Comelit VEDO 2.6 Series Programming Manual

Page 1
Passion.Technology.Design.
EN
PROGRAMMING
MANUAL
Technical Manual for programming Vedo 2.6.x control panels
Page 2
Table of contents
1. Introduction to Safe Manager 2.6.0 software ......................... 5
1.1 INSTALLING SAFE MANAGER 2.6 ........................................................................5
1.1.1 System requirements ......................................................................5
1.1.2 Installation procedure .....................................................................5
1.2 FIRST START-UP OF THE SOFTWARE .................................................................5
1.3 CHANGING THE SOFTWARE LANGUAGE ..........................................................5
1.4 ESTABLISHING A CONNECTION BETWEEN A PC AND VEDO SERIES CONTROL
PANELS ...................................................................................................................5
1.4.1 Set communication via USB ...........................................................5
1.4.2 Set communication via TCP/IP .......................................................6
1.5 VIEWING THE INSTALLED FIRMWARE VERSION OF THE CONTROL PANEL 6
1.6 CREATING A NEW SYSTEM ................................................................................... 6
2. Standard procedures ............................................................... 7
2.1 SAVING THE CONFIGURATION FOR THE SYSTEM IN USE .............................. 7
2.2 OPENING THE CONFIGURATION FOR A PREVIOUSLY SAVED SYSTEM ........7
2.3 PRINT PROJECT FUNCTION .................................................................................7
2.4 EXPORTING A SYSTEM CONFIGURATION .......................................................... 7
2.5 IMPORTING A SYSTEM CONFIGURATION ........................................................... 8
2.6 SENDING / RECEIVING CONTROL PANEL PARAMETERS ................................ 8
2.7 SENDING AN AUDIO PACKAGE ............................................................................8
2.8 RECEIVING THE EVENTS LOG .............................................................................9
2.9 RESET ACCESS CODE ...........................................................................................9
2.10 INSTALLER AUTHORISATION .............................................................................9
3. System conguration .............................................................. 10
3.1 CONTROL DEVICES ...............................................................................................10
3.1.1 Keypads ...........................................................................................10
Status / ID / description ......................................................................................10
Checked areas ....................................................................................................10
Area ......................................................................................................................11
Show ...................................................................................................................11
Display tamper ....................................................................................................11
Display technical alarms ....................................................................................11
Options ...............................................................................................................11
System status display time................................................................................11
Tamper alarm cycles ..........................................................................................11
Technical alarms cycles (bus/voltage levels) ..................................................11
Proximity card cycle actions (Art. VEDOLCDPRO only) .................................11
Partial keys ..........................................................................................................12
Function keys......................................................................................................12
Buzzer ..................................................................................................................12
Send message options.......................................................................................12
3.1.2 Safetouch .........................................................................................13
Status / ID / description ......................................................................................13
Checked areas ....................................................................................................13
Area ......................................................................................................................13
Display tamper ....................................................................................................13
Display technical alarms ....................................................................................13
Options ...............................................................................................................14
System status display time................................................................................14
Tamper alarm cycles ..........................................................................................14
Technical alarms cycles (bus/voltage levels) ..................................................14
Px key functions .................................................................................................14
Fx key functions .................................................................................................14
Buzzer ..................................................................................................................14
Send message options.......................................................................................14
Terminals .............................................................................................................14
Network parameters ...........................................................................................14
VIP options ..........................................................................................................14
3.1.3 Touch devices ..................................................................................15
Status / ID / description ......................................................................................15
Checked areas ....................................................................................................15
Area ......................................................................................................................15
Display tamper ....................................................................................................15
Display technical alarms ....................................................................................15
Options ...............................................................................................................16
System status display time................................................................................16
Tamper alarm cycles ..........................................................................................16
Technical alarms cycles (bus/voltage levels) ..................................................16
Px key functions .................................................................................................16
Fx key functions .................................................................................................16
Buzzer ..................................................................................................................16
Send message options.......................................................................................16
Network parameters ...........................................................................................16
VIP options ..........................................................................................................16
3.1.4 RFID readers ....................................................................................17
Status / ID / description ......................................................................................17
Checked areas ....................................................................................................17
Area ......................................................................................................................17
Display tamper ....................................................................................................17
Display technical alarms ....................................................................................17
LED ON time on proximity key ..........................................................................17
Tamper alarm cycles ..........................................................................................17
Technical alarms cycles (bus/voltage levels) ..................................................17
Cycle actions.......................................................................................................18
Buzzer ..................................................................................................................18
Forced activation ................................................................................................18
Send message options.......................................................................................18
Meaning of reader LEDs in normal conditions ................................................18
Meaning of reader LEDs during presentation of the key ................................18
3.1.5 Phone App ........................................................................................19
System requirements: ........................................................................................19
How to proceed ...................................................................................................19
Status / ID / description ......................................................................................20
Checked areas ....................................................................................................20
Area ......................................................................................................................20
Display tamper ....................................................................................................20
Options ................................................................................................................20
Tamper alarm cycles ..........................................................................................20
Fx key functions .................................................................................................20
VIP options ..........................................................................................................20
Send message options.......................................................................................20
3.1.6 Bridge ...............................................................................................21
Status / ID / description ......................................................................................21
Checked areas ....................................................................................................21
Area ......................................................................................................................21
Display tamper ....................................................................................................21
Display technical alarms ....................................................................................21
Options ................................................................................................................21
Tamper alarm cycles ..........................................................................................21
Technical alarms cycles (bus/voltage levels) ..................................................21
Send message options.......................................................................................21
3.2 EXPANSIONS ON BUS............................................................................................22
3.2.1 8 input/output expansions ..............................................................22
Status / ID / description ......................................................................................22
Area ......................................................................................................................22
Display tamper ....................................................................................................22
Display technical alarms ....................................................................................22
Terminals .............................................................................................................22
Tamper alarm cycles ..........................................................................................22
Technical alarms cycles (bus/voltage levels) ..................................................22
Send message options.......................................................................................22
3.2.2 Power supply units .........................................................................23
Status / ID / description ......................................................................................23
Area ......................................................................................................................23
Display tamper ....................................................................................................23
Display technical alarms ....................................................................................23
Options ................................................................................................................23
Tamper alarm cycles ..........................................................................................23
Send message options.......................................................................................23
Reading analogue values...................................................................................23
3.2.3 Isolators ...........................................................................................24
Status / ID / description ......................................................................................24
Area ......................................................................................................................24
Display tamper
....................................................................................................24
Display technical alarms ....................................................................................24
Options ................................................................................................................24
Tamper alarm cycles ..........................................................................................24
Technical alarms cycles (bus/voltage levels) ..................................................24
Send message options.......................................................................................24
Reading analogue values...................................................................................24
3.3 RADIO EXPANSIONS ..............................................................................................25
Status / ID / description ......................................................................................25
Area ......................................................................................................................25
Display tamper ....................................................................................................25
Display technical alarms ....................................................................................25
Tamper alarm cycles ..........................................................................................25
Technical alarms cycles (bus/voltage levels) ..................................................25
Send message options.......................................................................................25
3.3.1 Radio outputs /sirens ......................................................................26
Radio output acquisition....................................................................................26
Deleting a radio output.......................................................................................26
Status / ID / description ......................................................................................26
Physical Id ...........................................................................................................26
Source expansion ...............................................................................................26
Area ......................................................................................................................27
Display system status ........................................................................................27
Display tamper ....................................................................................................27
Radio output properties .....................................................................................27
Other options ......................................................................................................27
RSSI (signal level indicator 0-100) ....................................................................27
Siren options .......................................................................................................27
Event 1 / 2 / 3 / 4 ..................................................................................................27
Events association (AND/OR)............................................................................27
Sabotage cycles..................................................................................................27
Malfunction alarm cycles ...................................................................................27
Behaviour ............................................................................................................27
Send message options.......................................................................................27
3.3.2 Radio controls .................................................................................28
ID ..........................................................................................................................28
Description ..........................................................................................................28
Source expansion ...............................................................................................28
User ......................................................................................................................28
Checked areas ....................................................................................................28
Area ......................................................................................................................28
Radio control properties ....................................................................................28
RSSI (signal level indicator 0-100) ....................................................................28
Function keys......................................................................................................28
Fault cycles .........................................................................................................28
Forced activation ................................................................................................29
Instant activation ................................................................................................29
Send message options.......................................................................................29
3.3.3 Radio zones .....................................................................................30
Radio sensor acquisition ...................................................................................30
Duplicate the values of the current zone..........................................................31
Status / ID / description ......................................................................................31
Physical Id ...........................................................................................................31
Source expansion ...............................................................................................31
Radio zone properties ........................................................................................31
RSSI (signal level indicator 0-100) ....................................................................31
Options ................................................................................................................31
Fault cycles .........................................................................................................31
PIR (options apply to PIR sensors only) ..........................................................31
Page 3
Reed (options apply to Reed sensors only) .....................................................31
Smoke ..................................................................................................................31
Zone .....................................................................................................................32
3.4 WIRED ZONES .........................................................................................................33
Duplicate the values of the current zone..........................................................33
Status ..................................................................................................................34
Expansion type ...................................................................................................34
Origin ...................................................................................................................34
Zone ID.................................................................................................................34
Zone description / Double zone ........................................................................34
Double Id .............................................................................................................34
Terminal ...............................................................................................................34
Double..................................................................................................................34
Balancing.............................................................................................................34
Fault / tampering / shortcircuit cycles ..............................................................34
Setpoints .............................................................................................................34
Zone / Double ......................................................................................................34
3.5 GROUPS IN AND .....................................................................................................36
ID ..........................................................................................................................36
Description ..........................................................................................................36
Time window .......................................................................................................36
ID ..........................................................................................................................36
Description ..........................................................................................................36
Zone Type ............................................................................................................36
Expansion type ...................................................................................................36
Double..................................................................................................................36
3.6 AREAS ......................................................................................................................37
ID ..........................................................................................................................37
Description ..........................................................................................................37
Report pre-alert ...................................................................................................37
Deactivation with alarm memory.......................................................................37
Input 1 time (mm:ss)...........................................................................................37
Input 2 time (mm:ss)...........................................................................................37
Output time (mm:ss)...........................................................................................37
Last output time (mm:ss) ...................................................................................37
Not activated alert (minutes) .............................................................................37
Pre-alert time - activation (minutes)..................................................................37
Patrol time (minutes) ..........................................................................................37
Burglar alarm delay (seconds) ..........................................................................38
Activation delay after alarm (minutes)..............................................................38
Enable activation timer ......................................................................................38
Enable deactivation timer ..................................................................................38
Auto-reset alarms ...............................................................................................38
Area code ............................................................................................................38
Areas in AND .......................................................................................................38
Instant activation of areas in AND ....................................................................38
Forced activation of areas in AND ....................................................................38
3.7 OUTPUTS .................................................................................................................39
Status ...................................................................................................................39
Expansion ID .......................................................................................................39
Description ..........................................................................................................39
Expansion Type ..................................................................................................40
Output Id ..............................................................................................................40
Terminal ...............................................................................................................40
Event 1 / 2 / 3 / 4 ..................................................................................................40
Events association (AND/OR)............................................................................40
Behaviour ............................................................................................................40
Send message options.......................................................................................40
3.8 EVENTS GROUP......................................................................................................41
ID ..........................................................................................................................41
Description ..........................................................................................................41
Event 1 / 2 / 3 / 4 /... / 16 ......................................................................................41
3.9 SCENARIOS .............................................................................................................42
ID ..........................................................................................................................42
Description ..........................................................................................................42
Area ......................................................................................................................42
Action...................................................................................................................42
3.10 CODES....................................................................................................................43
Modifying user/installer codes ..........................................................................43
Deleting user/installer codes .............................................................................43
3.10.1 Users ..............................................................................................44
ID ..........................................................................................................................44
User Name ...........................................................................................................44
User type .............................................................................................................44
Area ......................................................................................................................45
Enable ..................................................................................................................45
Reset code...........................................................................................................45
Delete code..........................................................................................................45
Keys and radio controls association window ..................................................45
Associated timer .................................................................................................45
Number of operations ........................................................................................45
Keypad/reader authorisations ...........................................................................45
Robbery code ......................................................................................................45
Disable activation with areas in alarm ..............................................................45
Send message options.......................................................................................45
3.10.2 Installers .........................................................................................46
ID ..........................................................................................................................46
Description ..........................................................................................................46
Installer type........................................................................................................46
Reset code...........................................................................................................46
Delete code..........................................................................................................46
Keys and radio controls association window ..................................................46
Send message options.......................................................................................46
3.10.3 Access levels .................................................................................47
Enabling a level 3 user (via keypad) .................................................................47
How to logout from different control devices ..................................................48
3.10.4 Proximity keys ...............................................................................49
Acquiring an RFID digital key code ..................................................................49
Assigning a key to a user ..................................................................................49
Deleting an RFID digital key code .....................................................................49
ID ..........................................................................................................................49
Description ..........................................................................................................49
User ......................................................................................................................49
Colour ..................................................................................................................49
Acquire ................................................................................................................49
Delete ...................................................................................................................49
3.11 COMMUNICATION INTERFACES ........................................................................ 50
3.11.1 IP Options .......................................................................................50
Options ................................................................................................................50
Network Time Protocol Options ........................................................................51
Dynamic DNS ......................................................................................................51
Services conguration .......................................................................................51
Ports for access to web pages ..........................................................................51
Ports for remote management via Safe Manager ............................................51
SMTP options ......................................................................................................51
3.11.2 GSM Options ..................................................................................52
Telephone options ..............................................................................................52
SMS options ........................................................................................................52
Communicator SIM options ...............................................................................52
Checks on module ..............................................................................................52
Load Default Settings (icon in the form of a cellphone) .................................52
Email Options......................................................................................................53
MMS options .......................................................................................................53
3.11.3 Pal/IP video module .......................................................................54
Status / ID / description ......................................................................................55
Area ......................................................................................................................55
Display technical alarms areas .........................................................................55
Network parameters ...........................................................................................55
New module IP programming pop-up ...............................................................55
VIP options ..........................................................................................................55
Technical alarms cycles (bus/voltage levels) ..................................................56
Cameras installed ...............................................................................................56
Cameras installed (IP) ........................................................................................56
Images .................................................................................................................56
Send message options.......................................................................................56
Conguring a PAL/IP module ............................................................................56
3.11.4 Cloud Options ................................................................................57
Connection ..........................................................................................................57
Cloud Recording .................................................................................................57
3.12 COMMUNICATOR ..................................................................................................58
3.12.1 Telephone Options ........................................................................58
Answer .................................................................................................................58
Call .......................................................................................................................58
PSTN settings .....................................................................................................58
Telephone signaller parameters ........................................................................58
Priority management ..........................................................................................59
3.12.2 Phone Book ...................................................................................59
ID ..........................................................................................................................59
Description ..........................................................................................................59
Email ....................................................................................................................59
Stop calls .............................................................................................................60
Receiving SMS / Email / MMS ............................................................................60
3.12.3 Digital communicator contacts list ..............................................60
ID ..........................................................................................................................60
Description ..........................................................................................................60
Number to call .....................................................................................................60
Protocol ...............................................................................................................60
Customer code....................................................................................................60
Send Area code ...................................................................................................60
Enable periodic test............................................................................................60
Periodic test start date .......................................................................................60
Test period ...........................................................................................................60
Call attempts .......................................................................................................60
Hands-free after report .......................................................................................60
3.12.4 Generic events ...............................................................................61
Text To Speech Conguration ...........................................................................61
ID ..........................................................................................................................61
Description ..........................................................................................................61
Telephone ............................................................................................................61
Activation voice message ..................................................................................61
Reset voice message .........................................................................................61
Send activation SMS ..........................................................................................61
Send reset SMS...................................................................................................61
Send activation email .........................................................................................61
Send reset email .................................................................................................61
Options ................................................................................................................62
Other options (SMS and email) .........................................................................62
Event ....................................................................................................................62
Auto-composition ...............................................................................................63
3.12.5 Detailed events ..............................................................................64
ID ..........................................................................................................................64
Description ..........................................................................................................64
App .......................................................................................................................64
Areas ....................................................................................................................64
Enable MMS.........................................................................................................64
Tab for selecting details of events to signal ....................................................64
Telephone contacts list phones ........................................................................64
Digital communicator telephones .....................................................................64
3.12.6 Contact-ID Map ..............................................................................65
ID ..........................................................................................................................65
Description ..........................................................................................................65
Event code...........................................................................................................65
Qualier ...............................................................................................................65
Select Zone/User.................................................................................................65
3.12.7 Free voice messages ....................................................................66
Run Text To Speech on selected messages ....................................................66
Text To Speech Conguration ...........................................................................66
Delete selected audio messages.......................................................................66
Enable ..................................................................................................................66
ID ..........................................................................................................................66
Description ..........................................................................................................66
Text to speech .....................................................................................................66
Check message...................................................................................................66
Voice conguration ............................................................................................66
Page 4
Enter a free voice message ...............................................................................66
Deleting one or more free voice messages......................................................66
3.12.8 SMS .................................................................................................67
ID ..........................................................................................................................67
Description ..........................................................................................................67
Text .......................................................................................................................67
3.12.9 Email ...............................................................................................67
ID ..........................................................................................................................67
Description ..........................................................................................................67
Text .......................................................................................................................67
3.12.10 Service voice messages .............................................................67
Congure the System Address message .........................................................67
3.13 TIMETABLE PROGRAMMER ...............................................................................68
3.13.1 Timer ...............................................................................................68
ID ..........................................................................................................................68
Description ..........................................................................................................68
ID ..........................................................................................................................68
Enable ..................................................................................................................68
Description (timer type) .....................................................................................68
ONx ......................................................................................................................68
OFFx.....................................................................................................................68
3.13.2 Activations .....................................................................................69
ID ..........................................................................................................................69
Description ..........................................................................................................69
Enabled ................................................................................................................69
Forced ..................................................................................................................69
Control .................................................................................................................69
Area ......................................................................................................................69
ON1 ......................................................................................................................69
Action 1................................................................................................................69
3.14 SYSTEM PARAMETERS .......................................................................................70
Presence of expansions.....................................................................................70
Options ................................................................................................................70
Control devices ...................................................................................................71
System times.......................................................................................................71
Fault cycles .........................................................................................................72
Alarm cycles........................................................................................................72
Date and time ......................................................................................................72
Firmware version ................................................................................................72
Installer authorisation ........................................................................................72
Manufacturer authorisation ...............................................................................72
Restore factory default.......................................................................................72
3.15 EVENTS LOG .........................................................................................................73
3.15.1 Events Log .....................................................................................73
CSV ......................................................................................................................73
Re-analyse current events log...........................................................................73
Filter events.........................................................................................................73
KEY TO COLOURS .............................................................................................73
CONTENTS ..........................................................................................................73
event ....................................................................................................................73
Mask .....................................................................................................................73
Date ......................................................................................................................73
Agent....................................................................................................................73
3.15.2 Events to be saved ........................................................................74
ID ..........................................................................................................................74
Description ..........................................................................................................74
Set ........................................................................................................................74
Reset ....................................................................................................................74
4. System Verication .................................................................. 75
4.1 CONTROL PANEL CHECK (REAL TIME) .............................................................. 75
4.1.1 Launch control panel check function (Real Time) .......................76
4.1.2 Control panel check (Real Time) in alarm condition, activation,
command ............................................................................................76
4.2 CONFORMANCE VERIFICATION (EN50131 GRADE 2 / EN50131 GRADE 2 +
INCERT) ...................................................................................................................77
4.2 1 Run the function Conformance verication (EN50131 grade 2 /
EN50131 grade 2 + incert) .................................................................77
5. Appendix ................................................................................... 78
5.1 PORT FORWARDING FOR REMOTE CONNECTION ...........................................78
5.2 COMELIT DNS REGISTRATION PROCEDURE FOR VEDOIP EXPANSION ...... 79
5.3 CONFIGURATIONS NECESSARY TO GUARANTEE GRADE 2 CERTIFICATION
ACCORDING TO EN50131-1 .................................................................................81
5.3.1 Keypads ...........................................................................................81
5.3.2 App ....................................................................................................81
5.3.3 Input/output expansions (8I8O) .....................................................81
5.3.4 Power supply stations ....................................................................81
5.3.5 Isolators ...........................................................................................81
5.3.6 Radio expansion ..............................................................................81
5.3.7 Radio outputs ..................................................................................81
RADIO OUTPUT EVENTS ...................................................................................81
RADIO OUTPUT CONFIGURATION ....................................................................81
5.3.8 Radio controls .................................................................................81
5.3.9 Radio zones .....................................................................................82
RADIO SUBZONE PARAMETERS ......................................................................82
5.3.10 Wired zones ...................................................................................82
SUBZONE PARAMETERS ...................................................................................82
5.3.11 Areas ...............................................................................................82
5.3.12 Wired outputs ................................................................................82
WIRED OUTPUT EVENTS ...................................................................................82
WIRED OUTPUT CONFIGURATION ...................................................................82
5.3.13 User ................................................................................................82
CODE TYPE .........................................................................................................82
5.3.14 Installers .........................................................................................82
CODE TYPE .........................................................................................................82
5.3.15 IP Options .....................................................................................83
5.3.16 GSM settings .................................................................................83
5.3.17 Telephone Options ........................................................................83
5.3.18 Phone Book / Email .......................................................................83
5.3.19 Digital communicator contacts list ..............................................83
5.3.20 Generic events ...............................................................................83
5.3.21 Detailed events ..............................................................................83
DETAILED EVENTS FLAGS ................................................................................83
5.3.22 Service voice messages ...............................................................85
5.3.23 Timer Types....................................................................................85
TIMER TYPE SCHEDULES .................................................................................85
5.3.24 Timer Model ..................................................................................85
5.3.25 System Parameters .......................................................................85
5.3.26 Events to be saved ........................................................................85
5.4 CONFIGURATIONS NECESSARY TO GUARANTEE INCERT CERTIFICATION 86
5.4.1 Code type .........................................................................................86
5.4.2 System Parameters ........................................................................86
Page 5
Windows Security
Install this device software?
Comelit Vedo USB port driver Ports (COM... Author: COMELIT GROUP SPA
Always trust software from “COMELIT GROUP SPA”.
You should only install driver software from publishers you trust.
How can I decide which device software is safe to install?
Setup
Don't Install
Safe Manager
ItalianoEspañol Français
English Nederlands
Passion.Technology.Design.
Options
Options
Language:
Colour
Isolated peripheral
:
Events log
Alarm/ Sabotage:
Fault / Test:
Generic:
First Zone:
Italiano
Nederlands
Italiano
Español Français English
Communications
Safe Manager
Project View Tools Windows Help
Options
Safe Manager
Project View Tools Windows Help
Options
Language:
Colour
Isolated peripheral:
Events log
Events memory:
Generic:
Zone 1:
Italiano
Nederlands
Italiano
Español Français English
Safe Manager
The new settings will take effect after the programme has been re-started.
OK
Options
Communication type
OK Cancel
CommunicationsOptions
Serial port
Serial port
TCP/IP
COM 6
1. Introduction to Safe Manager 2.6.0 software
1.1 INSTALLING SAFE MANAGER 2.6
1.3 CHANGING THE SOFTWARE LANGUAGE
1.4 ESTABLISHING A CONNECTION BETWEEN A PC AND VEDO SERIES CONTROL PANELS
1.4.1 Set communication via USB
1.2 FIRST START-UP OF THE SOFTWARE
1.1.2 Installation procedure
1.1.1 System requirements
√ PC with Microsoft Windows (Vista, 7, 8, 8.1 or 10) and a free
USB port.
√ NET 4.6.1 Framework (downloadable from Microsoft website).
Comelit Safe Manager conguration software (downloadable
from pro.comelitgroup.com).
√ A-A USB cable.
The program starts if you click on the Safe Manager icon, the position of which depends on the operating system used. If using Windows 7, proceed
as follows:
√ Make sure that the Vedo Series control panel is NOT
connected to the PC.
1.
Run Setup.exe (from the CD or from the le downloaded from
pro.comelitgroup.com).
2.
Follow the on-screen instructions.
1.
Click the Tools menu.
2.
Click the Options menu.
4.
Click Ok to conrm the changes you have made.
5.
The software will conrm that the changes have been saved via the
following message.
6.
Restart Safe Manager to complete the language change procedure.
To programme the control panel with Safe Manager it is necessary to establish a connection between the control panel and the PC.
The Vedo system offers 2 possibilities:
• via USB
• via TCP/IP protocol (if the IP communication card expansion is
installed Art. VEDOIP)
√ Before carrying out the following procedure, make sure that
the USB drivers for Vedo series control panels have been
installed correctly (see “1.1.2 Installation procedure” on page
5).
1.
Connect the control panel to the PC using an A-A type USB
cable.
2.
Click the Tools menu.
3.
Click the Options menu.
4.
Click the Communications tab.
5.
Select Serial port under the option Communication type.
6.
Use the drop-down menu to select the COM port to which the
control panel is connected.
7.
Click Ok to conrm the changes you have made.
8.
Make sure the USB connection status icon (in the bottom right-
hand corner of the main window) has changed from
to .
3.
Select the desired language from the drop-down menu.
1.
Select Start.
2.
Select the folder All programs.
3.
Select the folder Safe Manager.
4.
Click the Safe Manager icon.
5.
The rst time it is started, you will be asked to select the software language.
3.
Click the Install option to install the driver software.
» During Safe Manager installation, the USB driver installation
request will appear automatically.
CAUTION! With control panel card PCBVEDO200 and firmware version up to 2.4.0. The first time the control panel is switched on with the VEDOVOICE card connected, the audio must be regenerated and re-sent to the control panel via Safe Manager (see "2.7
Sending an audio package" on page 8).
Page 6
Safe Manager
Project View Tools Windows Help
Options
Options
Communication type
OK Cancel
CommunicationsOptions
TCP-IP
Serial port
TCP/IP
Host name or IP address
192.168.1.230
Port
10022
Safe Manager
Project View Tools Windows Help
Toolbar
Status strip
Central unit firmware version
Central unit firmware version
Read
Close
Firmware version
Installer authorisation
Execute
Central unit firmware version
Read
Firmware version
Installer authorisation
Login
Login
Cancel
Request code Enter access code
******
Central unit firmware version
Read
Firmware version
Installer authorisation
HARDWARE_ID:MuTy - (Vedo68) HARDWARE_BOOT_VER: 0x2 VERSION_CODE: 0x0 COMMIT#/stable/Vedo-x.x-2.4.x@4467
Alarm control
unit
New project
Ok Cancel
Categories:
2.2.x
Vedo 10
Vedo 34
Vedo 68
Vedo 200
2.6.x Standard
Standard
Standard
Standard
2.6.x
2.6.x
2.6.x
10 2
34 8
8
68
16
200
2.4.x
2.5.x
2.6.x
DefaultDescription FW Zones Areas
Project type:
Ok Cancel
2.2.x
Vedo 10
Vedo 34
Vedo 68
Vedo 200
2.6.x
2.6.x
2.6.x
2.6.x
10 2
34 8
8
68
16
200
Basic
Standard
Alarm control
unit
New project
Categories:
Description
Project type:
DefaultFW Zones Areas
Standard
Standard
Standard
Standard
Safe Manager
Project View Tool Windows Help
Alarm control
unit
New project
Ok Cancel
Categories: Project type:
Description FW Zones Areas Default
Vedo 10
Vedo 34
Vedo 68
Vedo 200
2.6.x Standard
Standard
Standard
Standard
2.6.x
2.6.x
2.6.x
10 2
34 8
8
68
16
200
1.4.2 Set communication via TCP/IP
√ Before carrying out the following procedure, make sure that
the PC used and the Vedo series control panel are both on
the same network.
This is necessary when you want to know which rmware version is installed on the control panel, as some procedures need this information in order to be carried out fully (creating a new system, for example).
This procedure enables you to create a new archive, which will contain all the data relating to the new system that you want to congure.
1.
Press the New icon.
2.
Press the Alarm control panel icon.
3.
Select your control panel from the list and, from the drop-down menu, select the software version installed on the control panel (see "1.5 Viewing the installed rmware version of the control panel" on page 6).
4.
Use the drop-down menu to select whether you wish to create a project with the "Basic" default settings or the "Standard" default settings.
» A system with default parameters will be created. These parameters do
not necessarily correspond to the installed system.
5.
Click OK.
1.
Click the View menu.
2.
Click the Control panel rmware version menu.
3.
If necessary, enable the installer (see "Installer authorisation" on page
72) and click Read.
4.
Enter the installer access code. The default code is 001961
5.
Click Login.
» The box will display the control panel data.
For remote connection, the port on the router must be opened (see “Port forwarding (for Remote connection” page 78).
IP card expansion modules are programmed with the IP address 192.168.1.230 by default. Vedo series control panels communicate using port number 10022 by default.
1.
Click the Tools menu.
2.
Click the Options menu.
3.
Click the Communications tab.
4.
Select TCP/IP under the option Communication type.
5.
Enter the IP address of the IP card expansion module in the Host name or IP address eld.
6.
Insert the number of the communication port in the Port eld (the value must be the same as the one set for the tls port in
the IP Options).
7.
Click Ok to conrm the changes you have made.
8.
Make sure the TCP/IP connection status icon (in the bottom
right-hand corner of the main window) has changed from
to
.
1.5 VIEWING THE INSTALLED FIRMWARE VERSION OF THE CONTROL PANEL
1.6 CREATING A NEW SYSTEM
» 2.4.x --> The rst 2 digits (2.4) indicate the control panel rmware
version, while the third digit (x) increases progressively with routine bug xes. The same rule applies for the naming of the rmware used
by peripherals.
Page 7
Save project
Project information
Customer name:
Addrss
Town:
Telephone:
Mobile:
Notes:
CancelOK
Safe Manager
Project View Tool Windows Help
Open existing project
Customer name:
Filter
Delete
OK
Cancel
Customer name Address Town/city FW # Last saved
Customer 2 Customer address Customer town/city 2.2.x 20/02/2014 15:44:36
Customer 1 Customer address Customer town/city 2.2.x 23/02/2014 09:12:22
Safe Manager
Project View Tools Windows Help
Control devices
Keypads (1)
Safetouch Touch devices RFID readers Phone App Bridge
Vedo 68 - #FW: 2.2x
Status
Active
Absent
Absent
Absent
1
2
3
4
ID Description
Keypad 1
Keypad 2
Keypad 3
Keypad 4
Checked areas
Show
Display tamper
Display technical alarms
Area
Options
Enable proximity reader
Quick activation
Send quick alarms with function key
Display areas status
Keypads
Save
Export
Import...
Print...
Ctrl+S
Add
Open
Ctrl+N
Safe Manager
Do you want to protect the project with a password? Projects saved with a password cannot be recovered if you forget the password
Yes No
Password
Cancel
Project password
Password:
Confirm Password:
OK
Safe Manager
Project View Tool Windows Help
Safe Manager
Project View Tool Windows Help
This chapter illustrates the standard procedures usually carried out using the Safe Manager software. For example: saving the congurations for your system, opening previously saved system les, sending conguration parameters to the control panel and reading the control panel conguration
parameters, etc...
The export procedure is used to obtain a system conguration le. This le can then be opened on other PCs (still using Safe Manager software) and emailed, archived, etc.
Once the system has been congured, the settings can be saved in the Safe Manager database for any necessary servicing or updating purposes.
1.
Click on the Save icon.
1.
While the project is open, click the Project menu.
2.
Click Export.
3.
Save the le to your PC (the save screen depends on the operating system in use).
4.
Once you have chosen where to save it, you will be asked if you want to protect the le with a password.
6b. Fill in the required elds (MAX 15 characters) and press Ok.
» The software exports the project and provides notication that the
procedure is complete in a pop-up window.
5a. If you select NO the software exports the project and provides
notication that the procedure is complete in a pop-up window.
5b. If you select YES a pop-up window will appear, prompting you to enter
a password to protect the project.
1.
Click on the Open icon.
2.
Fill in the form. The "Customer name" eld is a required eld.
2.
Select the project from the list and press Ok.
FILTER OPTION
When the list of systems is particularly long, the name (or part of the name) of the system you want to load can be entered in the text line, pressing the Filter button afterwards: all systems containing the text entered in the Customer name line will appear on the list, while the
others will remain hidden.
3.
Click Ok.
2.1 SAVING THE CONFIGURATION FOR THE SYSTEM IN USE
2.4 EXPORTING A SYSTEM CONFIGURATION
2.2 OPENING THE CONFIGURATION FOR A PREVIOUSLY SAVED SYSTEM
2. Standard procedures
Caution: If the control panel has been updated with more recent firmware than the version used when the project was saved, the Safe Manager software will ask for the project to be updated.
2.3 PRINT PROJECT FUNCTION
This function (available from version 2.4.2.2) allows you to print the project, or parts of the project, in .pdf format.
1.
While the project is open, click the Print... icon.
2.
Tick the project options you wish to print.
3.
Press Ok to print the report in .pdf format.
Page 8
Safe Manager
Control devices
Keypads (1)
Safetouch Touch devices RFID readers Phone App Bridge
Expansions on bus
8 input/output expansions Power supplies
Isolators
Vedo 68 - #FW: 2.2x
Status
Activate
Absent
Absent
Absent
Absent
Absent
Absent
1
2
3
4
5
6
7
ID Description
Keypad 1
Keypad 2
Keypad 3
Keypad 4
Keypad 5
Keypad 6
Keypad 7
Checked areas
Show
Display tamper
Display technical alarms
Area
Options
Enable proximity reader
Quick activation
Send quick alarms with function key
Display areas status
Display alarm memory
Display open zones
Display chime zones
Keypads
Ctrl+NAdd
Open
Save
Export
Import...
Properties
Close
Exit
Print...
Ctrl+S
Project View Tools Windows Help
Password
Cancel
Project password
Password:
Confirm Password:
OK
Send configuration parameters
Log
Poer supply station
System parameters
Scenarios
Wired zones
Groups in And
Outputs
Events groups
Areas
Events to save
Control devices
Keypads
Safetouch
RFID readers
Touch devices
App Phone
Bridge
Expansions from bus
8 input/output expansions
Pal-Ip video module
Radio expansions
Radio zones
Radio outputs
Radiocontrols
Isolators
Power supply units
Interfaces
Options (telephony)
GSM Options
IP Options
Cloud Options
Events
Generic events
Detailed events
Contact-ID Map
Messages
Voice messages (text only)
SMS
Email
Service voice messages
Directory
Telephone contacts list
Digital communicator contacts list
Codes
Users
Installers
Access level
Proximity keys
Programming timetables
Timer
Activations
Timer models
CloseSubmit
Send service texts
Interrupt
Log
Send configuration parameters
Send audio
Audio messages
Regenerate audio
Submit
Audio messages from voice menu
Submit
Close
Using this option, all audio contents generated in the Voice Messages, Service Voice Messages and Generic Events sections will be sent to the control unit
Using this option, all audio contents making up the voice menu will be sent to the control unit. The messages are already ready to be sent and do not require any preparation by the installer.
Safe Manager
Project View Tools Windows Help
Keypads (1)
Control devices
Safetouch Touch devices
Vedo 68 - #FW: 2.6x
Status
Activate
Absent
1
2
ID Description
Keypad 1
Keypad 2
Checked areas
Show
Display tamper
Display technical alarms
Options
Enable proximity reader
Quick activation
Keypads
Safe Manager
Project View Tools Windows Help
Vedo 68 - #FW: 2.6x
Keypads
Safe Manager
Project View Tools Windows Help
Keypads (1)
Control devices
Safetouch Touch devices RFID readers
Vedo 68 - #FW: 2.6x
Status
Activate
Absent
Absent
1
2
3
ID Description
Keypad 1
Keypad 2
Keypad 3
Checked areas
Show
Display tamper
Display technical alarms
Options
Enable proximity reader
Quick activation
Send quick alarms with function key
Keypads
2.5 IMPORTING A SYSTEM CONFIGURATION
2.6 SENDING / RECEIVING CONTROL PANEL PARAMETERS
2.7 SENDING AN AUDIO PACKAGE
1.
Click the Project menu.
2.
Click Import.
Once you have congured the control panel, you will need to transfer the
settings in order for them to take effect.
You can do this from the individual conguration screens by pressing the
icon Send...
Or from the main bar by pressing the icon Send...
» In this case all parameters linked to the screen will be sent. In the image
above, therefore, all the parameters linked to the Keypads screen will be sent.
» In this case, you can select which parameters to send to the control
panel.
3.
Select the le from your PC (the selection screen depends on the operating system in use).
4.
If the project is protected, you will be asked to enter and conrm the
password.
» The software imports the project and provides notication that the
procedure is complete in a pop-up window.
To select / deselect all parameters, use the icons in the top left-hand corner of the box.
This procedure is used to send service voice messages (see "3.12.10
Service voice messages" on page 67), free voice messages (see "3.12.7 Free voice messages" on page 66) and voice control messages to the
control panel.
1.
While the project is open, click the icon Send audio...
2.
In the pop-up window, select which package to send: free voice messages / service messages or voice control messages (precongured).
This option can regenerate all voice messages in a package (not including voice control messages) using the option selected in Voice conguration
(see "Voice conguration" on page 66).
REGENERATE AUDIO OPTION
» At this point the project is saved in the Safe Manager software
database and can be reopened by carrying out the procedure described in chapter “2.2 Opening the conguration for a previously
saved system” on page 7.
The same procedure applies to receiving data from the control panel by pressing the Receive icon.
Caution: To use this function, you need to enable the voice message card.
Page 9
Events log
Events log
Close
Receive
Press the Receive key to receive the events log saved on the control unit. To view the received log, browse the project tree to the option "Events register -> Events log"
Events log
Events log
Press the Receive key to receive the events log saved on the control unit. To view the received log, browse the project tree to the option "Events register -> Events log"
Close
Receive
Login
Login
Cancel
Request code Enter access code
******
Safe Manager
Project View Tools Windows Help
Vedo 68 - #FW: 2.6x
Keypads
Safe Manager
Project View Tools Windows Help
Vedo 68 - #FW: 2.6x
Keypads
2.8 RECEIVING THE EVENTS LOG
2.9 RESET ACCESS CODE
This option allows you to download the control panel events log for later
analysis.
1.
While the project is open, click the icon Receive events log...
2.
Click Receive.
3.
Enter the installer access code. The default code is 001961.
4.
Click Login.
1.
While the project is open, click the icon Reset access code.
2.
Click Yes.
» Once login is complete, the events log screen will open automatically
(see “3.15.1 Events Log” on page 73).
This process resets the cache for previously entered user codes. Therefore,
when a new attempt to connect to the control panel is made, the access
codes will be requested again.
Caution: this procedure does not reset the codes saved on the control panel, only the Safe Manager memory.
2.10 INSTALLER AUTHORISATION
See “Installer authorisation” on page 72
Page 10
10
Status
Activate
Absent
Absent
Absent
Absent
Absent
Absent
Absent
1
2
3
4
5
6
7
8
ID Description
Keypad 1
Keypad 2
Keypad 3
Keypad 4
Keypad 5
Keypad 6
Keypad 7
Keypad 8
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Show
Display tamper
Display technical alarms
Area
Options
Enable proximity reader
Quick activation
Send quick alarms with function key
Display areas status
Display alarm memory
Display open zones
Display chime zones
System status display time
Unlimited
Seconds 120
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Proximity card cycle actions
Action 1
Scenario / Activat Scenario P1
Scenario / Activat Total activation
Scenario / Activat Scenario P1+P2
Scenario / Activat Scenario P2
Action 2
Action 3
Action 4
Partial keys
Function of pushbutton P1
<No function
<No function
Function of pushbutton P2
Key functions
F1 key function
<No function
<No function
<No function
<No function
F2 key function
F3 key function
F4 key function
Keypads
Buzzer
Enabled
Input
Output
Alarm
Chime
Pre-alarm
Pre-alert
Key beep
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Failed activation
Activation/Deactivation executed
3. System configuration
3.1 CONTROL DEVICES
3.1.1 Keypads
This group consists of all devices which allow the end user to manage the system connected to the control panel:
• Keypads
Safetouch
Touch devices
• RFID readers
• App Phone
• Bridge
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Selects the areas that can be controlled by the device during normal operation.
 At least one area on which the device can act during normal operation must be assigned to each active device [Reg. 32]
AREAS PANEL
CHECKED AREAS
Page 11
11
• Unlimited: provides indications even with the system activated, without any time limits. If not selected, enables the Time box. To guarantee conformity
with standards CEI EN 50131-1 and 50131-3, this option must be disabled. NOT selected [Reg. 17]
• Seconds: if the Unlimited checkbox is not checked, this box establishes the duration, in seconds, of the display of information on the device when
the system is activated.
=0 [Reg. 17] The alarm memory signal on the control devices is always visible with the system off even if the system status is not visible (e.g.: setting the display time of the system zero status)
• Unlimited: allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box. Selected [Reg. 12]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
Allows you to choose to which areas the technical alarms generated by the device are sent.
• Enable proximity reader:
enables the RFID reader on board the keypad (keypads Art. VEDOLCDPRO only).
• Quick activation:
activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will
not be allowed).
NOT selected [Reg. 14]
• Send quick alarms with function key: sends alarms when a function key (F1, F2, F3, F4) on the keypad is pressed.
• Display areas status:
authorises the device to display the status of the areas. Selected [Reg. 18]
• Display alarm memory: authorises the device to display the alarm memory.
• Display open zones:
authorises the device to display the open zones. Selected [Reg. 15]
• Display chime zones: authorises the device to display the open chime zones.
At least one area to which the tamper alarms generated by the device are to be signalled must be assigned to each active device [Reg. 5]
At least one area to which the technical alarms generated by the device are to be signalled must be assigned to each active device [Reg. 6]
SYSTEM STATUS DISPLAY TIME
TAMPER ALARM CYCLES
CONFIGURATIONS PANEL
DISPLAY TAMPER
DISPLAY TECHNICAL ALARMS
OPTIONS
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box. Selected [Reg. 13]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
Selects the areas of which you want to show the status with the device.
AREA
SHOW
When a valid and authorised RFID key is passed near a device capable of reading it, as well as performing a Total Activation or Total Deactivation (of the relevant areas), it is possible to activate the system in custom mode (see user manual for keypad Art. VEDOLCDPRO for operating modes relating to this function).
If this activation procedure is used, the keypad will display the set scenarios cyclically (Max 4) and the user will have to choose which one to activate. This section of the program can be used to dene the scenarios corresponding to the sequential steps of the cycle shown by the keypad display. There are two drop-down menus for each of the 4 steps in the cycle. The rst menu allows you to select only the Scenario / Activation option,
whereas the second menu allows you to choose from several standard congurations or from a series of custom activation scenarios (see "3.9
Scenarios" on page 42):
• Scenario P1:
for the areas covered, activates all zones that have a check in the Partial 1 checkbox (if the default settings are maintained).
• Scenario P2:
for the areas covered, activates all zones that have a check in the Partial 2 checkbox (if the default settings are maintained).
• Scenario P1+P2
for the areas covered, activates all zones that have a check in the Partial 1 or Partial 2 checkbox (if the default settings are
maintained).
• Scenario "n" with "n" from 4 to 16:
all activations / deactivations dened in the selected scenario are executed.
• Total Activation:
for the areas covered, activates all zones.
• Total Deactivation:
for the areas covered, deactivates all zones.
PROXIMITY CARD CYCLE ACTIONS (ART. VEDOLCDPRO ONLY)
Page 12
12
This section of the program can be used to dene the activation functions associated with the keys P1 and P2 on the keypads. There are two drop-down menus for each of the 2 keys. The rst menu allows you to select only the Scenario / Activation option, whereas the second
menu allows you to choose from several standard congurations or from a series of custom activation scenarios (see "3.9 Scenarios" on page 42):
PARTIAL KEYS
• Scenario P1:
for the areas covered, activates all zones that have a check in the Partial 1 checkbox (if the default settings are maintained).
• Scenario P2:
for the areas covered, activates all zones that have a check in the Partial 2 checkbox (if the default settings are maintained).
• Scenario P1+P2:
for the areas covered, activates all zones that have a check in the Partial 1 or Partial 2 checkbox (if the default settings are
maintained).
• Scenario "n" with "n" from 4 to 16:
all activations / deactivations dened in the selected scenario are executed.
See description Function keys on page 88.
FUNCTION KEYS
• Enabled: enables the buzzer function and therefore all the options relating to the section. Selected [Reg. 7]
• Entry: the buzzer will remain active for the entire duration of the entry time. Selected [Reg. 8]
• Exit: the buzzer will remain active for the entire duration of the exit time. Selected [Reg. 9]
• Alarm: the buzzer will remain active for the entire duration of the alarm time. Selected [Reg. 10]
• Chime: the buzzer will signal the opening of a zone with an active Chime checkbox (Bell). The duration of the signal can be set in the System
Parameters section (see "3.14 System Parameters" on page 70).
• Pre-alarm:
the buzzer will remain active for the entire duration of the pre-alarm time.
• Pre-alert:
the buzzer will remain active for the entire duration of the automatic pre-alert activation time. The pre-alert time can be set in the Areas
section (see "3.6 Areas" on page 37).
Selected [Reg. 11]
• Key beep: every time a key is pressed, a conrmation beep is generated.
• Failed activation*:
For each area that is in failed activation status (after an activation), the device buzzer emits a tone lasting about 2 sec.
Selected [Reg. 25]
• Activation/Deactivation executed: the buzzer will indicate the completion of the alarm activation/deactivation procedure. At the end of the
activation procedure (of all the areas in which a change of status is expected), the buzzer will emit a continuous tone for 1 second. At the end of the deactivation procedure (of all the areas of which deactivation is expected), the buzzer will emit a continuous tone for 2 seconds. Selected [Reg. 24]
BUZZER
* the "failed activation" signal has priority over the activation/deactivation signals.
When specic events occur, it is possible to send SMSs, emails, digital communications or notications to the smartphone app. In this section, you can assign an initial general permit to generate such events. A second and more detailed screening process is performed in the Detailed Events
section (see “3.12.5 Detailed events” on page 64), where you can select, for each category (e.g. Areas, Zones, Keypads, etc.), the events that will generate the transmission of messages.
• Send SMS:
allows the control panel to send SMSs for events generated by the keypad device. (Only with GSM expansion module Art. VEDOGSM installed and congured).
• Send Email messages:
allows the control panel to send email messages for events generated by the keypad device (only with GSM expansion module Art. VEDOGSM or IP card Art. VEDOIP installed and congured).
• Send digital communication:
allows the control panel to send digital communications for events generated by the keypad device (only with PSTN line congured or GSM expansion module Art. VEDOGSM installed and congured). Selected [Reg.16]
• Send notification to App: allows the control panel to send notications to the smartphone App for events generated by the keypad device (only
with IP card module Art. VEDOIP installed and congured).
SEND MESSAGE OPTIONS
Page 13
13
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Safetouch 1
Safetouch 2
Safetouch 3
Safetouch 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Display tamper
Display technical alarms
Area
Options
Quick activation
Quick alarms
Display areas status
Suspend due to no network
Tamper enabled
Display open zones
Display chime zones
System status display time
Unlimited
Seconds 120
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Px key functions
P1 key function
<No function
<No function
<No function
<No function
P2 key function
P3 key function
P4 key function
Fx key functions
F1 key function
<No function
<No function
<No function
F2 key function
F3 key function
Safetouch
Buzzer
Enabled
Input
Output
Alarm
Chime
Pre-alarm
Pre-alert
Key beep
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Failed activation
Activation/Deactivation executed
Terminals
I1 I2 I3 R LY
In In In Out
Network parameters
IP address
Netmask
Gateway
Address acquisition mode
.. .
.. .
.. .
Static address
VIP options
Logic address
00002001
60Streaming video timeout seconds
3.1.2 Safetouch
In the project there must be no active or isolated SafeTouch devices [Reg. 41]
For the purposes of system management, Safetouch has the same specications and same functions as a keypad with RFID reader. Unlike on the keypad, the keys are virtual: the characteristics of the LCD graphic display are used to represent the device's keys. When this section refers to keys, it means virtual keys.
Selects the areas that can be controlled by the device during normal operation.
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
AREAS PANEL
CHECKED AREAS
AREA
DISPLAY TAMPER
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Allows you to choose to which areas the technical alarms generated by the device are sent.
DISPLAY TECHNICAL ALARMS
Page 14
14
• Quick activation: activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will
not be allowed).
• Quick alarms:
sends alarms when a function key on the device is pressed.
• Display areas status:
authorises the device to display the status of the areas.
• Suspend when no mains power:
authorises the device to switch itself off in order to reduce battery consumption during a mains power outage.
• Tamper enabled:
enables device tamper.
• Display open zones:
authorises the device to display the open zones.
• Display chime zones:
authorises the device to display the open chime zones.
Safetouch is equipped as standard with three terminals that can be congured as inputs or outputs and a fourth terminal that is output only. In this box, you can set whether each of the rst three terminals is to be used as an input or an output. By clicking the terminal icon you can switch the selection from In to Out and vice-versa.
Congurations for viewing the cameras connected to PAL-IP modules Art. VEDOCCTV.
Only if IP card expansion module Art. VEDOIP is present and configured.
See description Buzzer on page 88.
See description Send Message options on page. 89.
OPTIONS
TERMINALS
VIP OPTIONS
NETWORK PARAMETERS
BUZZER
SEND MESSAGE OPTIONS
CONFIGURATIONS PANEL
• Unlimited: provides indications even with the system activated, without any time limits. If not selected, enables the Time box. To guarantee
conformity with standards CEI EN 50131-1 and 50131-3, this Option must be disabled.
• Seconds:
if the Unlimited checkbox is not checked, this box establishes the duration, in seconds, of the display of information on the device when the system is activated. The alarm memory signal on the control devices is always visible with the system off even if the system status is not visible (e.g.: setting the display time of the system zero status).
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
SYSTEM STATUS DISPLAY TIME
TAMPER ALARM CYCLES
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
• IP address: This box is for entering the network address that the device needs in order to be recognised and to communicate correctly on the
local network with the PAL/IP devices present. Bear in mind that the address must be part of the same network as the IP Module
in the control panel.
• Netmask:
This box is for entering the same Netmask address as used for the IP card expansion module connected to the control panel (see
“3.11.1 IP Options” on page 50).
• Gateway:
This box is for entering the same Gateway address as used for the IP card expansion module connected to the control panel (see
“3.11.1 IP Options” on page 50).
• Address acquisition mode:
for future uses.
• Logic address: eld for entering a logic address for the device. The address must be a completely unique 8-digit number.
• Streaming video timeout:
determines the duration of a video call to the cameras. The same value must be set for the PAL-IP modules (see
"3.11.3 Pal/IP video module" on page 54). If the values are different, the lower value is applied.
See description Px key functions on page 87.
See description Function keys on page 88.
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
PX KEY FUNCTIONS
FX KEY FUNCTIONS
Page 15
15
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Touch device 1
Touch device 2
Touch device 3
Touch device 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Display tamper
Display technical alarms
Area
System status display time
Unlimited
Seconds 120
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Px key functions
P1 key function
<No function
<No function
<No function
<No function
P2 key function
P3 key function
P4 key function
Fx key functions
F1 key function
<No function
<No function
<No function
F2 key function
F3 key function
Touch devices
Buzzer
Enabled
Input
Output
Alarm
Chime
Pre-alarm
Pre-alert
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Failed activation
Activation/Deactivation executed
VIP options
Logic address
00002001
60Streaming video timeout seconds
Options
Quick activation
Quick alarms
Display areas status
Suspend due to no network
Tamper enabled
Display open zones
Display chime zones
Communications
485 Bus
Network parameters
IP address
Netmask
Gateway
Address acquisition mode
.. .
.. .
.. .
Static address
Device type Minitouch
3.1.3 Touch devices
In the project there must be no active or isolated Touch devices [Reg. 42]
This group of devices includes: Planux Manager, Minitouch, PC Touch, Icona ViP and Icona SBC. Depending on the selected device, some settings
will be accessible or otherwise.
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Selects the areas that can be controlled by the device during normal operation.
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
AREAS PANEL
CHECKED AREAS
AREA
DISPLAY TAMPER
Allows you to choose to which areas the technical alarms generated by the device are sent.
DISPLAY TECHNICAL ALARMS
Page 16
16
• Quick activation: activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will
not be allowed).
• Quick alarms:
sends alarms when a function key on the device is pressed.
• Display areas status:
authorises the device to display the status of the areas.
• Suspend when no mains power:
authorises the device to switch itself off in order to reduce battery consumption during a mains power outage.
• Tamper enabled:
enables device tamper.
• Display open zones:
authorises the device to display the open zones.
• Display chime zones:
authorises the device to display the open chime zones.
• Communication:
displays the channel with which to communicate with the control panel. Non settable parameter, read-only.
OPTIONS
CONFIGURATIONS PANEL
• Unlimited: provides indications even with the system activated, without any time limits. If not selected, enables the Time box. To guarantee
conformity with standards CEI EN 50131-1 and 50131-3, this option must be disabled.
• Seconds:
if the Unlimited checkbox is not checked, this box establishes the duration, in seconds, of the display of information on the device when the system is activated. The alarm memory signal on the control devices is always visible with the system off even if the system status is not visible (e.g.: setting the display time of the system zero status).
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
SYSTEM STATUS DISPLAY TIME
TAMPER ALARM CYCLES
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
Keys available on touch devices Planux Manager, Minitouch, Icona ViP and Icona SBC.
See description Px key functions on page 87.
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
PX KEY FUNCTIONS
See description Buzzer on page 88.
See description Send Message options on page. 89.
BUZZER
SEND MESSAGE OPTIONS
NETWORK PARAMETERS
Keys available on touch devices Planux Manager, Minitouch, Icona ViP and Icona SBC.
See description Function keys on page 88.
FX KEY FUNCTIONS
Only if IP card expansion module Art. VEDOIP is present and configured.
• Device type: this drop-down menu is used to select the device model from Planux Manager, Minitouch, PC Touch, Icona ViP and Icona SBC
. .
• IP address:
This box is for entering the network address that the device needs in order to be recognised and to communicate correctly on the local network with the PAL/IP devices present. Bear in mind that the address must be part of the same network as the IP Module
in the control panel.
• Netmask:
This box is for entering the same Netmask address as used for the IP card expansion module connected to the control panel (see
“3.11.1 IP Options” on page 50).
• Gateway:
This box is for entering the same Gateway address as used for the IP card expansion module connected to the control panel (see
“3.11.1 IP Options” on page 50).
• Address acquisition mode:
displays the mode with which to acquire an IP address. Non settable parameter, read-only.
Congurations for viewing the cameras connected to PAL-IP modules Art. VEDOCCTV.
VIP OPTIONS
• Logic address: eld for entering a logic address for the device. The address must be a completely unique 8-digit number.
• Streaming video timeout:
determines the duration of a video call to the cameras. The same value must be set for the PAL-IP modules (see
"3.11.3 Pal/IP video module" on page 54). If the values are different, the lower value is applied.
Page 17
17
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Reader 1
Reader 2
Reader 3
Reader 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Cycle actions
Red LED cycle action
Scenario / Activat
Scenario / Activat
Scenario / Activat
Scenario / Activat
Yellow LED cycle action
Blue LED cycle action
Green LED cycle action
RFID readers
Buzzer
Enabled
Input
Output
Alarm
Chime
Pre-alarm
Pre-alert
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Active
Absent
Absent
Absent
5
6
7
8
Reader 5
Reader 6
Reader 7
Reader 8
LED ON time on proximity key
Unlimited
Seconds 0 (+30)
Total activation
Scenario P1
Scenario P2
Scenario P1+P2
Forced activation
Failed activation
Activation/Deactivation executed
3.1.4 RFID readers
In the project there must be no active or isolated RFID readers [Reg. 43]
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Selects the areas that can be controlled by the device during normal operation.
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
AREAS PANEL
CHECKED AREAS
AREA
DISPLAY TAMPER
Allows you to choose to which areas the technical alarms generated by the device are sent.
DISPLAY TECHNICAL ALARMS
CONFIGURATIONS PANEL
• Unlimited: allows continuous display of the information provided by the 4 reader LEDs. If not selected, enables the Time box. To guarantee
conformity with standards CEI EN 50131-1 and 50131-3, this option must be disabled.
• Seconds:
if the Unlimited checkbox is not active, this box determines the time, in seconds, for which the RFID reader is enabled to show the information associated to its LEDs, after the presentation of a valid, authorised RFID key. The system will automatically add 30
seconds to the set time.
LED ON TIME ON PROXIMITY KEY
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
TAMPER ALARM CYCLES
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
Page 18
18
When a valid and authorised RFID key is passed near an RFID reader, as well as performing a Total Activation or Total Deactivation (of the relevant areas), it is possible to activate the system in custom mode (see user manual for RFID reader Art. VEDOPROX for operating modes relating to this function).
If this activation procedure is used, the RFID reader will display the set scenarios cyclically (max. 4) via the LEDs and the user will have to choose which one to activate.
This section of the program can be used to dene the scenarios corresponding to the sequential steps of the cycle shown by the RFID reader LEDs. There are two drop-down menus for each of the 4 steps in the cycle (identied by the colours of the 4 LEDs on the RFID reader). The rst menu
allows you to select only the Scenario / Activation option, whereas the second menu allows you to choose from several standard congurations or from a series of custom activation scenarios (see "3.9 Scenarios" on page 42):
• Scenario P1:
for the areas covered, activates all zones that have a check in the Partial 1 checkbox (if the default settings are maintained).
• Scenario P2:
for the areas covered, activates all zones that have a check in the Partial 2 checkbox (if the default settings are maintained).
• Scenario P1+P2:
for the areas covered, activates all zones that have a check in the Partial 1 or Partial 2 checkbox (if the default settings are
maintained).
• Scenario "n" with "n" from 4 to 16:
all activations / deactivations dened in the selected scenario are executed.
• Total Activation: for the areas covered, activates all zones.
• Total Deactivation: for the areas covered, deactivates all zones.
CYCLE ACTIONS
See description Buzzer on page 88.
When the function is enabled, the RFID reader will always carry out activation, forcing the activation lock conditions.
(*) Indications relating to LED ON status have priority over any other indications (ashing) that may be present with the exception of the alarm memory, Flashing Red, which takes priority over Red LED ON.
(*) The purpose of forcing is to overcome a 'not ready' condition in one or more of the zones associated with the areas covered by the reader, and/ or an anomaly which can be overridden due to the choices made at the time of control panel conguration.
MEANING OF READER LEDS IN NORMAL CONDITIONS
RED YELLOW BLUE GREEN
OFF
All areas covered by the reader are deactivated. There are no saved alarms relating to the areas.
ON
The activation prole associated with the RED LED (*) is active
The activation prole associated with the YELLOW LED (*) is active
The activation prole associated with the BLUE LED (*) is active
The activation prole associated with the GREEN LED (*) is active
FLASHING SLOWLY
All areas covered by the reader are deactivated. There is an area alarm
or sabotage memory, or a control panel sabotage memory.
System activated with unknown scenario (not saved).
FLASHING QUICKLY
At least one of the areas covered by the reader is activated. There
is an area alarm or sabotage memory, or a control panel sabotage memory.
One or more anomalies have been detected in the areas covered by
the reader and/or there is a system
fault.
At least one area covered by the reader is not ready for activation.
MEANING OF READER LEDS DURING PRESENTATION OF THE KEY
RED YELLOW BLUE GREEN
OFF
Request for deactivation of all areas covered by the reader.
ON
Request for activation of the activation prole associated with
the RED LED
Request for activation of the activation prole associated with
the YELLOW LED
Request for activation of the activation prole associated with
the BLUE LED
Request for activation of the activation prole associated with
the GREEN LED
FLASHING QUICKLY
The reader is forcing the activation prole associated with the RED
LED (*)
The reader is forcing the activation prole associated with the
YELLOW LED (*)
The reader is forcing the activation prole associated with the BLUE
LED (*)
The reader is forcing the activation prole associated with the
GREEN LED (*)
See description Send Message options on page. 89.
BUZZER
FORCED ACTIVATION
SEND MESSAGE OPTIONS
Page 19
19
System parameters
Presence of expansions
GSM
PSTN
Network card (Ip)
Audio
Domotics
Intercom
IP Options
Options
Check presence of connection to internet
Enable DHCP (obtain IP address automatically)
IP Address
Subnet mask
Gateway
Primary DNS
Secondary DNS
Host name
192.168. 1 .230
255.255.255. 0
192.168. 1 . 1
192.168. 1 . 1
0 . 0 . 0 . 0
IP?
Status
Absent
1
2
ID Description
Pal/Ip 1
Pal/Ip 2
Display technical alarms
Pal-Ip video module
Activat
Pal-Ip parameters programming
Pal-Ip video module to update
Current IP address (Pal-Ip video module)
Current netmask (Pal-Ip video module)
New IP address
New netmask
Gateway
Address acquisition mode
Close
Ping
Ping
Alarm panel
Final IP address (control unit)
Ping
Run
0 . 0 . 0 . 0
192.168. 1 .234
192.168. 1 . 1
255.255.255. 0
192.168. 1 .230
Static address
0 . 0 . 0 . 0
3.1.5 Phone App
√ SafeManager software installed on a PC, version 2.2.0 or higher. √ VEDO10, VEDO34 or VEDO68 control panel, version 2.2.0 or higher. √ IP network card Art. VEDOIP, version 2.2.0 or higher.
PAL IP module Art. VEDOCCTV , version 2.2.0 or higher (required if you want to view cameras via the APP).
√ Camera connected to the PAL IP module (required if you want to view cameras via the App). √ Internet connection (for remote App usage).
1.
In "System Parameters", enable the IP network card.
2.
In "IP Options", make sure that the IP address of the network card for the module is compatible with the router network.
3.
In "Pal-Ip Video Module", activate the PAL IP module (if present).
4.
In "Pal-Ip Video Module", press "Assign new IP to the module..." to set a compatible IP address and send programming with "run" (see Conguration of a Pal/IP module,"3.11.3 Pal/IP video module" on page 54).
5.
In "Pal-Ip video module", in the section "Cameras installed", select how many cameras are connected and to which areas they refer; in the "Video acquisition mode” eld select PAL.
6.
In the "Phone App" section, activate how many Apps on mobile devices will be able to connect to the control panel (max 8), congure the device by setting the following parameters and set the notications you wish to receive using the section "Detailed events" (see "3.12.5 Detailed events"
on page 64).
SYSTEM REQUIREMENTS:
HOW TO PROCEED
In the project there must be no active or isolated App devices [Reg. 44]
To obtain certification, there must be no Pal/Ip Modules in the project [Reg. 104]
Page 20
20
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
App 1
App 2
App 3
App 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Display tamper
Area
Tamper alarm cycles
Unlimited
Cycles 0
App Phone
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Active
Absent
Absent
Absent
5
6
7
8
App 5
App 6
App 7
App 8
Options
Quick activation
Quick alarms
Unlimited System status display time
Function keys
F1 key function
Command
Command
Scenario / Activation
Scenario / Activation
Reset alarms
Stop alarms
Total deactivation
Total activation
F2 key function
F3 key function
F4 key function
F5 key function
F6 key function
F7 key function
F8 key function
<No function
<No function
<No function
<No function
VIP options
Logical address
00001001
60Streaming video timeout seconds
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Selects the areas that can be controlled by the device during normal operation.
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
AREAS PANEL
CHECKED AREAS
AREA
DISPLAY TAMPER
CONFIGURATIONS PANEL
• Quick activation: for future uses.
• Quick alarms:
for future uses.
• Unlimited System status display time:
if enabled, lets you view the notications received in real time with the app in the background, even without entering the user password; otherwise authentication is required.
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box.
• Cycles:
if the unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
• Logic address: eld for entering a logic address for the device. The address must be a completely unique 8-digit number.
• Streaming video timeout:
Determines the maximum duration of a video call; the user can always end the call using the relevant button in the App. The same value must be set for the PAL-IP modules (see "3.11.3 Pal/IP video module" on page 54). If the values are different, the lower value is applied.
Congurations for viewing the cameras connected to PAL-IP modules Art. VEDOCCTV.
OPTIONS
TAMPER ALARM CYCLES
VIP OPTIONS
See description Function keys on page 88.
The function keys F5, F6, F7, F8,will be available only as from version 2.3.x of the Vedo App.
FX KEY FUNCTIONS
See description Send Message options on page. 89.
SEND MESSAGE OPTIONS
Page 21
21
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Bridge 1
Bridge 2
Bridge 3
Bridge 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Bridge
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Options
Quick activation
Quick alarms
Check connection with the central unit (ethernet)
Check internet connection
Check faults
Communication
Bus 485
3.1.6 Bridge
In the project there must be no active or isolated App devices [Reg. 45]
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Selects the areas that can be controlled by the device during normal operation.
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
Allows you to choose to which areas the technical alarms generated by the device are sent.
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
• Quick activation:
activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will
not be allowed).
• Quick alarms: for future uses
• Communication:
drop-down menu, allows you to select the communication bus between the control panel and the Bridge.
• Check connection with the central unit (ethernet):
if this function is selected the Bridge checks and veries the Ethernet connection.
• Check presence of connection to internet:
if this function is selected the Bridge checks and veries the Internet connection.
• Check faults:
if this function is selected the device ignores all faults generated.
AREAS PANEL
CHECKED AREAS
AREA
DISPLAY TAMPER
DISPLAY TECHNICAL ALARMS
TAMPER ALARM CYCLES
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
OPTIONS
CONFIGURATIONS PANEL
See description Send Message options on page. 89.
SEND MESSAGE OPTIONS
Page 22
22
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Expansion 1
Expansion 2
Expansion 3
Expansion 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
8 input/output expansions
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Terminals
1 2 3 4
In In In In
Absent
Absent
Absent
Absent
5
6
7
8
Expansion 5
Expansion 6
Expansion 7
Expansion 8
Absent
Absent
Absent
Absent
9
10
11
12
Expansion 9
Expansion 10
Expansion 11
Expansion 12
5
In6In
7
In
8
In
3.2 EXPANSIONS ON BUS
3.2.1 8 input/output expansions
This section is for conguring the parameters of the input/output expansions. These are bus expansions which provide 8 congurable inputs (or open-collector outputs).
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
At least one area to which the tamper alarms generated by
the device are to be signalled must be assigned to each active device [Reg. 5]
Allows you to choose to which areas the technical alarms generated by the device are sent.  At least one area to which the technical alarms
generated by the device are to be signalled must be assigned to each active device [Reg. 6]
The expansion devices provide 8 terminals as standard; they can be congured as inputs or open collector outputs. In this box, you can set whether each of the terminals is to be used as an input or an output. By clicking the terminal icon you can switch the selection from In to Out and vice-versa.
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box. Selected [Reg. 12]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box. Selected [Reg. 13]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
AREAS PANEL
AREA
DISPLAY TAMPER
DISPLAY TECHNICAL ALARMS
TERMINALS
TAMPER ALARM CYCLES
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
CONFIGURATIONS PANEL
Page 23
23
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Power suppl. 1
Power suppl. 2
Power suppl. 3
Power suppl. 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Power supply units
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to the App
Options
Absent
Absent
Absent
Absent
5
6
7
8
Power suppl. 5
Power suppl. 6
Power suppl. 7
Power suppl. 8
Tamper enabled
Network alarm signalling delay (hh:mm:ss)
Battery alarm signalling delay (hh:mm:ss)
00:00:55
00:05:00
Reading analogue values
Output 1 voltage
Output 2 voltage
Output 3 voltage
Tamper voltage
Tamper power supplier
Aux 1 voltage
Output bus voltage
Aux 2 voltage
Read
3.2.2 Power supply units
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
• Tamper Enable: enables device tamper.
Selected [Reg. 19]
• Network alarm signalling delay (hh:mm:ss):
time box, allows you to set the alarm delay caused by a power outage. On expiry of this time an alarm will be generated, and if programmed, messages will be sent (SMS, voice, email). No alarm will be generated if the situation returns to normal before expiry of the timer. Maximum
60 sec [Reg. 20]
• Battery alarm signalling delay (hh:mm:ss):
time box, allows you to set the alarm delay caused by a battery fault. On expiry of this time an alarm will be generated, and if programmed, messages will be sent (SMS, voice, email). No alarm will be generated if the situation returns to normal before expiry of the timer.  Maximum 5 min
[Reg. 21]
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
At least one area to which the tamper alarms generated by
the device are to be signalled must be assigned to each active device [Reg. 5]
• Unlimited: allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box. Selected [Reg. 12]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
• Output 1 voltage:
displays the voltage value of open collector output number 1 if enabled.
• Output 2 voltage:
displays the voltage value of open collector output number 2 if enabled.
• Output 3 voltage:
displays the voltage value of open collector output number 3 if enabled.
• Tamper voltage:
displays the analogue voltage value of the 24H input.
• Power supply unit voltage:
displays the voltage value at the input of switching power supply unit Art. 30076101. The typical voltage value is
13.8 Vdc +/- 2%.
• Output bus voltage:
displays the voltage value at the output of the BUS power supply unit between terminals V+ and V- BUS Out.
• Aux 1 voltage:
displays the voltage value at the output between terminals V+ V- Aux 1.
• Aux 2 voltage:
displays the voltage value at the output between terminals V+ V- Aux 2.
Allows you to choose to which areas the technical alarms generated by the device are sent.
 At least one area to which the technical alarms
generated by the device are to be signalled must be assigned to each active device [Reg. 6]
AREAS PANEL
AREA
OPTIONS
DISPLAY TAMPER
TAMPER ALARM CYCLES
READING ANALOGUE VALUES
DISPLAY TECHNICAL ALARMS
CONFIGURATIONS PANEL
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 24
24
Status
Activate
Absent
Absent
Absent
1
2
3
4
ID Description
Isolator 1
Isolator 2
Isolator 3
Isolator 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Isolators
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Options
Absent
Absent
Absent
Absent
5
6
7
8
Isolator 5
Isolator 6
Isolator 7
Isolator 8
Enabled tamper
Reading analogue values
Tamper voltage
Input bus voltage
Output bus voltage
Read
Absent
Absent
Absent
Absent
9
10
11
12
Isolator 9
Isolator 10
Isolator 11
Isolator 12
Absent
Absent
Absent
Absent
13
14
15
16
Isolator 13
Isolator 14
Isolator 15
Isolator 16
3.2.3 Isolators
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
• Tamper enable: enables device tamper.
Selected [Reg. 19]
• Unlimited: allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box. Selected [Reg. 12]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box. Selected [Reg. 13]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
• Tamper voltage:
displays the analogue voltage value of the 24H input.
• Input bus voltage:
displays the voltage value at the input of the Bus isolator between terminals V+ and V- In. The typical voltage value must
fall between 10.3 Vdc and 14.5 Vdc.
• Output bus voltage:
displays the voltage value at the output of the Bus isolator between terminals V+ and V- Out. The typical voltage value must fall between 10.3 Vdc and 14.5 Vdc.
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
At least one area to which the tamper alarms generated by
the device are to be signalled must be assigned to each active device [Reg. 5]
Allows you to choose to which areas the technical alarms generated by the device are sent.  At least one area to which the technical alarms
generated by the device are to be signalled must be assigned to each active device [Reg. 6]
AREAS PANEL
AREA
OPTIONS
TAMPER ALARM CYCLES
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
READING ANALOGUE VALUES
DISPLAY TAMPER
DISPLAY TECHNICAL ALARMS
CONFIGURATIONS PANEL
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 25
25
Status
Activate
Absent
Absent
1
2
3
ID Description
Radio exp. 1
Radio exp. 2
Radio exp. 3
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Display tamper
Display technical alarms
Area
Tamper alarm cycles
Unlimited
Cycles 0
Technical alarms cycles (bus / voltage levels)
Unlimited
Cycles 0
Radio expansions
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
3.3 RADIO EXPANSIONS
This section is for conguring the parameters of the radio expansions. Radio expansion are bus expansions for receiving and sending radio information, and managing wireless sirens and sensors. Each module can manage up
to 32 radio zones, up to 32 radio controls and up to 16 radio outputs (of which 8 can be sirens).
See description Status / ID / Description on page 87.
STATUS / ID / DESCRIPTION
STATUS/DESCRIPTION PANEL
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37
• Unlimited:
allows you to generate innite cycles of tamper alarms. If not selected, enables the Cycles box. Selected [Reg. 12]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of tamper alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
• Unlimited:
allows you to generate innite cycles of technical alarms. If not selected, enables the Cycles box. Selected [Reg. 13]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of technical alarm cycles that the selected device can generate
within an activation cycle (from one activation to the next).
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
At least one area to which the tamper alarms generated by
the device are to be signalled must be assigned to each active device [Reg. 5]
Allows you to choose to which areas the technical alarms generated by the device are sent.  At least one area to which the technical alarms
generated by the device are to be signalled must be assigned to each active device [Reg. 6]
AREAS PANEL
AREA
TAMPER ALARM CYCLES
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
DISPLAY TAMPER
DISPLAY TECHNICAL ALARMS
CONFIGURATIONS PANEL
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 26
26
Status
Absent
Absent
Absent
Absent
1
2
3
4
ID Description
Radio output 1
Radio output 2
Radio output 3
Radio output 4
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Display system status
Display tamper
Area
Sabotage cycles
Unlimited
Time 0
Malfunction alarm cycles
Unlimited
Time 0
Radio outputs / sirens
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Absent
Absent
Absent
Absent
5
6
7
8
Radio output 5
Radio output 6
Radio output 7
Radio output 8
Absent
Absent
Absent
Absent
9
10
11
12
Radio output 9
Radio output 10
Radio output 11
Radio output 12
Absent 13 Radio output 13
Absent
Absent
Absent
14
15
16
Radio output 14
Radio output 15
Radio output 16
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Physical Id
Source expansion
Radio output properties
Serial Number
Siren
Type
DeleteAcquire
RSSI (received signal strength indication 0-100)
Read
0
Siren options
LED intermittence timeout
Equal to siren timeou
Siren Volume Medium-high
2 minutesActivation timeout
Sound on siren start-up
Sound on activation/deactivation
LED activation on siren start-up
LED activation on activation/deactivation
LED enabled
3
Radio monitoring time (minutes)
Event 1
Event type
Areas
AND / OR
OR
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Event subtype
OR alarm
Areas
Event
Zone alarm
Polarity
Direct
Event 2
Event type
System
Event subtype
OR alarm
Event
Sabotage
Polarity
Direct
Event 3
Event type
Event subtype
Event
Polarity
Event 4
Event type
Event subtype
Event
Polarity
Events association
Events logic
And timer
Or timer
OR
<None>
<None>
Conduct
Output type
Confirmations oscillation period
Monostable
1 x 100 ms
Alarm oscillation period
0 x 100 ms
Monostable times
ON Time (seconds)
120
OFF Time (seconds)
0
1
UnlimitedRepetition cycles
Other options
Disable battery check
Direct
Direct
3.3.1 Radio outputs /sirens
This section is for conguring the parameters of the input/output expansions. These are bus expansions which provide 8 congurable inputs (or open-collector outputs).
The total activation time of a siren must not exceed that prescribed by local regulations (see appendix to see what parameters determine the total duration).
Prepare the peripheral as per the specic technical sheet. In the case of a radio siren, by way of a guideline, proceed as follows:
1.
With the mouse, select the location corresponding to the output to be removed.
2.
Click on the Delete button (see "Radio output properties / delete" on page 27) and conrm. The program will indicate that deletion has been completed.
1.
With the mouse, select the location to which you intend to save.
2.
With the siren battery disconnected, press and hold the siren's LEARN button, which is located near the connection strip for the conguration jumpers, and then connect the battery. Hold the LEARN button down until the siren ashing light starts ashing quickly, then release the button.
3.
Wait until the ashing changes from quick to slow.
4.
Click on the Acquire button (see "Radio output properties / acquire" page 27). Via the control panel, the program starts the procedure for
acquiring the output code and parameters, including type.
5.
At the end of the procedure, the program indicates that acquisition has been completed and shows whether the code belongs to a siren or to a radio output. If the procedure times out before acquisition has been completed, repeat the operation from the start.
RADIO OUTPUT ACQUISITION
DELETING A RADIO OUTPUT
See description Status / ID / Description on page 87.
Uniquely identies the output within the framework of the internal numbering of the control panel. Cannot be modied by the installer.
Provides a description of the radio module to which the output (or siren) is associated.
STATUS / ID / DESCRIPTION
PHYSICAL ID
SOURCE EXPANSION
STATUS/DESCRIPTION PANEL
Page 27
27
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
Allows you to choose to which areas the Tamper alarm generated by the device is sent.
At least one area to which the tamper alarms generated by
the device are to be signalled must be assigned to each active device [Reg. 5]
Allows you to select the areas about which visual and/or aural activation/deactivation information can be sent. To each active device must be
assigned at least one area to which information regarding optical and/or acoustic activation/deactivation can be sent [Reg. 23]
AREAS PANEL
AREA
DISPLAY TAMPER
DISPLAY SYSTEM STATUS
• Serial number:
the siren output serial number will appear the moment it is acquired.
• Type:
drop-down menu; the moment the radio code from the peripheral is acquired, it allows you to establish whether the acquired code will belong to a radio siren or to a radio output. This will ensure the acquisition of a correct code for the type of peripheral and will set, on the control panel, the right method of communication with the peripheral.
Acquire: for starting the code acquiring phase for the output corresponding to the selected position, by means of the radio expansion module
with which it is associated.
Delete: deletes the code of the selected position, making it available again to be associated to another radio peripheral (output or siren).
• LED intermittence timeout: for future uses.
• Siren volume: future uses.
• Timeout activation:for future uses.
• Sound on siren start-up: for future uses.
• Sound on activation/deactivation: for future uses.
• Led activation on siren start-up: for future uses.
• LED activation on activation/deactivation: for future uses.
• LED enabled: for future uses.
• Radio monitoring time (minutes):
enables setting of a time period beyond which a fault signal is sent if the siren does not respond.
• Read:
when this key is pressed the radio signal is read. The Minimum RSSI Acquisition value must be 40 RSSI.
RSSI is the power of the radio signal between the siren in use and the radio transmitter to which it is associated, where 0 is no signal and 100 is the maximum value that can be obtained.
RADIO OUTPUT PROPERTIES
SIREN OPTIONS
RSSI (SIGNAL LEVEL INDICATOR 0-100)
CONFIGURATIONS PANEL
• Disable battery check: if this option is selected, the operational check procedure for the battery powering the siren will be disabled.  NOT
selected [Reg. 26]
OTHER OPTIONS
See description on page 90.
EVENT 1 / 2 / 3 / 4
See description on page 90.
EVENTS ASSOCIATION (AND/OR)
• Unlimited:
allows you to generate innite cycles of sabotage alarms. If not selected, enables the Time box.
• Time:
if the Unlimited checkbox is not active, this box determines the number of sabotage alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
SABOTAGE CYCLES
• Unlimited:
allows you to generate innite cycles of malfunction alarms. If not selected, enables the Time box.
• Time:
if the Unlimited checkbox is not active, this box determines the number of malfunction alarm cycles that the selected device can generate within an activation cycle (from one activation to the next).
MALFUNCTION ALARM CYCLES
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
See description on page 91.
BEHAVIOUR
Page 28
28
1
2
3
4
ID Description
Radio ctrl 1
Radio ctrl 2
Radio ctrl 3
Radio ctrl 4
Fault cycles
Unlimited
Cycles 0
Radio controls
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
5
6
7
8
Radio ctrl 5
Radio ctrl 6
Radio ctrl 7
Radio ctrl 8
9
10
11
12
Radio ctrl 9
Radio ctrl 10
Radio ctrl 11
Radio ctrl 12
13 Radio ctrl 13
14
15
16
Radio ctrl 14
Radio ctrl 15
Radio ctrl 16
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Source expansion
Radio control properties
Serial Number
4 buttons
Type
DeleteAcquire
RSSI (received signal strength indication 0-100)
Read
0
17
18
19
20
Radio ctrl 17
Radio ctrl 18
Radio ctrl 19
Radio ctrl 20
21
22
23
24
Radio ctrl 21
Radio ctrl 22
Radio ctrl 23
Radio ctrl 24
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
User
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Area 1
Checked areas
Area
Key functions
F1 key function (top left)
Scenario / Activat
Scenario / Activat
Alarm
Scenario / Activat
F2 key function (top right)
F3 key function (bottom left)
F4 key function (bottom right)
Total activation
Total deactivation
Medical
Scenario P1
Forced activation
Instant activation
3.3.2 Radio controls
This section can be used to add or remove and congure remote controls.
STATUS/DESCRIPTION PANEL
ID
DESCRIPTION
SOURCE EXPANSION
USER
Identies the position of the radio control. An uneditable checkbox next to the ID parameter; shows when a position is occupied, i.e. when a code has already been acquired in that position.
For entering a specic, customised name for the device. For example, you might choose to change the name of "Radio Control 1" to “RC John” so as to give a more specic idea of its user.
Shows a description of the radio module with which the radio control is associated.
Allows you to assign a user and hence the latter's authorisations to a radio control.
Selects the areas that can be controlled by the device during normal operation.
At least one area on which the device can act during normal
operation must be assigned to each active device [Reg. 32]
Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page 37.
AREAS PANEL
CHECKED AREAS
AREA
• Serial number:
the radio control serial number will appear the moment it is acquired.
• Type:
shows the type of radio control acquired (e.g.: 4 buttons, in the sense of a 4-button radio control).
• Acquire:
starts radio control acquisition.
• Delete:
deletes the selected radio control.
RSSI is the power of the radio signal between the radio control in use and the radio transmitter to which it is associated, where 0 is no signal and 100 is the maximum value that can be obtained.
• Read:
when this key is pressed the radio signal is read. The Minimum RSSI Acquisition value must be 40 RSSI.
RADIO CONTROL PROPERTIES
RSSI (SIGNAL LEVEL INDICATOR 0-100)
CONFIGURATIONS PANEL
See description Function keys on page 88.
FUNCTION KEYS
• Unlimited:
allows you to generate innite cycles of fault alarms. If not selected, enables the Cycles box. Selected [Reg. 33]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of fault alarm cycles that the selected radio control can generate
within an activation cycle (from one activation to the next).
FAULT CYCLES
Page 29
29
When the function is enabled, the Radio control will always carry out activation, forcing the activation lock conditions. Selected [Reg. 34]
If selected, the enabled areas will activate immediately, therefore resetting any output time to zero.
FORCED ACTIVATION
INSTANT ACTIVATION
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 30
30
Radio zones
Fault cycles
Unlimited
Cycles 0
Radio zone properties
Serial Number
Type
DeleteAcquire
RSSI (received signal strength indication 0-100)
Read
0
Options
90
Radio monitoring time (minutes)
Enabled
Tamper enabled
PIR
Zone
Alarm
Type
Areas associated with zone
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
OR
No functio
Areas logic
Inactivity
Inactivity time (minutes)
1
Instant activation
Forced activation
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Send MMS
Alarm cycles
Unlimited
Cycles 0
Burglar
Subtype
Groups in AND
Reaction type
Instant
Delayed input 1
Delayed input 2
Input path
Delayed in output
Last output
Burglar alarm verified
Attributes
Excluded
Cannot Exclude
Chime
Test
Auto-excludable
Auto-excludable with reset
Output delay with termination
Partial 1
Partial 2
Delayed on partial activation
Delayed and assess ready activation
Display during input/output
Cameras
Source
Camera
Status
Absent
Absent
Absent
Absent
1
2
3
4
ID Description
Radio zone 1
Radio zone 2
Radio zone 3
Radio zone 4
Absent
Absent
Absent
Absent
5
6
7
8
Radio zone 5
Radio zone 6
Radio zone 7
Radio zone 8
Absent
Absent
Absent
Absent
9
10
11
12
Radio zone 9
Radio zone 10
Radio zone 11
Radio zone 12
Absent 13 Radio zone 13
Absent
Absent
Absent
14
15
16
Radio zone 14
Radio zone 15
Radio zone 16
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Physical Id
Source expansion
Absent
Absent
Absent
Absent
17
18
19
20
Radio zone 17
Radio zone 18
Radio zone 19
Radio zone 20
Absent
Absent
Absent
Absent
21
22
23
24
Radio zone 21
Radio zone 22
Radio zone 23
Radio zone 24
Absent
Absent
Absent
Absent
25
26
27
28
Radio zone 25
Radio zone 26
Radio zone 27
Radio zone 28
Absent 29 Radio zone 29
Absent
Absent
Absent
30
31
32
Radio zone 30
Radio zone 31
Radio zone 32
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Radio exp. 1
Reed
Smoke
Gain control
2
Options
Number of impulses 2 Impulses
Pet immunity
Pir
Enable APS
3.3.3 Radio zones
This section of the program is for managing the radio zones, which correspond to the IR and magnetic contact wireless sensors belonging to the system. Specically, you can acquire new sensor codes; isolate, exclude or delete sensors already present on the control panel, and modify the
parameters of each radio sensor.
Prepare the peripheral as per the specic technical sheet. In the case of a radio sensor, by way of a guideline, proceed as follows:
1.
With the mouse, select a free position in which to save the sensor.
2.
Insert the battery in the sensor concerned and wait until the LED stops ashing. This applies to both magnetic contacts (REED) and infrared
detectors (PIR).
3.
Click on the Acquire button; an on-screen message will inform you that the code acquisition procedure is in progress.
4.
On the sensor, press and then release the tamper button.
5.
A few seconds later, the control panel will conrm that the code has been acquired and will update the Serial Number and Type boxes with the sensor data acquired.
RADIO SENSOR ACQUISITION
Page 31
31
STATUS/DESCRIPTION PANEL
• Serial number: the device serial number will appear the moment it is acquired.
• Type:
the type of sensor acquired is shown the moment the radio code of the peripheral is acquired (e.g.: Reed for a contact transmitter or PIR for a passive infrared detector).
• Acquire:
for starting the code acquiring phase for the zone corresponding to the selected position, by means of the radio expansion module
with which it is associated.
• Delete:
deletes the code of the selected position, making it available again to be associated with a new radio device.
• Radio monitor time (minutes):
allows you to set the time lapse between two consecutive transmissions of the sensor “existence” frame. The control panel will use these transmissions to assess the presence and correct operating status of the sensor. In the event of repeated failure to receive these transmissions, the control panel is capable of generating an
anomaly or alarm.
= 20 min [Reg. 35]
• LED enabled: if selected, enables the LED on the radio sensor.
• Tamper enabled:
if selected, enables the tamper on the radio sensor.
Selected [Reg. 36]
• Enabling APS:
(Automatic Power Saving) if selected, with the system off, allows the reduction of battery consumption (by reducing the number of communications of the sensors with the radio concentrator).
• Read:
when this key is pressed the radio signal is read. The Minimum RSSI Acquisition value must be 40 RSSI.
RSSI is the power of the radio signal between the sensor in use and the radio transmitter to which it is associated, where 0 is no signal and 100 is the maximum value that can be obtained.
• Unlimited:
allows you to generate innite cycles of fault alarms. If not selected, enables the Cycles box.
Selected [Reg. 33]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of fault alarm cycles that the selected sensor can generate within
an activation cycle (from one activation to the next).
• Gain control: set the sensitivity value of the PIR from 1 (lowest value) to 4 (highest value).
• Pet immunity:
if selected, activates the Pet Immunity function (to allow the presence of small animals).
• Number of pulses: allows you to set the number of pulses.
• Switch in AND:
if selected, the alarm will be generated only if both inputs are open.
• External switch:
if selected, the input for the sensor terminal block will be considered to be in use.
• Internal switch:
if selected, the internal input, corresponding to the reed capsule in the sensor, will be considered to be in use.
• Smoke sensor: if selected, enables the respective sensor.
• Heat sensor: if selected, enables the respective sensor.
CONFIGURATIONS PANEL
RADIO ZONE PROPERTIES
OPTIONS
RSSI (SIGNAL LEVEL INDICATOR 0-100)
FAULT CYCLES
PIR (OPTIONS APPLY TO PIR SENSORS ONLY)
REED (OPTIONS APPLY TO REED SENSORS ONLY)
SMOKE
See description Status / ID / Description on page 87.
Button allowing the congurations of a zone to be copied so as to paste them onto an existing zone.
1.
Select the zone of which you want to copy the congurations.
2.
Press the icon to copy.
3.
Select the zone where you want to paste the congurations from the window "Duplicate current zone on zone..."
4.
Conrm.
Uniquely identies the zone within the framework of the internal numbering of the control panel. Cannot be modied by the installer.
Shows a description of the radio module with which the radio zone is associated.
STATUS / ID / DESCRIPTION
DUPLICATE THE VALUES OF THE CURRENT ZONE...
PHYSICAL ID
SOURCE EXPANSION
Page 32
32
This section is for conguring the basic behaviour of the zone. In particular, you can associate the type of operation to the zone.
ZONE
• Type / subtype: selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the
eld below (subtype) will show a series of possible choices, depending on the type of selection made (See page 94).
There must be a zone configured as Type: fault - Subtype: zone fault [Reg. 1]. There must be a zone configured as Type: fault ­Subtype: robbery fault [Reg. 2]. There must be a zone configured as Type: fault - Subtype: siren fault [Reg. 3]. All alarm, fault and command zones must be set to double or triple balance or double with EOL. The sabotage zones must be set to single or double or triple or triple with jamming or double with EOL [Reg. 4]
• Areas associated with zone: determines which areas the zone will be associated with. All active devices must have at least one associated
area. [Reg. 37]
• Areas Logic:
• OR:
the selected actions are performed if the conditions arise in any of the areas associated with the zone.
• AND:
the set actions are performed only if the conditions arise in all of the areas associated with the zone.
• Inactivity: allows an action to be generated if a zone remains inactive beyond a maximum time limit.
No function: no action is performed.
Fault: an alarm fault is generated.
Auto-activation:
the alarm for the area associated to the zone is activated.
• Inactivity time (minutes):
eld for setting the maximum inactivity time.
• Instant activation:
if selected, the zone command instantly activates the areas to which it is associated.
• Forced activation:
if selected, the zone command or inactivity activates the areas to which it is associated, forcing the activation lock conditions.
• Send message options: See description Send Message options on page. 89.
• Alarm cycles
• Unlimited:
allows you to generate innite alarm cycles. If not selected, enables the Cycles box. Selected [Reg. 40]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of alarm cycles that the zone can generate within an
activation cycle (from one activation to the next).
• Cameras:
This section is for setting a camera to start acquiring the frames upon violation of the zone. The frames obtained can be sent by MMS and e-mail or notied to the Vedo App.
Source:
drop-down menu; allows you to choose the PAL/IP module to which the camera to be used for shooting the frames
is connected.
• Camera:
drop-down menu; allows you to choose the camera that will shoot the frames, from those connected to the PAL/ IP device.
• Groups in AND (only for zone type: Alarm):
The Groups in AND are eight virtual zones which can be constructed on the basis of the real zones, whether radio or wired. The aim of such a function is to cause the generation of an event, e.g. an alarm, conditional upon the violation of more than one area. For this purpose, there is a drop-down menu from which you can associate the zone with any of these eight areas. You need to associate more than one zone to a Group in AND in order to obtain the expected result. For the behaviour of Groups in AND, (see "3.5 Groups in AND" on page 36).
• Reaction type (only for zone type: Alarm/Burglary):
See description of reaction type on page 95.
• Attributes (only for zone type: Alarm):
See attributes description on page 96.
• Command type:
See description of command type on page 96.
Page 33
33
Status
Activate
Activate
Activatet
Activate
Expansion type Origin
Central unit
Central unit
Central unit
Central unit
Wired zones
Activate
Activate
Activate
Activate
Central unit
Central unit
Central unit
Central unit
Activate
Absent
Absent
Central unit
Central unit
Central unit
Central unit
Central unit
Central unit
Central unit
Central unit
Central unit
Speed
Speed
Central unit
Keypad 1
Keypad 1
1
3
5
7
9
11
13
15
17
211
214
24H zone
Wired zone 1
Wired zone 2
Wired zone 3
Wired zone 4
Wired zone 5
Wired zone 6
Wired zone 7
Wired zone 8
Keypad 1 I1
Keypad 1 I2
Zone Id
Zone description
Zone
Double Id
2
4
6
8
10
12
14
16
18
212
214
Double zone description
24H double zone
Double zone 1D
Double zone 2D
Double zone 3D
Double zone 4D
Double zone 5D
Double zone 6D
Double zone 7D
Double zone 8D
Keyp 1 I1D
Keyp 1 I2D
Terminals
24H
I1
I2
I3
I4
I5
I6
I7
I8
I1
I2
Double
Double
Balancing
Fault/tampering/shortcircuit cycles
Unlimited
Cycles 0
Setpoints (KΩ)
0 - 1.14
1.14 - 2.65
2.65 - 4.33
4.33 - 5.97
5.97 - 8.13
9.48.13 -
Sabotage / Short
Rest
Alarm
Sabotage / Open
Sabotage / Open
Sabotage / Open
Reset
Analogue value reading (KΩ)
Reset
0
AlarmType
Areas associated with zone
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
OR
No functio
Areas logic
Inactivity
Inactivity time (minutes)
1
Instant activation
Forced activation
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Send MMS
Alarm cycles
Unlimited
Cycles 0
Groups in AND
Reaction type
Instant
Delayed input 1
Delayed input 2
Input path
Delayed in output
Last output
Burglar alarm verified
Attributes
Excluded
Cannot Exclude
Chime
Test
Auto-excludable
Auto-excludable with reset
Output delay with termination
Partial 1
Partial 2
Enable output delay on partial activation
Delayed and assess ready activation
Display during input/output
Standard zoneDetection type
Impulse acquisition time
30 Seconds
Alarm impulse duration
1 100 ms
x
Impulses
1
24HSubtype
Zone ID 1
Double
Cameras
Source
Camera
3.4 WIRED ZONES
This section of the program is for managing the wired zones, which correspond to the wired sensors belonging to the system. Specically, you can add new zones; isolate, exclude or delete zones already present on the control panel, and modify the parameters of each zone.
Button allowing the congurations of a zone to be copied so as to paste them onto an existing zone.
1.
Select the zone of which you want to copy the congurations.
2.
Press the icon to copy.
3.
Select the zone where you want to paste the congurations from the window "Duplicate current zone on zone..."
4.
Conrm.
DUPLICATE THE VALUES OF THE CURRENT ZONE...
Page 34
34
Describes the type of peripheral to which the zone is connected, for example “Central unit” or “Keypad”.
Describes to which peripheral the zone is connected, for example “Keypad 1”, for the purpose of precisely identifying the zone connection position.
Uniquely identies the zone
An editable, alphanumeric eld, in which you can enter a specic, customised name for the zone / double zone. For example, you might want to change “Wired zone 1” to “Entrance 1” for the purpose of rapid identication of the physical position or function of the zone.
Uniquely identies the double zone.
Shows the name for the physical terminal of the peripheral to which the output in question is routed.
Flag; appears when the type Double or Double with EOL is selected in the tab for the zone.
All the alarm, fault and control zones must be at least in double balance. Single balance may be enough for sabotage [Reg. 4]
• Unlimited: allows you to generate innite cycles of fault / tampering / shortcircuit alarms. If not selected, enables the Cycles box.
• Cycles:
if the Unlimited checkbox is not active, this box determines the number of fault / tampering / shortcircuit alarm cycles that the selected sensor can generate within an activation cycle (from one activation to the next).
• Reset:
clicking this button resets the setpoints to their factory settings, thereby deleting any change relating to the selected zone.
This section shows the trigger setpoints set on the control panel for the selected zone. If you change the type of balance in the Balance drop-down menu, the meaning of the voltage ranges changes. In the simplest case (NC or NO) there are only two possibilities: Standby and Alarm. In the case of a more complex conguration, for example Double with EOL meanings will be added to several voltage ranges previously associated with the Alarm and Standby states. You can modify each individual setpoint to compensate an imbalance of the line. You are advised to modify the setpoints only after careful consideration.
This section is for conguring the basic behaviour of the zone. In particular, you can associate the type of operation to the zone. When you select Double or Double with EOL as the input type, you can use both tabs (Zone/Double). Otherwise, only the Zone tab will be usable.
For a physical description of the wiring required for correct balancing of the zones associated with each type of balance, refer to the control panel technical installation manual.
INPUT TYPE DESCRIPTION
NO
Normally Open in standby, signals only the alarm
NC
Normally closed in standby, signals only the alarm
Single
Single balance. Signals alarm and sabotage by short-circuit of the physical line
Double
Double balance, signals alarm and sabotage by cutting or short-circuit of the physical line
Triple
Triple balance. Signals alarm, fault and sabotage by cutting or short-circuit of the physical line From version 2.4, the zone fault recognition time for triple balance has been reduced from 10 seconds to 2 seconds.
Triple with jamming
Triple balance with jamming. Signals an alarm, motion sensor jamming and sabotage due to cutting or short-circuit of the physical line (from version 2.4, the zone fault recognition time for triple balance with jamming has been reduced from 10 seconds to 2 seconds)
Double
Enables you to connect two sensors to a single wired line. Signals alarm from zone 1, alarm from zone Double 1 and sabotage due to cutting of the cable
Double with EOL
As for Double but with end-of-line resistor. Enables you to connect two sensors to a single wired line and to signal tampering with the line. Signals alarm from zone 1, alarm from zone Double 1 and sabotage due to cutting or short-circuit of the physical line
EXPANSION TYPE
ORIGIN
ZONE ID
ZONE DESCRIPTION / DOUBLE ZONE
DOUBLE ID
TERMINAL
DOUBLE
FAULT / TAMPERING / SHORTCIRCUIT CYCLES
SETPOINTS
ZONE / DOUBLE
BALANCING
CONFIGURATIONS PANEL
STATUS/DESCRIPTION PANEL
Drop-down menu, allows you to add, isolate and remove devices from the conguration. The possible statuses for the device are as follows:
STATUS
• Absent:
when the zone does not exist or has to be removed.
• Active:
when the zone is present, congured and intended to be operational.
• Isolated:
when the zone is intended to be temporarily unused (even if present and congured, the control panel will not consider it active).
Page 35
35
PARAMETER UNIT OF MEASUREMENT FOR NORMAL DETECTION UNIT OF MEASUREMENT FOR INERTIAL/ROLLER SHUTTER
DETECTION
Pulse acquisition time
125 seconds maximum or 125 minutes maximum
125 seconds maximum or 125 minutes maximum
Alarm impulse duration
12.7 seconds maximum or 127 minutes maximum
127 x 1 millisecond maximum or 127 x 10 milliseconds maximum
Pulses
10 maximum 10 maximum
• Instant activation: if selected, the zone command instantly activates the areas to which it is associated.
• Forced activation:
if selected, the zone command or inactivity activates the areas to which it is associated, forcing the activation lock conditions.
• Send message options: See description Send Message options on page. 89.
• Alarm cycles
• Unlimited:
allows the zone to generate innite alarm cycles. If not selected, enables the Cycles box. Selected [Reg. 40]
• Cycles: if the Unlimited checkbox is not active, this box determines the number of alarm cycles that the zone can generate within an
activation cycle (from one activation to the next).
• Cameras:
This section is for setting a camera to start acquiring the frames upon violation of the zone. The frames obtained can be sent by MMS and e-mail or notied to the Vedo App.
Source:
drop-down menu; allows you to choose the PAL/IP module to which the camera to be used for shooting the frames
is connected.
• Camera:
drop-down menu; allows you to choose the camera that will shoot the frames, from those connected to the PAL/ IP device.
• Groups in AND (only for zone type: Alarm):
The Groups in AND are eight virtual zones which can be constructed on the basis of the real zones, whether radio or wired. The aim of such a function is to cause the generation of an event, e.g. an alarm, conditional upon the violation of more than one area. For this purpose, there is a drop-down menu from which you can associate the zone with any of these eight areas. You need to associate more than one zone to a Group in AND in order to obtain the expected result. For the behaviour of Groups in AND, (see "3.5 Groups in AND" on page 36).
• Reaction type (only for zone type: Alarm/Burglary):
See description of reaction type on page 95.
• Attributes (only for zone type: Alarm):
See attributes description on page 96.
• Command type:
See description of command type on page 96.
• Zone ID: uniquely identies the wired zone.
• Type / subtype:
selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the eld below (subtype) will show a series of possible choices, depending on the type of selection made (See page 94).
There must be a zone configured as Type: fault - Subtype: zone fault [Reg. 1]. There must be a zone configured as Type: fault ­Subtype: robbery fault [Reg. 2]. There must be a zone configured as Type: fault - Subtype: siren fault [Reg. 3]. All alarm, fault and command zones must be set to double or triple balance or double with EOL. The sabotage zones must be set to single or double or triple or triple with jamming or double with EOL [Reg. 4]
• Areas associated with zone: determines which areas the zone will be associated with. All active devices must have at least one associated
area. [Reg. 37]
• Areas Logic:
• OR:
the selected actions are performed if the conditions arise in any of the areas associated with the zone.
• AND:
the set actions are performed only if the conditions arise in all of the areas associated with the zone.
• Inactivity: allows an action to be generated if a zone remains inactive beyond a maximum time limit.
No function: no action is performed.
Fault: an alarm fault is generated.
Auto-activation:
the alarm for the area associated to the zone is activated.
• Inactivity time (minutes):
eld for setting the maximum inactivity time.
• Detection type:
drop-down menu. In order to interpret status changes correctly, you can congure the zone as a standard zone or as Inertial / Shutter, with different parameters. In both cases, you can congure the zone in such a way that it triggers only after a certain number of pulses (of zone violation) within a certain time. You can also set the minimum amplitude of the pulses that will be
considered.
• Pulse acquisition time, Alarm Pulse Duration:
only if, within the "Pulse acquisition time", the number of pulses detected is greater than or equal to the number set in the "Pulse" box, and their minimum amplitude satises the parameter "Alarm pulse duration", will the zone be considered to have been violated (or activated if a Control Zone).
Page 36
36
Description
Group in AND 1
Group in AND 2
Group in AND 3
Group in AND 4
Time window (hh:mm:ss)
Groups in AND
Group in AND 5
Group in AND 6
Group in AND 7
Group in AND 8
00:00:00
00:00:00
00:00:00
00:00:00
00:00:00
00:00:00
00:00:00
00:00:00
ID
1
2
3
4
5
6
7
8
ID Description Zone Type
Double
Expansion type
3.5 GROUPS IN AND
The control panel has 8 virtual zones whose behaviour depends on groups of real zones, which are assigned at the conguration stage to one of the 8 zones in AND.
When 2 or more zones are assigned to a zone in AND, all of them have to be violated within a specic time limit (measured from the rst violation) for an alarm state to be generated. The alarm state enables each real zone to generate an alarm according to its conguration.
STATUS/DESCRIPTION PANEL
ZONES IN AND DESCRIPTION PANEL
Uniquely identies the virtual zone.
Uniquely identies a real zone associated with the zone in AND.
Shows the description set for the real zone at the time of its conguration.
Describes the type of real zone (e.g.: Wired Zone or Radio Zone).
Describes the module to which the real zone is connected.
Checkbox; if shown selected, it means that the zone is double type.
An editable, alphanumeric eld, in which you can enter a specic, customised name for the group. For example, you might want to change “Zone in AND 1” to “Corridor Group” for the purpose of rapid identication of the function of the output.
If you select with the mouse a position relating to a zone in AND to which real zones are associated, the eld on the right-hand side will display information about the individual associated real zones. The data are not editable
An editable, numerical box; determines the time within which the individual zones associated with the Zone in AND must be violated for an alarm
state to be generated.
ID
ID
DESCRIPTION
ZONE TYPE
EXPANSION TYPE
DOUBLE
DESCRIPTION
TIME WINDOW
Page 37
37
Areas
Description
Report pre-alert
Deactivation with alarm memory
Input 1 time (mm:ss)
Input 2 time (mm:ss)
Output time (mm:ss)
Last output time (mm:ss)
Negligence
Not activated alert (minutes)
Pre-alert time - activation (minutes)
Round time (minutes)
Burglar alarm delay (seconds)
Activation delay after alarm (minutes)
Enable activation timer
Enable deactivation timer
Auto-reset alarms
Area code
1 2
3
4
5
6
Area 1 Area 2
Area 3
Area 4
Area 5
Area 6
00:30 00:30
00:30
00:30
00:30
00:30
00:00 00:00
00:00
00:00
00:00
00:00
00:30 00:30
00:30
00:30
00:30
00:30
00:15 00:15
00:15
00:15
00:15
00:15
0 0
0
0
0
0
0 0
0
0
0
0
0 0
0
0
0
0
0 0
0
0
0
0
0 0
0
0
0
0
<None> <None>
<None>
<None>
<None>
<None>
<None> <None>
<None>
<None>
<None>
<None>
0 0
0
0
0
0
3.6 AREAS
The Areas section allows you to congure the times and functions of the Areas according to the requirements of the system.
AREAS PANEL
Uniquely identies the area.
For entering a specic, customised name for the area. For example, you might want to change “Area 1” to “Reception Area” for the purpose of rapidly identifying the associated functions and sensors.
If selected, allows you to signal the activation pre-alert time by means of the buzzers on the control devices associated with the selected area.
Selected [Reg. 50]
If the area is enabled by a timer for the deactivation function, selecting this checkbox allows the area to be deactivated if it has saved an alarm.
This Timer allows a Delayed Input 1 time to be set for each individual Area. During Input time 1 (Timer active), the zones with Reaction type: Delayed Input 1 and Input Path are not in a condition to send the area into alarm. The Input delay is the time which passes on violation of a Delayed Input or Input Path type zone in the Area activated in Total or Partial mode.
< 45 sec (00:45) [Reg. 46]
This Timer allows a Delayed Input 2 time to be set for each individual Area. During Input time 2 (Timer active), the zones with Reaction type: Delayed Input 2 and Input Path are not in a condition to send the area into alarm. The Input delay is the time which passes on violation of a Delayed Input or Input Path type zone in the Area activated in Total or Partial mode.
< 45 sec (00:45) [Reg. 47]
This Timer allows a Delayed Output time to be set for each individual Area. During Output time (Timer active), the zones with Reaction type: Delayed Output are not in a condition to send the area into alarm. The Output delay is the time which passes on violation of a zone with Reaction type: Delayed in Output. When the Output Time has elapsed the zones behave as per Reaction type programming.
The Last output time Timer replaces the value remaining for the Area Output Time on violation of a zone with Reaction type: Last output.
This Timer is used to check that the Area to which it corresponds is activated normally within a maximum time limit. If the Area is not activated for a specied maximum time limit, an event of the type Areas/Generic/Negligence is generated and may be shown at an output. The maximum time that can be congured is 60000.
This Timer is used to alert personnel within the Checked area that activation is taking place. The enabled checking devices will emit an audible alert.
> 0 min [Reg. 48]
The Patrol time Timer is the time that passes from the moment at which the Area is deactivated with a User type code: Patrol, the moment at which it is activated automatically. The Patrol User type can be assigned to a User code, Proximity key or Radio control.
ID
DESCRIPTION
REPORT PRE-ALERT
DEACTIVATION WITH ALARM MEMORY
INPUT 1 TIME (MM:SS)
INPUT 2 TIME (MM:SS)
OUTPUT TIME (MM:SS)
LAST OUTPUT TIME (MM:SS)
NOT ACTIVATED ALERT (MINUTES)
PRE-ALERT TIME - ACTIVATION (MINUTES)
PATROL TIME (MINUTES)
Page 38
38
The "pre-alarm" Burglar alarm delay Timer is the time that passes between zone violation and Alarm event generation. During the Burglar alarm delay, the enabled checking devices will emit an audible alert.
= 0 sec [Reg. 49]
The Activation delay after alarm is the time that must pass before the violated area which generated the alarm event can be activated again.
If the Enable activation timer is associated with an Area, and if the Timer is active and in its START phase, the activation requirements for the area
- originating from the Control devices - will be satised. If the Timer is active but in is STOP phase, the activation requests will NOT be satised.
If the Enable deactivation timer is associated with an Area, and if the Timer is active and in its START phase, the deactivation requirements for the area - originating from the Control devices - will be satised. If the Timer is active but in is STOP phase, the deactivation requests will NOT be satised.
When this function is enabled, every Area to be activated will automatically carry out an Alarm Signal Reset.
Allows you to enter a specic area code that will be digitally transmitted by the communicator if the zones associated with that area generate alarms or events requiring notication to a monitoring control panel. It is useful when systems are shared between multiple users, because in these circumstances the Customer Code is not sufcient to identify unequivocally the source of the alarm call.
Allows you to associate the activation of the area that you are conguring, with the activation of one or more other areas. Supposing you are working on Area 8, if you select Area 1 and Area 2 in its group of checkboxes, Area 8 will activate automatically when Area 1 and Area 2 are both activated. It is possible to select one area only, for example Area 1. In this case, simply activating Area 1 will also activate Area 8.
If selected, ignores the activation delays of the areas activated as a consequence of the areas in AND.
Checkbox, allows activation as a consequence of the areas in AND even in the presence of a 'not ready for activation' state. In the case of a zone not ready for activation, if this cannot be excluded, it generates an alarm.
BURGLAR ALARM DELAY (SECONDS)
ACTIVATION DELAY AFTER ALARM (MINUTES)
ENABLE ACTIVATION TIMER
ENABLE DEACTIVATION TIMER
AUTO-RESET ALARMS
AREA CODE
AREAS IN AND
INSTANT ACTIVATION OF AREAS IN AND
FORCED ACTIVATION OF AREAS IN AND
AREAS IN AND PANEL:
Page 39
39
Status
Activate
Activate
Activate
Absent
Expansion Id
Description
O. centr.unit 1
O. centr.unit 2
O. centr.unit 3
Safet 1 RLY
Outputs
1
1
1
1
RLY
TC1
TC2
RLY
Expansion type
Central unit
Central unit
Central unit
Safetouch
Output Id
1
2
3
103
Terminal
Event 1
Event type
Areas AND / OR
OR
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Event subtype
OR alarm
Areas
Event
Zone alarm
Polarity
Direct
Event 2
Event type
System
Event subtype
OR alarm
Event
Sabotage
Polarity
Direct
Event 3
Event type
Event subtype
Event
Polarity Direct
Event 4
Event type
Event subtype
Event
Polarity Direct
Events association
Events logic
And timer
Or timer
OR
<None>
<None>
Conduct
Output type
Oscillation semiperiod
Monostable
0
Monostable times
ON Time
3
OFF Time
0
1
UnlimitedRepetition cycles
Polarity
NO
Minutes
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
Activation only with system activated
3.7 OUTPUTS
This section is for conguring the physical outputs present on the control panel or made available by the expansion modules on the bus.
The total activation time of any siren connected to an output must not exceed that prescribed by local regulations (see appendix to see what parameters determine the total duration).
STATUS/DESCRIPTION PANEL
Drop-down menu, allows you to add, isolate and remove devices (Keypad, Safetouch...)/zones/outputs from the conguration. The possible statuses for the device are as follows:
Shows the number of the expansion to which the output is routed. Coincides with the bus address congured on the peripheral.
For entering a specic, customised name for the device. For example, you might want to change “Central Unit 1” to “General Alarm” for the purpose of rapid identication of the function of the output.
STATUS
EXPANSION ID
DESCRIPTION
• Absent:
when the device/zone/output does not exist or has to be removed.
• Active:
when the device/zone/output is present, congured and intended to be operational.
• Isolated:
when the device/zone/output is intended to be temporarily unused (even if present and congured, the control panel will not consider it active).
Page 40
40
Shows the physical location of the output, with information such as “Central unit” or “8 I/O Expansion”.
Shows the name for the terminal of the peripheral to which the output in question is routed.
Uniquely identies the output.
EXPANSION TYPE
TERMINAL
OUTPUT ID
CONFIGURATIONS PANEL
See description on page 90.
EVENT 1 / 2 / 3 / 4
See description on page 90.
EVENTS ASSOCIATION (AND/OR)
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
See description on page 91.
BEHAVIOUR
Page 41
41
Description
Events group 1
Events group 2
Events group 3
Events group 4
Events group
Events group 5
Events group 6
Events group 7
Events group 8
ID
1
2
3
4
5
6
7
8
Event 1
Event type
Event subtype
Event
Polarity Direct
Event 2
Event type
Event subtype
Event
Polarity Direct
Event 3
Event type
Event subtype
Event
Polarity
Direct
Event 4
Event type
Event subtype
Event
Polarity
Direct
Event 5
Event type
Event subtype
Event
Polarity
Direct
3.8 EVENTS GROUP
The outputs, both standard outputs and radio outputs, can manage up to four events each, freely selected in terms of type and polarity. It is sometimes useful to have indications grouped according to a logic that cannot be obtained by conguring the four events available for a single output, e.g. a summary indication of block events relating to all the RFID readers, when there are more than 4 of them in the system.
The Group section provides eight Groups. Each group makes it possible to manage up to sixteen independent events. The single events belonging to an event group can be managed in OR or in AND. The mode can be selected directly in the output menus, in the section for
assigning events to outputs. You can choose the two modes from an appropriate drop-down menu. See also Radio outputs / Sirens and Outputs. Once you have decided and congured the events to be associated to the group, you can retrieve them in the section relating to Outputs or Radio Outputs.
You can do this by selecting the Groups option as Events Type in one of the four events available for the output and, immediately afterwards, from the menu to the right of the event, selecting the Group congured to show the desired set of events.
STATUS/DESCRIPTION PANEL
Uniquely identies the events group.
An editable, alphanumeric eld, in which you can enter a specic, customised name for the selected events group. For example, you might want to change “Events Group 1” to “RFID Block” for rapid identication of the function assigned to the events group.
ID
DESCRIPTION
See description on page 90.
EVENT 1 / 2 / 3 / 4 /... / 16
CONFIGURATIONS PANEL
Page 42
42
Description
Scenario P1
Scenario P2
Scenario P1+P2
Scenario 4
Scenarios
Scenario 5
Scenario 6
Scenario 7
Scenario 8
ID
1
2
3
4
5
6
7
8
Scenario 9
Scenario 10
Scenario 11
Scenario 12
Scenario 13
Scenario 14
Scenario 15
Scenario 16
9
10
11
12
13
14
15
16
ActionArea
Area 1
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
P1
P1
P1
P1
P1
P1
P1
P1
3.9 SCENARIOS
In this section you can congure the activation statuses for each area of the system and for 8 (for Vedo 10, Vedo 34) or 16 (for Vedo 68) different scenarios.
STATUS/DESCRIPTION PANEL
AREA / ACTION PANEL
Uniquely identies the scenario.
An alphanumeric eld; shows the name of the area (Area n by default) or the name that will be assigned to it by modifying the default in the Areas
section.
Drop-down menu, allows you to associate a specic activation status to each area. For each area, the options described in the table on page 89.
An editable, alphanumeric eld, in which you can enter a specic, customised name for the selected scenario. For example: you might want to change “Scenario 4” to “Night-time” for rapid identication of the function assigned to the scenario. For each scenario there is a table in which to congure the possible statuses of the area when that scenario is activated.
ID
AREA
ACTION
DESCRIPTION
Page 43
43
3.10 CODES
This heading covers the sections for the conguration, programming and acquisition of the codes, divided by type. The number of codes, keys and remote controls that can be activated depends on the type of control panel used:
For digital keys, a unique key ID is used which has at least 2³²-2 combinations. The unique ID of the digital key is dened by the crc32 of the bytes that form the unique code of the key, and can have a value between 1 and 2^32-1,
therefore generating a maximum number of 2^32-2 possible values. The number of code entry errors that will cause the timed lockout of the control device is programmable from the System Parameters (see "3.14 System
Parameters" on page 70).
IMPORTANT: if a user authorised to generate Robbery alarms types in a code identical to his own +1, a Robbery alarm will be generated. For this reason, it is not possible to enter codes whose value is equal to an existing code plus or minus 1.
VEDO10 VEDO34 VEDO34M VEDO68 VEDO68M
User Code
8 32 32 50 50
Installer Code
2 5 5 5 5
Manufacturer Code
1
Remote controls
11 38 38 56 56
Keys
11 38 38 56 56
The codes accepted must have 6 gures and range from 000000 to 999998. Code 999999 is not an accepted code. The robbery code is the user code + 1. Examples: user code 111111, the corresponding robbery code is 111112. Code 119999, robbery code = 120000. Code 123459, robbery code = 123460 It is not possible to register a user code corresponding to an existing user code + 1, since this new code corresponds to the robbery code of the existing user. In the system it is therefore possible to store up to a theoretical maximum of 999943 user codes. The calculation is the result of the fact that it is not possible
to create a user code that is the same as an existing user code + 1 (which is the robbery code). The actual maximum number of user codes that can be congured is shown in the previous table.
The authorised user can perform an innite number of changes of his user code and can create and eliminate another user, whereas he is unable to modify any user code other than his own.
MODIFYING USER/INSTALLER CODES
DELETING USER/INSTALLER CODES
1.
On the User/Installer page, select the position whose user/installer code you want to delete.
2.
Click the Reset button.
3.
When asked if you want to delete the existing code, press YES.
4.
When asked for an authorisation code, type in an installer code or the code of a user authorised to perform the operation and then press OK.
5.
When prompted for the new code, enter the six digits of the code that you intend to save, and press OK.
1.
Select the position whose user/installer code you want to delete.
2.
Click the Delete button.
3.
When asked if you want to delete the existing code, press YES.
4.
When asked for an authorisation code, type in an installer code or the code of a user authorised to perform the operation and then press OK.
5.
The program will conrm that the user code has been deleted.
6.
Press OK to nish.
If the option "Default codes change mandatory" is enabled in the "System Parameters" page (see "3.14 System Parameters" on page
70): The system is "not ready" for activation until the user codes and installer codes are the same as those set as default (user: 111111,
master: 001961). The control panel will only start working once the user and master codes have been customised (at which point it will also be possible to carry out activations).
Page 44
44
User name
Users
ID
User 1
User 2
User 3
User 4
User 5
User 6
User 7
User 8
User 9
User 10
User 11
User 12
User 13
User 14
User 15
User 16
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Area
Area 1
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
User type
User 4 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 17
User 18
User 19
User 20
User 21
User 22
User 23
User 24
User 25
User 26
User 27
User 28
User 29
User 30
User 31
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 1 Type
User 32
User 33
User 34
32
33
34
User 1 Type
User 1 Type
User 1 Type
Enable
Reset code
Delete
ID Passwords associated with user
ID Radio controls associated with user
<None>
Associated timer
Number of operations
Unlimited
0
Enablements
Keypads / readers
Safetouch Touch devices RFID readers
Keypad 1 Keypad 2 Keypad 3 Keypad 4
Keypad 5 Keypad 6 Keypad 7 Keypad 8
Keypads
PSTN (voice menu)
Access via web
USB
GSM (voice menu - sms commands)
Domotics
Use App
Robbery code
Disable activation with areas in alarm
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
3.10.1 Users
There must be at least one active user [Reg. 53]
The users section is for the management of codes reserved for users, who therefore have the possibility of activating and deactivating the system, depending on their authorisations.
STATUS/DESCRIPTION PANEL
Uniquely identies the user code. The tick in the checkbox at the side indicates that a user code has already been dened.
An editable, alphanumeric eld; allows you to assign a name or description to the selected code. For example you might want to change “User 1” to “John Smith” to clearly identify the real associated user.
Drop-down menu, allows you to associate an authorisation level to a user code, according to the associated user type. The custom authorisations of the various types of user can be modied in the Access levels section (see "3.10.3 Access levels" on page 47).
The possible choices for user type are:
• User Type 1: has the access levels authorised for User Type 1
• User Type 2: has the access levels authorised for User Type 2.
• User Type 3: has the access levels authorised for User Type 3
• User Type 4: has the access levels authorised for User Type 4
• Patrol: has the access levels authorised for Patrol Type.
• Master: has the access levels authorised for Master Type.
ID
USER NAME
USER TYPE
By default the "User 1" code is 111111
Page 45
45
An alphanumeric eld; shows the name of the area (Area n by default) or the name that will be assigned to it by modifying the default in the Areas
section.
Checkboxes; if selected, enable the user to operate on the corresponding areas.
Allows editing of the selected user code.
Button, allows you to remove the code for the selected position.
Drop-down menu, can be used to associate a Timer with a code. This code can carry out the functions for which it was programmed, only when the Timer is active and in the START time band.
• Unlimited:
checkbox; if selected, there is no limit on the number of operations that the selected user can perform within the course of a day.
• Numerical box:
allows you to set a limit on the number of operations that the selected user can perform within the course of a day. The operations counter is reset at midnight.
This section is for setting the control components with which the selected user is authorised to operate. If a user attempts to operate on a keypad for which he is not authorised, once he has typed in his code, the keypad display will show an error message.
• Keypads / readers:
Keypads/Safetouch/Touch devices/RFID readers:
tab with a group of checkboxes; the selected checkboxes enable the selected user to operate on the corresponding devices. The unchecked checkboxes, conversely, prevent the user from performing any operation on the corresponding devices.
AREA
ENABLE
RESET CODE
DELETE CODE
ASSOCIATED TIMER
NUMBER OF OPERATIONS
KEYPAD/READER AUTHORISATIONS
AREAS PANEL
CONFIGURATIONS PANEL
• PSTN (voice menu): checkbox; if selected, authorises the user to use the voice interface via the PSTN telephone line. The Messages module
must be present.
• Access via web:
checkbox; if selected, authorises the user to use the web interface to connect to the control panel web server. The IP communication module must be present.
• USB:
checkbox; if selected, authorises the user to access the control panel, using the Safe Manager program connected to the control panel USB port. A user could therefore access certain functions made available by the program, such as, for example, real-time display of system status.
• GSM (voice menu - SMS commands):
checkbox; if selected, authorises the user to use the voice interface via the GSM network. Also enables the user to send commands and receive status SMSs from the control panel. The GSM communication module and the Messages module must be present.
• Domotics: not used.
• Use App:
used to enable the Phone App for the selected user.
When you select the position of a user with the mouse, you can immediately check whether keys or radio controls have been associated to that user. At the same time, it will be possible to identify precisely which keys and/or radio controls are involved.
KEYS AND RADIO CONTROLS ASSOCIATION WINDOW
Checkbox; if selected, enables the user to send Robbery alarms by means of a Robbery code.
Checkbox; if selected, prevents the user from activating the alarm when there are areas in alarm.
ROBBERY CODE
DISABLE ACTIVATION WITH AREAS IN ALARM
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 46
46
Description
Installers
ID
Installer 1
Installer 2
Installer 3
Installer 4
Master
Manufacturer
51
52
53
54
55
56
Installer type
Install. type 1
Install. type 1
Install. type 2
Install. type 2
Master
Manufacturer
Reset
Delete
ID Passwords associated with user
ID Radio controls associated with installer
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
3.10.2 Installers
There must be at least one active installer [Reg. 53]
The installers section allows you to congure the codes intended for installers.
STATUS/DESCRIPTION PANEL
CONFIGURATIONS PANEL
Uniquely identies the installer code. The tick in the checkbox at the side indicates that an installer code has already been dened.
An editable, alphanumeric eld; allows you to assign a name or description to the selected code. For example you might want to change “Installer 1” to “John Smith” to clearly identify the associated installer.
Uneditable alphanumeric box; describes the type of installer. The authorisations will depend on the installer type (see “3.10.3 Access levels” on page
47).
When you select the position of an installer with the mouse, you can immediately check whether keys or radio controls have been associated to that installer. At the same time, it will be possible to identify precisely which keys and/or radio controls are involved.
ID
DESCRIPTION
INSTALLER TYPE
KEYS AND RADIO CONTROLS ASSOCIATION WINDOW
By default the "Master" code is 1961
Allows editing of the selected user code.
Button, allows you to remove the code for the selected position.
RESET CODE
DELETE CODE
See description Send Message options on page. 89.
All active devices must permit the control panel to send notification to the digital
communicator for events generated by the device itself [Reg. 16].
SEND MESSAGE OPTIONS
Page 47
47
3.10.3 Access levels
In this section, you can enable each individual function for each individual user type. The option is enabled when the box is checked. The options
that can be enabled are listed below:
Request assistance: allows a user to perform the "Installer authorisation" and "Manufacturer authorisation" commands.
According to standard EN50131-1 (grade 2) there are up to 4 access levels with different operating capacities in the system:
• Level 1 (unknown user): does not allow operation on the system.
• Level 2 (normal user): allows operation on the system.
Cannot update the FW of the peripherals.
May be limited on a time basis through the use of a programmable timer.
May carry out a programmable limited number of operations in a day.
Is not authorised to change the system conguration.
• Level 3 (Master/installer):
the Master is the "default installer" operating with default code 001961.
Cannot update the FW of the peripherals.
Must always be enabled by a level 2 user.
Is automatically disabled 4 hours after being enabled by a level 2 user, unless he has been permanently enabled by the respective
enabling parameter.
• Level 4 (Manufacturer).
only the manufacturer can update the FW of the system devices
.
Is automatically disabled 4 hours after being enabled by the level 3 user, unless he has been permanently enabled by the respective
enabling parameter.
ID OPTION ID OPTION ID OPTION
1
Activation
16
Extraordinary request
31
Zones menu
2
Deactivation
17
Request assistance
32
Outputs/Events group menu
3
Individual Acts./Deacts.
18
Change PIN
33
Areas menu / Auto-activations
4
Forced Activation
19
Reset control panel
34
Scenarios menu
5
Outputs control
20
Test devices
35
Tel and IP conguration menu
6
Alarms generation
21
Fault management
36
Telephone/signaller menu
7
Zones Exclusion
22
Lock alarms
37
Digital communicator menu
8
Reset control panel alarms
23
Responder voice menu
38
Remote support menu
9
Stop control panel alarms
24
Access program from PC
39
Timer menu
10
Reset area alarms
25
Access via WEB
40
Codes menu
11
Stop area alarms
26
SMS commands
41
Events log menu
12
Cancel system telephone actions
27
Domotics commands
42
Updating Firmware
13
Cancel area telephone actions
28
System menu
43
Reset installer alarms
14
Cancel telephone actions
29
Control devices menu
15
Cancel telephone actions on deactivation
30
Bus/radio expansions menu
ID OPTION
CONFIGURATIONS REQUIRED BY STANDARD
17 Request assistance
At least one "user type" must be authorised to "request assistance". At least one user must be associated to a "user type" authorised to "request assistance" [Reg. 54] At least one "installer type" must be authorised to "request assistance". At least one installer must be associated to an "installer type" authorised to "request assistance" [Reg. 55]
18 Change PIN
Only the installer can modify the pin, the keys and the radio controls of other users. User type 1, user type 2 and user type 3 cannot have "Change PIN" permission activated. No users can be assigned to user type 4 [Reg. 56]
19 Reset control panel
The control panel reset command can only be assigned to the manufacturer [Reg. 57]
21 Fault management
At least one user and one installer must be authorised for fault management [Reg. 58]
24 Access program from PC
Only the installer and manufacturer must be permitted to access the program from a PC [Reg. 59]
40 Codes menu
Access to the codes menu must be enabled for all user types [Reg. 102]
42 Updating Firmware
Only the manufacturer is permitted to update the firmware [Reg. 103]
43
Reset installer alarms
(Incert only)
Installer alarms reset must be active only for the installer
To prevent users from resetting sabotage alerts (and level 3 fault alerts), deselect the flag “installer alarms reset” for all access levels: User types 1/2/3/4, Patrol and Manufacturer.
1.
From the keypad, enter a valid user code (default 111111)
2.
Press Prog.
3.
The rst line of the display will show the message "System Mgmt.” indicating that you can now modify the system options.
4.
Using the navigation keys (up and down), select the “COMMANDS” menu on the second line of the display, and press Conrm: the message “GENERATE COMMAND” will appear on the rst line of the display.
5.
Using the navigation keys (up and down), select “AUTH. INSTALLER?” on the second line, and press Conrm: the message “DONE” will appear
on the display.
ENABLING A LEVEL 3 USER (VIA KEYPAD)
To operate on the system, the installer must be enabled by the level 2 user via the keypad.
Page 48
48
HOW TO LOGOUT FROM DIFFERENT CONTROL DEVICES
From any device/application for system control after a determined period of time in which the user does not perform any operation (timeout), the work session is closed automatically (logout). To close the session before timeout, follow the indications in the table below.
Devices/Applications Logout procedure
Vedolcd - Vedolcdprox
Press "C" until you have exited the menus completely (i.e. until the date and time are displayed on the
keypad).
Vedo Touch
home
back
Press "Home" or "back" to return to the main page and close the "settings" work session
Mini Touch, Planux Manager, Icona
Manager ViP, Icona Manager SBC
home
back
Press "Home" to return to the main page and logout from the "settings work session" Press "back" to return to the main page and logout from the "settings work session"
Vedo App
For ANDROID Press the menu key on your own mobile device and press QUIT
Web server
Connecté
Press the logout key.
Bridge
Connecté
Press the logout key.
THE UNAUTHENTICATED USER can use only the delete key “C” or the numerical keys on the keypad. If a key that is not usable is pressed, the display will show the message "FUNCTION NOT AVAILABLE".
THE USER WHO IS AUTHENTICATED on the keypad and who presses button C will be returned to the previous menu until the area status is displayed. If the value of the area status display time for that keypad is not unlimited, the next time button C is pressed will return the keypad to standby position, without giving any indication of the current area status (immediately hiding the information on the display).
Page 49
49
Proximity keys
DescriptionID
Key 1
Key 2
Key 3
Key 4
Key 5
Key 6
1
2
3
4
5
6
User Colour
User 1 Yellow
<Not assign...
<Not assign...
<Not assign...
<Not assign...
<Not assign...
Digital password
Acquire
Delete
Acquisition of digital key
Acquisition
Acquire from...
Keypad: Reader 1
CancelOK
Message
Key Code
Acquire Cancel
3.10.4 Proximity keys
This section allows you to acquire RFID digital keys and assign them to users. You can save up to 56 keys.
1.
Select the position in which you intend to acquire the key.
2.
Press the Acquire button.
3.
From the "Reader to Acquire" drop-down menu, select the peripheral to use for acquisition of the digital key.
4.
Press the Acquire button and enter the installer code (if requested) and conrm.
5.
Bring the key to be registered close to the peripheral selected for acquisition. As soon as the code is acquired, the audible signal from the
peripheral will stop
6.
The new acquisition will be shown in the Key Code eld and the OK button will become available.
7.
Press OK to nish.
» The selected peripheral will start emitting an audible signal. You can interrupt the procedure by clicking Cancel. Important: you cannot acquire a
key code if the position is not rst freed, by deleting the existing key.
To assign a key to a user or to modify the assignment of a key, simply select the user from the User drop-down menu.
1.
With the mouse, select the key you intend to delete.
2.
Click Delete.
3.
When asked “Delete selected key?”, click “Yes”.
ACQUIRING AN RFID DIGITAL KEY CODE
ASSIGNING A KEY TO A USER
DELETING AN RFID DIGITAL KEY CODE
Uniquely identies the user key. The tick in the checkbox at the side indicates that a key has already been registered.
An editable, alphanumeric box; allows you to assign a name or description to the selected key. For example you might want to change “Key 1” to “John S” to clearly identify the real associated user.
Drop-down menu, allows you to assign a user and hence the latter's authorisations to a key.
Describes the real colour of the shell of the RFID key. Can be useful for differentiating key types according to the type of user to whom they will be
associated.
Button; clicking on it starts a key code acquisition procedure.
Clicking on it starts a key code deletion procedure.
ID
DESCRIPTION
USER
COLOUR
ACQUIRE
DELETE
Page 50
50
IP Options
Options
Check presence of connection to internet
Enable DHCP (obtain IP address automatically)
IP Address
Subnet mask
Gateway
Primary DNS
Secondary DNS
Host name
192,168. 1 .230
255,255,255. 0
192,168. 1 . 1
192,168. 1 . 1
0 . 0 . 0 . 0
Services configuration
http/https ports type
https port
http port
tls port
TCP Port
80
Standard
10022
10012
443
SMTP options
Port
Server address
Email
Username
Password
Email subject
Enable SMTP
Use SSL25
Network Time Protocol Options
Enable NTP
NTP Server
Enable DDNS (Dynamic DNS)
pool.ntp.org
Dynamic DNS
D-DNS provider
Port
Host name
Username
Password
80
comelitdns.com
3.11 COMMUNICATION INTERFACES
3.11.1 IP Options
This group of sections describes the communication interfaces other than the digital communicator.
Important: to use the options, the following conditions must be met:
√ The control panel must be equipped with an IP network card module. √ The IP network card module must be correctly connected to a switch or Ethernet router. √ The IP network card module must be congured as present by selecting the checkbox IP Network Card in the Expansions Present section of
the System Parameters menu.
• Check presence of connection to internet:
checkbox; if selected, allows the control panel to be informed of the presence or absence of the
Internet connection. If there is no connection, an anomaly is generated which is recorded by the control panel.
• Enable DHCP (obtain IP address automatically):
checkbox; has to be selected to enable the IP network card module to be assigned the communication parameters automatically by the router/switch, without necessitating manual entry. IMPORTANT: when this checkbox is selected, the IP Address, Subnet
Mask, Gateway, Primary DNS and Secondary DNS boxes will not be accessible for modification.
• IP Address:
numerical box for assigning a unique network address to the IP network card.
• Subnet mask:
numerical box for selecting the subnet. With a few rare exceptions, for a home network the value to enter will be: 255.255.255.0.
• Gateway:
numerical box for entering the IP address of the gateway necessary for Internet connection (given by the Internet service provider
– ISP).
• Primary DNS:
numerical box for entering the IP address of the primary DNS necessary for Internet connection (given by the Internet service provider – ISP)
• Secondary DNS:
numerical box for entering the IP address of the secondary DNS necessary for Internet connection (given by the Internet service provider – ISP).
• Host Name:
alphanumeric box for entering the name by which the control panel will be recognised on the network.
OPTIONS
Page 51
51
These options serve periodically to synchronise the system clock with a sample time available via an internet connection.
Normally, unless explicitly requested otherwise, a home internet connection provides a dynamic IP address associated with the internet connection. This means that if the router is switched off and back on again for any reason (e.g. power outage) or if the provider decides to renegotiate the IP
address associated with the connection, the address changes.
Suppose you wish to access the control panel using the integrated WEB server on the IP network card: you must know the exact address of the Internet connection the control panel is using. Dynamic DNS is a service available subject to registration by which you can associate a xed name to a dynamic address. This name can always be used to connect to the card (even if the dynamic address changes).
IMPORTANT: to use this service you need to register with one of the suggested providers. On completion of registration, the service provider will communicate all the necessary information for configuring the dynamic DNS service. (see chapter "5.2 Comelit DNS registra
-
tion procedure for VEDOIP expansion" on page 79)
To work properly, network services need to access ports that enable them to connect correctly. You can congure them in this section.
• Enable NTP:
checkbox; if selected, enables the control panel to update the control panel clock by means of an appropriate service.
• NTP Server:
alphanumeric box; enter the address of the server you intend to use. A known, operational address is proposed by default. If you intend to replace it with another service, consult the provider's site to obtain the server name to enter in the box.
• Enable DDNS (Dynamic DNS):
checkbox, must be selected to enable the IP network card to use a Dynamic DNS service. It also enables you to congure the following options:
D-DNS provider:
drop-down menu for choosing one of the possible providers.
Port, numerical box:
for setting the port number to use for the service. This is normally port 80. Follow the service provider's instructions however.
• Host Name:
alphanumeric box, for entering the name decided at the time of requesting the service and that the provider will have conrmed at the time of registering the service.
• User name:
alphanumeric box for entering the User Name decided at the time of registration. This often coincides with the address of a mailbox at the user's disposal.
Password: alphanumeric box for entering the Password used when registering with the service.
• http port:
numerical box; normally contains the default port number for the http port (80), can be used for entering other values. Use with care,
only if necessary.
• https port:
numerical box; normally contains the default port number for the http port (443), can be used for entering other values. Use with
care, only if necessary.
These are the options that enable you to congure access to the email server to allow the transmission of email. To use this service, you need an email account. The majority of data to be entered in this section relates to the email service provider.
• TLS port:
numerical box, proposes a usable port, by default (10022). If necessary, allows you to assign a different port number from the default number for TLS connection (encrypted TCP).
• TCP Port:
numerical box, proposes a usable port, by default (10012). If necessary, allows you to assign a different port number from the default number for standard TCP connection.
• Enable SMTP:
checkbox, must be selected to enable the IP network card module to connect to an email server.
• Server address:
alphanumeric box for entering the address of the SMTP server made available by the email service provider. If is often of the type smtp.xxxxxxx.yyy .
• Port:
numerical box; the value 25 is proposed by default, which universally corresponds to the port used by the email services. If you use the SSL encryption service, check the correct port number for this service with your provider.
• Use SSL:
checkbox; if selected, obliges the IP network card to use an encrypted protocol with the email server. If you want to use it, it is advisable rst to check the availability of the service with the provider of the connection used for email.
• Email:
alphanumeric box for entering the email address in use, from which you intend to send email.
• Username:
alphanumeric box for entering the correct username to be used for accessing the email service.
• Password:
alphanumeric box for entering the correct password to be used for accessing the email service.
• Email subject:
alphanumeric box for entering the subject of the email, i.e. the title that will appear in the heading of outgoing messages.
For remote connection, the ports on the router must be opened (see “Port forwarding (for Remote connection” page 78).
• Port type:
drop-down menu, allows you to select from three possibilities. The table shows the possible choices.
HTTP/HTTPS PORTS TYPE DESCRIPTION
Standard
Assigns the default port number for connections of type http and https (secure http). The values are assigned rigidly.
Alternative
Assigns a pair of port numbers for http and https connections that is different from the default pair. Again, the values are
assigned rigidly.
Special
Allows you to assign a pair of port numbers freely. Use with care, only if necessary.
NETWORK TIME PROTOCOL OPTIONS
DYNAMIC DNS
SERVICES CONFIGURATION
PORTS FOR ACCESS TO WEB PAGES
SMTP OPTIONS
PORTS FOR REMOTE MANAGEMENT VIA SAFE MANAGER
Page 52
52
SMS options
Credit remaining
Utilizza SSL
Message to send*
Text to send*
Service centre number*
Forward SMS...
SMS
credit
40916
GSM Options
Communicator SIM options
Telephone 2
Telephone 3
Telephone 4
Telephone 5
Telephone 6
Telephone 7
Telephone 8
Telephone 9
Telephone 10
Telephone 11
Telephone 12
Telephone 13
Telephone 14
Telephone 15
Telephone 16
Telephone 1
Checks on module
Enable jamming check
GSM card pin
Enable SIM expiry
11/02/2017
6167
Email Options
Enable sending email with attachment
Enable email transmission
Email subject
Email (sender)
GPRS options
APN address*
Username*
Password*
SMTP options
Server Address*
Port*
Username*
Password*
25
mail.posta.tim.it
wap.tim.it
MMS options
Enable MMS transmission
MMS subject
APN address*
Username*
Password*
Proxy IP address*
Card telephone number
3668907247
mail.posta.tim.it
mms.tim.it
Service centre address (MMSC)*
http://mms.tim.it/servlets/mms
3.11.2 GSM Options
Important: to use these options correctly, the following conditions must be met:
√ The control panel must be equipped with the GSM expansion module, correctly connected to its antenna. √ The GSM expansion module must be congured as present by selecting the checkbox IP Network Card in the Expansions Present section of
the System Parameters menu.
Pressing the icon takes you quickly to the "Telephone options" menu.
Press the icon to automatically set the parameters for managing remaining credit. This option also automatically loads the known parameters for possible Email and MMS connections relating to the selected phone company. IMPORTANT: if any data are already present in the fields
involved in the automatic loading process, these will be overwritten. The table shows the data that can be loaded automatically (and overwritten if appropriate).
This section is for conguring the management of SMS messages.
• GSM card PIN:
numerical box for entering the code for unlocking the SIM tted on the GSM communication card.
• Enable SIM expiry: if active, enables checking the SIM expiry.
• Enable jamming check:
checkbox; if selected, enables the module to generate an indication to the control panel if an attempt to mask the GSM
signal is detected. Jamming control must be active if the GSM module is configured [Reg. 60]
• Forward SMS: checkbox; if enabled, allows forwarding of SMS messages that reach the control panel but do not pertain to a cellphone number
listed in the contacts list (e.g. promotions from the telephone company).
• Credit remaining:
this section is for conguring the way in which the control panel can determine the credit remaining on the SIM card
• Message to send:
drop-down menu; select Call or SMS according to the procedure used by the phone company. See also Default Settings.
Text to send:
alphanumeric box; enter the text required by the phone company if determining remaining credit involves sending an SMS. See also Default Settings.
Service centre number:
alphanumeric box; enter the number of the phone company's SMS service centre. See also Default Settings.
TELEPHONE OPTIONS
LOAD DEFAULT SETTINGS (ICON IN THE FORM OF A CELLPHONE)
SMS OPTIONS
COMMUNICATOR SIM OPTIONS
CHECKS ON MODULE
Page 53
53
Telephone companies
Telephone Company
Select
CancelOK
EMAIL OPTIONS
MMS OPTIONS
To use the email service, you need an email address that you can access via the control panel GSM module. In this section, you can congure the GSM module and set the parameters and options relating to email messages.
This section is for conguring the necessary parameters for sending MMS messages. This section must be correctly set if you intend to send images captured by cameras connected to PAL-IP modules by MMS.
For example to enter an Italian phone number: With country dialling code, use the form: 003933398765432 Without country dialling code, use the form: 33398765432
• APN address:
alphanumeric box for entering the address of the phone company's GPRS access point (information provided by the phone company). If you use the Load option in the Default Settings section, this parameter can be entered automatically for certain companies.
• Username:
alphanumeric box. Check whether you need to enter a Username with your phone company.
• Password:
alphanumeric box. Check whether you need to enter a Password with your phone company.
• SMTP options:
• Enable email transmission:
checkbox; if selected, enables the module to send emails.
• Enable sending email with attachment:
checkbox; if selected, enables the module to send emails with attached images captured by the cameras connected to any Pal-IP modules in the system.
• Email subject:
alphanumeric box for entering the text that you want to appear in the Subject eld of the email.
• Email (sender):
alphanumeric box for entering the email address that you want to use for communication.
• GPRS options:
• Enable MMS transmission:
checkbox; if selected, enables the module to send MMS messages.
• MMS subject:
alphanumeric box for entering the text that you want to appear in the Subject eld of the MMS message.
• MMS service centre address:
alphanumeric box for entering the address of the phone company's MMS server (information provided by the phone company). If you use the Load option in the Default Settings section, for some companies this parameter might be entered automatically.
• APN address:
alphanumeric box for entering the address of the phone company's MMS access point (information provided by the phone company). If you use the Load option in the Default Settings section, this parameter can be entered automatically for certain
companies.
• Username:
alphanumeric box. Check whether you need to enter a Username with your phone company.
• Password:
alphanumeric box. Check whether you need to enter a Password with your phone company.
• Proxy IP address:
alphanumeric box for entering the address of the proxy server dedicated to the phone company's MMS service (information provided by the phone company). If you use the Load option in the Default Settings section, this parameter can be entered automatically for certain companies.
• Port:
alphanumeric box for entering the port number corresponding to the phone company's MMS service (information provided by the phone
company).
• Card telephone number:
numerical box for entering the number of the phone card tted in the GSM module. You can enter the number with or without the country dialling code, but you cannot use the format preceded by a + sign for the country dialling code.
SECTION PRE-DEFINABLE PARAMETERS (OVERWRITTEN IF APPROPRIATE)
SMS options
Text to send, service centre number
Email Options
APN address, Username, Password
SMTP options
Server address, Port
MMS options
Service centre address (MMSC), APN address, Username, Password, Proxy IP address
• Telephone Company: drop-down menu, allows you to select a phone company in order to load automatically its parameters and remaining
credit request procedures, its email connection parameters and its MMS connection parameters. The providers currently present are TIM, Vodafone and Wind.
Server address:
alphanumeric box for entering the address of the phone company's SMTP server (information provided by the phone company). If you use the Load option in the Default Settings section, for some companies this parameter might be entered automatically.
• Port:
alphanumeric box for entering the port number corresponding to the phone company's SMTP server (information provided by the phone company). If you use the Load option in the Default Settings section, for some companies this parameter might be entered automatically.
• Username:
alphanumeric box for entering the Username of the email account that you intend to use.
• Password:
alphanumeric box for entering the Password of the email account that you intend to use.
Page 54
54
Status
Absent
1
2
ID Description
Pal/Ip 1
Pal/Ip 2
Area 2
Area 3
Area 4
Area 5
Area 6
Area 7
Area 8
Display technical alarms
Area
Pal-Ip video module
Active
input
Network parameters
IP Address
UDP Port
Netmask
Gateway
Address acquisition mode
Technical alarms cycles (bus / voltage levels)
0 . 0 . 0 . 0
. . .
. . .
9069
Assign new IP to module...
Static address
Unlimited
Cycles 0
Cameras installed
Pre-alarm recording
Analogue camera
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Areas (2)
Camera 2
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Areas (3)
Camera 3
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Areas (4)
Camera 4
Video acquisition mode
PAL
<None>
VIP options
Logic address
00030001
60Streaming video timeout seconds
Cameras installed (IP)
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Areas (1)
Camera 1
IP1 Camera
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Areas (1)
Username
Password
IP/Hostname
Low resolution channel
URL preview
High resolution channel
URL preview
RTSP port
1-ip camera
554
admin
****
nomehostname
/channel/1
rtsp://admin:****@nomehostname:554/channel/1
/channel/2
rtsp://admin:****@nomehostname:554/channel/1
Images
4
Images to capture (num)
Send message options
Send detailed events SMS
Send Email messages
Send digital communication
Send notification to App
3.11.3 Pal/IP video module
In the project there must be no active or isolated Palip devices [Reg. 104]
This section is for conguring, adding or deleting PAL-IP devices.
Page 55
55
Pal-Ip parameters programming
Pal-Ip video module to update
Current IP address (Pal-Ip video module)
Current netmask (Pal-Ip video module)
New IP address
New netmask
Gateway
Address acquisition mode
Close
Ping
Ping
Alarm panel
Final IP address (control unit)
Ping
Run
0 . 0 . 0 . 0
192.168. 1 .234
192.168. 1 . 1
255.255.255. 0
192.168. 1 .230
Static address
0 . 0 . 0 . 0
Clicking on Assign New IP to Module opens a pop-up for verifying the status of the communication of the selected module and to changing its parameters if you want.
• Pal-IP video module to update
• Alarm control panel
• Run:
button; conrms and launches the operation of assigning IP addresses.
• Close:
button; enables you to exit the procedure without changing anything.
Current IP address (Pal/IP module):
numerical box; shows the current address but also allows you to enter a different address manually.
Load default
Ping
0 . 0 . 0 . 0
: button, for loading an IP address that corresponds to the factory-set address of the Pal/IP module.
Requests conrmation before performing the operation.
• Ping:
button; click it to run a check on the presence of a Pal/IP device at the address shown in the IP Address box to its left.
• New IP address:
numerical box for entering the IP address that you intend to assign to the Pal/IP module, to change is current address. (This operation is necessary when there are several Pal/IP modules in the system).
• Ping:
button; click it to run a check on the presence of a device at the address shown in the IP Address box to its left. Serves to check that the new address you intend to assign to the selected PAL/IP module is not already present on
the system.
• New netmask:
numerical box for entering the value of the new netmask for identifying the subnet (normally enter
255.255.255.0).
Gateway: numerical box, for entering the gateway value (e.g. 192.1681.1.).
Address acquisition mode: for future uses.
• Final IP address (control panel):
numerical box; shows the current address of the control panel IP communication module.
• Ping:
button; click it to run a check on the presence of the control panel IP card at the address shown in the IP Address box to its left.
NEW MODULE IP PROGRAMMING POP-UP
Congurations for viewing the cameras connected to PAL-IP modules Art. VEDOCCTV.
VIP OPTIONS
• Logic address:
eld for entering a logic address for the device. The address must be a completely unique 8-digit number.
• Streaming video timeout:
determines the maximum duration of a video call; the same value must be set on the supervision devices (Safetouch, App...). If the values are different, the lower value is applied.
See description Status / ID / Description on page 87.
Alphanumeric box; shows the name assigned to the control panel areas.
Column of checkboxes; by checking the appropriate checkboxes, you can choose the areas to which to send technical alarms generated by the selected PAL/IP module.
This section is for conguring the communication parameters of the PAL/IP module to make it reachable via the data network.
• IP address:
numerical box; shows the IP address of the module in the selected position. For a PAL/IP module that has not yet been congured,
the data shown will be 0.0.0.0.
• UDP Port:
numerical box; shows the UDP port number used by the module in the selected position.
• Assign new IP to module:
button for launching the for registration/verication of the IP communication of the module in the selected position.
STATUS / ID / DESCRIPTION
AREA
DISPLAY TECHNICAL ALARMS AREAS
NETWORK PARAMETERS
STATUS/DESCRIPTION PANEL
AREAS PANEL
CONFIGURATIONS PANEL
Page 56
56
Pal-Ip parameters programming
Pal-Ip video module to update
Current IP address (Pal-Ip video module)
Current netmask (Pal-Ip video module)
New IP address
New netmask
Gateway
Address acquisition mode
Close
Ping
Ping
Alarm panel
Final IP address (control unit)
Ping
Run
0 . 0 . 0 . 0
192.168. 1 .234
192.168. 1 . 1
255.255.255. 0
192.168. 1 .230
Static address
0 . 0 . 0 . 0
CONFIGURING A PAL/IP MODULE
After correctly installing at least one PAL/IP module, proceed as follows to congure it:
1.
Click on Assign New IP to Module.
2.
In the pop-up press the button
Ping
0 . 0 . 0 . 0
.
3.
A new pop-up will ask you to conrm loading of the factory-set address.
4.
Conrm.
5.
When the pop-up closes, the default address will have bee loaded. Press the Ping button to check whether the module is reachable. If it is not, check the connections (power supply and IP network).
6.
Enter the new address to be assigned to the module (e.g. 192.168.1.234) in the New IP Address eld.
7.
Press the Ping button next to the new address to make sure that it is not already in use. If you receive an 'address present' reply , change it (e.g. to 192.168.1.235) and repeat the Ping test. No module should reply to the address that you want to assign to the PAL/IP module.
8.
Enter the Netmask value (default 255.255.255.0).
9.
Enter the Gateway value.
10.
Press Run.
See description Send Message options on page. 89.
SEND MESSAGE OPTIONS
N.B.: The default IP address is 192.168.1.233 for all the PAL/IP modules. If two Pal/IP video modules are installed, it is imperative to reprogram the IP address of at least one of the two modules. Failure to do so could cause an IP address conflict on the network. You are advised to reprogram one module at a time, keeping the other module disconnected from the IP network.
• Unlimited:
checkbox; if selected, there is no limit on the number of technical alarm cycles that can be generated per activation cycle.
• Cycles:
numerical box; if the Unlimited checkbox is not selected, this box enables you to set a limit to the number of technical alarm cycles that can be generated, measured between one activation and the next.
This section is for selecting how many images (frames) must be captured when required (e.g. as a result of a zone in alarm). The images will be captured at intervals of one second.
The captured images can be sent as MMS, email and notications to Vedo App.
If using third-party IP cameras, make sure that:
• They support the default video streaming configuration, i.e. MJPEG, 320x240 pixel with FPS from 1 to 12.
• The URL providing access to video streaming for the IP camera is known. All IP cameras interfacing with the VEDOCCTV module should adopt the same configuration as the low-definition channel (same
codec, same resolution, same frame rate...).
• Areas:
determines which areas the camera will be associated with.
• Video acquisition mode: to speed up the capture of the rst image, do not select Autoswitch mode.
• Pre-alarm recording: Allows you to select the analogue camera on which to make the continuous recording.
• IP(x) Camera
Auto-configuration button: Press the button and select the model of camera used (IP100 / IP700) to auto-congure the URL
of the channels.
• Areas:
determines which areas the camera will be associated with.
• Username: User name for IP CAM access (as for camera conguration)
• Password: Password for IP CAM access (as for camera conguration)
• IP/Hostname: Hostname or IP address for IP CAM (as for camera conguration)
• Low resolution channel: channel for low resolution video streaming (for Comelit cameras IPCAM100="/ch01_sub.264", for Comelit cameras IPCAM700="/1/stream2", for cameras supplied by third parties, refer to the respective manuals)
• URL preview: URL address for the "Low resolution channel" stream from the IP (x) camera. To be used in programs that allow viewing
of rtsp video streaming.
• High resolution channel: channel for high resolution video streaming (for Comelit cameras IPCAM100="/ch01.264", for Comelit cameras IPCAM700="/1/stream1", for cameras supplied by third parties, refer to the respective manuals)
• URL preview: URL address for the "High resolution channel" stream from the IP (x) camera. To be used in programs that allow viewing of rtsp video streaming.
• RTSP port: RTSP service port of the IP CAM
• Images to capture: numerical box, allows you to set the number of images to capture. The value is between 1 and 4.
In this section you have to select the cameras installed, add the description and select the areas to be associated to the respective camera. You can choose not to select a camera that is present( for example to exclude its operation temporarily or because it is faulty). A camera must not
be selected if it is not physically connected to the PAL/IP module, as this would generate a fault associated with the module.
In this section you have to select the IP cameras installed, add the description and select the areas to be associated to the respective camera. You can choose not to select a camera that is present( for example to exclude its operation temporarily or because it is faulty). A camera must not be selected if it is not physically connected to the PAL/IP module, as this would generate a fault associated with the module.
TECHNICAL ALARMS CYCLES (BUS/VOLTAGE LEVELS)
IMAGES
CAMERAS INSTALLED
CAMERAS INSTALLED (IP)
Page 57
57
Connection
Cloud Recording
Server Address
Port
eps.comelitgroup.com
443
Cloud Options
Enable Cloud service
Use secure SSL/TLS connection
Reset
3.11.4 Cloud Options
In this section you can congure the cloud service to save Push notications to be sent to the Apps.
Congurations for connection to the Comelit Cloud service.
• Enable Cloud service:
checkbox, when selected, enables the Comleit Cloud service.
• Server address:
alphanumeric box, enter the address of the server on which the Comelit Cloud service is installed.
• Port: numerical box, enter the port to be used for connection to the Comelit Cloud service (default: 443).
Use secure SSL/TLS connection: checkbox, select this option to use the secure SSL/TLS connection.
• Reset: button, resets the recording information of the control panel at Comelit Cloud, to allow a new recording
CONNECTION
CLOUD RECORDING
Page 58
58
Telephone Options
Answer Priority management
Priority
SMS
MMS
Email
Voice call
Digital communication
Call
PSTN settings
Number of rings (only PSTN)
send message requesting user code input:
Telephone line check
Tones check
End call with keys
Skip fax (only PSTN)
Pulse dialling
Telephone line parameters
3
Message repetitions
5
Pause between repetitions
1
Code recognition time (sec.)
20
Tones recognition timeout (sec)
10
Maximum duration of single call (sec)
60
Voice delay / wait duration (sec)
10
Voice message repetition
3
Pause between repetitions (sec)
1
Attempts
3
Italy/Malta
Switchboard
Prefix number
Telephone signaller parameters
Send message after
Press key 1
3.12 COMMUNICATOR
3.12.1 Telephone Options
• Number of rings (only PSTN): numerical box, allows you to set the number of rings that the control panel must wait for before engaging the
line after an incoming telephone call.
• Send message requesting user code input:
checkbox; if selected, allows the control panel that has replied to a telephone call, to generate an audio message requesting the input of a valid user code, via the keypad of the calling telephone. Also applies to communication on GSM network.
• Skip fax (only PSTN):
checkbox; if selected, enables the fax/answering service override mechanism. Fax/answering service override function: the calling user makes the device ring once only and then ends the call. If a new ring is detected within no more than 120 seconds, the control panel obtains the line immediately, regardless of the number of rings set in Number of Rings.
• Message repeats (for future uses):
numerical box, allows you to set the number of times the welcome message must be repeated.
• Pause between repeats (for future uses):
numerical box, allows you to set the pause between repeats of the message.
• Code recognition time (sec.):
numerical box, allows you to set the maximum time within which a valid user code must be entered, after the request for input by the control panel.
• Tones recognition timeout (sec):
numerical box, allows you to set the maximum waiting time for completing the user code once its entry has
been started. = 60 sec [Reg. 61]
• Telephone line parameters: drop-down menu, allows you to set the line parameters according to the specications of the country in which the
control panel is installed (Italy/Malta, Czech Republic/Slovakia, Slovenia, Croatia, Greece, Bulgaria, Gibraltar, CI Jersey/Cyprus/UK, Hungary).
• Pulse dialling:
if selected it dials the telephone number in pulse mode.
• Tones check:
if selected it checks the line free tone before dialling the telephone number. Selected [Reg. 67]
• Telephone line check:
checkbox; if selected, it enables telephone line checking. If the telephone line is faulty or not connected, a fault alarm is generated Selected [Reg. 68]
• Prefix number (switchboard): by entering this parameter, all the outgoing calls from the PSTN will add this number as a prefix to all the
numbers saved in the telephone directory and in the digital communicator. The check for a dial tone will be performed only after the prefix is dialled. Empty [Reg. 133]
• Send message after: drop-down menu (see table), allows you to put the telephone signaller audio message online after obtaining the line after
a call, according to the procedure set in the drop-down menu. = Press key 1 [Reg. 65]
ANSWER
CALL
PSTN SETTINGS
TELEPHONE SIGNALLER PARAMETERS
Page 59
59
Telephone contacts list
Telephone
Stop calls
1 2
3
Telephone 1 Telephone 2
Telephone 3
Description
SMS reception
Email reception
MMS reception
ID
3407959221
Email
• End call with keys: checkbox; if selected, authorises the users to stop the call or calls (depending on the key pressed). If not selected, the
control panel will end the call only after repeating the message the set number of times.
Selected [Reg. 66]
• Maximum duration of single call (sec): numerical box, allows you to set the maximum duration of the communication. On expiry of the set
time, the control panel will disconnect the line. = 60 sec [Reg. 62]
• Voice delay / wait duration (sec): numerical box, allows you to set the maximum silent waiting time before transmitting the message of the
telephone signaller to the caller. Also see the option "Send message after".
• Voice message repetition:
numerical box, allows you to set the number of times the telephone signaller message transmitted to the caller must
be repeated. = 5 [Reg. 63]
• Pause between repetitions (sec): numerical box, allows you to set the pause between repetitions of the telephone signaller message during
transmission to the caller.
• Attempts:
numerical box, allows you to set the total number of attempts that the communicator will make to dial each telephone number if the
call fails.
= 3 [Reg. 64]
KEY PRESSED END CALL TYPE
Hash (#)
Ends the call but does not cancel calls to other numbers
Asterisk(*)
Ends the call and cancels calls to other numbers
The system manages the sending of alert messages according to two priority levels. Until it has nished sending one type of alert, it does not start to send the next type.
The rst level is events priority (in order of priority): Alarms, Sabotage, Anomalies, Exclusions and Other (order cannot be changed). The second level is the priority of sending messages by type of alert sent (SMS, email, MMS, voice call, digital communication) and it can be
congured by Safe Manager using the arrow keys
from the box "Priority management".
App notications are sent immediately when the event is generated.
If there is no digital communicator, the following general events must be indicated (transmission of the corresponding voice message must also have
been completed): [Reg. 80] System/ZoneAlarm/Robbery
System/ZoneAlarm/Burglary
System/ZoneAlarm/H24
System/OR alarm/Sabotage
System/OR alarm/Expansion buses
System/Fault/Control panel ID power supply unit fault
System/Fault/Radio zone battery fault
System/Fault/Siren battery fault
System/Generic/Timed activation error
System/Fault/Failed activation fault
System/Fault/Zone Fault
System/Fault/Robbery Zone Fault
System/Fault/Motion sensor jamming fault
Timer/Timer Events/Timer ON/Regular pstn and email communication
Timer/Timer Events/Timer ON/Regular gsm communication
PRIORITY MANAGEMENT
3.12.2 Phone Book
There must be at least one digital communicator selected or at least one telephone configured in the phone book (there must be at least one telephone
number in the phone book or in the digital communicator contacts list) [Reg. 69]
This is the section for entering the telephone numbers to be contacted and any email addresses, and for enabling the types of communication for each contact on the contacts list.
Sixteen numbers are available in the contact list. For the sake of brevity, the picture shows only four.
Numerical box, uniquely identies the position in the contacts list.
Alphanumeric box for entering name and surname or identity (e.g. in the case of a company) of the user to contact.
A description must be entered
for each active phone [Reg. 70]
Alphanumeric box for entering the email address to be associated to the selected user.
ID
DESCRIPTION
EMAIL
SELECTION FROM THE
MENU
BEHAVIOUR OF THE TELEPHONE SIGNALLING DEVICE
Delay
the message will be sent after the delay time set in the "delay" parameters
Press key 1
Once the line is obtained, if the caller presses the 1 key on his telephone (in DTMF mode), the message will be transmitted to the caller
Voice delay
not implemented
Page 60
60
Digital communicator contacts list
Hands-free after report (sec.)
1
2
3
4
Telephone 1 Telephone 2
Telephone 3
Telephone 4
Description
Call attempts
Test period (hours)
ID
Send area code
Enable periodic test
Number to call
Protocol Periodic test start date
Contact ID Contact ID
Contact ID
Contact ID
0 0
0
0
11/02/2013 8:38 11/02/2013 8:38
11/02/2013 8:38
11/02/2013 8:38
24 24
24
24
1 1
1
1
0 0
0
0
Customer code
3.12.3 Digital communicator contacts list
There must be at least one digital communicator selected or at least one telephone configured in the phone book (there must be at least one telephone
number in the phone book or in the digital communicator contacts list) [Reg. 69]
The control panel has a digital communicator to Contact ID standard, which is useful for interfacing correctly with a monitoring control panel. The Contact ID communication function is currently supported only by the PSTN line interface. This is the section for entering the telephone numbers to be contacted digitally, and for conguring the connection procedures for each contact on
the contacts list.
Numerical box, uniquely identies the position in the contacts list.
Alphanumeric box for entering the ID of the monitoring control panel to contact.
Alphanumeric box for entering the telephone number for the company contracted to provide the monitoring and telephone checking service.
Drop-down menu, allows you to select the format of communication to the monitoring control panel. Only Contact ID standard is currently available.
Select a communication protocol for each phone number entered. [Reg. 73]
alphanumeric code for entering the code provided by the monitoring control panel. Also enables the monitoring control panel automatically to recognise the system making the communication. The user code must be specified for each phone number entered [Reg. 76]
Checkbox; if selected, ensures that the area code is sent to the monitoring control panel (see Areas menu) and not the customer code set in the line. This is useful in the case of multiple-user systems.
Numerical box for entering the frequency, expressed in hours, of the periodic test. If you enter 24, the test will be carried out 24 hours after the start date and every 24 hours thereafter.
Numerical box for entering the number of call attempts that the system will make even in the event of failure to connect to the monitoring control
panel.
The number of call attempts must be = 1 for each phone number entered [Reg. 75]
Not supported
Checkbox for enabling the periodic test function.
The periodic test must be active for each phone number entered [Reg. 72] The test period must be
<= 25 hours for each phone number entered [Reg. 74]
Start date of the periodic test. The start date of the periodic test must precede the current date for each phone number entered [Reg. 77]
ID
DESCRIPTION
NUMBER TO CALL
PROTOCOL
CUSTOMER CODE
SEND AREA CODE
TEST PERIOD
CALL ATTEMPTS
HANDS-FREE AFTER REPORT
ENABLE PERIODIC TEST
PERIODIC TEST START DATE
Checkbox; if selected, allows the selected user to stop the ow of calls directly from the telephone using the Hash (#) and Asterisk (*) keys. The "End Call With Keys" option must be enabled in Telephone Options.
Checkbox; if selected, enables the selected user to receive SMS/email/MMS sent from the control panel.
STOP CALLS
RECEIVING SMS / EMAIL / MMS
Page 61
61
1
2
3
4
ID Description
Tamper Alarm
No network
Battery low
Telephone 2
Telephone 3
Telephone 4
Smith John
Activation voice message
Reset voice message
Telephone
Generic events
Send activation SMS
Send reset SMS
Send activation email
Send reset email
9
Event 5
Event 6
Event 7
Event 8
Event 9
1112Event 11
Event 12
8
5
7
6
10 Event 10
Burglar Alarm
3.12.4 Generic events
This section is for conguring the events that can generate communications/messages to the devices. In practice, the conguration of a generic event consists of assigning behaviour rules and procedures for contacting the available telephone numbers to each of the forty-eight possible events.
Button for conguring the Text-to-Speech section by loading the voice to be used for audio transmission. The procedure is described in detail in
the Free Voice Messages section on page 8.
Checkbox; if selected, enables the transmission of a voice message activating an event.
For all generic events with a configured event (excluding
tests), the sending of an activation voice message must be enabled for at least one phone enabled in the phone book [Reg. 78]
Checkbox; if selected, enables the transmission of a voice message resetting an event. For all generic events with a configured event (excluding
tests), the sending of a reset voice message must be enabled for at least one phone enabled in the phone book [Reg. 79]
TEXT TO SPEECH CONFIGURATION
ACTIVATION VOICE MESSAGE
RESET VOICE MESSAGE
Numerical box, uniquely identies the position of the event.
Alphanumeric box, contains a description of the event to which the parameters in the line correspond.
ID
DESCRIPTION
STATUS/DESCRIPTION PANEL
TELEPHONE PANEL
Description identifying the telephone in the contacts list.
Checkbox; if selected, enables the transmission of an SMS activating an event.
Checkbox; if selected, enables the transmission of an SMS resetting an event.
TELEPHONE
SEND ACTIVATION SMS
SEND RESET SMS
Checkbox; if selected, enables the transmission of an email activating an event.
Checkbox; if selected, enables the transmission of an email resetting an event.
SEND ACTIVATION EMAIL
SEND RESET EMAIL
If there is no digital communicator, the following general events must be indicated (transmission of the corresponding voice message must also have
been completed): [Reg. 80] System/ZoneAlarm/Robbery
System/ZoneAlarm/Burglary
System/ZoneAlarm/H24
System/OR alarm/Sabotage
System/OR alarm/Expansion buses
System/Fault/Control panel ID power supply unit fault
System/Fault/Radio zone battery fault
System/Fault/Siren battery fault
System/Generic/Timed activation error
System/Fault/Failed activation fault
System/Fault/Zone Fault
System/Fault/Robbery Zone Fault
System/Fault/Motion sensor jamming fault
Timer/Timer Events/Timer ON/Regular pstn and email communication
Timer/Timer Events/Timer ON/Regular gsm communication
Page 62
62
SMS
Email
Select free voice message
Options
Priority event
Burglary Message
Voice message
Stop calls
Priority to call on PSTN
Auto-composed
Message
None
DVR camera link
3
Selection
Selection
Burglary SMS
Burglary Email
Other options (SMS/email/Vocal messages)
Send system address
Create web link
• Priority event: checkbox. Events are normally processed in order of presentation. If this checkbox is selected, the event is processed before all
other events that do not have this checkbox selected. If there is already one or more priority events at the front of the queue, the new event is placed in the queue behind the priority events already present.
• Voice message:
drop-down menu, regulates the association of a voice message to the selected event. The possibilities are: none, auto­composed, message (for "message" it is possible to choose one of 16 free voice messages that can be congured from the respective section).
• Select free voice message:
drop-down menu, allows you to select one of the 16 free voice messages congured, so that it is sent when an event occurs.
• Stop calls:
checkbox; if selected, a number enabled to stop calls can stop the call or sequence of calls according to the command sent (# key stop current call only, * key stop all subsequent calls in addition to current call).
• Priority to call on PSTN:
checkbox; if selected, if there is a GSM expansion module and an enabled PSTN interface, when an event occurs, the rst communication attempt will be made using the PSTN telephone interface.
• SMS:
drop-down menu, regulates the association of an SMS to the selected event. The possibilities are: none, auto-composed, message (for "message" it is possible to choose one of 16 SMSs that can be congured from the respective section).
• Selection (SMS):
drop-down menu, allows you to select one of the SMSs congured, so that it is sent when an event occurs.
• Email:
drop-down menu, regulates the association of an email to the selected event. The possibilities are: none, auto-composed, message (for "message" it is possible to choose one of 16 email messages that can be congured from the respective section).
• Selection (Email):
drop-down menu, allows you to select one of the emails congured, so that it is sent when an event occurs.
• Send system address: checkbox; if selected, adds the system address to SMS, voice messages and email
messages.
• Create web link:
checkbox; if selected, adds to SMS and email messages the link DDNS (hostname)* with which it is possible to reach the system. *see chapter “IP Options” on page 50.
• Generate auto-composed message:
Button; when pressed, generates a message deriving from the conguration of the event, and enters it in the text elds of the auto-composition section.
OPTIONS
OTHER OPTIONS (SMS AND EMAIL)
EVENT
CONFIGURATIONS PANEL
• Event type: allows you to associate a main type of event to the general event, e.g. an event belonging to the Area events type (see table on
page 92).
• Event subtype:
allows you to rene your choice by selecting a subtype of the category set as Event Type; going back to the Area events type example, the subtype could be Zone Alarm (see table on page 92).
• Event:
corresponds to the maximum detail and allows you to specify exactly which event will allow output activation (see table on page 92). Going back to the example, the event could be Burglary, thereby making it possible to activate the output if a burglary is detected by an activated area.
• AND/OR and selection box:
only for certain types of event is an AND/OR selection block available which, together with a selection box, allows you to organise and, if appropriate, determine the status of the output.
The OR condition is useful when you intend to group events originating from several sources in a single output: in the case of an AREAS type of event, for example, it is possible to signal the activation status of the rst three areas on one output only, by selecting, for example, the checkboxes for the rst three areas: in this case, the output would activate if at least one of the three areas was activated, and would be deactivated if all three areas were deactivated.
The AND condition is useful for providing summary information of the fact that a certain status is common, for example, to two or more areas. A practical example, similar to the previous one, could be a conrmation of activation of several areas, by selecting, for example, the checkboxes of the rst three areas: in this case, the output would activate only if all three areas were activated, and would be deactivated if any one of the three areas were deactivated.
Sometimes, instead of a selection block based on checkboxes like the one just described, a drop-down menu will be displayed: in this case the AND or the OR condition will be constructed on the basis of the options chosen from these menus.
Page 63
63
Auto-composition
Message type
Part A
Part B
Areas.
Burglar Zone Alarm
Input. Area 2. Area 3. Area 4.
Generate audio Play
In this section, the auto-composed message is converted into audio so that it can be sent by telephone.
• Message type:
alphanumeric box containing a description of the type of auto-composed message.
• Part A:
alphanumeric box containing a description of the event.
• Part B:
alphanumeric box containing details about the event (e.g. zones involved, areas involved, etc.).
• Generate audio:
button; if pressed, converts the text in the three text elds (Message Type, Part A and Part B) into audio format.
• Play:
button; if pressed, allows you to listen to the message converted into audio through the PC speakers.
AUTO-COMPOSITION
Page 64
64
1
2
3
4
ID Description
Family
Tel. group 3
Tel. group 4
Detailed events
Tel. group 5
Tel. group 6
Tel. group 7
Tel. group 8
8
5
7
6
Job
Areas
Enable MMS
Area 1 Area 2 Area 3 Area 4
Area 5 Area 6 Area 7 Area 8
Enable transmission of MMS if zone in alarm with associated camera
1
2
3
4
ID
Telephone contacts list phones
Telephone 2
Telephone 3
Telephone 4
Telephone 5
8
5
7
6
Telephone 1
9
10
14
11
13
12
15
16
Telephone 6
Telephone 7
Telephone 8
Telephone 9
Telephone 10
Telephone 11
Telephone 12
Telephone 13
Telephone 14
Telephone 15
Telephone 16
1
2
3
4
ID
Digital Com. telephones
Telephone 2
Telephone 3
Telephone 4
Telephone 1
6
7
8
App 6
App 7
App 8
App 5
1
2
3
4
ID Apps
App 2
App 3
App 4
App 1
5
3.12.5 Detailed events
This is the section in which you can select whether to send messages for each event or action detected by the control panel, and if so, what type of messages. This detailed section works in conjunction with the individual permissives for the transmission of detailed messages present in each zone screen, area screen etc.
You can congure up to eight groups of independent telephone numbers, with different communication characteristics.
Numerical box, uniquely identies the position of the group of telephone numbers of the phone/App to which to send the messages.
Group of checkboxes for selecting the areas whose activity must be notied by means of the telephone numbers in the selected group.
There must
be at least one area selected in the phone groups (group 8 - test - excluded) in which at least one digital communicator is enabled [Reg. 82]
Checkbox; if selected, enables the transmission of MMSs to the telephones in the selected group, if zones associated with a camera are present on
one or more of the enabled areas.
Alphanumeric box, contains an ID for the group of selected telephone numbers. The Group 8 "Test MMS/Com. Dig" is the ID for the group of dedicated telephone numbers for the send MMS test (on the telephone, 16 in the phone
book) and for sending digital Communications (on the telephone, 4 in the digital communicator contacts list).
In this section, for each group of telephones it is possible to enable up to sixteen telephone numbers independently. This makes it possible to differentiate the groups as required and to send the information (phone calls, SMSs, MMSs, etc.) only to the parties who need it. The numbers are the ones congured in the telephone contacts list.
select the checkbox of the telephone number that you want to enable and associate to the group of telephones
you are editing.
select the checkbox of the telephone number that you want to enable and associate to the group of telephones
you are editing.
select the checkbox of the App that you want to enable and associate to the group of telephones you are editing.
In this section, for each group of telephones it is possible to associate independently up to four telephone numbers for digital communication. They are the numbers congured in the digital communicator contacts list.
At least
one digital communicator must be selected in the phone groups (group 8 - test - excluded).[Reg. 81]
In this section, for each group of telephones, it is possible to associate up to 8 Apps independently. The Apps are the applications congured in "Phone App".
ID
AREAS
ENABLE MMS
DESCRIPTION
TELEPHONE CONTACTS LIST PHONES
DIGITAL COMMUNICATOR TELEPHONES
APP
STATUS/DESCRIPTION PANEL
CONFIGURATIONS PANEL
This section enables you to customise in detail the type of information that the system can send by telephone connection (audio messages, digital messages to monitoring control panel), by GSM connection (audio messages, SMS, email, MMS) and by IP/Internet connection (email), or via local/
remote connection to the Vedo App.
The structure of the conguration is very similar for all the events managed. The only differences relate to the presence or absence of certain
message options.
TAB FOR SELECTING DETAILS OF EVENTS TO SIGNAL
Page 65
65
Contact-ID Map
DescriptionID
1
2
3
Event code
Qualifier
Direct
Direct
Direct
Command
Zone exclusion
Zone isolation
140
570
570
Zone/user
Zone
Zone
Zone
App Bridge
Zones Areas/System Keypad RFID Remote connections Timer Outputs Actions
Safetouch Touch devices Reset databaseChange codes
Activations
Zone alarm Sabotage Faults Generic
SMS - Activation
/ Forcing
SMS - Reset
Digital comm. - Activation
Digital comm. - Reset
4
5
Total activation
Partial activation 1
ID Description
App - Activation
/ Forcing
App - Deactivation
Email - Activation
/ Forcing
Email - Deactivation
Example: Areas/system tab
• ID:
numerical box, uniquely identies the event.
• Description:
alphanumeric box containing the ID of the event.
• SMS - Activation/Forcing
checkbox; if selected, enables the transmission of an SMS to activate the selected event.
• SMS - Reset:
checkbox; if selected, enables the transmission of an SMS to reset the selected event.
• Digital comm. - Activation:
checkbox; if selected, enables transmission of a new event message in digital format (e.g.: Contact ID) for the selected event. Configure the events according to the table in the appendix [Reg. 83]
• Digital comm. - Reset: checkbox; if selected, enables transmission of a the reset message in digital format (e.g.: Contact ID) for the selected
event. Configure the events according to the table in the appendix [Reg. 83]
• App - Activation/Forcing /App - Deactivation: checkbox; when selected enables the sending of notications (corresponding to the activation/
forcing or resetting of an event) to mobile devices with the application installed.
• Email - Activation/Forcing:
checkbox; if selected, enables the transmission of an email to activate the selected event.
• Email - Reset:
checkbox; if selected, enables the transmission of an email to reset the selected event.
3.12.6 Contact-ID Map
For digital communications directed to a monitoring control panel, this section shows a map of the events and related standard codes for which such communication is envisaged.
In this section you can also modify certain values, to adapt the messages to the characteristics of the monitoring control panel.
Numerical box, uniquely identies the position of the command in the table.
Alphanumeric box, contains a description of the command to which the parameters in the line correspond.
Numerical box containing, by default, the standard code of the selected event. If necessary, can be modied to be adapted to possible requests from
the monitoring control panel.
Drop-down menu for associating, when possible, the zone number or ID of the user at the origin of the event. The eld is editable but you are advised not to change the default setting.
Drop-down menu, congures the procedure for transmission of events to the monitoring control panel.
The possible choices are:
MENU SELECTION TYPE OF NOTIFICATION SENT
Direct
The direction of the command will be coherent with the direction of the event that triggers it: a new activation event will generate an activation command / new event, and vice versa
Force Activation
The direction of the command will always correspond to an activation type event (new event)
Force Reset
The direction of the command will always correspond to a reset type event
Inverse
The direction of the command will be coherent with the opposite of the direction of the event that triggers it: a new event will generate a reset command and vice versa
ID
DESCRIPTION
EVENT CODE
SELECT ZONE/USER
QUALIFIER
Page 66
66
Free voice messages
DescriptionID Text to speech
Message 1
Message 2
Message 3
Message 4
Message 5
Message 6
Message 7
Message 8
a burglar alarm is in progress
a fire alarm is in progress
a robbery alarm is in progress
a medical emergency alarm is in progress
1
2
3
4
5
6
7
8
Text to speech
Alarm test
Available voices
MSP SAPI 4 SAPI 5
Cancel
Test
Microsoft Server Speech Text to Speech
Ok
3.12.7 Free voice messages
This section enables you to compose text messages that can be sent in audio form to one or more telephone numbers. The messages can be entered by means of the conguration PC keyboard and must then be transferred to the messages memory. Sixteen free messages are available.
Converts the text of the message, composed in the input lines, into an audio le that can be sent to one or more telephone numbers. The command only affects messages with the checkbox selected, and has no effect on the others.
Opens the voice conguration menu.
Removes the messages whose checkboxes are selected.
Checkbox, allows you to select one or more messages for conversion from text to speech or for deletion.
Numerical box; uniquely identies the message.
Alphanumeric box for entering the text that you want to convert into an audio message to transmit by telephone.
Button, in the form of a yellow loudspeaker, located on the right of the Text to Speech eld. The button does not appear until you have converted the text into audio using the Speaker button in the light blue eld. Double-clicking this button starts playing the audio (on the PCs loudspeakers) of
the selected message.
1.
Press the Gearwheel button.
2.
Select the Text to Speech voice synthesis interface.
3.
In the drop-down menu, select the voice you intend to use.
4.
Type any test into the test box (Test alarm in the example).
5.
Press the Test button to hear the audio conversions.
6.
Press OK.
1.
Select the checkboxes of the messages you want to delete.
2.
Press the button in the form of a trash can.
3.
Click 'Yes' in the pop-up that opens.
4.
Click “send audio”.
1.
Select a free position and enter the message in the Text to Speech eld.
2.
Select the checkbox of the message (or messages) to be converted into audio.
3.
Press the Speaker button in the light blue eld; this done, a button in the form of a yellow loudspeaker will appear on the right of the message in the Check eld.
4.
To check the audio message, double-click on the yellow loudspeaker button on the right of the message you intend to listen to.
Alphanumeric box, assigns an ID to the message. For example, you might want to change the description "Message 1" into "Burglary Message" for the purpose of quick identication in the selection menu.
RUN TEXT TO SPEECH ON SELECTED MESSAGES
TEXT TO SPEECH CONFIGURATION
DELETE SELECTED AUDIO MESSAGES
ENABLE
ID
TEXT TO SPEECH
CHECK MESSAGE
VOICE CONFIGURATION
DELETING ONE OR MORE FREE VOICE MESSAGES
ENTER A FREE VOICE MESSAGE
DESCRIPTION
Page 67
67
SMS
DescriptionID
1
2
3
Burglary SMS
Sms 2
Sms 3
Text
John Smith's home: a burglar alarm is in progress
Email
DescriptionId
12Email 1
Email 2
Text
Service voice messages
DescriptionID Text to speech
Reset
Press key 1
End call...
End queue
Access menus
System address
Reset
Press 1 to listen to the alarm message
Press hash to end call
Press asterisk to end all calls
Press zero to enter voice menu
Via Umberto Mario
1
2
3
4
5
6
3.12.8 SMS
3.12.9 Email
3.12.10 Service voice messages
This section enables you to compose up to sixteen different text messages that can be sent in SMS form to one or more telephone numbers. The messages can be entered by means of the conguration PC keyboard and must then be transferred to the messages memory.
The control panel allows you to send up to eight different email messages. You can congure them in this section.
Numerical box; uniquely identies the SMS message.
Alphanumeric box, assigns an ID to the message. For example, you might want to change the description "SMS 1" into "Burglary SMS" for the purpose of quick identication in the selection menu.
Alphanumeric box for entering the text of the SMS message.
Numerical box; uniquely identies the email message.
Alphanumeric box, assigns an ID to the message. For example, you might want to change the description "Email 1" into "Burglary Email" for the purpose of quick identication in the selection menu.
Alphanumeric box for entering the text of the email message.
As well as the free voice messages, there are several service messages, which are used by the control panel to suggest standard operations (e.g. during telephone use of the voice control) or to communicate the system address.
These messages, with the sole exception of System Address message, are xed and cannot be modied in the Text to Speech eld. They can be deleted as audio however.
Attention: the System Address message is taken automatically from the Address box, to be completed in the System Parameters section. That is why it is important to congure the system details in the System Parameters section.
The operation of the section and its respective buttons are totally identical to those of the Free Voice Messages section. The only difference is the
treatment of the System Address message.
ID
DESCRIPTION
TEXT
ID
DESCRIPTION
TEXT
1.
Complete the System Coordinates section in "System parameters" (see "3.14 System Parameters" on page 70), at least in relation to the system address eld.
2.
Go to the Service Voice Messages section and make sure that the text of the system address has appeared in position 6 - System Address - in the Text to Speech eld.
3.
Select the checkbox for message 6 to convert it into audio.
4.
Press the Speaker button in the light blue eld; this done, a button in the form of a yellow loudspeaker will appear on the right of the message in the Check eld.
5.
To check the audio message, double-click on the yellow loudspeaker button on the right of the message you intend to listen to.
CONFIGURE THE SYSTEM ADDRESS MESSAGE
Page 68
68
1
2
3
4
ID
Timer
5
7
6
ID
Timer 3
Timer 4
Timer 5
Timer 6
Timer 7
office area
1
2
3
4
5
7
6
START 1 STOP 1 START 2 STOP 2 START 3 STOP 3 START 4 STOP 4
07:00
04:00
21:00
23:00
Description
Activation
Description
Timer 2 Type
Timer 3 Type
Timer 4 Type
Timer 5 Type
Timer 6 Type
Timer 7 Type
warehouse
3.13 TIMETABLE PROGRAMMER
3.13.1 Timer
This section allows you to congure Timers and timed or automatic activations. The timers relate mainly to time-dependent authorisations (e.g. you can enable keypads to perform operations only within certain timeframes) and conditions on outputs.
The control panel provides eight different timer congurations. Each conguration is associated with up to sixteen possible congurable timeframe timers. The gure shows only 9 for the sake of convenience.
Numerical box; uniquely identies the timer.
Numerical box; uniquely identies the specic timer.
Alphanumeric box, assigns an ID to the timer. For example, you might want to change the description "Timer Type 1" into "Activation" for the purpose of quick identication in the subsequent selection menus.
Checkbox; when selected, enables operation of the selected timer.
Alphanumeric box, assigns an ID to the specic timer. For example, you might want to change the description "Timer 1" into "Ofce Area" for quick identication. Each timer (you can congure up to sixteen for each timer conguration) has up to four Timer On/Off cycles, whose trigger times can be freely congured.
Time box, for entering the start time of interval x.
Time box, for entering the end time of interval x.
See description “Panel for Periods/calendar management section” on page 98.
ID
ID
DESCRIPTION
ENABLE
DESCRIPTION (TIMER TYPE)
ONX
OFFX
STATUS/DESCRIPTION PANEL
PANEL FOR GROUPING TIMED ACTIVATION/DEACTIVATION OF TIMERS
PANEL FOR PERIODS/CALENDAR MANAGEMENT SECTION
Page 69
69
1
2
3
4
ID Description
Holiday
Garden
Activation type 4
Activations
Activation type 5
Activation type 6
5
6
Working day Control
Control panel
Control panel
Supervisor
Control panel
Area ON1 Action 1 ON2 ON4
Action 2 ON3 Action 3 Action 4
Area 2
Area 3
Area 4
Input 07:00
None
None
None
Total
None
None
None
None
None
None
None
None
21:00
None
None
None
Forced
Enabled
Deactivation
3.13.2 Activations
In this section it will be possible to congure any programmed activations. Up to eight different activation proles can be congured. Each prole can operate on eight areas simultaneously, and for each area, eight
independent and programmable timeframes are available.
Numerical box; uniquely identies the timer.
Checkbox; when selected, enables operation of the prole for the selected area.
Alphanumeric box, assigns an ID to the timer. For example, you might want to change the description "Timer Type 1" into "Activation" for the purpose of quick identication in the subsequent selection menus.
Checkbox; when selected, enables forcing for the selected area. When the timed automatic activation is activated a pre-alert buzzer will be heard on the control device (if congured correctly on the keypad, Safetouch or touch device with the "Buzzer/Enabled" and "Buzzer/Pre-alert" ags).
Drop-down menu, allows you to choose for each area, whether control will be assigned to the control panel or to a supervisor. Not currently implemented, leave default setting (control panel).
Alphanumeric box, shows the name assigned to the area in the Areas menu.
Time box, for setting the time at which the event shown in the Action 1 column will be generated. In general form, applies to all eight time boxes from
ON1 to ON8.
Drop-down menu, allows you to select one of the available events (vedi tabella a pag 89) to be performed at the time set in the ON 1 column. In general form, applies to all eight action boxes, from Action 1 to Action 8.
ID
ENABLED
DESCRIPTION
FORCED
CONTROL
AREA
ON1
ACTION 1
STATUS/DESCRIPTION PANEL
PANEL FOR GROUPING TIMED ACTIVATION/DEACTIVATION OF ACTIVATIONS
See description “Panel for Periods/calendar management section” on page 98.
PANEL FOR PERIODS/CALENDAR MANAGEMENT SECTION
Page 70
70
System parameters
Presence of expansions
GSM
PSTN
Network card (Ip)
Audio
Domotics
Intercom
Options
Forced activation Level 2 (anomalies)
RS485 bus speed
Language
Italiano
38400
Forced activation Level 2 (sabotage)
Activation with monitor fault (radio)
Activation with battery fault (radio)
Buzzer in partial
Sound in panic
Restore factory settings
Permanently enable installer code
Voice guide for telephone communicator
Total
Obbligo cambio codici di default
Failed activation fault
Enabling sabotage and fault tests for zones
3.14 SYSTEM PARAMETERS
Includes 6 independent checkboxes for enabling any expansions that may be present on the control panel. The check mark in the checkbox enables the peripheral, which would not otherwise be considered, even if present. If you enable a peripheral that is not present, after transfer of the
programming to the control panel, system errors may be indicated.
• GSM:
refers to the GSM expansion card.
At least one of the options PSTN, GSM or IP must be enabled [Reg. 98]
• PSTN: refers to the telephone interface supplied as standard. If it is enabled, but the telephone line is not present, an anomaly will be generated.
 At least one of the options PSTN, GSM or IP must be enabled [Reg. 98]
• Network card (IP): refers to the IP expansion card. If it is present and enabled, but there is no IP connection, an anomaly is generated.
• Audio:
refers to the messages expansion module. If enabled but not present, it generates an anomaly. At least one of the options PSTN, GSM
or IP must be enabled [Reg. 98]
• Domotics:
not implemented.
• Intercom:
not implemented.
PRESENCE OF EXPANSIONS
• Language:
drop-down menu, allows you to set the user interface language (on-screen menus and messages).
• RS485 bus speed:
drop-down menu, allows you to select the speed of the RS485 communication bus, from between 9600 and 115200 baud. The standard is 38400 baud.
• Forced activation Level 2 (faults):
checkbox; if selected, allows a user to force an activation in the presence of anomalies. This operation degrades the performance of the control panel at grade 2. If deselected, allows the user to perform only the following forced activations (in presence of faults):
OPTIONS
Faults
Zone fault
Radio control fault
Power supply unit battery fault
Faults:
No power supply unit network
Radio control battery fault
Camera fault
Remote communication failed
Robbery zone fault
Failed activation fault
IP Expansion fault from bus
 Selected [Reg. 94]
• Forced activation level 2 (sabotage): checkbox; if selected, allows a user to force an activation in the presence of sabotage. This operation
degrades the performance of the control panel at grade 2. If deselected, allows the user to perform only the following forced activations (in presence of alarms/sabotage):
Burglar
• H24
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
All the alarms if the zones can be excluded
Activations in the presence of sabotage
can be forced only by installers
Alarms: Sabotage:
 Selected [Reg. 95] NOT selected [Incert]
Page 71
71
Control devices
Devices password
Reactivation time (minutes)
*
Lock due to wrong code and/or false password
2
Code entry errors
3
• Lock due to wrong code or false key: if selected, locks the device when the set number of "code errors" is reached. Selected [Reg. 92]
• Code entry errors: numerical box for setting the number of consecutive code entry errors that will cause the timed lockout of the control device.
Max 10 [Reg. 88]
• Reactivation time (minutes): numerical box for setting the temporary lockout time for the control device (keypad, RFID reader, Planux,
Minitouch...) that generated the maximum permitted number of code entry errors. Min 2 min [Reg. 89]
• Devices password: a system-specic numerical value for differentiating the devices by associating them to a specic system. The number
must be between 0 and 65535.
• System coordinates:
3 alphanumeric elds for containing the serial n°, address and name of customer to whom the system is registered. The serial number is not editable and is the number for the specic card. The customer name field must be completed [Reg.
84] The system address field must be completed [Reg. 85]
• Database Version:
numerical, provides information about the version of data management in the database (and hence in the data ash memory) of that particular system. Different databases are not compatible with each other.
• Activation with monitoring fault (radio):
checkbox; if selected, allows activation of the system even if there is a radio sensors monitoring anomaly. The system must be activated by forcing. Must be selected if active radio sensors are
present [Reg. 93]
• Activation with battery fault (radio): checkbox; if selected, allows activation of the system even if there is a radio device battery anomaly. The
system must be activated by forcing.
• Failed activation fault
checkbox; if selected, the immediate burglar zones and/or the delayed burglar zones at output (which cannot be excluded) can stop the activation of an area if they are still open at the end of the output time. An activation failed fault will be generated on the area that has not nished the activation procedure. Instead, if the ag is deselected a burglar
alarm will be generated on the area in both cases. Selected [Reg. 99]
• Enabling sabotage and zone fault tests if the ag is selected, the zone test mode will also be extended to sabotage and zone fault. If the ag
is deselected, the test mode of a zone will be active only for the alarm event.
Selected [Reg. 100]
• Buzzer in partial: checkbox; if selected, enables the control devices to audibly indicate the output time during a partial activation.
• Sound in panic:
checkbox; if selected, allows a panic alarm to be associated with the activation of the sounders (sirens).
• Restore factory settings:
drop-down menu, allows you to choose either NO (do not allow), PARTIAL (allow partially) or YES (allow in full) for the purposes of resetting the system parameters.
• Permanently enable
installer code: checkbox; if selected, does not allow timed expiry of the installer code: once an installer code has been
authorised for the rst time, it will remain authorised until the check mark is removed and the programmed data are subsequently transferred to the control panel. NOT Selected [Reg. 100]
• Voice guide for telephone communicator: checkbox; if selected, allows the use of voice menu during interaction from a telephone line
(conventional or GSM), thereby making it possible to interact by means of audio messages transmitted by the communicator and reply with DTMF tones generated by the telephone in use. The voice control must be transferred to the messages module at the time of programming.
• Default codes change mandatory:
checkbox, when selected, the control panel performs a default code check, preventing any activations while the user codes and installer codes are the same as the default codes (user: 111111, master: 001961). The control panel will only start working once the user and master codes have been customised (at which point it will also be possible to carry out activations).
Selected [Reg. 132]
CONTROL DEVICES
• Chime duration (seconds):
numerical box, allows you to set the duration in seconds of the sounding of a zone congured as Bell.
• Network alarm signalling delay (hh:mm:ss):
time box, allows you to set the alarm delay caused by a power outage. On expiry of this time an alarm will be generated, and if programmed, messages will be sent (SMS, voice, email). No alarm will be generated if the situation returns to normal before expiry of the timer. Max 60
sec [Reg. 86]
• Battery alarm
signalling delay (hh:mm:ss): time box, allows you to set the alarm delay caused by a battery fault. On expiry of this time an
alarm will be generated, and if programmed, messages will be sent (SMS, voice, email). No alarm will be generated if the situation returns to normal before expiry of the timer. Max 5 min [Reg. 87]
• Zones testing time (days): numerical box, allows you to set the time, expressed in days, during which one or more zones congured in Test
mode, will not be able to generate alarms when the system is active, but only records for the events log. Test mode is useful for checking the behaviour of zones whose correct operation is in doubt, while avoiding generating unforeseen alarm cycles. There is just one test time, and it is associated to all the test zones. On expiry of this time, all the zones will return to normal operation and will be able to generate fully effective alarms. If a zone is put into test mode after the timer has already been activated for a different zone, the timer will restart from zero, thereby prolonging the test time for all zones involved. To put zones in test mode, select the Test checkbox in the Attributes section of the individual zones, whether radio or wired.
SYSTEM TIMES
Page 72
72
• Unlimited: checkbox; if selected, there is no limit on the number of fault cycles that can be generated per activation cycle. Selected [Reg. 91]
• Time: numerical box; if the Unlimited checkbox is not selected, this box enables you to set a limit to the number of fault cycles that can be
generated, measured between one activation and the next.
• Unlimited:
checkbox; if selected, there is no limit on the number of alarm cycles that can be generated per activation cycle. Selected [Reg. 90]
• Time: numerical box; if the Unlimited checkbox is not selected, this box enables you to set a limit to the number of alarm cycles that can be
generated, measured between one activation and the next.
• Read:
button, for reading the rmware revision from the switchboard and displaying it in the box below.
• Run: button for enabling the installer code. This operation is essential for the purposes of conguring the system. Pressing the button opens
an access form: enter a valid authorised user code, then press Login. If the operation is successful, it is possible to transfer data to and
from the control panel. If the user is not authorised to perform the operation, authorise the installer from the keypad, see "Enabling a level
3 user (via keypad)" on page 47.
• Run:
button for enabling the manufacturer code. This operation is essential for the purposes of updating the system. Pressing the button opens
an access form: enter a valid authorised installer code, then press Login. If the operation is successful, it is possible to operate on the control panel.
• Partial: resets the factory-set codes of the control panel (User Code: 111111, Master Installer Code: 001961).
• Total: resets the factory conguration of the control panel.
• Set: saves the current congurations as factory default.
• Restart: generates a restart command.
• Alphanumeric Date and Time box:
allows you to set a date and time to send to the control panel, or to read the date and time of the control panel. You can also change the date and time manually: simply select the eld to be edited with the mouse, and enter the new data. The value is static and is not modied by the passage of time.
• Set:
button for sending the system date and time to the control panel. Date and time correspond to the date and time of the computer in use for conguration.
• Read:
button, allows reading of the date and time from the control panel and display of the value read in the alphanumeric Date and Time box
• Automatic switch to/from daylight saving time:
checkbox, for European countries only; if selected, allows the control panel to update the time automatically in response to changes to and from daylight saving time.
• Time difference:
for correct interpretation of the GMT time data.
FAULT CYCLES
ALARM CYCLES
FIRMWARE VERSION
INSTALLER AUTHORISATION
MANUFACTURER AUTHORISATION
RESTORE FACTORY DEFAULT
DATE AND TIME
• Burglar alarm time verified: if greater than zero, the burglar alarm veried function is activated
• System verified burglar alarm: If selected, the alarm is veried in case any two burglar zones go into alarm
status within the time specied in the previous parameter. If deselected, to have a veried alarm two burglar alarms belonging to the same area must go into alarm status within the time specied in the previous parameter.
• Unlimited:
checkbox, for putting no limit on the test time: the zones in test mode will remain in test mode until taken out of test mode.
• Maximum number of overtime requests:
numerical box for setting the maximum number of overtime requests (which equate to an activation delay requested by a user) that can be made before automatic activation.
• Duration of single overtime period:
numerical box for setting the duration of a single overtime cycle, which can be activated at the request of a user.
• Burglar alarm verified: a burglar alarm veried occurs when two separate burglar zones go into alarm status within a specic time
Page 73
73
3.15 EVENTS LOG
The events log can record up to 1024 standard-compliant events, 1024 generic events and 8 events of “rst zone event” type on a non-volatile memory. First Zone type events refer to the rst zone in the area to which they belong, and amount to one per potentially used area. For each of the three types of event, once you have lled all the locations assigned to recording, subsequent records of mandatory and generic events will rewrite the non-volatile memory, starting from the oldest events. If necessary, at each activation cycle, the rst zone events will rewrite the individual event in the specic area position. The events log can only be imported, and the memory to which it is saved is not editable.
3.15.1 Events Log
Button for exporting the events log for analysis/printing by means of an external editor. The format is such that the exported data are separated from each other by commas (comma-separated values).
Button, allows you to update the descriptions of events, if, after importation, the descriptions of peripheral, zones, etc. have been modied.
Button, allows you to perform an advanced search combining the "lters" of the columns log type, event type, event subtype, event, mask, agent type, agent. Choose the lters of the individual columns and press the # icon to start the advanced search.
CSV
RE-ANALYSE CURRENT EVENTS LOG
FILTER EVENTS
KEY TO COLOURS
Each line is highlighted with a colour which indicates the type of event recorded:
• red: identies alarm and sabotage events
• green: identies general events.
• yellow: identies fault and test events
• white: identies rst zone events
CONTENTS
Numerical box; incremental event number.
EVENT
Alphanumeric box, description of the event type recorded. For example: General: "Alarm Memory", "Fault: Date lost"
MASK
Alphanumeric box; where envisaged by the event, identies the logical origin of the event. By way of example only, Area 1, Area 2 in the case of a burglar alarm, or User 1 in the case of an activation or deactivation.
DATE
Date box, shows the date and time at which the event described in the line occurred
AGENT
Alphanumeric box; shows the operator who generated the event. For example Wired Zone 1 in the case of a burglar alarm, or Digital Key in the case of an activation.
Events log
Page 74
74
App BridgeSafetouch Touch devices Change codes
Zones Areas/System Keypad RFID Remote connections Timer
Outputs
Actions
Activations
Zone alarms Sabotage Anomalies Generic
4
ID Description
Total activation
Partial activation 1
5
Events to save
Set
3.15.2 Events to be saved
In this section, it is possible to choose which events to save in the events memory, for subsequent analysis. Detailed selection of the individual events that can be saved, makes it possible to increase the level of detail of the records while reducing the maximum retention period or, conversely, to reduce the level of detail of the records while extending the available retention time, assuming the same conditions of system use.
The structure of the conguration tables is the same for all the events managed. Two tabs, under the name Areas/System and Actions, manage a large number of selectable events. To simplify their conguration, they are equipped
with sub-tabs which divide the options into homogeneous subgroups with respect to the events that can be selected and, at the same time, simplify
their management and checking.
Numerical box, uniquely identies the event.
Checkbox; if selected, enables recording of the event at the time it occurs.
alphanumeric box containing the ID of the event.
Checkbox; if selected, enables recording of the event at the time it is reset.
The complete list of all the events that can be saved is available on page 97.
Configure the events to be saved according to the table in the appendix [Reg. 101]
ID
SET
DESCRIPTION
RESET
Page 75
75
4. System Verification
4.1 CONTROL PANEL CHECK (REAL TIME)
This chapter will show how to:
This function allows you to check the system status in real time. Providing for each element information on the status of every single
parameter.
Signals:
general signal
peripheral active
presence of anomalies, sabotage or faults
presence of alarms or peripheral absent
check the system status using the function "Control panel check (Real
Time)"
verify the system congurations for grade 2 certication to ENEN50131 and "EN50131 grade 2 + incert" using the function “Verify compliance..."
Below is the list of the parameters veried:
ZONES - OUTPUTS - AREAS
Element Parameters
Zones
• Open
• Alarm
Fault
• Sabotage
• Not ready **
• ON
• Chime
Excluded
• Isolated *
• Absent *
Active
• Testing
• Masked
• Battery low ***
• Monitored ***
Fault - inactivity
• inhibited
* with isolated condition and absent
at 0 means that the zone is active. ** valorised only if the conditions for activation are present
*** radio only
Output
• on
• off
• absent*
• isolated*
fault
• tamper**
• battery low**
• monitoring
* with isolated condition and absent
at 0 means that the zone is active.
** radio only
Area
Deactivated
Activated in total
Activated in p1
Activated in p2
Not ready for activation
• In alarm
• Sabotage in progress
• Anomaly
• Alarm log
Not ready for total activation
Not ready for p1 activation
Not ready for p2 activation
• Alarm in progress
Zones excluded on the area
(sabotage, anomaly, zone or zones testing)
Input active time
Output active time
CONTROL DEVICES
Element Parameters
Keypad
Active
• Isolated
• Absent
No input tamper
Bus error
Supply voltage error
Device locking in progress
RFID reader
Active
• Isolated
• Absent
No input tamper
Bus error
Device locking in progress
Safetouch
Touch devices
Active
• Isolated
• Absent
No input tamper
Bus error
Supply voltage error
Output short circuit
Device locking in progress
CONTROL PANEL ALARMS/SABOTAGE
Element Parameters
Alarms
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
Sabotage
Wire zones tamper
Siren/radio output tamper
Radio device jamming
• Tamper free 0
• Tamper free 1
• Tamper free 2
• Tamper free 3
• Tamper free 4
BUS I/O expansion tamper
• BUS keypad tamper
• BUS RFID tamper
BUS Minitouch tamper
BUS Planux tamper
BUS power supply station/
isolator tamper
BUS Radio expansion tamper
• BUS siren tamper
Alarm communication device
tamper
IP expansion tamper
IP video expansion tamper
Tamper bus free_0
Tamper_bus_free_1
Tamper_bus_free_2
Tamper_bus_free_3
Tamper_bus_free_4
Remote communication
tamper
GSM jamming
• False code
ANOMALIES
Element Parameters
Areas anomalies
Bus siren fuse fault
Radio control fault
Bus power supply unit fuse
fault
Bus power supply unit battery
• Radio siren battery
Bus siren battery
Bus power supply network
Radio zone battery
• Radio control battery
Bus expansion input voltage
level anomalous
Bus expansion output voltage level anomalous
Zones rx monitoring
Sirens rx monitoring
Output fault
Camera fault
No bus expansion GSM GPRS network
Bus expansion telephone
line fault
IO expansion fault
Keypad fault
RFID reader fault
Safetouch fault
Touch device fault
Isolator power supply station
from bus
Radio concentrator fault from bus
Siren fault from bus
Alarm communication device
fault
IP expansion fault
IP video expansion fault
System
Anomalies
• Control panel battery
Mains power supply
PSTN fault
GSM fault
IP fault
Voice synthesis fault
Intercom fault
Domotics fault
AUX fuse fault
Bus fuse fault
Siren fuse fault
• Voltage low
Control panel bus fault
Telephone line bus fault
• No GSM network
• No GPRS network
• Date and time not set
EXPANSIONS
Element Parameters
Expansion
Outputs shorting
V+ aux voltage error
Power supply voltage error
Bus error
No input tamper
• Absent
• Isolated
Active
Radio expansion
Technical fault
Input voltage low
485 bus communication
Jamming
• Tamper
• Absent
• Isolated
Active
GSM
No GSM expansion card
• No SIM
GSM antenna fault
• No GSM network
• No GPRS network
Sabotage - Jamming
SIM expired
Power supply
units
Output 03 short circuit
Output 02 short circuit
Output O1 short circuit
230/110 V supply error
• Battery error
Aux 2 voltage error
Aux 1 voltage error
Output voltage error
Input voltage error
Supply voltage error
Bus error
• Tamper
• Absent
• Isolated
Active
Isolators
Output voltage error
Input voltage error
Input bus error
• Tamper
• Absent
• Isolated
Active
Page 76
76
Safe Manager
Project View Tool Windows Help
Options
Updating firmware...
Control unit check (Real Time)
Scan System...
Send audio
Receive events log
ETH EXPANSIONS
Element Parameters
Ip card
• No Link
• No Internet
• No SD
• DHCP error
• NTP error
• DDNS error
• SMTP error
• Card presence error
Timeout
Palip
Fault cameras 4
Fault cameras 3
Fault cameras 2
Fault cameras 1
• Database mismatch
Conguration reading error
SD card fault
Timeout Keep Alive
• Absent
• Isolated
Active
Bridge
Input voltage abnormal
• SMTP error
• DDNS error
• NTP error
• DHCP error
• SD card error
• Internet error
• Link error (ethernet)
Device locking in progress
Bus error
No input tamper
• Absent
• Isolated
Active
4.1.1 Launch control panel check function (Real Time)
4.1.2 Control panel check (Real Time) in alarm condi
-
tion, activation, command
 Click on the "Tools" menu, choose "Control panel check (Real
Time)”, enter the installer code (default=001961) and press OK to conrm.
 Press "Run" to start the real time check function (press "stop"
if you want to stop scanning, press close to exit the real time check function).
By means of the panel at top left (activations/alarms/commands) it is possible to verify the system status in different conditions of alarm, activation, command; below is the list of conditions that can be veried.
Condition Activations
Activations
• Scenario P1
• Scenario P2
• Scenario P1+P2
• Scenario 4
• Scenario 5
• Scenario 6
• Scenario 7
• Scenario 8
Scenario 9
• Scenario 10
• Scenario 11
• Scenario 12
• Scenario 13
• Scenario 14
• Scenario 15
• Scenario 16
Total activation
Total deactivation
Alarms
Burglar
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
Commands
Authorise installer
• Reset alarms
• Reset phone calls
Request support
• Stop
• Alarms
Extraordinary
1.
Click on the alarm condition, activation, command that you want to verify (e.g.: Activations/Total activation).
2.
Press "run" to startd the condition. In the case of activations: it is possible to carry out forced/immediate activations by selecting the appropriate ag.
Page 77
77
EN50131 (grade 2)
EN50131 (grade 2) + INCERT
Verification regulation...
Tool Windows Help
Options
Updating firmware...
Control unit check (Real Time)
Scan System...
Send audio
Receive events log
4.2 CONFORMANCE VERIFICATION (EN50131 GRADE 2 / EN50131 GRADE 2 + INCERT)
This function allows you to verify whether the system conguration conforms
to standards (EN50131 grade 2 / EN50131 grade 2 + incert)
4.2 1 Run the function Conformance verification
(EN50131 grade 2 / EN50131 grade 2 + incert)
1.
Click on the "Tools" menu, choose “Conformance verication (EN50131 grade 2 / EN50131 grade 2 + incert) ”, and enter the
installer code (default=001961) and press OK to conrm.
2.
Press "Verify" to start the "Conformance verication (EN50131 grade 2 / EN50131 grade 2 + incert)” function.
 Press "Show only infringed rules and warnings" to view only the
conguration errors and the warnings.
1.
Press "Events to be saved" for automatic conguration of the events to be saved according to standard.
2.
Conrm to start correction.
AUTOMATIC CONFIGURATION OF EVENTS TO BE SAVED.
» An icon will appear next to each conguration rule indicating
whether the parameter complies with the standards (EN50131 grade 2 / EN50131 grade 2 + incert).
Signals:
Conguration conforms to standards (EN50131 grade 2 / EN50131
grade 2 + incert)
Warning
Conguration does not conform to standards (EN50131
grade 2 / EN50131 grade 2 + incert)
Page 78
78
5. Appendix
5.1 PORT FORWARDING FOR REMOTE CONNECTION
A.
For remote management of the Vedo control panel via Safe Manager, open the router ports card for the IP address of the control panel
network
B.
For remote use of the Vedo App, open the router ports to:
• the IP address of the control panel network card.
the IP address of the rst Pal-IP (if present).
• the IP address of the second Pal-IP (if present).
TO B
Port
External port (default*)
Internal port (default*)
Protocol IP Address
√ √
HTTP
(for access to WEB pages)
80 80 TCP
Control panel net
-
work card
√ √
HTTPS
(for secure
access to WEB pages)
443 443 TCP
√ √
TLS
(for secure com­munication over
TCP/IP networks)
10022 10022 TCP
TCP
(protocol for com-
munication over
TCP/IP networks)
NOT
necessary for Vedo App
10012 10012 TCP
GRAB
(for capturing
screenshots
using the Vedo
application)
30012 10012 TCP
First Pal-IP module
STREAMING
(for streaming data transmis-
sion via Vedo
application)
49110 49110 UDP
CSP
(Comelit Signal
-
ling Protocol)
24104 24104 UDP
GRAB
(for capturing
screenshots
using the Vedo
application)
30013 10012 TCP
Second Pal­IP module
STREAMING
(for streaming data transmis-
sion via Vedo
application)
49 111 4 9111 UDP
CSP
(Comelit Signal­ling Protocol)
24105 24105 UDP
or
or
The port forwarding procedure is described below:
1.
Connect the PC to the router to which the Vedo control panel will be
connected.
2.
Access the browser and enter the IP address of the router (this can be found in the router user manual) in the navigation bar, for example:
192.168.1.1.
3.
Log in by entering the username and password (these can be found in the router user manual).
The port configuration method may differ according to the brand and type of router used.
4.
Search for the sections "Port Opening" or "Apps and games" or "Port Forwarding" (if not displayed on the main menu, search for them in Advanced settings) and add the ports you wish to congure.
5.
Fill in the conguration panel (see example in the gure below):
a.
Enter the name of the port you want to open.
b.
Select the desired protocol (TCP or UDP).
c.
For the external port, enter a desired value which has not been used for ports opened previously (the value should then be entered
in SafeManager for remote connection on "3.11.1 IP Options"
on page 50or listed in the Vedo App settings, in the remote
connection parameters section)**.
For the internal port, enter the default value or the value congured via Safe Manager software*. If requested, enter the same value in Start and in End if you wish to
open a single port.
The internal ports corresponding to the Pal-IP modules are fixed and therefore not freely configurable.
d.
Enter the IP address of the device for which you wish to open the ports on the router (Control panel network card/First Pal-IP module/ Second Pal-IP module).
e.
Conrm.
f.
Repeat the procedure for each port you wish to open.
* The ports opened on the router must correspond to those configured via Safe Manager and/or via the App. ** To resolve problems regarding a few router models, we recommend using an external port value which is equal to the internal port value.
Page 79
79
IP Options
Options
Check presence of connection to internet
Enable DHCP (obtain IP address automatically)
IP Address
192,168. 1 .230
Network Time Protocol Options
Enable NTP
NTP Server
pool.ntp.org
Dynamic DNS
Comelit VEDO
SETUP
HOME
Enter User Password
Configuration
Configuration
Enable installer
Enable manufacturer
Update product
Comelit DNS registration:
Firmware: @5715:5742M
IP address: 192.168.1.230
Subnet Mask: 255.255.255.0
Gateway: 192.168.1.1
Primary DNS: 192.168.1.1
Secondary DNS: 0.0.0.0
MAC address: 00:04:A3:55:42:EE
DDNS code: 0004A35542EE
Activation code: 9314DEB308D47B0C
SETUP
An Internet connection is required for this procedure.
The device must be connected to the same network as the control panel.
1.
Open your browser (from a PC, tablet, smartphone...).
2.
Enter the IP Address (default: 192.168.1.230) assigned to the VEDOIP expansion device (via the "IP Options" conguration screen) in the address bar and press return.
3.
Press
SETUP
, enter the user/installer password and conrm.
4.
Press "Comelit DNS registration".
» The Product registration screen on the website www.comelitdns.com will open:
» The control panel web page will open:
5.
Complete the user registration (making a note of the data entered, which you will need to complete step 7).
5.2 COMELIT DNS REGISTRATION PROCEDURE FOR VEDOIP EXPANSION
Page 80
80
IP Options
Options
Check presence of connection to internet
Enable DHCP (obtain IP address automatically)
IP Address
Subnet mask
Gateway
Primary DNS
Secondary DNS
Host name
192,168. 1 .230
255,255,255. 0
192,168. 1 . 1
192,168. 1 . 1
0 . 0 . 0 . 0
Services configuration
http/https ports type
https port
http port
tls port
TCP Port
80
Standard
10022
10012
443
SMTP options
Port
Server address
Email
Username
Password
Email subject
Enable SMTP
Use SSL25
Network Time Protocol Options
Enable NTP
NTP Server
Enable DDNS (Dynamic DNS)
pool.ntp.org
Dynamic DNS
D-DNS provider
Port
Host name
Username
Password
80
comelitdns.com
6.
Press to continue with "product registration".
» Product registration via the website comelitdns.com is complete!
7.
Return to the "IP Options" conguration screen in Safe Manager, tick "Enable DDNS (Dynamic DNS)" and enter the host name (including "comelitdns. com"), email address and password entered during registration on the websitecomelitdns.com (see step 5) in the "Host name", "Username" and
"Password" elds.
Page 81
81
5.3.1 Keypads
Vedo10 x: from 1 to 2 / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 8 / Vedo200 x: from 1 to 16
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.1.x.2 Checked areas
At least one selected area
1.1.1.1.x.4 Tamper areas
At least one selected area
1.1.1.1.x.5 Technical areas
At least one selected area
1.1.1.1.x.16 Buzzer on
Active
1.1.1.1.x.17 Entrance Buzzer
Active
1.1.1.1.x.18 Exit Buzzer
Active
1.1.1.1.x.19 Alarm Buzzer
Active
1.1.1.1.x.22 Pre-alert Buzzer
Active
1.1.1.1.x.24 System status display time
0 (+30 seconds)
1.1.1.1.x.25 Tamper cycles
Unlimited
1.1.1.1.x.26 Technical cycles
Unlimited
1.1.1.1.x.27
Unlimited System status display time
Deselected
1.1.1.1.x.28 Unlimited tamper cycles
Selected
1.1.1.1.x.29 Unlimited technical cycles
Selected
1.1.1.1.x.33 Quick activation
Deselected
1.1.1.1.x.35 Area status
Selected
1.1.1.1.x.37 Zones open
Selected
1.1.1.1.x.40 Send email
Selected
1.1.1.1.x.41 Send Digital Com
Selected
1.1.1.1.x.43 Buzzer ActDeact
Selected
1.1.1.1.x.44 Buzzer Act.Failed
Selected
5.3.2 App
x: from 1 to 8
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.5.x.2 Controllable areas
At least one selected area
1.1.1.5.x.3 Tamper areas
At least one selected area
1.1.1.5.x.4 Tamper cycles
Unlimited
1.1.1.5.x.9 Send email
Selected
1.1.1.5.x.10 Send digital communication
Selected
1.1.1.5.x.12 Unlimited tamper cycles
Selected
1.1.1.5.x.23 Unlimited start-up time
Deselected
5.3.3 Input/output expansions (8I8O)
Vedo10 x: not available / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 12 / Vedo200 x: from 1 to 50
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.7.x.2 Tamper areas
At least one selected area
1.1.1.7.x.3 Technical areas
At least one selected area
1.1.1.7.x.4 Tamper cycles
Unlimited
1.1.1.7.x.5 Technical cycles
Unlimited
1.1.1.7.x.8 Unlimited tamper cycles
Selected
1.1.1.7.x.9 Unlimited technical cycles
Selected
1.1.1.7.x.11 Send email
Selected
1.1.1.7.x.12 Send Digital Com
Selected
5.3.4 Power supply stations
Vedo10 x: from 1 to 1 / Vedo34 x: from 1 to 4 / Vedo68 x: from 1 to 8 / Vedo200 x: from 1 to 8
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.8.x.2 Tamper Areas
At least one selected area
1.1.1.8.x.3 Technical Areas
At least one selected area
1.1.1.8.x.4 Tamper cycles
Unlimited
1.1.1.8.x.5 Technical cycles
Unlimited
1.1.1.8.x.7 Unlimited tamper cycles
Selected
1.1.1.8.x.8 Unlimited technical cycles
Selected
1.1.1.8.x.10 Send email
Selected
1.1.1.8.x.11 Send digital communications
Selected
1.1.1.8.x.13 Tamper enabled
Selected
1.1.1.8.x.14 Network alarm delay
Max 60 seconds
1.1.1.8.x.15 Battery alarm delay
Max 5 minutes
5.3.5 Isolators
Vedo10 x: from 1 to 4 / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 16 / Vedo200 x: from 1 to 16
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.9.x.2 Tamper areas
At least one selected area
1.1.1.9.x.3 Technical areas
At least one selected area
1.1.1.9.x.4 Tamper cycles
Unlimited
1.1.1.9.x.5 Technical cycles
Unlimited
1.1.1.9.x.7 Unlimited tamper cycles
Selected
1.1.1.9.x.8 Unlimited technical cycles
Selected
1.1.1.9.x.10 Send email
Selected
1.1.1.9.x.11 Send digital communications
Selected
1.1.1.9.x.13 Tamper enabled
Selected
5.3.6 Radio expansion
Vedo10 x: from 1 to 1 / Vedo34 x: from 1 to 2 / Vedo68 x: from 1 to 3 / Vedo200 x: from 1 to 8
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.10.x.2 Tamper areas
At least one selected area
1.1.1.10.x.3 Technical areas
At least one selected area
1.1.1.10.x.4 Tamper cycles
Unlimited
1.1.1.10.x.5 Technical cycles
Unlimited
1.1.1.10.x.7 Unlimited tamper cycles
Selected
1.1.1.10.x.8 Unlimited technical cycles
Selected
1.1.1.10.x.10 Send email
Selected
1.1.1.10.x.11 Send digital communication
Selected
5.3.7 Radio outputs
Vedo10 x: from 1 to 16 / Vedo34 x: from 1 to 32 / Vedo68 x: from 1 to 48 / Vedo200 x: from 1 to
128
y: from 1 to 4
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.11.x.7 Siren on time out (not active)
**
1.1.1.11.x.8 Siren sound for on (not active)
**
1.1.1.11.x.13 Cycle Outputs
**
1.1.1.11.x.14 Unlimited Cycle Outputs
**
1.1.1.11.x.15 Output type
*** Monostable
1.1.1.11.x.17 OFF Time
**
1.1.1.11.x.19 ON Time
**
1.1.1.11.x.20 System status areas
At least one selected area
1.1.1.11.x.21 Tamper and technical areas
At least one selected area
1.1.1.11.x.22 Sabotage cycles
Unlimited
1.1.1.11.x.23 Technical cycles
Unlimited
1.1.1.11.x.24 Monitoring time
Maximum 20 minutes
1.1.1.11.x.25 Unlimited sabotage cycles
Selected
1.1.1.11.x.26 Unlimited technical cycles
Selected
1.1.1.11.x.31 Disable battery check
Deselected
** The total activation time of a siren must not exceed that prescribed by local regulations.
*** These apply only to sirens
RADIO OUTPUT EVENTS
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.11.x.27.y.1 Event
* Alarms/Sabotage+ Motion sensor
jamming fault
1.1.1.11.x.27.y.2 Polarity
* Direct
1.1.1.11.x.27.y.3 And/or
* OR
* These apply only to sirens
RADIO OUTPUT CONFIGURATION
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.11.x.28.1.1
Timer in And
* No timer
1.1.1.11.x.28.1.2
Timer in Or
* No timer
1.1.1.11.x.28.1.7
Events logic
* OR
1.1.1.11.x.28.1.9
Send email
Selected
1.1.1.11.x.28.1.10
Send digital communicator
Selected
1.1.1.11.x.28.1.12
Output activation only with system activated
Selected if connected to a siren
* These apply only to sirens
5.3.8 Radio controls
Vedo10 x: from 1 to 11 / Vedo34 x: from 1 to 64 / Vedo68 x: from 1 to 96 / Vedo200 x: from 1 to
256
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.12.x.3 Areas
At least one selected area
1.1.1.12.x.5 Unlimited fault cycles
Selected
1.1.1.12.x.7 Fault cycles
Unlimited
1.1.1.12.x.13 Send email
Selected
1.1.1.12.x.14 Send digital communications
Selected
1.1.1.12.x.19 Forced activation
Deselected
This chapter provides indications on the conguration parameters which, if varied, could lower the safety level of the system, and the congurations necessary to guarantee I&HAS certication.
For further details on programming and configuration, consult the programming technical manual.
5.3 CONFIGURATIONS NECESSARY TO GUARANTEE GRADE 2 CERTIFICATION ACCORDING TO EN50131-1
Page 82
82
5.3.9 Radio zones
Vedo10 x: from 1 to 16 / Vedo34 x: from 1 to 64 / Vedo68 x: from 1 to 96 / Vedo200 x: from 1 to
256
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.13.x.3 Monitoring
Maximum 20 minutes
1.1.1.13.x.16 Unlimited fault cycles
Selected
1.1.1.13.x.18 Fault cycles
Unlimited
1.1.1.13.x.20 Tamper enable
Selected
RADIO SUBZONE PARAMETERS
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.13.x.21.1.3
Areas
At least one selected area
1.1.1.13.x.21.1.4
Alarm cycles
Unlimited
1.1.1.13.x.21.1.22
Can be self-disabled (alarm only)
Deselected
1.1.1.13.x.21.1.23
Can be self-disabled with reset (alarm only)
Deselected
1.1.1.13.x.21.1.30
Unlimited alarm cycles
Selected
1.1.1.13.x.21.1.44
Send email
Selected
1.1.1.13.x.21.1.45
Send digital com
Selected
5.3.10 Wired zones
Vedo10 x: from 1 to 16 / Vedo34 x: from 1 to 95 / Vedo68 x: from 1 to 133 / Vedo200 x: from 1 to
453
Vedo10 y: from 1 to 1 / Vedo34 y: from 1 to 2 / Vedo68 y: from 1 to 2 / Vedo200 y: from 1 to 2
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.14.x.13 Balancing
All alarm, fault and command zones must be set to double or triple balance or double with EOL. The sabotage zones must be set to single or double or triple or triple with jamming or double with EOL.
1.1.1.14.x.14 Unlimited fault cycles
Selected
1.1.1.14.x.15 Fault cycles
Unlimited
* If triple balance is not used for all the sensors, three inputs of the control panel must be programmed to signal the following events:
- Detector fault
- Anti-robbery device fault, if robbery zone present
- Siren fault In order to guarantee compliance with Standards EN50131-1 and EN50131-3: In order to guarantee compliance with Standards EN50131-1 and EN50131-3, a siren sabotage zone must be provided.
SUBZONE PARAMETERS
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.14.x.15.y.3
Areas
At least one selected area
1.1.1.14.x.15.y.4
Alarm cycles
Unlimited
1.1.1.14.x.15.y.22
Can be self-disabled (alarm only)
Deselected
1.1.1.14.x.15.y.23
Can be self-disabled with reset (alarm only)
Deselected
1.1.1.14.x.15.y.30
Unlimited alarm cycles
Selected
1.1.1.14.x.15.y.44
Send email
Selected
1.1.1.14.x.15.y.45
Send digital com
Selected
5.3.11 Areas
Vedo10 x: from 1 to 2 / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 8 / Vedo200 x: from 1 to 16
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.16.x.4 Entry 1 time
Max 45 seconds
1.1.1.16.x.5 Entry 2 time
Max 45 seconds
1.1.1.16.x.8 Pre-alert time
Other than 0
1.1.1.16.x.10 Pre-alarm time
0
1.1.1.16.x.15 Report pre-alert
Selected
5.3.12 Wired outputs
Vedo10 x: from 1 to 7 / Vedo34 x: from 1 to 75 / Vedo68 x: from 1 to 115 / Vedo200 x: from 1 to 419
y: from 1 to 4
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.17.x.3 Output type
* Monostable
1.1.1.17.x.5 Unlimited cycles
Deselected
1.1.1.17.x.6 ON time scale
**
1.1.1.17.x.7 ON Time
**
1.1.1.17.x.8 OFF TIME:
**
1.1.1.17.x.10 Cycles
**
* These apply only to outputs connected to sirens ** The total activation time of a siren must not exceed that prescribed by local regulations.
WIRED OUTPUT EVENTS
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.17.x.11.y.1
Event
* Alarms/Sabotage+ Motion sensor
jamming fault
1.1.1.17.x.11.y.2
Polarity
* Direct
1.1.1.17.x.11.y.3
And/or
* OR
* These apply only to outputs connected to sirens
WIRED OUTPUT CONFIGURATION
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.17.x.12.1.1
Timer in And
* No timer
1.1.1.17.x.12.1.2
Timer in Or
* No timer
1.1.1.17.x.12.1.7
Events logic
* OR
1.1.1.17.x.12.1.9
Send email
Selected
1.1.1.17.x.12.1.10
Send digital communicator
Selected
1.1.1.17.x.12.1.12
Output activation only with system activated
Selected if connected to a siren
* These apply only to outputs connected to sirens. For standard EN50131 an output of the control panel must be activated in the case of a fault and must not
be connected to a siren.
5.3.13 User
Vedo10 x: from 1 to 8 / Vedo34 x: from 1 to 32 / Vedo68 x: from 1 to 50 / Vedo200 x: from 1 to 200
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.20.x.17 Send email
Selected
1.1.1.20.x.18 Send digital communicator
Selected
The codes accepted must have 6 gures and range from 000000 to 999998. Code 999999 is not an accepted code. The robbery code is the user code + 1. Example: user code 111111, the corresponding robbery code is 111112. Code 119999, robbery code = 120000. Code 123459, robbery code = 123460 - It is not possible to register a user code corresponding to an existing user code + 1, since this new code corresponds to the robbery code of the existing user. In the system it is therefore possible to store up to a theoretical maximum of 999943 user codes. The calculation is the result of the fact that it is not possible to create a user code that is the same as an existing user code + 1 (which is the robbery code). The actual maximum number of user codes that can be congured is shown in the paragraph “3.10 CODES” on page 43 on page
43.
The authorised user can perform an innite number of changes of his user code and can create and eliminate another user, whereas he is unable to modify any user code other than his own.
CODE TYPE
x: from 1 to 9
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.22.x.19 Request assistance
Active for at least one type of user (x enab. inst.) and one type of installer (x enab. manuf.)
1.1.1.22.x.20 Change Pin
Active only for installers
1.1.1.22.x.21 Reset control panel
Active at least for manufacturer
1.1.1.22.x.23 Fault management
Active for all
1.1.1.22.x.26 Programme from PC
Active at least for installer and manufacturer
1.1.1.22.x.42 Codes menu
Active for all
1.1.1.22.x.44 FW Update
Only for manufacturer
1.1.1.22.x.45 Reset alarms L3
Selected Deselected for Patrol
5.3.14 Installers
Vedo10 x: from 1 to 3 / Vedo34 x: from 1 to 6 / Vedo68 x: from 1 to 6 / Vedo200 x: from 1 to 6
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.21.x.5 Send email
Selected
1.1.1.21.x.6 Send digital communicator
Selected
CODE TYPE
x: from 1 to 9
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.22.x.19 Request assistance
Active for at least one type of user (x enab. inst.) and one type of installer (x enab. manuf.)
1.1.1.22.x.20 Change Pin
Active only for installers
1.1.1.22.x.21 Reset control panel
Active at least for manufacturer
1.1.1.22.x.23 Fault management
Active for all
1.1.1.22.x.26 Programme from PC
Active at least for installer and manufacturer
1.1.1.22.x.42 Codes menu
Active for all
1.1.1.22.x.44 FW Update
Only for manufacturer
1.1.1.22.x.45 Reset alarms L3
Selected Deselected for Patrol
Page 83
83
5.3.15 IP Options
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.24.1.1 IP
* Completed
1.1.1.24.1.2 Netmask
* Completed
1.1.1.24.1.3 Gateway
* Completed
1.1.1.24.1.4 Dns1
* Completed
1.1.1.24.1.5 Dns2
* Completed
1.1.1.24.1.18 SMTP server
* Completed
1.1.1.24.1.19 SMTP port
* Completed
1.1.1.24.1.20 SMTP Email
* Completed
1.1.1.24.1.21 SMTP Username
* Completed
1.1.1.24.1.22 SMTP Password
* Completed
1.1.1.24.1.23 SMTP Email subj.
* Completed
1.1.1.24.1.24 SMTP with ssl
* Completed
1.1.1.24.1.28 SMTP enable
* Selected
1.1.1.24.1.29 Internet check enable
* Selected
* If the digital communicator or voice messages are not enabled
5.3.16 GSM settings
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.25.1.24 Jamming control
Selected
5.3.17 Telephone Options
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.27.1.5 Tones recognition timeout
= 60 seconds
1.1.1.27.1.9
Telephone line parameters (pstn)
Selected
1.1.1.27.1.10 Length of call
= 60 seconds
1.1.1.27.1.12 Voice message repetition
5
1.1.1.27.1.14 Attempts
3
1.1.1.27.1.15 Send message
Press key 1
1.1.1.27.1.16 Termination with confirmation
Selected
1.1.1.27.1.19 Tones control (pstn)
Selected
1.1.1.27.1.20 Telephone line control (pstn)
Selected
1.1.1.27.1.21 Alert Priority Setup
SMS and MMS follow
1.1.1.27.1.22 PSTN switchboard prefix
* Empty
* The PSTN line must be connected before the switchboard.
5.3.18 Phone Book / Email
x: from 1 to 16
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.28.x.1 Description
*
1.1.1.28.x.2 Telephone *
1.1.1.28.x.4 Line active
* At least one selected
1.1.1.28.x.7 Email receipt
* At least one selected
* If the digital communicator is not active, at least one user must be present
5.3.19 Digital communicator contacts list
x: from 1 to 4
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.29.x.2 Periodic test
Active
1.1.1.29.x.4 Protocol
Contact ID
1.1.1.29.x.5 Test period
<=25h
1.1.1.29.x.6 Attempts
1
1.1.1.29.x.7 Number to call
If the digital communicator is not active, at least the telephone sounder or email transmission must be congured correctly
1.1.1.29.x.8 Customer code
Valorised
1.1.1.29.x.10 Periodic test start date
Value before date of activating the system (must be before current date)
5.3.20 Generic events
Vedo10 x: from 1 to 20 / Vedo34 x: from 1 to 32 / Vedo68 x: from 1 to 48 / Vedo200 x: from 1 to 48
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.30.x.2 Event
*
1.1.1.30.x.5 Activation voice message
Active for at least one phone
1.1.1.30.x.6 Reset voice message
Active for at least one phone
1.1.1.30.x.9 Send activation email
Active for at least one email
1.1.1.30.x.19 Send address
* Selected
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
* If the digital communicator is not active, the following events must be signalled:
- Robbery Alarm
- Burglar Alarm
- H24 Alarm
- Sabotage
- Expansion bus
- No network
- Radio sensor battery low
- Radio siren battery low
- Auto-activation failed
- Failed activation fault
- Zone fault
- Robbery zone fault
- Motion sensor jamming fault
- Regular PSTN and email communication
- Regular GSM communication Of course it must also be completed by sending the respective voice message.
5.3.21 Detailed events
x: from 1 to 8 y: from 1 to 8
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.31.x.3 communicator telephones
At least one selected
1.1.1.31.x.4 Areas
At least one selected
DETAILED EVENTS FLAGS
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.31.x.6.y.2 Zone Exclusion
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.3 Zone Isolation
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.4 Total ON
* - activation: Selected
1.1.1.31.x.6.y.5 Partial 1 ON
* - activation: Selected
1.1.1.31.x.6.y.6 Partial 2 ON
* - activation: Selected
1.1.1.31.x.6.y.7 Effective activation
* - activation: Selected
1.1.1.31.x.6.y.8 Deactivated
* - activation: Selected
1.1.1.31.x.6.y.10 Burglar Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.11 24H Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.12 Fire Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.13 Panic Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.14 Robbery Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.15 Flood alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.16 Gas Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.17 Medical Alarm
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.18 Zones Sabotage Tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.19 Siren tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.20 Radio device jamming
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.21 Tamper App
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.22 Tamper free 1
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.23 Tamper free 2
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.24 Tamper free 3
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.25 Tamper free 4
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.26 Bus I/O expansions tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.27 BUS keypad tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.28 RFID tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.29 Safetouch tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.30 Touch Tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.31
BUS power supply station or isolator tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.32
BUS radio concentrator tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.33 Bus siren tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.34
Alarm communication device tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.35 IP expansion tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.36 IP video expansion tamper
* - activation: Selected
* - reset: Selected
Page 84
84
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.31.x.6.y.37 Tamper bus free 0
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.38 Tamper bus free 1
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.39 Tamper bus free 2
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.40 Tamper bus free 3
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.41 Tamper bus free 4
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.42
Remote communications tamper
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.43 GSM concentrator jamming
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.44 False code
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.45 Zone Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.46 Siren fuse fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.47 Radio control fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.48 Power supply unit fuse fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.49
Power supply unit battery fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.50 Radio output battery fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.51 Bus siren battery fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.52 No power supply unit network
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.53 Radio zone battery fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.54 Radio control battery fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.55 Input voltage level fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.56 Output voltage level fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.57 Zones RX monitoring
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.58 Outputs RX monitoring
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.59 Output fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.60 Camera fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.61 No GSM/GPRS coverage
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.62 Telephone line fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.63 Failed communication fault
* - activation: Selected
1.1.1.31.x.6.y.64 Robbery zone fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.65 Failed activation fault
* - activation: Selected
1.1.1.31.x.6.y.66 IP Expansion fault on bus
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.67 Motion sensor jamming fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.68 Fault free 5
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.69 Fault free 6
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.70 I/O expansion Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.71 Keypad Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.72 Reader Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.73 Safe Touch Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.74 Touch Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.75
Isolator Power Supply Unit Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.76 Radio Concentrator Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.77 Siren Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.78
Alarm Communication Device Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.79 IP Expansion Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.80 IP Video Expansion Bus Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.81 Fault free bus 0
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.82 Fault free bus 1
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.83 Fault free bus 2
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.84 Fault free bus 3
* - activation: Selected
* - reset: Selected
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.31.x.6.y.85 Fault free bus 4
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.86 Control Panel Battery Fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.87
Control Panel Power Supply Mains Outage
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.88 Control panel pstn fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.89 Control panel GSM fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.90 Control panel IP fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.91
Control panel voice synthesis fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.92 Control panel Intercom fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.93
Control panel home automation expansion fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.94
Auxiliary power supply fuse fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.95 Bus power supply fuse fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.96 Siren power supply fuse fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.97
Control panel power supply unit fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.98 Control panel bus fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.99 Telephone line fault
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.100
No GSM network
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.101
No GPRS network
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.102
Date lost
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.108
L2 forced ON
* - activation: Selected
1.1.1.31.x.6.y.109
L3 forced ON
* - activation: Selected
1.1.1.31.x.6.y.116
Timed activation error
* - activation: Selected
1.1.1.31.x.6.y.119
Technical programming
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.120
Control panel in service
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.126
Change date and time
* - activation: Selected
1.1.1.31.x.6.y.127
Change site data
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.140
Lock RFID
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.143
Lock Web
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.144
Lock PC
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.145
Lock SMS
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.146
Lock voice
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.147
Home autom. lock
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.151
Activation action
* - activation: Selected
1.1.1.31.x.6.y.152
Burglar Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.153
24H Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.154
Fire Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.155
Panic Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.156
Robbery Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.157
Flood Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.158
Gas Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.159
Medical Alarm Action
* - activation: Selected
1.1.1.31.x.6.y.177
Zone exclusion command
* - activation: Selected
1.1.1.31.x.6.y.178
Zone inclusion command
* - activation: Selected
1.1.1.31.x.6.y.179
Zone isolation command
* - activation: Selected
1.1.1.31.x.6.y.180
Zone activation command
* - activation: Selected
1.1.1.31.x.6.y.183
Safe Touch lock
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.188
Touch lock
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.200
App locked
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.205
Touch lock
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.208
Digital communicator manual test
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.216
Zone Restriction
* - activation: Selected
* - reset: Selected
1.1.1.31.x.6.y.219
Communicator parameters changed
* - activation: Selected
1.1.1.31.x.6.y.220
Updating firmware
* - activation: Selected
* - reset: Selected
* Only for the digital communicator and email columns
Page 85
85
5.3.22 Service voice messages
x: from 1 to 6
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.36.x.1 Text
The system address eld must be
completed
5.3.23 Timer Types
Vedo10 x: from 1 to 4 / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 8 / Vedo200 x: from 1 to 32 Vedo10 y: from 1 to 4 / Vedo34 y: from 1 to 16 / Vedo68 y: from 1 to 16 / Vedo200 y: from 1 to 32
TIMER TYPE SCHEDULES
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.37.x.2.y.1 Time ON1
Timer 4 completed*
1.1.1.37.x.2.y.2 Time OFF1
Timer 4 completed*
* Timer 4 completed and linked with the two regular general events
5.3.24 Timer Model
Vedo10/Vedo34/Vedo68 x: from 1 to 30 / Vedo200 x: from 1 to 60
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.39.x.1 Start day of week
Line 1 '*'
1.1.1.39.x.2 End day of week
Line 1 '*'
1.1.1.39.x.3 Start month
Line 1 '*'
1.1.1.39.x.4 End month
Line 1 '*'
1.1.1.39.x.5 Start date
Line 1 '*'
1.1.1.39.x.6 Selection
First line selected
1.1.1.39.x.7 End date
Line 1 '*'
1.1.1.39.x.8 Start year
Line 1 '*'
1.1.1.39.x.9 End year
Line 1 '*'
1.1.1.39.x.10 Timer Type
Line 1 'Timer 4'
5.3.25 System Parameters
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.42.1.2 Customer Name
Fill in the eld
1.1.1.42.1.3 System Address
Fill in the eld
1.1.1.42.1.4 Network alarm delay
Max 60 seconds
1.1.1.42.1.5 Battery alarm delay
Max 5 minutes
1.1.1.42.1.14 Code errors
<=10
1.1.1.42.1.15 Reactivation time
Minimum 2 minutes
1.1.1.42.1.16 Alarm Cycles
Unlimited
1.1.1.42.1.17 Fault Cycles
Unlimited
1.1.1.42.1.18 Unlimited Alarm Cycles
Selected
1.1.1.42.1.19 Unlimited fault cycles
Selected
1.1.1.42.1.20
Device locked for incorrect code
Selected
1.1.1.42.1.23
Activation with monitoring fault
Selected
1.1.1.42.1.24 Forcing level 3 faults
Selected
1.1.1.42.1.25 Forcing level 3 sabotage
Selected
1.1.1.42.1.30 Installer always active
Deselected
1.1.1.42.1.32 IP card enable
At least one active of PSTN, GSM and IP
1.1.1.42.1.33 Audio control enable
Active if digital communicator or IP card is
not enabled
1.1.1.42.1.34 GSM card enable
At least one active of PSTN, GSM and IP
1.1.1.42.1.37 PSTN enable (on board)
At least one active of PSTN, GSM and IP
1.1.1.42.1.38 Failed activation fault enable
Selected
1.1.1.42.1.39
Enable test for fault and zones sabotage
Deselected
1.1.1.42.1.42
Default codes change mandatory
Selected
5.3.26 Events to be saved
x: from 1 to 2
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.43.x.2 Zone Exclusion
Selected
1.1.1.43.x.3 Zone Isolation
Selected
1.1.1.43.x.4 Total ON
Only set selected
1.1.1.43.x.5 Partial 1 ON
Only set selected
1.1.1.43.x.6 Partial 2 ON
Only set selected
1.1.1.43.x.7 Effective activation
Only set selected
1.1.1.43.x.8 Deactivated
Only set selected
1.1.1.43.x.10 Burglar Alarm
Selected
1.1.1.43.x.11 24H Alarm
Selected
1.1.1.43.x.12 Fire Alarm
Selected
1.1.1.43.x.13 Panic Alarm
Selected
1.1.1.43.x.14 Robbery Alarm
Selected
1.1.1.43.x.15 Flood alarm
Selected
1.1.1.43.x.16 Gas Alarm
Selected
1.1.1.43.x.17 Medical Alarm
Selected
1.1.1.43.x.18 Zones Sabotage Tamper
Selected
1.1.1.43.x.19 Siren tamper
Selected
1.1.1.43.x.20 Radio device jamming
Selected
1.1.1.43.x.21 Tamper App
Selected
1.1.1.43.x.26 Bus I/O expansions tamper
Selected
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.43.x.27 Bus keypad tamper
Selected
1.1.1.43.x.28 RFID tamper
Selected
1.1.1.43.x.29 Safetouch tamper
Selected
1.1.1.43.x.30 Touch Tamper
Selected
1.1.1.43.x.31
Bus power supply station or isolator tamper
Selected
1.1.1.43.x.32
Bus radio concentrator tamper
Selected
1.1.1.43.x.33 Bus siren tamper
Selected
1.1.1.43.x.34
Alarm communication device tamper
Selected
1.1.1.43.x.35 IP expansion tamper
Selected
1.1.1.43.x.36 IP video expansion tamper
Selected
1.1.1.43.x.42
Remote communications tamper
Selected
1.1.1.43.x.43 GSM concentrator jamming
Selected
1.1.1.43.x.44 False code
Selected
1.1.1.43.x.45 Zone Fault
Selected
1.1.1.43.x.46 Siren fuse fault
Selected
1.1.1.43.x.47 Radio control fault
Selected
1.1.1.43.x.48 Power supply unit fuse fault
Selected
1.1.1.43.x.49
Power supply unit battery fault
Selected
1.1.1.43.x.50 Radio output battery fault
Selected
1.1.1.43.x.51 Bus siren battery fault
Selected
1.1.1.43.x.52 No power supply unit network
Selected
1.1.1.43.x.53 Radio zone battery fault
Selected
1.1.1.43.x.54 Radio control battery fault
Selected
1.1.1.43.x.55 Input voltage level fault
Selected
1.1.1.43.x.56 Output voltage level fault
Selected
1.1.1.43.x.57 Zones RX monitoring
Selected
1.1.1.43.x.58 Outputs RX monitoring
Selected
1.1.1.43.x.59 Output fault
Selected
1.1.1.43.x.60 Camera fault
Selected
1.1.1.43.x.61 No GSM/GPRS coverage
Selected
1.1.1.43.x.62 Telephone line fault
Selected
1.1.1.43.x.63 Failed communication fault
Only set selected
1.1.1.43.x.64 Robbery zone fault
Selected
1.1.1.43.x.65 Failed activation fault
Only set selected
1.1.1.43.x.66 IP Expansion fault on bus
Selected
1.1.1.43.x.67 Motion sensor jamming fault
Selected
1.1.1.43.x.70 I/O expansion Bus Fault
Selected
1.1.1.43.x.71 Keypad Bus Fault
Selected
1.1.1.43.x.72 Reader Bus Fault
Selected
1.1.1.43.x.73 Safe Touch Bus Fault
Selected
1.1.1.43.x.74 Touch Bus Fault
Selected
1.1.1.43.x.75
Isolator Power Supply Unit Bus Fault
Selected
1.1.1.43.x.76 Radio Concentrator Bus Fault
Selected
1.1.1.43.x.77 Siren Bus Fault
Selected
1.1.1.43.x.78
Alarm Communication Device Bus Fault
Selected
1.1.1.43.x.79 IP Expansion Bus Fault
Selected
1.1.1.43.x.80 IP Video Expansion Bus Fault
Selected
1.1.1.43.x.86 Control Panel Battery Fault
Selected
1.1.1.43.x.87
Control Panel Power Supply Mains Outage
Selected
1.1.1.43.x.88 Control panel pstn fault
Selected
1.1.1.43.x.89 Control panel GSM fault
Selected
1.1.1.43.x.90 Control panel IP fault
Selected
1.1.1.43.x.91
Control panel voice synthesis fault
Selected
1.1.1.43.x.94
Auxiliary power supply fuse fault
Selected
1.1.1.43.x.95 Bus power supply fuse fault
Selected
1.1.1.43.x.96 Siren power supply fuse fault
Selected
1.1.1.43.x.97
Control panel power supply unit fault
Selected
1.1.1.43.x.98 Control panel bus fault
Selected
1.1.1.43.x.99 Telephone line fault
Selected
1.1.1.43.x.100 No GSM network
Selected
1.1.1.43.x.101 No GPRS network
Selected
1.1.1.43.x.102 Date lost
Selected
1.1.1.43.x.103 Inactivity
Selected
1.1.1.43.x.106 Zone test
Selected
1.1.1.43.x.107 User logged in
Selected
1.1.1.43.x.108 L2 forced ON
Selected
1.1.1.43.x.109 L3 forced ON
Selected
1.1.1.43.x.110 Negligence
Selected
1.1.1.43.x.111 Alarm log
Selected
1.1.1.43.x.113 Reset alarms
Selected
1.1.1.43.x.114 Stop alarms
Selected
1.1.1.43.x.115 Stop telephone calls
Selected
1.1.1.43.x.116 Timed activation error
Selected
1.1.1.43.x.119 Technical programming
Selected
1.1.1.43.x.120 Control panel in service
Selected
1.1.1.43.x.123 Reset system alarms
Selected
1.1.1.43.x.124 Stop system alarms
Selected
1.1.1.43.x.125 Stop system telephone calls
Selected
Page 86
86
Indices Parameters
Configurations necessary to guarantee Grade 2 certification
1.1.1.43.x.126 Change date and time
Selected
1.1.1.43.x.127 Change site data
Selected
1.1.1.43.x.130 Telephone call failed
Only set selected
1.1.1.43.x.131
Outgoing phone communication
Selected
1.1.1.43.x.132
Digital communicator periodic test
Selected
1.1.1.43.x.135 Lock keypad
Selected
1.1.1.43.x.140 Lock RFID
Selected
1.1.1.43.x.143 Lock Web
Selected
1.1.1.43.x.144 Lock PC
Selected
1.1.1.43.x.145 Lock SMS
Selected
1.1.1.43.x.146 Lock voice
Selected
1.1.1.43.x.151 Activation action
Only set selected
1.1.1.43.x.152 Burglar Alarm Action
Only set selected
1.1.1.43.x.153 24H Alarm Action
Only set selected
1.1.1.43.x.154 Fire Alarm Action
Only set selected
1.1.1.43.x.155 Panic Alarm Action
Only set selected
1.1.1.43.x.156 Robbery Alarm Action
Only set selected
1.1.1.43.x.157 Flood Alarm Action
Only set selected
1.1.1.43.x.158 Gas Alarm Action
Only set selected
1.1.1.43.x.159 Medical Alarm Action
Only set selected
1.1.1.43.x.160 Event 1 key command
Only set selected
1.1.1.43.x.161 Event 2 key command
Only set selected
1.1.1.43.x.162 Extraordinary command
Only set selected
1.1.1.43.x.163 Stop alarms command
Only set selected
1.1.1.43.x.164 Reset alarms command
Only set selected
1.1.1.43.x.165
Reset telephone calls command
Only set selected
1.1.1.43.x.166
Reset Control panel command
Only set selected
1.1.1.43.x.167 Request support command
Only set selected
1.1.1.43.x.168 Authorise installer command
Only set selected
1.1.1.43.x.169 Confirm code command
Only set selected
1.1.1.43.x.170 Confirm key command
Only set selected
1.1.1.43.x.171 Login upgrade command
Only set selected
1.1.1.43.x.172
Authorise manufacturer command
Only set selected
1.1.1.43.x.177 Zone exclusion command
Only set selected
1.1.1.43.x.178 Zone inclusion command
Only set selected
1.1.1.43.x.179 Zone isolation command
Only set selected
1.1.1.43.x.180 Zone activation command
Only set selected
1.1.1.43.x.183 Safe Touch lock
Selected
1.1.1.43.x.188 Touch lock
Selected
1.1.1.43.x.191 Added code command
Only set selected
1.1.1.43.x.192 Removed code command
Only set selected
1.1.1.43.x.193 Changed code command
Only set selected
1.1.1.43.x.194 Added key command
Only set selected
1.1.1.43.x.195 Removed key command
Only set selected
1.1.1.43.x.196 Changed key command
Only set selected
1.1.1.43.x.197 Database reset command
Only set selected
1.1.1.43.x.200 App locked
Selected
1.1.1.43.x.205 Touch lock
Selected
1.1.1.43.x.208
Digital communicator manual test
Selected
1.1.1.43.x.209 Sending SMS
Only set selected
1.1.1.43.x.210 Sending email
Only set selected
1.1.1.43.x.211 Sending MMS
Only set selected
1.1.1.43.x.213 Activation lock cause
Only set selected
1.1.1.43.x.214 Sending telephone call
Only set selected
1.1.1.43.x.216 Zone Restricted
Selected
1.1.1.43.x.217 NAK digital communication
Only set selected
1.1.1.43.x.218 Digital communication OK
Only set selected
1.1.1.43.x.219
Communicator parameters changed
Only set selected
1.1.1.43.x.220 Updating firmware
Selected
1.1.1.43.x.221 NAK email communication
Only set selected
5.4 CONFIGURATIONS NECESSARY TO GUARANTEE INCERT CERTIFICATION
This chapter provides indications on the conguration parameters which, if varied, could lower the safety level of the system, and the congurations necessary to guarantee I&HAS certication.
5.4.1 Code type
Indices Parameters
Configurations necessary to guarantee INCERT certification
1.1.1.22.x.45 Reset alarms L3
Selected
Deselected for manufacturer
5.4.2 System Parameters
Indices Parameters
Configurations necessary to guarantee INCERT certification
1.1.1.42.1.25 Forcing level 2 sabotage
Deselected
For further details on programming and configuration, consult the programming technical manual, which can be downloaded from the website www.comelitgroup.com/
To guarantee Incert certification, ALL configurations required for Grade 2 certification (see "5.3 Configurations necessary to guarantee grade 2 certification according to EN50131-1" on page 81 on page 81) must be observed, except for the settings listed in the following tables.
Page 87
87
Drop-down menu, allows you to add, isolate and remove devices (Keypad, Safetouch...)/zones/outputs/expansions from the conguration. The possible statuses for the device are as follows:
Device identication number. This corresponds to the bus address set on the device.
Alphanumeric box, where you can enter a customised description of the device. For example, you might choose to change “Keypad 1” to “Entrance”
in order to rapidly identify the location of the peripheral within the system.
STATUS
STATUS/DESCRIPTION PANEL
ID
DESCRIPTION
• Absent:
when the device/zone/output/expansions do not exist or have to be removed.
• Active:
when the device/zone/output is present, congured and intended to be operational.
• Isolated:
when the device/zone/output/expansion is intended to be temporarily unused (even if present and congured, the control panel will not consider it active).
This section of the program can be used to dene the activation functions associated with the PX keys of the device. There are two drop-down menus for each key. The rst menu allows you to select only the Scenario / Activation option, whereas the second menu
allows you to choose from several standard congurations or from a series of custom activation scenarios (see "3.9 Scenarios" on page 42):
PX KEY FUNCTIONS
• Scenario P1:
for the areas covered, activates all zones that have a check in the Partial 1 checkbox (if the default settings are maintained).
• Scenario P2:
for the areas covered, activates all zones that have a check in the Partial 2 checkbox (if the default settings are maintained).
• Scenario P1+P2:
for the areas covered, activates all zones that have a check in the Partial 1 or Partial 2 checkbox (if the default settings are
maintained).
• Scenario "n" with "n" from 4 to 16:
all activations / deactivations dened in the selected scenario are executed.
• Total Activation:
for the areas covered, activates all zones.
• Total Deactivation:
for the areas covered, deactivates all zones.
Page 88
88
The function keys can be used to perform actions on the system directly. This section of the program allows you to dene the actions to be assigned
to each key.
There are two drop-down menus for each function key. The rst allows you to decide the action category to assign to the function key, while the second (activated when the category has been chosen from the rst menu) allows you to choose the specic action.
The table below shows the possible associations for each category of actions, which is valid for all function keys.
FIRST MENU
event category
SECOND MENU event generated by pressing a key
None
No action is possible for the function key
Scenario Activation
Allows you to assign to the function key one of the possible activation/deactivation programs:
• Scenario P1
• Scenario P2
• Scenario P1 + P2
• Scenario n (with n from 4 to 16)
Total activation
Total deactivation
Alarm
Allows you to assign to the function key the generation of one of the alarms listed below:
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
Command
Allows you to assign to the function key one of the control panel commands listed below:
• Event 1 key:
the device is capable of generating generic events that can be intercepted by an appropriately congured output. This conguration makes it possible to generate an event dened as Press Event 1 Key when the function key is pressed, which the outputs are capable of understanding. Also see the Outputs section and the Events Group section
• Event 2 key: as per Event 1 key, but for an event dened as Press Event 2 Key.
• Overtime: this command allows you to delay an automatic activation by n hours, where n is programmable, for the purpose of allowing work to continue beyond
the envisaged activation time.
• Stop alarms: stops the alarms in progress, regardless of whether the events that triggered them are still active. Does not stop silent alarms.
• Reset alarms: resets the switchboard conditions and alarms in progress, but not the events that triggered the alarms which, if still active, will trigger a new alarm
cycle. After this command, the switchboard assumes the same state as it would assume following an activation.
• Reset telephone calls: blocks all phone calls, on landline and GSM network. Also blocks any messages envisaged but not sent (SMS, email, MMS).
• Request assistance: allows you to send a request for assistance to one or more recipients, by means of a phone call. (not implemented).
• Authorise installer: authorises the installer code. Has the same effect as authorising the installer code from the keypad via the user menu.
Activate Output
Allows you to assign to the function key the activation of one of the outputs listed below:
O. centr.unit 1 (control panel RY1 relay)
O. centr.unit 2 (output TC1)
O. centr.unit 3 (output TC2)
ESP x O n (if expansion modules are present,
where x is the bus address of the expansion and n denotes the connection terminal of the output)
Deactivate Output
Allows you to assign the function key to deactivate the selected output. The possible choices are the same as indicated for the Activate Output function.
Toggle output
Allows you to assign the function key to toggle (change the status of) the selected output. The possible choices are the same as indicated for the Activate Output function.
FUNCTION KEYS
• Enabled: enables the buzzer function and therefore all the options relating to the section.
• Entry:
the buzzer will remain active for the entire duration of the entry time.
• Exit:
the buzzer will remain active for the entire duration of the exit time.
• Alarm:
the buzzer will remain active for the entire duration of the alarm time.
• Chime:
the buzzer will signal the opening of a zone with an active Chime checkbox (Bell). The duration of the signal can be set in the
System Parameters section (see "3.14 System Parameters" on page 70).
• Pre-alarm: the buzzer will remain active for the entire pre-alarm time duration.
• Pre-alert:
the buzzer will remain active for the entire duration of the automatic pre-alert activation time. The pre-alert time can be set in
the Areas section (see "3.6 Areas" on page 37).
• Key beep (only for Keypad and Safetouch): every time a key is pressed, a conrmation beep is generated.
• Failed activation*:
for each area that is in failed activation status (after an activation), the device buzzer emits a tone lasting about 2
sec.
• Activation/Deactivation executed:
the buzzer will indicate completion of the alarm activation/deactivation procedure. At the end of the activation procedure (of all the areas of which a change of status is expected), the buzzer will emit a continuous tone for 1 second. At the end of the deactivation procedure (of all the areas of which deactivation is expected), the buzzer will emit a continuous tone for 2 seconds.
BUZZER
* the "failed activation" signal has priority over the activation/deactivation signals.
Page 89
89
When specic events occur, it is possible to send SMSs, emails, digital communications or notications to the smartphone app. In this section, you can assign an initial general permit to generate such events. From the Detailed Events section (see "3.12.5 Detailed events" on page 64) it is possible to make a more precise conguration by selecting, for each category (e.g. Areas, Zones, Keypads, etc.), the events that can generate the
sending of messages.
SEND MESSAGE OPTIONS
• Send detailed events SMS:
allows the control panel to send SMS for events generated by the device (only with GSM expansion module Art. VEDOGSM installed and congured).
• Send Email messages:
allows the control panel to send email messages for events generated by the device (only with GSM expansion module Art. VEDOGSM or IP card Art. VEDOIP installed and congured).
• Send digital communication:
allows the control panel to send digital communications for events generated by the device (only with PSTN line congured or GSM expansion module Art. VEDOGSM installed and congured).
• Send notification to App:
allows the control panel to send notications to the smartphone App for events generated by the device (only with IP card module Art. VEDOIP installed and congured).
• Send MMS (only for radio zone and zone):
if selected, allows the control panel to send SMSs for events generated by the active Zone.
MENU SELECTION DESCRIPTION
None
Activation of the scenario will have no effect on the area
Total
Activation of the scenario will activate the area in Total mode
P1+P2
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 1 or Partial 2
P1
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 1
P2
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 2
Deactivation
Activation of the scenario will deactivate the area in completely
Total with zero output delay
Activation of the scenario will activate the area in Total mode. The output times will not be taken into consideration.
P1+P2 with zero output delay
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 1 or Partial 2. The output times will not be
taken into consideration.
P1 with zero output delay
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 1. The output times will not be taken into
consideration.
P2 with zero output delay
Activation of the scenario will activate only the sensors belonging to the area, with the attribute Partial 1. The output times will not be taken into
consideration.
SCENARIO CUSTOMISATION
Page 90
90
• Event type: allows you to associate a main type of event to the output, e.g. an event belonging to the Area events type (see table on page 92).
• Event subtype: allows you to rene your choice by selecting a subtype of the category set as Event Type; going back to the Area events type
example, the subtype could be Zone Alarm (see table on page 92).
• Event:
corresponds to the maximum detail and allows you to specify exactly which event will allow output activation (see table on page 92). Going back to the example, the event could be Burglary, thereby making it possible to activate the output if a burglary is detected by an activated area.
• Polarity:
allows you to set the status in standby – consequently the status when activated - of the output.
• Direct:
in standby the output is not active, and is controlled only during the active status. If the output controls the coil of a relay, in standby the coil will not be powered up, and will be powered up only during the active status of the output.
Inverse:
opposite of direct. In standby the output is active, and unlike in the previous case, will not be controlled during the active status. If the output controls the coil of a relay, in standby the coil will be powered up, and power to it will be switched off during the active status of the output.
• AND/OR and selection box:
only for certain types of event is an AND/OR selection block available which, together with a selection box, allows you to organise and, if appropriate, determine the status of the output.
The OR condition is useful when you intend to group events originating from several sources in a single output: in the case of an AREAS type of event, for example, it is possible to signal the activation status of the rst three areas on one output only, by selecting, for example, the checkboxes for the rst three areas: in this case, the output would activate if at least one of the three areas was activated, and would be deactivated if all three areas were deactivated.
The AND condition is useful for providing summary information of the fact that a certain status is common, for example, to two or more areas. A practical example, similar to the previous one, could be a conrmation of activation of several areas, by selecting, for example, the checkboxes of the rst three areas: in this case, the output would activate only if all three areas were activated, and would be deactivated if any one of the three areas were deactivated.
Sometimes, instead of a selection block based on checkboxes like the one just described, a drop-down menu will be displayed: in this case the AND or the OR condition will be constructed on the basis of the options chosen from these menus.
The purpose of the outputs is to move on command, in a congurable manner, when one or more events occur. To explain the behaviour of the outputs and of the control panel logic properly, it is useful to describe what is meant by the term 'event': at logic level, an event can be dened as the condition that exists between the detection of a status and its cessation (or the cessation of its active status). By way of a simplied example, and considered in terms of zone, the 'zone open' event starts when the zone opens and ends, normally, when it is closed again.
For each output, it is possible to associate up to 4 different events (Event 1, Event 2, Event 3, Event 4), each of which can be congured by means of the parameters Event type, Event subtype, Event and Polarity.
Example:
to make an output act as a burglar alarm output, for the purpose of controlling a siren, you need to make the following selections: in the rst drop-down menu, the event type “Areas”, in the second drop-down menu, select the event subtype “OR Alarm” (to have a signal that includes multiple alarm sources), and in the third drop-down menu, select the event “General Alarm” or alternatively, “Alarm + sabotage”
 Among the active outputs, there must be at least one output configured as: event: Areas; event subtype: Fault; event: Motion sensor jamming fault;
polarity: Direct; AND/OR: OR [Reg. 31]
EVENT 1 / 2 / 3 / 4 /... / 16
• Events logic: for setting whether the control logic will be AND or OR type. In the case of AND logic, all the events have to be present
simultaneously to generate an activation of the output. For OR logic, the presence of just one of the congured events is sufcient to generate an activation of the output. The output can be regulated by a timer. Standards CEI EN 50131-1 and EN50131-3 do not allow timers to be associated with outputs used for signalling events such as Intrusion, Tamper or Robbery. If AND mode is selected, the output will be enabled only during the timeframes permitted by the activation of the timer, provided that they are prompted by the events envisaged in the conguration (see table on page 92). If OR mode is selected, the output will be active when prompted by the events envisaged in the conguration (see table on page 92) and will also be active in the timeframes
determined by the timer, regardless of the presence or otherwise of other prompts.
All active devices must have OR control logic [Reg. 29]
• AND Timer: allows you to choose one of the timers available on the control panel and associate it to AND mode. All active devices must NOT
have associated timers in AND [Reg. 27]
• OR Timer: allows you to choose one of the timers available on the control panel and associate it to OR mode. All active devices must NOT
have associated timers in OR [Reg. 28]
EVENTS ASSOCIATION (AND/OR)
Page 91
91
Semiperiod
ON Time
OFF Time
1st Cycle
2nd Cycle
occurs
active
active
ends
in standby
in standby
EVENT
BISTABLE OUTPUT
MONOSTABLE OUTPUT
end of event if associated with the Monostable output
• Output type: can be used to select output conduct by associating with Monostable or Bistable type operation. All radio sirens must be set as
monostable. [Reg. 22]
All active outputs connected to a siren must be monostable [Reg. 51]
• Monostable: this is the type of output dedicated to managing alarms correctly. It is an output to which a time setting is
assigned, and cycle repetitions if appropriate. On expiry of the time limit, the output returns to standby.
• Bistable:
this is the type of output to use for signalling anomalies. Its main characteristic is that it follows the event to which it has been associated. An anomaly output will remain active for the full duration of the anomaly, until it is rectied. Only then will the output return to standby. If the event to which the output is associated consists of the OR of several events, the output will remain activated until all the events included in the OR have returned to standby. Standard CEI EN 50131 does not allow a bistable operating mode to be associated to outputs used for commanding sirens or other alarm devices.
• Polarity (only for "NON radio" outputs):
drop-down menu, for setting the output (with reference to its status in standby) as:
• direct polarity type NO (normally open)
inverse polarity type NC (normally closed)
• Activation only with system activated:
if selected, and if the output is of the monostable type, prevents an output being activated for alarm, anomaly and sabotage events when the system is deactivated. If the radio output is of the siren type, the ag will be selected automatically. Selected [Reg. 30]
• Oscillation semiperiod (only for "NON radio" outputs):
numerical box in steps of 200ms, for setting the time of the oscillation semiperiod, which can be set from 0 to a maximum of 1.4 seconds. Allows you to modulate the status of the output, to allow it, for example, to control optical signalling devices intermittently (e.g. LEDs that can ash).
• Confirmations oscillation period (only for radio outputs):
for future uses.
• Alarm oscillation period (only for radio outputs):
for future uses.
• Monostable times:
the following controls are available only if the behaviour selected for the output is Monostable.
• ON time (seconds):
allows you to establish the output activation time, in an operation cycle. Within this time, the output can be stably controlled (if the oscillation period is set to zero) or oscillating with modulation dependent upon the set oscillation period time. (only for "NON radio" outputs is the ON timescale possible between minutes/seconds).
• OFF time (seconds):
allows you to establish the output deactivation time, in an operation cycle.
• Repetition cycles:
allows you to set how many repetitions of the ON Times + OFF Times cycle will be generated within the output control cycle.
• Unlimited:
if selected, there is no time limit on the output, so the only way to stop an alarm is with a device, for example a keypad or an RFID key.
BEHAVIOUR
Page 92
92
EVENT TYPE: APP
EVENT SUBTYPE EVENT
App Events
• Wrong code
• Code accepted
• App locked
Event 1 key
Event 2 key
EVENT TYPE: AREAS
EVENT SUBTYPE EVENT
Zone alarm
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
General
Inactivity
Not ready for activation
• Login
• Zone test
Zones Exclusion
• Not ready
• Not ready L2 forced
• Not ready L3 forced
• Chime
Event 1 key
Event 2 key
• User logged in
• L2 forced ON
• L3 forced ON
• Negligence
• Alarm log
• Reset alarms
• Stop Alarms
• Stop telephone calls
Timed activation error
Fault
Zone fault
Siren fault
Radio control fault
Bus power supply unit fuses fault
Bus power supply unit battery fault
Radio output battery fault
Bus siren battery fault
Bus mains power fault
Radio zone battery fault
Radio control battery fault
Voltage low - peripheral input from bus
Voltage low - peripheral output from bus
Radio zones monitoring fault
Radio outputs monitoring fault
Output fault
Camera fault
No GSM/GPRS coverage
• No telephone line
Failed communication fault
Robbery zone fault
Failed activation fault
IP Expansion fault on bus
Motion sensor jamming fault
8 I/O expansion fault
Keypad fault
RFID reader fault
Safetouch fault
Touch device fault
Power supply unit / isolator fault
Radio concentrator fault
Siren bus fault
Alarm communication device fault
Expansion on IP fault
IP video expansion fault
Activation/Deactivation
Total activated
P1 activated
P2 activated
Effective activation
Deactivated
P1 and P2 activated
OR alarm
• Zone alarm
Zone alarm and zones sabotage
• Sabotage
• Zones sabotage
Bus expansion tamper
• General alarm
Fault
Expansion bus
Sabotage
• Zones sabotage
• Siren sabotage
Radio device interference
• App sabotage
8 I/O expansion sabotage
• Keypad sabotage
• RFID reader sabotage
Safetouch sabotage
Touch device sabotage
Power supply unit / isolator sabotage
• Radio concentrator sabotage
Siren from bus sabotage
Communicator device sabotage
Expansion on IP sabotage
IP video expansion sabotage
Activation times
Input and output time
Output time
Last output time
Input 1 time
Input 2 time
• Pre-alarm time
• Pre-alert time
EVENT TYPE: BRIDGE
EVENT SUBTYPE EVENT
Bridge events
• Wrong code
• Code accepted
• Bridge locked
Event 1 key
Event 2 key
EVENT TYPE: REMOTE CONTROL
EVENT SUBTYPE EVENT
Remote management
events
• Key error
• User recognised
• Lock web
• Lock PC
• Lock SMS
Lock voice
Home autom. lock
EVENT TYPE: TOUCH DEVICE
EVENT SUBTYPE EVENT
Touch device events
• False key
• Valid key
• Lock keypad
Event 1 key pressed
Event 2 key pressed
EVENT TYPE: GROUPS
EVENT SUBTYPE EVENT
AND / OR
for this event type only an AND / OR choice is made available, along with a menu from which to choose the eight congurable groups of events made available by
the control panel.
If you set AND, all the events in the group will have to occur for the output activation condition to be met. If you set OR, only one event in the group need occur to meet the condition of activation of the event.
EVENT TYPE: RFID READER
EVENT SUBTYPE EVENT
RFID reader events
• False key
• Key not recognised
• Lock reader
The set of tables below (one for each available event type and applicable to each of the four available event sections) shows the possible choices.
Page 93
93
EVENT TYPE: RADIO CONTROL
EVENT SUBTYPE EVENT
Radio control events
Event 1 key pressed
Event 2 key pressed
EVENT TYPE: SAFETOUCH
EVENT SUBTYPE EVENT
Safetouch events
• False key
• Valid key
• Lock keypad
Event 1 key pressed
Event 2 key pressed
EVENT TYPE: SCAN
EVENT SUBTYPE EVENT
Zone alarm
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
General
Inactivity
Not ready for activation
• Login
• Zone test
Zones Exclusion
• Not ready
• Not ready L2 forced
• Not ready L3 forced
• Chime
Event 1 key
Event 2 key
• User logged in
• L2 forced ON
• L3 forced ON
• Negligence
• Alarm log
• Reset alarms
• Stop Alarms
• Stop telephone calls
Timed activation error
• Technical programming
Control panel in service
• Reset system alarms
• Stop system alarms
• Stop system telephone calls
• Change date/time
• Change site data
• Test battery
• Voice call failed
Outgoing phone communication
Digital communicator periodic test
Digital communicator manual test
• SMS sent
• EMAIL sent
• MMS sent
Incoming phone communication
Activation lock cause
• Voice call made
Digital communication failed
Digital communication sent
Communicator parameters changed
Updating rmware
• Send email failed
Fault
Zone fault
Siren fuses from bus fault
Radio control fault
Bus power supply unit fuses fault
Bus power supply unit battery fault
Radio output battery fault
Bus siren battery fault
Bus mains power fault
Radio zone battery fault
Radio control battery fault
Voltage low - peripheral input from bus
Voltage low - peripheral output from bus
Radio zones monitoring fault
Radio sirens monitoring fault
Output fault
Camera fault
No GSM/GPRS coverage
• No telephone line
Failed communication fault
Robbery zone fault
Failed activation fault
IP Expansion fault on bus
Motion sensor jamming fault
8 I/O expansion fault
Keypad fault
RFID reader fault
Safetouch fault
Touch device fault
Power supply unit / isolator fault
Radio concentrator fault
Siren fault
Communicator device fault
Expansion on IP fault
IP video expansion fault
Control panel battery fault
Control panel power supply network fault
PSTN fault
GSM expansion fault
IP expansion fault
Audio expansion fault
Speak/listen expansion fault
Domotics expansion fault
Control panel aux line fuses fault
Control panel bus line fuses fault
Control panel siren line fuses fault
Control panel voltage low
Control panel bus fault
Telephone line fault
GSM network fault
GPRS network fault
• Date lost
Activation/Deactivation
Total activated
P1 activated
P2 activated
Effective activation
Deactivated
P1 and P2 activated
OR alarm
• Zone alarm
Zone alarm and zones sabotage
• Sabotage
• Zones sabotage
Bus expansion tamper
• General alarm
Fault
Expansion bus
Sabotage
• Zones sabotage
• Siren sabotage
Radio device interference
• App sabotage
8 I/O expansion sabotage
• Keypad sabotage
• RFID reader sabotage
Safetouch sabotage
Touch device sabotage
Power supply unit / isolator sabotage
• Radio concentrator sabotage
Siren from bus sabotage
Communicator device sabotage
Expansion on IP sabotage
IP video expansion sabotage
• Remote connections sabotage
GSM module jamming
• False code
Activation times
Input and output time
Output time
Last output time
Input 1 time
Input 2 time
• Pre-alarm time
• Pre-alert time
EVENT TYPE: KEYPAD
EVENT SUBTYPE EVENT
Keypad events
• False key
• Valid key
• Lock keypad
Event 1 key pressed
Event 2 key pressed
EVENT TYPE: TIMER
EVENT SUBTYPE EVENT
Timer events
• Timer ON
EVENT TYPE: OUTPUT
EVENT SUBTYPE EVENT
Output events
Output ON
EVENT TYPE: USER
EVENT SUBTYPE EVENT
User events
• User recognised
Extraordinary request
EVENT TYPE: ZONE
EVENT SUBTYPE EVENT
Zone events
• Zone follows
• Zone alarm
Fault/anomaly
• Sabotage
Status
Zone activated
• Chime
Excluded*
* The excluded zone event that can be linked with an output and/or a group of events is activated in the case of Exclusion, Isolation or Restriction of a zone
Page 94
94
ZONE TYPE / SUBTYPE
ZONE TYPE: ALARMS
ZONE TYPE: COMMAND
ZONE TYPE: SABOTAGE
ZONE TYPE: FAULT
SUBTYPE EVENTS GENERATED
Burglar
• 24H
• Zone alarm
System/area alarm, zone alarm, 24H
OR Area/System alarm: zone alarm, zone alarm + zone sabotage, general alarm
• Fire
• Panic
• If silent:
Zone alarm, panic area/system alarm. Does not generate OR type alarms
• If not silent, acts as 24H
• Robbery Zone alarm, robbery area/system alarm. Does not generate OR type alarms
• Flooding
• Gas
• Medical Zone alarm, medical emergency area/system alarm. Does not generate OR type alarms
Selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the eld below (subtype)
will show a series of possible choices, depending on the type of selection made.
SUBTYPE
Zone fault
Siren fault
Radio control fault
Bus power supply unit fuses fault
Bus power supply unit battery fault
Radio output battery fault
Bus siren battery fault
Bus mains power fault
Radio zone battery fault
Radio control battery fault
Voltage low - peripheral input from bus
Voltage low - peripheral output from bus
Radio zones monitoring fault
Radio outputs monitoring fault
Output fault
Camera fault
No GSM/GPRS coverage
• No telephone line
Failed communication fault
Robbery zone fault
Failed activation fault
IP Expansion fault from bus
Motion sensor jamming fault
8IO expansion fault
Keypad fault
RFID fault
Safetouch fault
Touch device fault
Power supply unit / isolator fault
Radio concentrator fault from bus
Siren bus fault
Alarm communication device fault
Expansion on IP fault
Video expansion on IP fault
SUBTYPE
• Zones sabotage
• Siren sabotage
Radio device interference
• App sabotage
8I/O expansion sabotage
• Keypad sabotage
• RFID reader sabotage
Safetouch sabotage
Touch device sabotage
Power supply unit / isolator sabotage
• Radio concentrator sabotage
Siren from bus sabotage
Communicator device sabotage
Expansion on IP sabotage
IP video expansion sabotage
SUBTYPE
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
Page 95
95
REACTION TYPE
This section is enabled only for Burglary type zones. For all other types of zone, this zone is made inaccessible. The reaction of a zone, in the event of violation, derives from the fact that the following conditions must be met:
• Instant:
if this option is selected, when the zone is violated, not excluded, not in test and the areas to which it belongs are Activated, it immediately generates the events (specied using the Alarm type menu): Zone alarm, Area alarm. The testing and instant burglar
zones do not generate failed activation faults and do not end the output times.
• Delayed input 1:
if this option is selected, when the zone is violated, not excluded, not in test and the areas to which it belongs are Activated, it starts the longer Input time 1 for the Activated Areas to which it belongs. During the input time, the enabled keypads will emit an alert sound. If at the end of Input time 1 the areas to which the zone belongs have still not been deactivated, or the zone is violated when Input time 1 has elapsed, the events are generated (as for an Instant type zone). Suggestion: if the
layout necessitates walking through the protected spaces to deactivate the alarm system areas, the first zone to be violated should be of Delayed input type.
• Delayed input 2:
as above, but with reference to area timer Input 2.
• Input path:
If this option is selected, when the zone is violated, not excluded, not in test, the areas to which it belongs are Activated and there is no input time in progress, it generates an alarm. During the input time, the enabled keypads will emit an alert sound. If at the end of Input time the areas to which the zone belongs have still not been deactivated, or the zone is violated when Input time has elapsed, the events are generated (as for an Instant type zone). The violation of an Input path zone during the Input time for its Area does not generate any event. Suggestion: the zones to be passed through to reach the point at which it is possible to deactivate the
areas to which the zones belong should be configured as an input path.
• Delayed in output:
if this option is selected, violation of the zone during an Output time does not cause any event to be generated. If the zone is violated in the absence of an Output time, it behaves as zone programming, reaction type: Instant or Delayed. Suggestion:
the zones that need to be passed through after activation to exit the premises protected by the control panel should be configured as Delayed in output.
• Last output:
During the Output time, the enabled control devices will beep. If the zone is violated and the output time is not yet ended, the Last Output Time Timer replaces the value remaining for the Area Output Time. If the zone is violated when the Output time has elapsed and the Areas to which the zone belongs are Activated, it behaves like zone programming, reaction type: Instant or Delayed.
Suggestion: the last zone that needs to be passed through after activation to exit the premises protected by the control panel should be configured as last output.
√ must not be under testing √ must not be excluded √ the areas on which it depends for operation must be activated (only for burglary zones) √ must not have reached the maximum number of alarm cycles if a limited number of cycles has been set.
Page 96
96
ATTRIBUTES
• Excluded:
the zone with this attribute will be excluded, it will not generate the Zone alarm event. Anomaly and sabotage conditions will be indicated.
• Cannot Exclude:
the zones with this attribute cannot be forced if they are not ready for activation during the system activation process (alarm, sabotage, fault).
• Chime:
the zone with this attribute, generates a chime event if the area to which it belongs is Deactivated. The enabled control devices will beep, otherwise (Area Activated) it will behave as specied via the Reaction type parameter.
• Test:
the zone with this attribute, is operational with all effects, however it does not cause the alarm event but records the event in the EVENTS LOG. This attribute allows monitoring of a zone without causing alarm signals. The testing and instant burglar zones do not generate failed activation faults and do not end the output times.
• Auto excludable:
the zone with this attribute will be excluded automatically if violated during activation of the Area to which it belongs. The next time the Area to which the zone belongs is deactivated, the zone will be activated automatically. The Auto-excludable attribute also affects zones with Reaction type: Output Time. The zone will be automatically excluded when Output Time for the area to which
it belongs has elapsed. NOT selected [Reg. 38]
• Auto excludable with reset: the zone with this attribute will be excluded automatically if violated during activation of the Area to which it belongs. The
zone will be activated automatically when it reverts to standby, behaving as specied via the Reaction type parameter. The Auto-excludable attribute also affects zones with Reaction type: Output Time. The zone will be automatically excluded when Output Time for the area to which it belongs has elapsed. NOT selected [Reg. 39]
• Output delay with termination: the zone with this attribute, if violated during Output Time for the area to which it belongs, causes the area Output
Time to be terminated, when the area reverts to standby and is ready for activation.
• Partial 1:
the zone with this attribute is activated if the areas to which it belongs are activated in Partial 1, Partial 1+2 and in Total.
• Partial 2:
the zone with this attribute is activated if the areas to which it belongs are activated in Partial 2, Partial 1+2 and in Total.
• Delayed on partial activation Enable output delay on partial activation: if this option is selected, the zone will be activated following the output delay also for partial
activations (P1, P2, P1+P2).
• Delayed and assess ready activation:
if this option is selected, if the zone is violated at the moment of activation, forced activation of the system will be requested. In this condition the system will be forced and the zone will be active and will behave as specied via the Reaction type parameter.
• Display during input/output:
if this option is selected, the open zone will be displayed also during the input/output time.
• Alarm verified:
if selected and it is a burglary type zone, the veried alarm is generated immediately without having conrmation from another zone.
COMMAND TYPE
This section is for setting the type of command (or commands) that can be generated by the zone.
• Pulse Act/Deact:
if selected, violation of the zone inverts the activation or deactivation status of the areas to which it is associated. The return of the zone to standby status will have no effect.
• Bistable Act/Deact:
if selected, violation of the zone activates the areas to which it is associated. The return to standby status deactivates them.
• Activation only:
if selected, violation of the zone activates the areas to which it is associated. The return of the zone to standby status will have
no effect.
• Deactivation only:
if selected, violation of the zone deactivates the areas to which it is associated. The return of the zone to standby status will have no effect.
• Reset Area:
if selected, violation of the zone resets the areas associated with the zone to activation conditions.
• Reset system:
if selected, violation of the zone resets the system alarms.
• Cancel telephone calls:
if selected, violation of the zone blocks all outgoing phone calls.
• Extended not ready for activation:
if selected, violation of the zone prevents activation of the associated areas.
• Extended ready for activation:
if selected, violation of the zone permits activation of the associated areas.
Page 97
97
ZONES EVENTS MANAGED
• Command
Zone exclusion
• Zone isolation
zone restriction
Areas/System EVENTS MANAGED
Activations Tab
Total activation
Partial activation 1
Partial activation 2
Effective activation
Deactivation
Partial activation 1 and 2
Zones alarm tab
Burglar
• 24H
• Fire
• Panic
• Robbery
• Flooding
• Gas
• Medical
Sabotage Tab
• Zones sabotage
• Sirens sabotage
Radio concentrator jamming
• App sabotage
8 In Out expansion sabotage
• Keypad sabotage
• RFID sabotage
Safetouch sabotage
Touch device sabotage
Power supply units and isolators sabotage
• Radio concentrator sabotage
Siren from bus sabotage
Telephone devices sabotage
IP expansion sabotage
IP device (camera) sabotage
Remote communications sabotage
GSM module jamming
Code not valid
Faults Tab
Zone fault
Siren fault
Radio control fault
Bus power supply fuses fault
Bus power supply battery
Radio output battery
• Siren battery
Bus power supply network
Radio zone battery
• Radio control battery
Input voltage level to peripheral from bus low
Output voltage level from peripheral from bus low
Radio zones monitoring
• Radio sirens monitoring
Output fault
Camera fault
No GSM/GPRS coverage
• No telephone line
Failed communication fault
Robbery zone fault
Failed activation fault
IP Expansion fault from bus
Motion sensor jamming
8 In Out expansion fault
Keypad fault
RFID fault
Safetouch fault
Touch device fault
Power supply units or isolators fault
Radio concentrator fault from bus
Siren fault from bus
Telephone devices fault
IP expansion fault
IP device (camera) fault
• Control panel battery anomaly
Control panel power supply network anomaly
PSTN fault
GSM fault
IP card fault
Audio card fault
Intercom card fault
Domotics fault
Control panel aux line fuses fault
Control panel bus line fuse fault
Control panel siren line fuses fault
Control panel voltage low
Control panel bus fault
Telephone line fault
• GSM network anomaly
• GPRS network anomaly
• Date lost
Generic tabs
Inactivity
Not ready for activation
• User logged
• L2 forced ON
• L3 forced ON
• Negligence
• Alarm log
• Reset alarms
• Stop alarms
• Stop telephone calls
Timed activation error
• System alarm memory
• Technical programming
Control panel in service
• Reset system alarms
• Stop system telephone calls
• Change date time
• Change site data
Automatic system reset
• Voice call failed
Outgoing phone communication
Digital communicator periodic event
Digital communicator manual test
• SMS sent
• EMAIL sent
• MMS sent
Incoming phone communication
Activation lock cause
• Voice call made
Digital communication failed
Digital communication sent
Communicator parameters changed
Updating rmware
• Send email failed
KEYPAD EVENTS MANAGED
• Wrong code
• Code accepted
• Lock keypad
Event 1 key
Event 2 key
RFID EVENTS MANAGED
Key not valid
• Key accepted
• Lock RFID reader
REMOTE
CONNECTIONS
EVENTS MANAGED
• Wrong Login
• Logged in
• Lock web
• Lock PC
• Lock SMS commands
Lock Voice Menu
Home autom. lock
TIMER EVENTS MANAGED
• Timer On Off
OUTPUTS EVENTS MANAGED
Activate mono-stable output
Activate output manually
The group of tables below provides a list of the events associated with each tab:
TAB FOR SELECTING DETAILS OF EVENTS TO SIGNAL
Page 98
98
Start date
ID
1
2
3
4
5
Start month Start year Start day End date End month End year End day Timer type Activation type
25 December 2012 * 6 January 2013 * Activation Holiday
ACTIONS EVENTS MANAGED
Activations Tab
Activation Deactivation action
Alarms tab
Burglar alarm action
• 24H alarm action
• Fire alarm action
• Panic alarm action
• Robbery alarm action
• Flood alarm action
• Gas alarm action
• Medical Emergency alarm action
Commands tab
Event 1 key command
Event 2 key command
Extraordinary command
• Stop Alarms command
• Reset alarms command
• Reset Telephone Calls command
• Reset Control panel command
Request support
Request installer authorisation
Request code
Request key
Request login upgrade
Request manufacturer authorisation
Outputs tab
Output activation action
Output deactivation action
Output toggle action
Zones tab
Zone exclusion action
Zone inclusion action
• Zone isolation action
Zone activation action
SAFETOUCH EVENTS MANAGED
• Wrong code
• Code accepted
Lock Safetouch
Event 1 key
Event 2 key
TOUCH/APP/
BRIDGE DEVICES
EVENTS MANAGED
• Wrong code
• Code accepted
Lock Safetouch / Planux / App / Bridge
Event 1 key
Event 2 key
CHANGE CODES EVENTS MANAGED
• Code added
Code removed
• Code changed
• Key added
Key removed
• Key changed
RESET
DATABASE
EVENTS MANAGED
• Reset database
PANEL FOR PERIODS/CALENDAR MANAGEMENT SECTION
This is the section for setting periods of activity, their duration and their association to a specic timer. You can set up to thirty different periods/ calendars, although the gure shows a smaller number for the sake of convenience.
Numerical box; uniquely identies the specic timer.
Checkbox; when selected, enables operation of the selected timer.
Drop-down menu for selecting the start/end month of the interval. If it is not important or not convenient to assign a date, month and/or year, select asterisk (*) from the menu.
Drop-down menu for selecting the type of timer that will be active during the interval, from those available in the drop-down menu. You can choose any one of the eight timer types congured. Also see Description (timer type).
Drop-down menu, select the operating mode assigned to the timer. You can choose any one of the eight types of timer activation congured.
ID
ENABLE
START DATE / START MONTH / START YEAR / START DAY OF WEEK / END DATE / END MONTH / END YEAR / END DAY OF WEEK
TIMER TYPE (SELECTION)
ACTIVATION TYPE
CAUTION:
If the month is specified, it is also necessary to specify the day. If the year is specified, it is necessary to specify both the month and the day.
CAUTION:
Priority of periods/calendar timers: In the event of conict between two or more timers, the least used timer will take priority over the
others and therefore be used. For example, imagine that you have two timers in conict, one of which is active every day and the other of which is active only one day a week. The timer that is active only one day a week will take priority because it is the less used of the two.
Page 99
99
Page 100
2nd edition 02/2017
code 2G40001438
www.comelitgroup.com
Via Don Arrigoni, 5 - 24020 Rovetta (BG) - Italy
CERTIFIED MANAGEMENT SYSTEMS
Loading...