Altronix® is a registered trademark of Altronix
Corporation.
Phillips
Company in the United States and other countries.
Windows
are registered trademarks of Microsoft Corporation in
the United States and/or other countries.
®
is a registered trademark of Phillips Screw
®
98, Windows® 2000, and Windows® XP,
UL Listings and Approvals
The Conettix C900V2 Dialer Capture Ethernet Module
is UL Listed under the following standards:
•UL Central Station Burglary (1610), Encrypted
Line Security
•UL Commercial Fire Alarm Signaling (864),
Primary
•UL Police Station Burglar Alarm Units and
Systems (365)
• FCC Part 15 Radiated/Conducted Emissions
• cUL S304-M88, Central and Monitoring Station
Burglar Alarm Units
•C1076, Proprietary Burglar Alarm Units and
Systems
cUL installations approved for Level 3 Line Security
when communicating over a packet-switched data
network (PSDN). Install according to ULC-S302.
Refer to the D6200 Software Operation and Installation Guide (P/N:
4998154991) for information on how to
prepare the D6600 or D6100i in your
Monitoring Center to receive UL Listed
communications from a Conettix
C900V2 Dialer Capture Ethernet
Module.
2 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 3
Conettix C900V2 | Installation Guide | Contents
1.0 Introduction
The Conettix C900V2 Dialer Capture Ethernet Module
(referred to as the C900V2) links the digital dialer
(data output) from a control panel to an Ethernet
connection on a local area network (LAN) or wide area
network (WAN).
When the dialer sends a message, the C900V2
simulates a public switched telephone network (PSTN)
connection to the central station. The C900V2
decodes the digital dialer message and sends the
decoded signals by Ethernet connection to the
Conettix D6600 or D6100i. Communication
Gateway/Receiver (referred to as the receiver). When
the receiver acknowledges receipt of the message, the
C900V2 sends an acknowledge message to the
dialer. This process maintains true end-to-end
security.
The C900V2 has three modular connectors:
• TELCO connects to the PSTN.
• PANEL connects to a digital dialer.
• Ethernet connects to the network.
In Intercept Mode, the C900V2 connects the digital
dialer to a LAN or WAN. In Fallback Mode, the
C900V2 connects the dialer to the PSTN, which
bypasses the C900V2 from the phone circuit. The
C900V2 stays in Intercept Mode when its CPU is
working (Output 1 open). In Fallback Mode, the
C900V2 connects the dialer directly to the PSTN. The
C900V2 switches to Fallback Mode if there is a CPU
or network failure.
2.0 Installation
Failure to follow these instructions can
result in the system failing to transmit an
alarm. Bosch Security Systems, Inc. is
not responsible for improperly installed,
tested, or maintained devices.
Notify the central station and the local
authority before installing the C900V2 in
an existing system.
Disconnect all power to the control
panel before installing the C900V2.
2.1 Mounting
The C900V2 is static sensitive. Before
handling the circuit board, touch earth
ground to discharge any static electricity
from your body. Use a grounding strap
while installing the circuit board.
Figure 1: Location of Major Components
3
2
1
HL
4
8
5
67
1 – RJ-45 phone jack (to PSTN)
2 – RJ-45 phone jack (to control panel)
3 – High and low voltage selector (refer to
Section 3.1 on page 8)
4 – DIP switch (refer to Section 3.2 on page 8)
5 – RJ-45 Ethernet jack (to LAN or WAN)
6 – Power terminal strip (refer to Section 2.5 on
page 7)
7 – Input and output wiring terminals (refer to
Sections 2.3 and 2.4 on page 7)
8 – Dialer and system LEDs (refer to Section 3.3 on
page 10)
2.1.1 Optional Mounting Plate
Use an optional mounting plate (P/N: 40182) for
mounting the C900V2 on the door of a control panel
(D8103) or a fire control panel enclosure (D8109). You
cannot use the D8108A Attack Resistant Enclosure.
Mounting a C900V2 in a control panel
enclosure is approved by UL only when
used with a DS7400Xi as shown in
Figure 5 on page 6.
For the following procedure, refer to Figure 2 on page
5.
1. Insert the top hook of the supplied top (1) and
bottom plastic standoffs (2) into the mounting
plate brackets (3). Refer to Detail A.
2. Align the holes in the mounting brackets (3) and
the plastic standoffs (1 and 2).
4 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
.
Figure 2: Optional Mounting Plate
A
3
1
6
2
5
4
6
3
3. Place the top edge of the C900V2 (4) under the
standoff bracket of the top two standoffs (1).
4. Insert two of the Phillips
®
head screws provided
(5) through the holes in the top standoffs (3).
5. Lower the bottom edge of the module to rest
against the ledge of the two bottom standoffs (2).
6. Insert the other two Phillips head screws (5) into
the bottom two mounting holes (6) on the C900V2
and through the bottom two plastic standoffs (2)
and mounting bracket (3).
7. Tighten the screws until the C900V2 is attached
securely to the mounting plate.
2.1.2 Attaching the Module to the Enclosure
Door
Refer to Figure 3.
Conettix C900V2 | Installation Guide | Contents
2.1.3 Separate Enclosure Mounting
You can mount the C900V2 in a separate enclosure
such as the AE2. Refer to Figure 4.
Mount the enclosure on a vertical
surface before you install the C900V2
because the C900V2 covers one of the
mounting holes (9).
1. Place the top edge of the C900V2 (1) between the
two slots (2) on the inside top of the enclosure (3).
2. Insert the top hook of the top plastic standoffs (4)
into the mounting brackets (5) on the back wall of
the enclosure (6), showing a side view of the
standoff in the mounting bracket).
3. Align the bottom two mounting holes (7) on the
C900V2 with the plastic standoffs (4) and the
enclosure mounting brackets (5).
4. Insert two screws (8) into the holes and slowly
tighten until the C900V2 is secured firmly to the
enclosure.
Figure 4: C900V2 in AE2 Enclosure
8
2
3
1
7
4
Figure 3: Attaching to Enclosure Door
2
1
1. Slide the tabs (1) at the top of the mounting plate
over the top lip of the enclosure door (2).
2. Position the mounting plate on the side farthest
from the door hinge.
9
6
5
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 5
Conettix C900V2 | Installation Guide | Contents
2.2 Wiring
Figure 5: Wiring to a DS7400Xi in the Same Enclosure
1
2
3
10
9
6
4
5
8
7
1 – C900V2
2 – To LAN or WAN port
3 – DS7400Xi Control Panel
4 – Non-power limited area
NOTE: All power limited wiring must be at least
6.4 mm (0.25 in.) from the battery wiring.
5 – Battery
6 – EOL resistor for the control panel, attached to
terminals
7 – DS7481 Single Phone Line Monitor (optional)
8 – Telco jack
9 – RJ31X
10 – House telephone
You can use the C900V2 with a variety of control
panels. The next sections provide information for
wiring the C900V2 to a generic control panel. Refer
to Figure 5.
The control panel’s phone line monitor
becomes inactive when the C900V2
intercepts the phone line between the
The DS7400Xi is the only control panel
approved by UL to be wired in the same
enclosure as the C900V2. You must
install any other control panel in a
separate enclosure to receive the UL
approval.
telco service and the control panel. If
phone line monitoring is required, use an
external phone line monitor, such as the
Bosch Security Systems, Inc. DS7481.
The loss of a network connection closes
the Output 2 relay contact on the
C900V2. You can connect this output to
a 24-hour zone on the control panel.
6 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
.
2.3 Input Functions
The C900V2 has three inputs monitored by analogto-digital (A/D) converters:
•Input 1 (IN1): Used as an end-of-line (EOL)
supervised loop. If input status reports are
enabled by the receiver using the Conettix
D6200 Programming/Administration Software
(referred to as D6200 Software), any voltage
below 1.66 VDC is sent as a short-circuit
message to the D6600. Any voltage above
3.33 VDC is sent as an open-circuit message.
Input 1 must be EOL-terminated with a 10 k
resistor. Refer to the D6600/D6100i Computer Interface Manual (P/N: 4998122703) for Event
Messages to automation software.
•Input 2 (IN2): Used for Intercept Inhibit. If Input
2 rises above 5.5 VDC, the C900V2 is
immediately forced into Fallback Mode for at
least 2 minutes. Input 2 must go low for at least
5 seconds to be considered low. If Input 2 is
not used, allow it to remain disconnected.
•Input 3 (IN3): Used for Intercept Override. If
Input 3 rises above 5.5 VDC for 5 seconds, the
C900V2 enters Fallback Mode. If Input 3 goes
low, the C900V2 returns to Intercept Mode. If
this input is connected to a ground start relay
output, the C900V2 remains in Intercept Mode,
except to allow the dialer to dial. Input 3 cannot
force Intercept Mode if the C900V2 is in
Fallback Mode because of an error, a
command, or a high signal at Input 2. If this
input is not used, allow it to remain
disconnected.
You cannot use Inputs 1, 2 and 3 for UL
Fire Listing. You can use the inputs for
other purposes.
Figure 6: C900V2 Input, Output, and Power
OUT40VOUT3 OUT2 OUT1OUT1 IN3 IN2IN1 – V +0V
2.4 Output Functions
The C900V2 has four relay contact outputs:
•Output 1 (OUT1): Active (open) when the CPU
works properly. If the CPU fails or loses power,
Output 1 closes.
Connect Output 1 from the C900V2 to a
24-hour zone on the control panel. This
24-Hour Zone Alarm report enables the digital
dialer, if used, to indicate or sound a failure if
the C900V2 CPU fails.
Conettix C900V2 | Installation Guide |
•Output 2 (OUT2): Active (open) when the
receiver works properly, and closed when the
receiver does not respond to or acknowledge a
message sent from the C900V2.
Connect Output 2 from the C900V2 to a
24-hour zone on the control panel. This
24-Hour Zone Alarm Report enables the digital
dialer, if used, to indicate or sound a failure if
the network communications path fails.
•Output 3 (OUT3): Active (open) when the
C900V2 is in Intercept Mode.
•Output 4 (OUT4): Controlled by a command
from the D6200 Software or receiver. The
default is open.
2.5 Power Terminal Strip
Table 1: Power Terminal Functions
Terminal Description
V (+) Connect regulated 12 to 24 VDC power to
this terminal and the – V terminal. This
power can be supplied by a separate power
supply or auxiliary power from the control
panel.
V (–) 12 to 24 VDC return.
Connect to earth ground.
