Bosch B3512-NC, B3512 Specsheet

Bosch B3512-NC, B3512 Specsheet

Intrusion Alarm Systems | B3512 Control Panels

B3512 Control Panels

www.boschsecurity.com

The B3512 Control Panel integrates intrusion and residential fire, providing one simple user interface for both systems. The B3512 provides up to 16 individually identified points in a single area.

The control panel can communicate through its built-in Ethernet port (not applicable to “E” control panels), or through compatible plug-in modules that can send events over the public switched telephone network (PSTN) or over cellular network communications.

With the B3512, you can monitor doors, windows, and motion within areas like showrooms or those that hold inventory. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system.

uProvides up to 16 points using 8 on-board and 8 wireless points for installation flexibility with perimeter and interior control. Supports keypad points.

uOn-board Ethernet port for Conettix IP alarm communication and remote programming, compatible with modern IP networks including IPv6/ IPv4, Auto-IP, and Universal Plug and Play

uInstaller-friendly features for simple installation and communications, including on-board USB for easy on-site RPS programming, plus support for Remote Connect Service (not available in Europe, the Middle East, or Africa), and plug-in PSTN and cellular communication modules for simple installation and communications

uRemote Security Control (RSC) app which allows users to control their security systems - and view system cameras - remotely from mobile devices such as phones and tablets

uProgrammable keypad shortcuts, situation sensitive on-screen help, and a bilingual user interface make system operation simple and easy

Use programmable authority levels with restricted privileges to provide service, security, and cleaning personnel with full or limited access. Use the three programmable outputs to turn on lights or lock and unlock doors. Users can:

Turn on the system to secure the stock room while you conduct daily business.

Perform tests to ensure your system is working properly.

Set your system to alarm immediately if a door opens.

Activate the Watch feature so a tone sounds whenever a customer enters.

Set a schedule for your system to automatically turn on at closing time.

2 | B3512 Control Panels

Use wireless security options to customize your system.

Central monitoring stations provide 24-hour system monitoring with access to vital services. Professional security personnel can test the system, monitor system activity, and alert the police, fire department, or other emergency response teams if necessary.

Functions

Programmable outputs

Three programmable on-board outputs; one high current using a relay, and two trigger outputs

Output A, with a contact rating of 3 Amps, can supply up to 1.0 A total current from AUX PWR

Outputs B and C sink up to 50 mA at 12 VDC

Four alarm-output patterns

Programmable bell test

System response

High-performance micro-controller provides industry leading system response

20 custom point indexes

Selectable point response time

Cross point capability

Fire alarm verification

Dangerous gas indicator includes carbon monoxide (NFPA 720)

Watch mode

A scheduled event (SKED) to perform several functions, such as turn on (arm) the system, turn off (disarm) the system, bypass and unbypass points, and control relays

User interface

Supervision of up to 4 keypads

Custom keypad text is fully programmable through RPS

Full function menu including custom functions

Authority by area and 32 character name for each user

14 custom authority levels control user’s authority to change, add, or delete passcodes to disarm or bypass areas; and to start system tests

Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese

Area Re-Arm

For higher security applications, this feature guarantees that areas are always rearmed, and are disarmed for no longer than a specific, configurable, amount of time (for example, service time).

Custom functions

For added convenience, the installer can program one custom function. A custom function allows customers to complete complex tasks with fewer keystrokes. For example, a custom function can bypass a group of points and arm the system, allowing the user to perform this function with one easy command. Installers can use custom functions to control a

particular room. Customers activate a custom function with a keypad, with a keyfob, by faulting a point, or automatically as a scheduled event (SKED).

Passcode security

Two-man rule. Requires two people with two unique passcodes to be present at the time of opening.

Early ambush. Allows users to verify that the facility is safe by requiring two passcodes. The control panel sends a duress event if the user does not enter the passcode a second time after inspecting the premises.

Dual authentication. Requires two forms of identification before processing certain system commands, including turning off the system and opening doors. A standard system user must have a passcode, a credential (token or card), and appropriate command authority permissions.

Easy exit control

The control panel changes from one On (armed) state to another without turning off (disarming) the system. For example, if you change the state from Part On (Perimeter Arm) to All On (Master Arm), the control panel complies and reports the change. Easy Exit Control reduces the number of keystrokes, simplifying system operation.

Programmable passcode-controlled menu list

Passcode-controlled shortcuts provide users only with the options and information pertinent to them, simplifying system operation.

