background image

30

phone numbers.

4.

4.

4.

4. Remote

Remote

Remote

Remote Set-up

Set-up

Set-up

Set-up

Call the phone numbers pre-set for the user alarm host through fixed phone or

mobile phone in other areas, and then the user alarm host will automatically pick up

the phone after receiving several rings (program default: 9 times ) and at the same

time you can hear a voice prompt “Welcome to Use Hengbo Security Product”. And

then you can enter # # # through the keyboard of fixed phone or mobile phone, and

then you can hear a voice prompt “Please enter user password”. Enter A A A A A A #.

“A A A A A A ” is a 6-digit user password (The factory default user password is

123456, which can be modified by users). If user password is wrong, the system will

automatically cut off phone line and exit set-up mode. If user password is correct,

please selectively enter the following commands after 30 seconds.

1 #

Arm (Set to Full Arm)

2 #

Disarm

3 #

Activate on-site siren at the maximum volume level

0 # 0 #

Exit Alarm Receiving Mode

For example: Once user password is correct, you will hear a short “Beep”

prompt, and then the system will wait for receiving commands in the next 30

seconds. At this time, you can enter operating commands through the keyboard of a

long-distance fixed phone or cell phone. Enter 1 # to arm the alarm host. Enter 2 # to

disarm the alarm host. Enter 3 # to activate on-site siren immediately. Enter 0 # 0 #

to exit set-up mode. If users can not perform any valid operation within 30-second

wait time, the alarm host will automatically cut off phone line.

IX.

IX.

IX.

IX. Main

Main

Main

Main Technical

Technical

Technical

Technical Specifications

Specifications

Specifications

Specifications

1.

1.

1.

1.

User

User

User

User Alarm

Alarm

Alarm

Alarm Host

Host

Host

Host

Operating Voltage: AC220V

±

10%

50Hz

Operating Current: Standby Current:

100mA (for connecting a keyboard), Alarm

Current:

350mA

Содержание HB-G100 Series

Страница 1: ...lection To To To To make make make make full full full full use use use use of of of of its its its its performance performance performance performance and and and and ensure ensure ensure ensure stab...

Страница 2: ...Name and Usage of Main Components 6 V System Installation 11 VI Operating Instructions 12 VII How to Program Alarm Host 18 VIII Add Delete Detectors and Remote Controllers 27 IX Main Technical Specifi...

Страница 3: ...ly applied in workshops enterprises and business units schools and other large and medium scale places I I I I Definition Definition Definition Definition Arm Arm Arm Arm It refers to the state also c...

Страница 4: ...time or delayed arming time Ringing Ringing Ringing Ringing Times Times Times Times It refers to times of ringing the phone when users dial a fixed phone number or SIM card number connected to the ho...

Страница 5: ...timely Please periodically perform test to identify and debug failures in time so as to avoid system failure III III III III Main Main Main Main Characteristics Characteristics Characteristics Charact...

Страница 6: ...lephone numbers It can get access to any pre set telephone number and can set monitoring arming disarming and on the spot alarm by entering user password The alarm information of any detector can be m...

Страница 7: ...getting into set up mode A correct password is required for entering into set up mode In this mode users can modify alarm mode and alarm time and set alarm informed telephone numbers etc 3 SIGNAL Indi...

Страница 8: ...ndicator When the built in battery of any detector connected to the host is damaged Battery Damage Indicator will light up and display the defense zone No 11 Invalid Indicator When any infrared detect...

Страница 9: ...er into Partial Arm mode Note If the host is under Full Arm mode disarm the host and then press F1 key to enter into Partial Arm mode 21 F2 Key F2 key acts as Full Arm key Press F2 key to enter into F...

Страница 10: ...9 Installation Installation Installation Installation Wiring Wiring Wiring Wiring Diagram Diagram Diagram Diagram of of of of Engineering Engineering Engineering Engineering Host Host Host Host...

Страница 11: ...ith 120 ohm resistor Wired Defense Zone Input Z1 Z8 represents input of defense zone 1 8 which respectively corresponds to defense zone number 000 007 Defense zone 000 is a tamper zone intended for th...

Страница 12: ...nstallation suitable types and models of detectors should be adopted according to user s requirements for defense areas The installation location angle and height of detectors shall be determined acco...

Страница 13: ...concentration of flammable explosive vapor gas dust or fiber exists otherwise it may cause any hazard The alarm host shall not be close to devices with high electromagnetic radiation such as TV air c...

Страница 14: ...ompt that Please enter a pre set password Step 2 Enter password 112233 and after password and then the alarm host gives out a voice prompt that The alarm host is entering into adjustment mode 112233 i...