2.6 Telephone Connections
Use two of the RJ-45 telephone connectors to
connect to the control panel and to the PSTN. The
connector pins are identified in Table 2 and
Figure 7.
Table 2: Control Panel and PSTN RJ-45
Connectors
Pin Connection
1 T1
4 T
5 R
8 R1
Figure 7: RJ-11 Connector Wiring
1118
1111
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 7
Conettix C900V2 | Installation Guide | 3.0 Setup
2.7 Ethernet Connection
One of the RJ-45 jacks connects the C900V2 to
the Ethernet Network (LAN or WAN).
The connector pins are listed in Table 3.
Table 3: Ethernet Connector Pins
Pin Connection
1 TX+
2 TX–
3 RX+
6 RX–
3.0 Setup
3.1 Setting P3
A shorting link on P3 selects the voltage and
current applied to the alarm panel’s telephone
circuit to simulate the signal from a PSTN
telephone exchange. For most alarm panels, set
the shorting link to the H position (short the middle
and right pins of P3). The L position results in
slightly lower power consumption for the C900V2
but some alarm panels might report a telephone
line failure when dialing the C900V2.
For UL approved applications, the
shorting link must be set to the H
position.
3.2 Setting the DIP Switches
A ten-position DIP switch programs the C900V2.
The programming depends on the application and
dialer format of the control panel connected to the
module.
Figure 8: C900V2 DIP Switches
12345678910
O
N
12
1 – Off
2 – On
Because the C900V2 emulates a phone
line and a digital receiver, you must
program the C900V2 to the format it
receives from the control panel.
DIP Switch positions 1 through 4 and 10 program
the dialer format into the C900V2. Table 4 on page
9 lists the format programming for these DIP
switches.
8 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 3.0 Setup
.
Table 4: Digital Dialer Protocol (DIP Switches 1 through 4, and 10)
DIP Switches
10 1 2 3 4
ON OFF OFF OFF OFF Radionics Modem IIe and Modem IIIa2
ON OFF OFF OFF ON Radionics Modem II
ON OFF OFF ON OFF DTMF*
ON OFF OFF ON ON DTMF* (where dialer retransmits quickly)
ON OFF ON OFF OFF BFSK (2300Hz ACK Tone)
ON OFF ON OFF ON BFSK (1400Hz ACK Tone)
ON OFF ON ON OFF FBI Superfast DTMF (2300 Hz ACK Tone) †
ON OFF ON ON ON FBI Superfast DTMF (1400 Hz ACK Tone) †
ON ON OFF OFF OFF Pulse 3/1, 3/1 Checksum (2300 Hz ACK Tone)
ON ON OFF OFF ON Pulse 3/1, 3/1 Checksum (1400 Hz ACK Tone)
ON ON OFF ON OFF Pulse 4/2 (Long 2300 Hz ACK Tone)
ON ON OFF ON ON Pulse 4/2 (Long 1400 Hz ACK Tone)
ON ON ON OFF OFF SIA Bell 103 (110/300 baud, 2016 Hz ACK Tone)
ON ON ON OFF ON Reserved
ON ON ON ON OFF ADT-SIA†
ON ON ON ON ON Reserved
OFF OFF OFF OFF OFF Reserved
OFF OFF OFF OFF ON Reserved
OFF OFF OFF ON OFF Scancom 481, 581, 681 †, ‡
OFF OFF OFF ON ON Reserved
OFF OFF ON OFF OFF Reserved
OFF OFF ON OFF ON Reserved
OFF OFF ON ON OFF Telim †
OFF OFF ON ON ON Robofon †
OFF ON OFF OFF OFF Reserved
OFF ON OFF OFF ON Reserved
OFF ON OFF ON OFF Reserved
OFF ON OFF ON ON Reserved
OFF ON ON OFF OFF SIA Bell 103 (110/300 baud, 2083 Hz ACK Tone) †
OFF ON ON OFF ON SIA V.21 (110/300 baud) †
OFF ON ON ON OFF Seriee DTMF †
OFF ON ON ON ON Seriee FSK †
* DTMF includes Contact ID, High Speed and 4/2 Express
† These formats have not been approved for UL 1610.
‡ Requires firmware version 1.12 or higher.
Dialer Format of Host Alarm Panel
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 9
Conettix C900V2 | Installation Guide | 3.0 Setup
Table 5: DIP Switches 5 through 9
Switch State Function
5 ON Enable auto Fallback Mode after detecting an intercept error.1
OFF Disable auto Fallback Mode after detecting an intercept error.
6 ON Hang-ups do not cause Fallback Mode.
OFF Third hang-up without receiver ACK causes Fallback Mode.2
73 ON 240 sec poll
OFF 75 sec poll
8 ON C900 sends initial handshake to panel after 6 sec dialing break.
OFF C900 sends initial handshake to panel after 1 sec dialing break.
9 ON Enable Anti-Replay/Substitution.4
OFF Disable Anti-Replay/Substitution.
1
If an error occurs in the Intercept Mode, the C900V2 automatically returns (falls back) to the telco line.
2
If the receiver does not acknowledge a report intercepted by the C900V2 in the specified time, the digital dialer
hangs up and retries the message transmission. The C900V2 switches to Fallback Mode based on the number of
hang-ups.
3
The time that elapses between polls from the C900V2 when it is idle (not expecting a dialer acknowledgement).
4
This DIP switch must be set to ON if the receiver is set up for NNC Mode.