Monitor Delay/Delayed Response

Create a special point index that delays the reaction of a point for a specified time (up to 1 hour in minutes and seconds). This delay provides time for the specified condition to reset before activating any annunciation. The system can annunciate locally and send a report, if desired. When the system is armed, the point can respond like a normal point – providing dual functionality. Use this feature to ensure that perimeter doors have not been propped open, or to monitor critical areas such as computer rooms and safes, for example.

System users

The system supports up to 10 users. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system. You can assign passcodes to one of 14 customized authority levels that can be restricted to operate only during certain times. Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese.

Communication formats

The control panel prioritizes and sends reports to four route groups. Network and phone communications can use one of two communication formats: Modem4, Contact ID. Each group has a programmable primary and backup destination.

3 | B3512 Control Panels

The control panel provides flexible communications for most central stations with reporting capabilities such as:

Individual point numbers

Opening or closing reports by user and area number

Remote programming attempts

Diagnostic reports

IP communication

The control panel can use IP to communicate with a Conettix D6600 or a Conettix D6100IPv6 Communications Receiver/Gateway. Use one of the following for IP:

The on-board Ethernet connection (the on-board Ethernet port is excluded on “E” versions).

A B426.

A plug-in cellular communicator (B440/B440-C/B441/ B441-C/B442/B443/B444).

Conettix IP communication provides a secure path that includes anti-replay/anti-substitution features, and enhanced security with up to AES 256-bit encryption (using Cipher Block Chaining (CBC)).

The control panel supports Domain Name System (DNS) for both remote programming and central station communication. DNS provides ease of use, eliminating the need to use static IP addresses as your reporting destination, and accommodates a simple solution for central station disaster recovery. The control panel supports both IPv6 and IPv4 networks.

Communication paths

The control panel accommodates up to four separate phone and four separate network paths to the central station receiver. When resetting alarms or turning a system on and off, the user is identified by name and number.

Personal notification

The control panel can send text messages and emails for personal notification over Ethernet or using a cellular communicator. You can configure up to 16 destinations using a combination of cellular phone numbers and email addresses. The control panel sends notifications in the user’s programmed primary language.

Bosch Remote Connect (Cloud)

Remote Connect simplifies connections from RPS, and the Remote Security Control app, using Bosch Cloud services. This service creates a secure connection to the control panel without specific router settings or the need for a static IP address or DNS.

Notice

The Bosch Remote Connect service is not available in Europe, the Middle East, or Africa.

Firmware updates

The system allows remote firmware updates:

Control panel updates. Remotely update the control panel firmware for easy feature enhancements without replacing ROM chips.

Module update support. Remotely update the firmware on connected SDI2 modules for easy feature enhancements without visiting each individual module.

Firmware updates occur through Remote Programming Software (RPS) and the RPS Firmware Update Wizard. The Firmware Update Wizard uses the on-board USB connection or the on-board Ethernet (IP) connection (the on-board Ethernet port is excluded on “E” versions) to transfer firmware updates.

The control panel can optionally receive firmware updates from RPS. Use one of the following communication methods:

B426

Plug-in cellular communicator: B440/B440-C/B441/ B441-C/B442/B443/B444

Notice

Data rate apply

Cellular firmware updates require more time than Ethernet updates and carrier data rates apply.

A wide variety of input options

Each point:

Accommodates normally open (NO) and normally closed (NC) devices with end of line (EOL) resistor supervision.

Accepts programming for fire, gas, fire supervisory, or intrusion applications.

Supports hardwired and wireless devices.

Security and fire detection

The control panel provides 8 on-board points, and up to 8 additional wireless points. You can program individual points to monitor burglar alarms, fire alarms, and supervision devices.

Event log

The event log stores local and reported events. The event log includes information such as time, date, event, area, point, and user. View the event log from a keypad or use RPS to remotely retrieve event information. When the event log reaches a programmed threshold of stored events, it can send an optional report to a receiver.

The log stores up to 127 local and reported events.

Scheduled events (SKEDs)

The internal clock and calendar start a scheduled event (SKED). A SKED performs functions such as turn on or off, relay control, or point bypassing.

One scheduled event with up to 25 different functions

Two opening windows and two closing windows

Two user group windows

Day-of-week, date-of-month, or holiday only schedules

One holiday schedule of 366 days (leap year)

Programming

Installers can perform limited programming on-site with a keypad (critical parameters; such as account IDs, central station and RPS IP addresses and phone

Loading...
+ 5 hidden pages