Страница 15: ...e host learn the code of the next remote controller until the host completes learning codes of all remote controllers 2 2 2 2 Delete Delete Delete Delete Remote Remote Remote Remote Controllers Contro...

Страница 16: ...Take Take Defense Defense Defense Defense Zone Zone Zone Zone 010 010 010 010 for for for for example example example example Step 1 Enter and then the host gives out a voice prompt Please enter a pre...

Страница 17: ...n defense zone 010 has been deleted Step 6 Press key and then follow the voice prompt Delete a detector to delete the detector Note a Detectors numbered 000 559 shall be added in accordance with the s...

Страница 18: ...h the same procedure b To modify the attributes of defense zones continuously enter 011 after theattribute of the first defense zone is modified and then the host will give out avoice prompt The host...

Страница 19: ...ively related to Low Voltage Low Voltage Recovery Anti tamper Invalid Operation Invalid Operation Recovery Light Disturbance Light Disturbance Recovery Before detectors transmit any code please confir...

Страница 20: ...entering into adjustment mode And then users can continue with the next step If user password is wrong the system will exit set up mode and at the same time the set up indicator goes out Note Note Not...

Страница 21: ...ure Information Command Function Clear Failure Information Command Grammar 4 Function Description This command serves to clear failure information which is mainly applicable to manually clear troubles...

Страница 22: ...tre or your local distributor for help 4 How to Set Phone Command Command Command Command Function Function Function Function Set Set Set Set Informed Informed Informed Informed Phone Phone Phone Phon...

Страница 23: ...Delete the first group of informed user phone number For the first two steps please refer to the above mentioned procedure in SET mode Step 3 Enter 10 10 represents informed phone number and and then...

Страница 24: ...e Operating Steps Please enter the preset password 112233 The host enters into adjusting mode 37 Please enter ringing times 09 The host gives out a voice prompt Ding to indicate ringing times has been...

Страница 25: ...rompt sound is given out when a remote controller is working an alarm occurs due to phone line cut off or the power supply voltage is too low Note a When alarm volume is set to any level in accordance...

Страница 26: ...call you will hear the siren and then you can follow the prompts to perform other operations Note When any function of and is selected the other function will be automatically invalid 8 Set Various T...

Страница 27: ...t does not sound an alarm when you disarm the defense zone by remote control or phone for local calls within the entry period of time If you do not disarm the defense zone within the entry period of t...

Страница 28: ...pts Ademco Contact ID protocol to transmit information XXXX is a 4 digit host ID set by users VIII VIII VIII VIII Operating Operating Operating Operating Instructions Instructions Instructions Instruc...

Страница 29: ...ctor alarm information and failure information to be deleted Once the above mentioned arm disarm operation is completed the system will automatically exit set up mode 3 Arm Disarm by Remote Control Pr...

Страница 30: ...3 3 3 3 Alarm Alarm Alarm Alarm Receiving Receiving Receiving Receiving Operation Operation Operation Operation In phone alarm mode upon receipt of alarm call you can hear a 5 second siren or record a...

Страница 31: ...nter the following commands after 30 seconds 1 Arm Set to Full Arm 2 Disarm 3 Activate on site siren at the maximum volume level 0 0 Exit Alarm Receiving Mode For example Once user password is correct...

Страница 32: ...Transmitting Power 10 mW Dimension 35 61 14 mm X X X X Standard Standard Standard Standard Configuration Configuration Configuration Configuration List List List List Standard Configuration List of A...

Страница 33: ...standard phone device The alarm host alarms immediately when powered on or armed The end of line resistors of the alarm host are not installed or become loose Install end of line resistors according t...

Страница 34: ...of thephone XIII XIII XIII XIII Programming Programming Programming Programming Set up Set up Set up Set up and and and and Other Other Other Other Operating Operating Operating Operating Commands Co...

Страница 35: ...DD 01 99 seconds 3 5 D D Set leaving time DD 01 99 seconds 3 6 D D Set entry time DD 01 99 seconds 3 7 D D Set ringing times in other areas DD 05 15 times 3 8 D D Set dialling times DD 03 99 times 40...

Страница 36: ...lfunction The passive infrared detector can only detect an intruder breaking into any area mentioned in Detector Installation Instructions but can not detect a body in motion or intruder behind walls...

Страница 37: ...duct to us within 3 days from purchase date provided no man made damage occurs and we will refund you all money Otherwise you will be deemed to have agreed to the above mentioned terms User Warning Th...

Отзывы: