background image

HB-G100

HB-G100

HB-G100

HB-G100 Series

Series

Series

Series

User

User

User

User Manual

Manual

Manual

Manual for

for

for

for Intelligent

Intelligent

Intelligent

Intelligent

Burglar

Burglar

Burglar

Burglar Alarm

Alarm

Alarm

Alarm Host

Host

Host

Host

Ningbo

Ningbo

Ningbo

Ningbo Saferhome

Saferhome

Saferhome

Saferhome Electronics

Electronics

Electronics

Electronics Co.,

Co.,

Co.,

Co., Ltd.

Ltd.

Ltd.

Ltd.

We

We

We

We are

are

are

are honoured

honoured

honoured

honoured that

that

that

that you

you

you

you have

have

have

have chosen

chosen

chosen

chosen our

our

our

our security

security

security

security products.

products.

products.

products.

Thanks

Thanks

Thanks

Thanks for

for

for

for your

your

your

your wise

wise

wise

wise selection.

selection.

selection.

selection. To

To

To

To make

make

make

make full

full

full

full use

use

use

use of

of

of

of its

its

its

its performance

performance

performance

performance

and

and

and

and ensure

ensure

ensure

ensure stable

stable

stable

stable operation

operation

operation

operation of

of

of

of the

the

the

the host,

host,

host,

host, please

please

please

please carefully

carefully

carefully

carefully read

read

read

read this

this

this

this

User

User

User

User Manual

Manual

Manual

Manual before

before

before

before operating

operating

operating

operating the

the

the

the host.

host.

host.

host. For

For

For

For any

any

any

any questions,

questions,

questions,

questions, please

please

please

please

don

don

don

don’’’’tttt hesitate

hesitate

hesitate

hesitate to

to

to

to consult

consult

consult

consult our

our

our

our Customer

Customer

Customer

Customer Service

Service

Service

Service Department

Department

Department

Department or

or

or

or

agents.

agents.

agents.

agents.

Содержание HB-G100 Series

Страница 1: ...lection To To To To make make make make full full full full use use use use of of of of its its its its performance performance performance performance and and and and ensure ensure ensure ensure stab...

Страница 2: ...Name and Usage of Main Components 6 V System Installation 11 VI Operating Instructions 12 VII How to Program Alarm Host 18 VIII Add Delete Detectors and Remote Controllers 27 IX Main Technical Specifi...

Страница 3: ...ly applied in workshops enterprises and business units schools and other large and medium scale places I I I I Definition Definition Definition Definition Arm Arm Arm Arm It refers to the state also c...

Страница 4: ...time or delayed arming time Ringing Ringing Ringing Ringing Times Times Times Times It refers to times of ringing the phone when users dial a fixed phone number or SIM card number connected to the ho...

Страница 5: ...timely Please periodically perform test to identify and debug failures in time so as to avoid system failure III III III III Main Main Main Main Characteristics Characteristics Characteristics Charact...

Страница 6: ...lephone numbers It can get access to any pre set telephone number and can set monitoring arming disarming and on the spot alarm by entering user password The alarm information of any detector can be m...

Страница 7: ...getting into set up mode A correct password is required for entering into set up mode In this mode users can modify alarm mode and alarm time and set alarm informed telephone numbers etc 3 SIGNAL Indi...

Страница 8: ...ndicator When the built in battery of any detector connected to the host is damaged Battery Damage Indicator will light up and display the defense zone No 11 Invalid Indicator When any infrared detect...

Страница 9: ...er into Partial Arm mode Note If the host is under Full Arm mode disarm the host and then press F1 key to enter into Partial Arm mode 21 F2 Key F2 key acts as Full Arm key Press F2 key to enter into F...

Страница 10: ...9 Installation Installation Installation Installation Wiring Wiring Wiring Wiring Diagram Diagram Diagram Diagram of of of of Engineering Engineering Engineering Engineering Host Host Host Host...

Страница 11: ...ith 120 ohm resistor Wired Defense Zone Input Z1 Z8 represents input of defense zone 1 8 which respectively corresponds to defense zone number 000 007 Defense zone 000 is a tamper zone intended for th...

Страница 12: ...nstallation suitable types and models of detectors should be adopted according to user s requirements for defense areas The installation location angle and height of detectors shall be determined acco...

Страница 13: ...concentration of flammable explosive vapor gas dust or fiber exists otherwise it may cause any hazard The alarm host shall not be close to devices with high electromagnetic radiation such as TV air c...

Страница 14: ...ompt that Please enter a pre set password Step 2 Enter password 112233 and after password and then the alarm host gives out a voice prompt that The alarm host is entering into adjustment mode 112233 i...

