ADEMCO 4120XM Guía de usuario Pagina 61

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 80
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 60
What Can Be Done
Arm the System in the Away Mode; Disarm the System
once
Panel IS Bypass a Zone
‘lOn-Linell?
c Force the System to Accept a New Program Download
Shut Down Communication (dialer) Functions (non-payment of monitoring fees
in an owned system)
Shut Down all Security System Functions (non-payment for a leased system)
Inhibit Local Keypad Programming (prevents takeover of your accounts)
Leave a message for customer (5137 ONLY)
Command the System to Upload a Copy of its Resident Program to the office
Read: Arming Status, AC Power Status, List of Faulted Zones, List of
Bypassed Zones, 10-Day Alarm History Log, 10-Day Trouble Histoy Log, List
of Zones Currently in Alarm, List of
Zones Currently in Trouble, List of RF
sensors with low battery conditions
How Secure Is
Accessing the Control from a remote location is protected against compromise by
Downloading?
the use of 4 levels of protection:
1. Security Code Handshake: The subscribers account number as well as an 8-
digit ID number (known only to the office) must be matched between the
Control and computer.
2.
Hang-Up and Cal/-Back: The Control panel will “hang-up” and call the
computer back at the pre-programmed number only if the security codes
match.
3.
Data Encryption: All data that is exchanged between the computer and Control
is encrypted to reduce the possibility of anyone “tapping” the line and corrupting
data.
4.
Operator Access Levekx Up to 15 operators can have access to the
DOWNLOADER, each having their own log-on code. However, each operator
can be assigned one of three levels of access in both FILE and COMMAND
functions, as follows:
FILE ACCESS:
Read On/y:
able only to look at the database; cannot change any information,
and cannot see the customer’s access codes.
Part Read/lWrite: able to look at and change all information. except the
customer’s access codes.
Fu// ReaoWVrite.’
able to look at and change any and all information in the
database.
CONTROUCOMM ACCESS:
Read On/y: able only to Upload and arm the system. Not able to DISARM,
BYPASS, or change any information.
Parl Read/Write: able to ARM, BYPASS, UPLOAD, DOWNLOAD but cannot
shutdown the system.
Fu// Read/Write: able to perform all control and status commands, as well as
shutdown all or part of the system.
Notes:
1. Each time the Control panel is accessed (whether successful or
unsuccessful), a PROGRAM TAMPER report ~40) is sent to central station, if
programmed.
2. When downloading, the console will display “MODEM COMM” (Alpha
consoles) or “CC” (Fixed-word consoles)
3. Whenever a download or a save is done, an automatic time stamp is done,
indicating the date and time of the last download (or save) and the operator ID
number.
4. The average time for a complete download, including initial call-up, hang-up
and call-back is under 4 minutes.
5. A complete hard copy of each individual account can be obtained by
connecting a printer to the computer. Refer to your computer owner’s manual
or contact your dealer for printer recommendations.
—61—
Vista de pagina 60
1 2 ... 56 57 58 59 60 61 62 63 64 65 66 ... 79 80

Comentarios a estos manuales

Sin comentarios