Any error forces the C900V2 to switch
to Fallback Mode (phone line backup)
Figure 9: C900V2 LED Locations
HL
for 2 min the next time the control panel
seizes the line (if DIP Switch 5 is ON,
DIP Switch 6 is OFF, or both, and if the
control panel seizes the line within 2
min). Intercept errors are always
reported to the receiver. If the receiver
does not acknowledge a signal
1
intercepted by the C900V2 in the
specified time, the control panel digital
dialer hangs up and tries to send the
message again.
2
3.3 LEDs
The C900V2 has two dual-color status LEDs: the
system LED and the dialer LED.
The Ethernet connector also includes two LEDs
that indicate the status of the network connection.
The right LED lights or flashes when there is a
valid connection to the network.
3.3.1 System LED (LED 1)
The system LED indicates the status of the
receiver and the C900V2 itself. Refer to Table 6 on
page 11.
3.3.2 Dialer LED (LED 2)
The dialer LED indicates the status of the digital
dialer interface. Refer to Table 7 on page 11.
1 – System LED
2 – Dialer LED
3 – Ethernet connector LEDs
3
10 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 3.0 Setup
.
Table 6: System LED Functions
Color State Function
None Off No power.
Green Solid C900V2 failed.
Flashing (5 Hz) The receiver is responding normally.
Red Solid C900V2 failed.
Flashing (5 Hz) The receiver is not responding.
1 flash: ROM checksum error Flashing
(Repeating
Code)
Red/
Alternating (5 Hz) The dialer is off-hook, but the last message was rejected because of a bad checksum or
Green
1
If the dialer subsequently sends a valid message, the LED returns to a blinking green status. If the dialer hangs up, an
2 flashes: RAM test error
other logical error.1
intercept error is generated. The alternating LED also occurs when the line is seized, but no transaction occurs (for
example, the C900V2 is waiting for the dialer to return on-hook). This happens when the C900V2 returns to Intercept
Mode, or while the dialer seizes the line.
Table 7: Dialer LED Functions
Color State Function
None Off C900V2 is in permanent Fallback Mode due to a command or no power.
Green Solid C900V2 is in Intercept Mode and the dialer is on-hook.
Flashing (5 Hz) C900V2 is in Intercept Mode and the dialer is off-hook.
Red Solid C900V2 is in Fallback Mode due to an error, Intercept Inhibit or Override inputs, or a
command.
Flashing (5 Hz) An off-hook condition caused an intercept error.1
Red/
Green
1
If Auto Fallback After Error is enabled (DIP Switch 5 = ON), the C900V2 connects the dialer to the phone line at the
2
If the dialer subsequently sends a valid message, the LED returns to a blinking green status. If the dialer hangs up, an
Alternating (5 Hz) The dialer is off-hook, but the last message was rejected due to a bad checksum or other
logical error.2
next line seizure. If the dialer does not seize the line, this condition terminates after two min.
intercept error is generated. The alternating LED also occurs when the line is seized, but no transaction occurs (for
example, the C900V2 is waiting for the dialer to return on-hook). This happens when the C900V2 returns to Intercept
Mode, or while the dialer seizes the line.
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 11
Conettix C900V2 | Installation Guide | 3.0 Setup
3.4 Fallback Mode
In fallback operation, the C900V2 connects the
PSTN directly to the dialer, bypassing itself from
the phone circuit. Intercept Mode is maintained
only if the C900V2 processor operates and there
3.5 Dialer Interaction
Table 8 shows the conditions causing the C900V2
to change to Fallback Mode. The C900V2 returns
to Intercept Mode only when all conditions in the
Intercept Mode Restored column are met.
are no errors. Fallback Mode is ensured if a CPU
lockup occurs.
Table 8: Dialer Interaction Forcing C900V2 into Fallback Mode
CPU fails Immediately C900V2 restart
Receiver fails Immediately Link restored
Receiver does not respond
to last message
Intercept Disable Command On receipt of the command Intercept Enable command
Intercept Error If Fallback after intercept error is enabled, the
Switch to Fallback command On receipt One hour or at receipt of Intercept
Dialer goes off-hook (disconnected) Link restored
After two minutes
dialer goes off-hook within two minutes of the
error
Enable command
12 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
The receiver can communicate with a C900V2 that
has an IP address dynamically assigned by a
DHCP server on the network. When using DHCP,
you must set the receiver to use the network
naming convention (NNC) to identify accounts
instead of using static IP addresses. Devices in the
field can have either a static IP address or a
dynamic IP address. The receiver uses the NNC
number to identify the account instead of the IP
address.
For devices having IP addresses assigned by a
DHCP server:
Programming Software Operation and
Installation Guide
(P/N: 4998154991).
•Use the D6200 Software to enter the eight-digit
NNC number located on the label of the
C900V2 into the Account Database.. Refer to
the D6200 Programming Software Operation and Installation Guide (P/N: 4998154991).
•Configure network connections to
communicate through a DHCP server.
•Set the IP address of the C900V2 to 0.0.0.0.
4.2 Identifying the MAC Hardware
Address
If you know the IP address of the
configured C900V2, go to Section 4.5 Using Telnet to Finish the Configuration
on page 14.
You must program the IP address of the C900V2.
The first step is to determine the MAC, or
hardware, address of the C900V2. This address is
hard-coded into the C900V2 during its manufacture
and cannot be changed. This address is 6 bytes
(12 digits) long.
Figure 10 shows an example of a MAC address.
Figure 10: MAC Address Label Example
The MAC address label is located on
the top of the Ethernet connector.
Record this number for future reference.
4.3 Getting an IP Address
If you are using Dynamic Host
Configuration Protocol (DHCP), you do
not need an IP address.
If you are not using DHCP, request an
IP address for your C900V2 from your
network administrator. You might have
to provide the MAC address.
An IP address is an identifier for a computer or
device on a TCP/IP network. The IP address is a
32-bit numeric address written as four numbers
separated by periods. Each number can be zero to
255, for example, 190.200.128.111. In an isolated
network, you can assign IP addresses at random if
each one is unique. Connecting a private network
to the Internet requires registered IP addresses
(called Internet addresses) to avoid duplication.
4.4 Initial IP Address Assignment
Using ARP.EXE
The C900V2 you are configuring and the PC used
to configure it must both be on the same gateway
(the device that connects the LAN to the WAN) to
use telnet for configuration of the C900V2. The
gateway can be a router or a hub. After you
configure the C900V2 and assign it an IP address,
you can then use telnet to change configuration
parameters from anywhere on the network.
Read this entire procedure before
starting. Ensure that power is applied to
the C900V2 and the C900V2 is
connected to the LAN or WAN through
the Ethernet connector.
The following procedure shows how to use the
ARP command to assign an IP address to the
C900V2.
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 13
The IP and MAC addresses in this
procedure are examples and are not the
same as those for your C900V2.
Figure 11: ARP Table
1. Select Start Æ Run.
The Run dialog box appears.
2. In the Run dialog box, type COMMAND and
click OK.
A DOS window appears:
The network uses this table to identify devices and
to route signals. The number of devices and other
types (static and dynamic, as shown in the
example) depends on the network and the number
and type of devices with which this PC
communicates. Identify the MAC address of the
device you are installing and verify that it now has
3. At the DOS command line, type:
arp -s xxx.xxx.xxx.xxx zz-zz-zz-zz-zz-zz
an IP address linked to it.
4.5 Using Telnet to Finish the
Configuration
Use the telnet program to configure the C900V2.
and press [ENTER].
•xxx.xxx.xxx.xxx is the IP address the
network administrator assigned to the
C900V2
•zz-zz-zz-zz-zz-zz is the MAC address
printed on the Ethernet connector label.
For example:
The procedure for Windows 98SE, ME is different
from the procedure for Windows 2000 and
Windows XP.
4.5.1 Starting Windows 98SE, ME Telnet
1. Select Start Æ Run.
The Run dialog box appears.
2. In the Run dialog box, type telnet and press
[ENTER].
The Telnet application window appears.
The program responds with a prompt to
indicate that the address was accepted.
The program does not indicate that the
operation was performed properly. The
only indication is the absence of an
error message.
4. Verify that you entered the IP address
correctly. Type:
arp -g
and press [ENTER].
This command displays the IP address
172.17.10.70 temporarily linked to MAC address
00-20-4a-12-04-0e as shown in Figure 11. The
temporary link shows a static entry.
3. Select Connect ÆRemote System.
The Connect dialog box appears.
a. In the Host Name field, type the IP
address of the C900V2.
b. In the Port, field type 1.
c. Accept vt100 as the TermType field.
d. Click Connect.
14 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
If you are using DHCP type 0.0.0.0 and
press [ENTER]. Refer to Section 4.1
Dynamic Host Configuration Protocol
(DHCP) on page 13.
3. If the Gateway address is required, type y,
press [ENTER] and then type the address and
press [ENTER].
If the Gateway address is not required or if you
use DHCP, type n and press [ENTER]
This prompt appears.
5. If you do not want to assign or change the
name, press [ENTER].
If you want to assign a name for this device for
use on a LAN, type y and press [ENTER}.
Type the name, up to 16 characters, and press
[ENTER].
If you do not enter a DHCP device
name, a default name of Cxxxxxx is
used (where xxxxxx is the last six digits
of the MAC address).
This prompt appears.
The Gateway IP is required only if you
are connecting to a WAN. In a LAN, the
Gateway IP is usually not needed
unless the Gateway IP of the PC is
different from the Gateway to which the
C900V2 is connected.
4. If using DHCP, press [ENTER].
If not, enter the number of bits that correspond
to the netmask your network uses and press
[ENTER]. Refer to Table 9.
6. Press [ENTER] to accept the password setting
at none.
In most cases, do not assign a
password. If a password is necessary,
store it in a safe place. If you lose or
forget the password, you cannot
connect to C900V2 using telnet until you
send the unit to the factory for password
Contact your network administrator if you need
more information about the netmask.
removal, and the unit is returned to you.
The Setup Mode information appears.
Netmask
Bits
16 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
If you want to enable encryption, continue with the
next step. If not, go to step 27.
If you enable encryption on the C900V2,
you must enable encryption on the
D6680 with the same key.
16. From the Change Setup menu, type 6 and
press [ENTER].
This information appears.
If the default value displayed in your
Telnet window does not match the
value listed in any of the steps below,
type the correct value and press
[ENTER].
8. At the Baud Rate prompt, press [ENTER] to
accept the default (9600).
9. At the I/F Mode prompt, press [ENTER] to
accept the default (4C).
10. At the Flow prompt, press [ENTER] to accept
the default (00).
11. Type a unique Port Number for the LAN to
which the C900V2 is connected and press
[ENTER].
12. At the ConnectMode prompt, press [ENTER]
to accept the default (CC).
13. At the Datagram Type prompt, type 01 and
press [ENTER].
14. At the IP addr prompt, type the remote IP
address used for the receiver to which the
C900V2 reports and press [ENTER].
Enter the remote IP address using
000.000.000.000 format.
17. At the Disable SNMP prompt, press [ENTER]
to accept the default (N).
18. At the SNMP Community Name prompt, press
[ENTER] to accept the default (public).
19. At the Disable Telnet Setup prompt, press
[ENTER] to accept the default (N).
20. At the Disable Port 77FEh prompt, press
[ENTER] to accept the default (N).
Disabling both the telnet and port 77FE
prevents you from accessing the set-up
menu for future changes.
21. At the Disable Web Server prompt, press
[ENTER] to accept the default (N).
22. At the Disable ECHO ports prompt, press
[ENTER] to accept the default (Y).
23. At the Enable Encryption prompt, type y and
press [ENTER].
24. At the Change keys prompt, type y and press
[ENTER].
25. Type the key programmed for the receiver and
press [ENTER].
The key is 16 bytes (32 characters) long. Enter
the key using the 01-02-03-04-05-06-07-08-0910-11-12-13-14-15-16 format.
26. At the Enable Enhanced Password prompt,
press [ENTER] to accept the default (N).
27. Type 9 and press [ENTER] to save changes
and exit the telnet session.
To confirm that the IP address is configured
properly, use the ping utility:
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 17
and press [ENTER].
Four reply messages are received, confirming
the C900V2 is communicating on the network.
Configuration of the C900V2 is complete.
5.0 Anti-Substitution
Protection
1. Remove power from the C900V2.
2. Set DIP Switch 9 to the ON position (the
factory default). Refer to Section 3.2 Setting the DIP Switches on page 8.
3. Apply power to the C900V2.
After rebooting the C900V2, the unit exchanges
numeric keys with the receiver, and they become
synchronized. Once they are synchronized, all
subsequent communications sessions numerically
validate the authenticity of the sender and receiver.
Each session generates an entirely new set of
keys, which invalidates the replay of authentic
sessions.
18 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 6.0 UL Standard 1610 and ULC S304 Intrusion System Installations
.
6.0 UL Standard 1610 and
ULC S304 Intrusion
System Installations
To install the C900V2 to comply with UL Standard
1610 Applications (for Line Security, formerly
“Grade AA”) and ULC S304, you must satisfy all
requirements in this section.
5. Connect Output 1 from the C900V2 to a
24-hour zone on the control panel.
This enables the control panel to locally
annunciate a C900V2 CPU failure.
6. Connect Output 2 from the C900V2 to a
24-hour zone on the control panel.
This enables the control panel to locally
annunciate a network failure.
6.1 Protected Premises Control
Panel without Digital Dialer
Backup
1. Use the D6200 Software to set the poll rate on
the C900V2. For UL approved installations, the
maximum interval is 90 seconds to meet the
requirement for polling supervision established
by UL. In most cases, to get a polling
supervision interval of 90 seconds, set the Poll
Rate to 75 and Retry to 13.
Because of differences in packet transmission
time latency within different networks, the poll
rate times vary. Contact Technical Support at
Bosch Security Systems, Inc. for assistance in
establishing the latency time for the network on
which you are installing the C900V2.
Refer to D6200 Software Operation and Installation Guide (P/N: 4998154991).
2. Set DIP Switch 7 to the OFF position to enable
75-second supervision signals (the factory
default).
Refer to Table 5 on page 10 for the
functions of DIP Switches 5 through 9.
3. Add a telnet password to the communications
protocol of the C900V2 (refer to Section 4.5.3 Configuration Using Telnet, step 6, on
page 16). Retain this password for future
reference.
4. Program the control panel to send a daily test
signal through the digital dialer.
This tests the connection from the control
panel to the C900V2.
7. Install a tamper switch (such as a D110
8. Set DIP Switch 5 to OFF to disable Auto
9. Set DIP Switch 6 to ON to prevent fallback
10. Set DIP Switch 9 to ON to enable Anti-
11. Set the shorting link on P3 to the H position.
You must use the C900V2 with a UL Listed
Burglary Alarm Control Unit or a UL Listed
combination Fire/Burglary Alarm Control
Unit with an integral or Listed digital alarm
communicator transmitter (DACT) installed
according to the manufacturer’s
instructions.
Tamper Switch, available from Bosch Security
Systems, Inc.) on the control panel enclosure
and connect it to a 24-hour zone on the control
panel. If you use a separate enclosure for the
C900V2, install another tamper switch (D110)
on the enclosure and connect it to the same
24-hour zone.
Fallback.
caused by hang-ups.
Intercept errors are reported to the
receiver. If the receiver does not
acknowledge a signal sent that was
intercepted by the C900V2 in the
programmed time, the control panel
digital dialer hangs up and retries the
message transmission.
Substitution/Anti-Replay.
Refer to Figure 12 on page 20 and Table 10 on
page 21 for the proper connection sequence.
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 19
Conettix C900V2 | Installation Guide | 6.0 UL Standard 1610 and ULC S304 Intrusion System Installations
Figure 12: C900V2 and Generic Control Panel in Separate Enclosures (UL Standard 1610, with or
without Telephone Line)
1
PANEL
TELCO
12345678910
O
F
F
2
3
1
6
7
5
6
2
4
8
9
11
4
5
3
3
7
9
10
14
15
13
12
-
+
8
1 – Optional telephone line
2 – C900V2
3 – D110 Tamper Switch
4 – LAN or WAN
5 – Metal conduit no longer than 6.1 m (20 ft)
indicates the connection sequence. Refer to Table 10.
6
6 – AE2 enclosure
7 – Host control panel
8 – Battery
9 – AC transformer
20 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 6.0 UL Standard 1610 and ULC S304 Intrusion System Installations
.
Table 10: Connection Sequence – C900V2 and Generic Control Panel in Separate Enclosures
(UL Standard 1610, with or without Telephone Line)
Seq
C900V2 Connection Control Panel Connection Other Connection
connector
3 – V terminal to –12 to –24 VDC (common)
4 V + to +12 to +24 VDC output
5 Install an EOL resistor for
the control panel across
OUT2-L and OUT1-R
6 OUT2-L TO OUT1-L
7 OUT2-R TO OUT1-R
8 OUT1-R to C900V2 enclosure closed-circuit
9 C900V2 enclosure closed-circuit
10 24-hour zone input common to Control panel enclosure closed-
11 OUT2-L to 24-hour zone input
12 Battery negative input to Battery negative terminal
13 Battery positive input to Battery positive terminal
14 AC input AC transformer
15 AC input AC transformer
NOTE: The sequence numbers appear in the diagram in Figure 12.
to LAN or WAN
tamper switch
tamper switch to control panel
enclosure closed-circuit tamper
switch
circuit tamper switch
The optional telephone line is for programming and diagnostics only.
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 21
Conettix C900V2 | Installation Guide | 6.0 UL Standard 1610 and ULC S304 Intrusion System Installations
6.2 Protected Premises Control
Panel with Digital Dialer Backup
1. Use the D6200 Software to set the poll rate on
the C900V2. For UL approved installations, the
maximum interval is 360 seconds to meet the
requirement for polling supervision established
by UL. In most cases, to get a polling
supervision interval of 360 seconds, set the
Poll Rate to 240 and Retry to 13.
Because of differences in packet transmission
time latency within different networks, the poll
rate times vary. Contact Technical Support at
Bosch Security Systems, Inc. for assistance in
establishing the latency time for the network on
which you are installing the C900V2.
Refer to D6200 Software Operation and Installation Guide (P/N: 4998154991).
2. Set DIP Switch 7 to the ON position to enable
240-second supervision signals.
Refer to Table 5 on page 10 for the
functions of DIP Switches 5 through 9.
3. Add a telnet password to the communications
protocol of the C900V2 (refer to Section 4.5.3 Configuration Using Telnet, step 6, on
page 16). Retain this password for future
reference.
4. Program the control panel to send a daily test
signal through the digital dialer.
This tests the connection from the
control panel to the C900V2.
5. Connect Output 1 from the C900V2 to a
24-hour zone on the control panel.
This tests the digital dialer if the C900V2
CPU fails.
6. Connect Output 2 from the C900V2 to a
24-our zone on the control panel.
This tests the digital dialer if the network
communications path supervision fails.
You must use the C900V2 with a UL Listed
Burglary Alarm Control Unit or a UL Listed
combination Fire/Burglary Alarm Control
Unit with an integral or Listed digital alarm
communicator transmitter (DACT) installed
according to the manufacturer’s
instructions.
7. Install a tamper switch (such as a D110
Tamper Switch, available from Bosch Security
Systems, Inc.) on the control panel enclosure
and connect it to a 24-hour zone on the control
panel. If you use a separate enclosure for the
C900V2, install another tamper switch (D110)
on the enclosure and connect it to the same
24-hour zone.
8. Set DIP Switch 5 to ON to enable Auto
Fallback.
9. Set DIP Switch 6 to OFF so three hang-ups
cause fallback.
Any error forces the C900V2 to switch
to Fallback Mode for 2 minutes the next
time the alarm panel seizes the line (if
DIP Switch 5 is ON or DIP Switch 6 is
OFF, or both, and the seizure occurs
within 2 minutes). Intercept errors are
always reported to the receiver. If the
receiver does not acknowledge the
signal in the programmed time, the
control panel digital dialer hangs up and
retries the message.
10. Set DIP Switch 9 to ON to enable Anti-
Substitution/Anti-Replay.
11. Set the shorting link on P3 to the H position.
Refer to Figure 12 on page 20 and Table 10 on
page 21 for the proper connection sequence.
22 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 7.0 UL Standard 864 for Fire System Installations
.
7.0 UL Standard 864 for Fire
System Installations
To install the C900V2 in compliance with UL 864
for Fire System Installations, you must satisfy all
requirements in this section. You must install the
system in accordance with NFPA-72.
If the control panels are used for fire applications,
test according to NFPA-72.
For UL Listed Fire Installations, shared
on-premises communications
equipment must be UL Listed for
Information Technology Equipment.
Installation at the Protected Premises
1. Use the D6200 Software to set the poll rate on
the C900V2. For UL approved installations, the
maximum interval is 90 seconds to meet the
requirement for polling supervision established
by UL. In most cases, to get a polling
supervision interval of 90 seconds, set the Poll
Rate to 75 and Retry to 13.
(For non-UL approved installations, the
maximum interval is 300 seconds to meet the
requirement for polling supervision set by
NFPA Standard 72, Section 5-5.4.4.1. To get a
polling supervision interval of 300 seconds, set
the Poll Rate to 240 and Retry to 13.)
Because of differences in packet transmission
time latency within different networks, the poll
rate times vary. Contact Technical Support at
Bosch Security Systems, Inc. for help in
establishing the latency time for the network on
which you are installing the C900V2.
Refer to D6200 Software Operation and Installation Guide (P/N: 4998154991).
2. Set DIP Switch 7 to the OFF position to enable
75-second supervision signals.
Refer to Table 5 on page 10 for the
functions of DIP Switches 5 through 9.
3. Add a telnet password to the communications
protocol of the C900V2 (refer to Section 4.5.3 Configuration Using Telnet, step 6, on
page 16). Retain the password for future
reference.
4. Program the control panel to send a daily test
signal through the digital dialer.
This tests the connection from the
control panel to the C900V2.
5. Connect Output 1 from the C900V2 to a
24-hour zone on the control panel.
This enables the control panel to
annunciate a C900V2 CPU failure
locally.
6. Connect Output 2 from the C900V2 to a
24-hour zone on the control panel.
This enables the control panel to
annunciate a network failure locally.
You must use the C900V2 with a UL
Listed Fire Alarm Control Unit or a UL
Listed combination Fire/Burglary Alarm
Control Unit with an integral or UL
Listed digital alarm communicator
transmitter (DACT). Refer to the
C900TTL-E and C900V2 Compatibility
Chart
(P/N: 4998141056).
7. If the C900V2 is installed in a separate
enclosure, you must locate the unit in the same
room within 6.1 m (20 ft) because the control
equipment and the wiring must be enclosed in
conduit (or equivalently protected against
mechanical injury).
Mounting a C900V2 in a control panel
enclosure is approved by UL only when
used with a DS 7400Xi as shown in
Figure 5 on page 6.
8. You must use the C900V2 with a UL Listed
Power Supply (such as Altronix
®
AL300-
ULXR).
9. Set DIP Switch 5 to OFF to disable Auto
Fallback.
10. Set DIP Switch 6 to ON to prevent fallback
caused hang-ups.
Intercept errors are reported to the
receiver. If the receiver does not
acknowledge a signal sent that was
intercepted by the C900V2 in the
programmed time, the control panel
digital dialer hangs up and retries the
message transmission.
11. Set DIP Switch 9 to ON to enable Anti-
Substitution/Anti-Replay.
12. Set the shorting link on P3 to the H position.
Refer to Figure 13 on page 24 and Table 11 on
page 25 for the proper connection sequence.
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 23
Conettix C900V2 | Installation Guide | 7.0 UL Standard 864 for Fire System Installations
Figure 13: C900V2 and Generic Control Panel in Separate Enclosures (UL Standard 864)
1
11
PANEL
TELCO
12345678910
O
F
F
2
3
1
3
9
6
5
4
7
8
11
10
6
14
1010
12
2
4
5
3
7
13
9
17
18
16
15
-
+
8
1 – Optional telephone line
2 – C900V2
3 – D110 Tamper Switch
4 – LAN or WAN
5 – Metal conduit no longer than 6.1 m (20 ft)
6 – AE2 enclosure
indicates the connection sequence. Refer to Table 11.
6
7 – Host control panel
8 – Battery
9 – AC transformer
10 – Battery
11 – UL Listed power supply (such as Altronix
AL300-ULXR) in separate enclosure
24 Bosch Security Systems, Inc. | 8/08 | F01U087780-01
Conettix C900V2 | Installation Guide | 7.0 UL Standard 864 for Fire System Installations
.
Table 11: Connection Sequence – C900V2 and Generic Control Panel in Separate Enclosures
(UL Standard 864)
C900V2 Connection Control Panel Connection Other Connection
Seq
1 RJ-45 PANEL connector to RJ-45 connector (telco dialer)
2 RJ-45 ETHERNET connector to LAN or WAN
3 – V terminal to –12 to –24 VDC (common)
4 V + to +12 to +24 VDC output
5 Power supply +BAT input to
battery 1 + terminal
6 Power supply –BAT input to
battery 2 – terminal
7 Battery 1 – terminal to battery 2 +
terminal (in series)
8 Install an EOL resistor for the
control panel across OUT2-L
and OUT1-R
9 OUT2-L to OUT1-L
10 OUT2-R to OUT1-R
11 OUT1-R to C900V2 enclosure closed-circuit
12 C900V2 enclosure closed-circuit
13 24-hour zone input common to Control panel enclosure closed-
14 OUT2-L to 24-hour zone input
15 Battery negative input to Battery negative terminal
16 Battery positive input to Battery positive terminal
17 AC input AC transformer
18 AC input AC transformer
NOTE: The sequence numbers appear in the diagram in Figure 13.
tamper switch
tamper switch to control panel
enclosure closed-circuit tamper
switch
circuit tamper switch
Bosch Security Systems, Inc. | 8/08 | F01U087780-01 25