Bosch B3512-NC, B3512 Specsheet

Intrusion Alarm Systems | B3512 Control Panels
B3512 Control Panels
www.boschsecurity.com
u Provides up to 16 points using 8 on-board and 8
wireless points for installation flexibility with perimeter and interior control. Supports keypad points.
The B3512 Control Panel integrates intrusion and residential fire, providing one simple user interface for both systems. The B3512 provides up to 16 individually identified points in a single area. The control panel can communicate through its built-in Ethernet port (not applicable to “E” control panels), or through compatible plug-in modules that can send events over the public switched telephone network (PSTN) or over cellular network communications. With the B3512, you can monitor doors, windows, and motion within areas like showrooms or those that hold inventory. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system.
u On-board Ethernet port for Conettix IP alarm
communication and remote programming, compatible with modern IP networks including IPv6/ IPv4, Auto-IP, and Universal Plug and Play
u Installer-friendly features for simple installation and
communications, including on-board USB for easy on-site RPS programming, plus support for Remote Connect Service (not available in Europe, the Middle East, or Africa), and plug-in PSTN and cellular communication modules for simple installation and communications
u Remote Security Control (RSC) app which allows
users to control their security systems - and view system cameras - remotely from mobile devices such as phones and tablets
u Programmable keypad shortcuts, situation sensitive
on-screen help, and a bilingual user interface make system operation simple and easy
Use programmable authority levels with restricted privileges to provide service, security, and cleaning personnel with full or limited access. Use the three programmable outputs to turn on lights or lock and unlock doors. Users can:
• Turn on the system to secure the stock room while you conduct daily business.
• Perform tests to ensure your system is working properly.
• Set your system to alarm immediately if a door opens.
• Activate the Watch feature so a tone sounds whenever a customer enters.
• Set a schedule for your system to automatically turn on at closing time.
| B3512 Control Panels
2
• Use wireless security options to customize your system.
Central monitoring stations provide 24-hour system monitoring with access to vital services. Professional security personnel can test the system, monitor system activity, and alert the police, fire department, or other emergency response teams if necessary.
Functions
Programmable outputs
• Three programmable on-board outputs; one high current using a relay, and two trigger outputs
• Output A, with a contact rating of 3 Amps, can supply up to 1.0 A total current from AUX PWR
• Outputs B and C sink up to 50 mA at 12 VDC
• Four alarm-output patterns
• Programmable bell test
System response
• High-performance micro-controller provides industry leading system response
• 20 custom point indexes
• Selectable point response time
• Cross point capability
• Fire alarm verification
• Dangerous gas indicator includes carbon monoxide (NFPA 720)
• Watch mode
• A scheduled event (SKED) to perform several functions, such as turn on (arm) the system, turn off (disarm) the system, bypass and unbypass points, and control relays
User interface
• Supervision of up to 4 keypads
• Custom keypad text is fully programmable through RPS
• Full function menu including custom functions
• Authority by area and 32 character name for each user
• 14 custom authority levels control user’s authority to change, add, or delete passcodes to disarm or bypass areas; and to start system tests
• Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese
Area Re-Arm
For higher security applications, this feature guarantees that areas are always rearmed, and are disarmed for no longer than a specific, configurable, amount of time (for example, service time).
Custom functions
For added convenience, the installer can program one custom function. A custom function allows customers to complete complex tasks with fewer keystrokes. For example, a custom function can bypass a group of points and arm the system, allowing the user to perform this function with one easy command. Installers can use custom functions to control a
particular room. Customers activate a custom function with a keypad, with a keyfob, by faulting a point, or automatically as a scheduled event (SKED).
Passcode security
• Two-man rule. Requires two people with two unique passcodes to be present at the time of opening.
• Early ambush. Allows users to verify that the facility is safe by requiring two passcodes. The control panel sends a duress event if the user does not enter the passcode a second time after inspecting the premises.
• Dual authentication. Requires two forms of identification before processing certain system commands, including turning off the system and opening doors. A standard system user must have a passcode, a credential (token or card), and appropriate command authority permissions.
Easy exit control
The control panel changes from one On (armed) state to another without turning off (disarming) the system. For example, if you change the state from Part On (Perimeter Arm) to All On (Master Arm), the control panel complies and reports the change. Easy Exit Control reduces the number of keystrokes, simplifying system operation.
Programmable passcode-controlled menu list
Passcode-controlled shortcuts provide users only with the options and information pertinent to them, simplifying system operation.
Monitor Delay/Delayed Response
Create a special point index that delays the reaction of a point for a specified time (up to 1 hour in minutes and seconds). This delay provides time for the specified condition to reset before activating any annunciation. The system can annunciate locally and send a report, if desired. When the system is armed, the point can respond like a normal point – providing dual functionality. Use this feature to ensure that perimeter doors have not been propped open, or to monitor critical areas such as computer rooms and safes, for example.
System users
The system supports up to 10 users. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system. You can assign passcodes to one of 14 customized authority levels that can be restricted to operate only during certain times. Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese.
Communication formats
The control panel prioritizes and sends reports to four route groups. Network and phone communications can use one of two communication formats: Modem4, Contact ID. Each group has a programmable primary and backup destination.
| B3512 Control Panels
3
The control panel provides flexible communications for most central stations with reporting capabilities such as:
• Individual point numbers
• Opening or closing reports by user and area number
• Remote programming attempts
• Diagnostic reports
IP communication
The control panel can use IP to communicate with a Conettix D6600 or a Conettix D6100IPv6 Communications Receiver/Gateway. Use one of the following for IP:
• The on-board Ethernet connection (the on-board Ethernet port is excluded on “E” versions).
• A B426.
• A plug-in cellular communicator (B440/B440-C/B441/ B441-C/B442/B443/B444).
Conettix IP communication provides a secure path that includes anti-replay/anti-substitution features, and enhanced security with up to AES 256-bit encryption (using Cipher Block Chaining (CBC)). The control panel supports Domain Name System (DNS) for both remote programming and central station communication. DNS provides ease of use, eliminating the need to use static IP addresses as your reporting destination, and accommodates a simple solution for central station disaster recovery. The control panel supports both IPv6 and IPv4 networks.
Communication paths
The control panel accommodates up to four separate phone and four separate network paths to the central station receiver. When resetting alarms or turning a system on and off, the user is identified by name and number.
Personal notification
The control panel can send text messages and emails for personal notification over Ethernet or using a cellular communicator. You can configure up to 16 destinations using a combination of cellular phone numbers and email addresses. The control panel sends notifications in the user’s programmed primary language.
Bosch Remote Connect (Cloud)
Remote Connect simplifies connections from RPS, and the Remote Security Control app, using Bosch Cloud services. This service creates a secure connection to the control panel without specific router settings or the need for a static IP address or DNS.
Notice
The Bosch Remote Connect service is not available in Europe, the Middle East, or Africa.
Firmware updates
The system allows remote firmware updates:
• Control panel updates. Remotely update the control panel firmware for easy feature enhancements without replacing ROM chips.
• Module update support. Remotely update the firmware on connected SDI2 modules for easy feature enhancements without visiting each individual module.
Firmware updates occur through Remote Programming Software (RPS) and the RPS Firmware Update Wizard. The Firmware Update Wizard uses the on-board USB connection or the on-board Ethernet (IP) connection (the on-board Ethernet port is excluded on “E” versions) to transfer firmware updates. The control panel can optionally receive firmware updates from RPS. Use one of the following communication methods:
• B426
• Plug-in cellular communicator: B440/B440-C/B441/ B441-C/B442/B443/B444
Notice
Data rate apply Cellular firmware updates require more time than Ethernet updates and carrier data rates apply.
A wide variety of input options
Each point:
• Accommodates normally‑open (NO) and normally‑closed (NC) devices with end‑of‑line (EOL) resistor supervision.
• Accepts programming for fire, gas, fire supervisory, or intrusion applications.
• Supports hardwired and wireless devices.
Security and fire detection
The control panel provides 8 on-board points, and up to 8 additional wireless points. You can program individual points to monitor burglar alarms, fire alarms, and supervision devices.
Event log
The event log stores local and reported events. The event log includes information such as time, date, event, area, point, and user. View the event log from a keypad or use RPS to remotely retrieve event information. When the event log reaches a programmed threshold of stored events, it can send an optional report to a receiver. The log stores up to 127 local and reported events.
Scheduled events (SKEDs)
The internal clock and calendar start a scheduled event (SKED). A SKED performs functions such as turn on or off, relay control, or point bypassing.
• One scheduled event with up to 25 different functions
• Two opening windows and two closing windows
• Two user group windows
• Day-of-week, date-of-month, or holiday only schedules
• One holiday schedule of 366 days (leap year)
Programming
Installers can perform limited programming on-site with a keypad (critical parameters; such as account IDs, central station and RPS IP addresses and phone
Loading...
+ 5 hidden pages