Страница 15: ...e host learn the code of the next remote controller until the host completes learning codes of all remote controllers 2 2 2 2 Delete Delete Delete Delete Remote Remote Remote Remote Controllers Contro...

Страница 16: ...Take Take Defense Defense Defense Defense Zone Zone Zone Zone 010 010 010 010 for for for for example example example example Step 1 Enter and then the host gives out a voice prompt Please enter a pre...

Страница 17: ...n defense zone 010 has been deleted Step 6 Press key and then follow the voice prompt Delete a detector to delete the detector Note a Detectors numbered 000 559 shall be added in accordance with the s...

Страница 18: ...h the same procedure b To modify the attributes of defense zones continuously enter 011 after theattribute of the first defense zone is modified and then the host will give out avoice prompt The host...

Страница 19: ...ively related to Low Voltage Low Voltage Recovery Anti tamper Invalid Operation Invalid Operation Recovery Light Disturbance Light Disturbance Recovery Before detectors transmit any code please confir...

Страница 20: ...entering into adjustment mode And then users can continue with the next step If user password is wrong the system will exit set up mode and at the same time the set up indicator goes out Note Note Not...

Страница 21: ...ure Information Command Function Clear Failure Information Command Grammar 4 Function Description This command serves to clear failure information which is mainly applicable to manually clear troubles...

Страница 22: ...tre or your local distributor for help 4 How to Set Phone Command Command Command Command Function Function Function Function Set Set Set Set Informed Informed Informed Informed Phone Phone Phone Phon...

Страница 23: ...Delete the first group of informed user phone number For the first two steps please refer to the above mentioned procedure in SET mode Step 3 Enter 10 10 represents informed phone number and and then...

Страница 24: ...e Operating Steps Please enter the preset password 112233 The host enters into adjusting mode 37 Please enter ringing times 09 The host gives out a voice prompt Ding to indicate ringing times has been...

Страница 25: ...rompt sound is given out when a remote controller is working an alarm occurs due to phone line cut off or the power supply voltage is too low Note a When alarm volume is set to any level in accordance...

Страница 26: ...call you will hear the siren and then you can follow the prompts to perform other operations Note When any function of and is selected the other function will be automatically invalid 8 Set Various T...

Страница 27: ...t does not sound an alarm when you disarm the defense zone by remote control or phone for local calls within the entry period of time If you do not disarm the defense zone within the entry period of t...

Страница 28: ...pts Ademco Contact ID protocol to transmit information XXXX is a 4 digit host ID set by users VIII VIII VIII VIII Operating Operating Operating Operating Instructions Instructions Instructions Instruc...

Страница 29: ...ctor alarm information and failure information to be deleted Once the above mentioned arm disarm operation is completed the system will automatically exit set up mode 3 Arm Disarm by Remote Control Pr...

Страница 30: ...3 3 3 3 Alarm Alarm Alarm Alarm Receiving Receiving Receiving Receiving Operation Operation Operation Operation In phone alarm mode upon receipt of alarm call you can hear a 5 second siren or record a...

Страница 31: ...nter the following commands after 30 seconds 1 Arm Set to Full Arm 2 Disarm 3 Activate on site siren at the maximum volume level 0 0 Exit Alarm Receiving Mode For example Once user password is correct...

Страница 32: ...Transmitting Power 10 mW Dimension 35 61 14 mm X X X X Standard Standard Standard Standard Configuration Configuration Configuration Configuration List List List List Standard Configuration List of A...

Страница 33: ...standard phone device The alarm host alarms immediately when powered on or armed The end of line resistors of the alarm host are not installed or become loose Install end of line resistors according t...

Страница 34: ...of thephone XIII XIII XIII XIII Programming Programming Programming Programming Set up Set up Set up Set up and and and and Other Other Other Other Operating Operating Operating Operating Commands Co...

Страница 35: ...DD 01 99 seconds 3 5 D D Set leaving time DD 01 99 seconds 3 6 D D Set entry time DD 01 99 seconds 3 7 D D Set ringing times in other areas DD 05 15 times 3 8 D D Set dialling times DD 03 99 times 40...

Страница 36: ...lfunction The passive infrared detector can only detect an intruder breaking into any area mentioned in Detector Installation Instructions but can not detect a body in motion or intruder behind walls...

Страница 37: ...duct to us within 3 days from purchase date provided no man made damage occurs and we will refund you all money Otherwise you will be deemed to have agreed to the above mentioned terms User Warning Th...

Отзывы: