamper button when prompted as indicated on the respective device manuals Fig 27 4 7 1 Storage of magnetic contact The magnetic contact screen allows you to activate or not the magnetic reed activate the external AUX contact the association of the latter to one of the three programs or to all three the operating parameters the times and the various attributes whose detail is shown in the next ta...

Страница 20: ...ed it is activated only if another input that has the active delay option detects a presence and follows the same time duration A alarm If active when the zone is violated the control panel switches relay A K alarm If active when the zone is violated the control panel will activate the K output following its programming Fire To be assigned to the input if it is associated with a fire sensor Bell T...

Страница 21: ...the input if it is associated with a fire sensor Bell The control panel emits a sound when the input is violated but only when the system is disarmed Electrolock If the input is violated the output with this attribute will be activated for a time set in the time section Fig 29 4 7 3 Storing wireless sirens The siren screen allows you to set the siren volume by choosing from the relative drop down ...

Страница 22: ...es the input when a key is entered including a code or remote control for a certain period of time This time can be set in the times section 24 h The attribute transforms the input into a 24 hour zone Monitoring Enable the device to send monitoring signals LED ON The detector LEDs remain ON during operation Delayed It allows you to set a period of time from the detection within which the system ha...

Страница 23: ...key is entered including a code or remote control for a certain period of time This time can be set in the times section 24 h The attribute transforms the input into a 24 hour zone Monitoring Enable the device to send monitoring signals LED ON The detector LEDs remain ON during operation Delayed It allows you to set a period of time from the detection within which the system has to be disabled Pat...

Страница 24: ...des the input when a key is entered including a code or remote control for a certain period of time This time can be set in the times section 24 h The attribute transforms the input into a 24 hour zone Monitoring Enable the device to send monitoring signals LED ON The detector LEDs remain ON during operation Delayed It allows you to set a period of time from the detection within which the system h...

Страница 25: ...io control is recognized the outputs with this attribute are activated Antipanic When the radio control is recognized the sirens and all the outputs programmed as panic are activated Patrol With the system armed it excludes the inputs with the Ronda attribute for a certain period of time that can be set in the times section Silent When the radio control is recognized the outputs programmed as Sile...

Страница 26: ...itivo all invio dei segnali di Monitoring LED ON I LED del rilevatore rimangono accesi durante il funzionamento Enable with activated system L uscita è attiva solo se l impianto è inserito anche parzialmente AND Se abilitato l uscita viene commutata quando almeno due ingressi commutano entro un tempo di 30s A alarm Se abilitato l uscita si attiva quando viene violata una zona con attributo A K ala...

Страница 27: ... trigs when the alarm is disarmed A Alarm If enabled the fogging is activated when an input with attribute A is violated K Alarm If enabled the fogging is activated when an input with attribute K is violated Fire If active the fogging is triggered when an input with fire attribute is violated even when the system is disarmed Bell If active the fog is triggered when an input with bell attribute is ...

Страница 28: ...sibility zero Visibility 1 5 m 10 15 1 110 165 11 20 30 2 120 180 12 30 45 3 130 195 13 40 60 4 140 210 14 50 75 5 150 225 15 60 90 6 160 240 16 70 105 7 170 255 17 80 120 8 180 270 18 90 135 9 190 285 19 The first column shows the volume that you want to issue in the time indicated in the column on the right The volume varies de pending on the density and therefore on the visibility to be achieve...

Страница 29: ...s button and click on Yes to confirm the operation Fig 37 4 10 TIMES In the Times section it is possible to set the times related to the normal operation of the system as for example the duration of the alarm the duration of the silent alarm etc Press Apply to make the changes take effect A user with Administrator privileges can only exclude the inputs and view their status Fig 38 ...

Страница 30: ...t valid code is entered five consecutive times within a minute If the option is not enabled and five attempts of arming are made the system blocks for one minute during which codes and keys are not accepted even if previously stored Basic key if the option is enabled it allows the entire system to be armed disarmed by simply entering the key in the keyreader without pressing any key By enabling th...

Страница 31: ...ssociated with the alarm Superkey 2 if enabled from programming it enables output OUT Superkey 3 if enabled from programming it enables outputs relay output OUT Superkey 4 if enabled from programming it fully enables the system it does not disable Click on Apply to make the settings effective 5 3 CLOCK The clock section allows you to set the clock of the control unit and offers the possibility of ...

Страница 32: ... switch on automatically Each auto activation must be enabled by checking the relevant entry to be effective Press Apply to make the changes effective Fig 43 5 5 ACCESS CONTROLS 5 5 1 Keys storage To store the transponder keys for system switching go to the Commands section and press the Add new keys key When the message below appears move the key to be stored close to the keyreaders Fig 42 ...

Страница 33: ...he software automatically returns to the first screen so that others can be acquired When finished press Cancel to exit the procedure Fig 44 5 5 2 Codes storage To memorize access codes and system switching go to the Commands section and press the Add new codes button When the message appears enter the code you want to memorize and enter it again as confirmation This operation can only be performe...

Страница 34: ...e administrator In the Keys Codes section it is possible to log in only with administrator privileges Select from the Keys Code Choice menu based on the name assigned during storage it is therefore possible to change all the parameters and attributes related to them By clicking on Modify it is possible to modify the parameters of a code and search for it simply by entering it in the appropriate wi...

Страница 35: ...e numbers section you can set all the options related to the telephone numbers that must be contacted in case of need Press Apply to make the changes effective before proceeding to the setting of the next number The Test function allows performing tests on the correct sending of SMS and receiving voice calls for the numbers indicated in this phase each number indicated receives an SMS and a voice ...

Страница 36: ...mories exclusion faults etc From the drop down menu you can select in blocks of 16 the group of radio inputs of which you want to receive information In particular by double clicking on a memorized device it is possible to receive information such as the peripheral signal level the FW version and the transmission frequency Fig 51 Fig 52 By clicking on the RF field Analysis button it is possible to...

Страница 37: ...TS LOG The Events Log section allows you to view events such as access arming disarming alarms etc which can be filtered from the drop down menu Furthermore it is offered the possibility to export them in a text file csv The two keys Request and Stop allow you to make the event request and stop it with Stop when necessary Fig 54 ...

Страница 38: ...in the example below on a screen that can be exported to a text file using the appropriate Export button Questa funzione permette in qualsiasi momento di collaudare il buon funzionamento dell impianto Fig 56 8 SYSTEM MANAGEMENT The following screenshots deal with the commands related to plant management 8 1 RF TURN OFF Il tasto RF turn OFF nella sezione Commands permette di spegnere la parte radio...

Страница 39: ...o return the control panel to the factory settings On the next screen enter the GoldSOFT password to make the changes effective Fig 57 8 3 SERVICE STATUS Press the Activate service button to activate the service status of the control panel Press the button again to deactivate it Fig 58 ...

Страница 40: ...lows access to various settings and additional functions useful for better management of the software and the system 9 1 GOLDSOFT MENÙ The GoldSOFT menu allows you to set the language set the serial port change the software password and use the import and export function In particular the items import and export allow you to import and export the list of systems present in the software in zip form...

Страница 41: ...simply change the name of the system and press the SAVE key 9 3 2 Off line mode no connection between control panel and software It is possible to configure new systems except for radio devices or modify systems already present in the database Click on the item plant open the list and open the demo system This allows to configure a system without having to receive the configuration from the contro...

Страница 42: ...ars ATTENTION DO NOT use chlorinated products abrasive products or alcohol to remove particularly noticeable dirt 1 Clean the lid with a cloth dampened with water 2 Then wipe with a dry cloth ATTENTION If after storing the devices the control panel is switched off or the control panel and devices are out of range it is recommended to remove the batteries from the devices in order to preserve their...

Страница 43: ...d disconnect all terminal blocks on the terminal board see Fig 3 3 Divide the parts according to their type and dispose of them according to the laws in force ATTENTION Do not disperse the components and any other material of the product into the environment Consult authorised consortia for the disposal and recycling of materials ...

Страница 44: ... 33 49 2 18 34 50 3 19 35 51 4 20 36 52 5 21 37 53 6 22 38 54 7 23 39 55 8 24 40 53 9 25 41 57 10 26 42 58 11 27 43 59 12 28 44 60 13 29 45 61 14 30 46 62 15 31 47 63 16 32 48 64 Tel number Name Tel number Name Tel number Name Tel number Name 01 05 09 13 02 06 10 14 03 07 11 15 04 08 12 16 Wired outputs Name NA C NC 01 02 03 04 WIRED INPUTS N Name N Name N Name N Name N Name N Name 1 6 11 16 21 26...

Отзывы: