Dsc PC 4010 User Manual

WARNING: This manual contains information on limitations
regarding product use and function and information on the
limitations as to liability of the manufacturer. The entire
manual should be carefully read.
FCC COMPLIANCE STATEMENT
CAUTION: Changes or modifications not expressly approved by Digital Security Controls Ltd. could void your authority to use this equipment.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Re-orient the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/television technician for help. The user may find the following booklet prepared by the FCC useful: “How to Identify and Resolve Radio/Television
Interference Problems”. This booklet is available from the U.S. Government Printing Office, Washington D.C. 20402, Stock # 004-000-00345-4.
IMPORTANT INFORMATION
This equipment complies with Part 68 of the FCC Rules. On the side of this equipment is a label that contains, among other information, the FCC registration number of this equipment.
NOTIFICATION TO TELEPHONE COMPANY The customer shall notify the telephone company of the particular line to which the connection will be made, and provide the FCC registration number and the ringer equivalence of the protective circuit.
FCC Registration Number: F53CAN-30678-AL-E Ringer Equivalence Number: 0.1B USOC Jack: RJ-31X
TELEPHONE CONNECTION REQUIREMENTS Except for the telephone company provided ringers, all connections to the telephone network shall be made through standard plugs and telephone company provided jacks, or equivalent, in such a manner as to allow for easy, immediate disconnection of the terminal equipment. Standard jacks shall be so arranged that, if the plug connected thereto is withdrawn, no interference to the operation of the equipment at the customer’s premises which remains connected to the telephone network shall occur by reason of such withdrawal.
INCIDENCE OF HARM Should terminal equipment or protective circuitry cause harm to the telephone network, the telephone company shall, where practicable, notify the customer that temporary disconnection of service may be required; however, where prior notice is not practicable, the telephone company may temporarily discontinue service if such action is deemed reasonable in the circumstances. In the case of such temporary discontinuance, the telephone company shall promptly notify the customer and will be given the opportunity to correct the situation.
ADDITIONAL TELEPHONE COMPANY INFORMATION The security control panel must be properly connected to the telephone line with a USOC RJ-31X telephone jack.
The FCC prohibits customer-provided terminal equipment be connected to party lines or to be used in conjunction with coin telephone service. Interconnect rules may vary from state to state.
CHANGES IN TELEPHONE COMPANY EQUIPMENT OR FACILITIES The telephone company may make changes in its communications facilities, equipment, operations or procedures, where such actions are reasonably required and proper in its business. Should any such changes render the customer’s terminal equipment incompatible with the telephone company facilities the customer shall be given adequate notice to the effect modifications to maintain uninterrupted service.
RINGER EQUIVALENCE NUMBER (REN) The REN is useful to determine the quantity of devices that you may connect to your telephone line and still have all of those devices ring when your telephone number is called. In most, but not all areas, the sum of the RENs of all devices connected to one line should not exceed five (5.0). To be certain of the number of devices that you may connect to your line, you may want to contact your local telephone company.
EQUIPMENT MAINTENANCE FACILITY If you experience trouble with this telephone equipment, please contact the facility indicated below for information on obtaining service or repairs. The telephone company may ask that you disconnect this equipment from the network until the problem has been corrected or until you are sure that the equipment is not malfunctioning. Digital Security Controls Ltd. 160 Washburn St., Lockport, NY 14094
Table of Contents
Introduction 2 Section 1: General System Operation 3
1.1 Getting to Know Your System........................................................ 3
1.2 How to Arm ...................................................................................... 4
1.3 Alternate Arming Methods ............................................................ 5
1.4 Disarming .......................................................................................... 6
1.5 Alarm Memory ................................................................................. 6
1.6 If An Alarm Sounds ......................................................................... 7
1.7 Zone Bypassing ................................................................................ 7
1.8 Trouble Conditions .......................................................................... 8
Section 2: Access Codes 9
2.1 Program A New Access Code ........................................................ 9
2.2 Modify an Existing Code ............................................................... 11
2.3 Change User Code Options.......................................................... 12
2.4 Access Code Label Options .......................................................... 12
2.5 Delete an Existing Code ................................................................ 14
2.6 Special Codes ................................................................................. 14
2.7 Installer Programmed Codes ........................................................ 15
Section 3: System Administration 16
3.1 Quick Arm ...................................................................................... 16
3.2 Quick Exit ........................................................................................ 16
3.3 Auto Arm Control .......................................................................... 16
3.4 Setting the Time and Date ............................................................ 18
3.5 Activating Door Chime ................................................................. 18
3.6 View Event Buffer .......................................................................... 18
3.7 [*][7] Command Outputs 1-8 ........................................................ 19
3.8 Keypad Control .............................................................................. 19
3.9 Downloading Options ................................................................... 19
Section 4: Access Control 21
4.1 Access Card Readers ..................................................................... 21
4.2 Access Card Programming ........................................................... 22
4.3 Search Using Access Card Numbers ........................................... 24
Section 5: Testing and Maintenance 25
5.1 Walk Test ......................................................................................... 25
5.2 System Test ..................................................................................... 26
5.3 Lamp Test (PC4216) ....................................................................... 26
5.4 System Maintenance ..................................................................... 26
Section 6: Fire Safety 27
6.1 Fire Alarm Operation .................................................................... 27
6.2 Guidelines for Locating Smoke Detectors .................................. 27
6.3 Household Fire Safety Audit ........................................................ 29
6.4 Fire Escape Planning ..................................................................... 29
Appendix A – Special Characters 31
1

Introduction

About Your Security System
Your DSC security equipment has been designed to give you the greatest possible flexibility and convenience. The LCD keypad will guide you through each operation with English language prompts. The keypad provides audible feedback each time a key is pressed; with unique audible sequences, it will also signal system troubles and other indications of system status.
Read this manual carefully and have your installer instruct you on your system’s operation. Become familiar with the features that have been implemented on your system. All users of this system should be equally instructed in its use.
About this Manual
This manual is a thorough explanation of all system functions, including troubleshooting and programming access codes in addition to performing basic system functions. Most users of the system will not need to know all of this information. The first section of this manual, titled “General System Operation,” explains general system concepts and instructs the user on how to arm and disarm the system and bypass zones. Photocopy this section and distribute it to general users of the system. The remaining sections of the manual are reserved for more detailed system information.
Fire Detection
This equipment is capable of monitoring fire detection devices such as smoke detectors and providing a warning alarm if a fire condition is detected. Good fire detection depends on having adequate numbers of fire detectors placed in appropriate locations. This equipment should be installed in accordance with NFPA 72 (NFPA, 1 Batterymarch Park, Quincey MA 02269). Carefully review the “Fire Escape Planning” guidelines in this manual.
NOTE: Your installer must enable the fire detection portion of this equipment before it will work.
Monitoring
This system is capable of transmitting alarms, troubles, and emergency information over telephone lines to a monitoring station. If you inadvertently initiate an alarm, immediately call the monitoring station to prevent an unnecessary response.
NOTE: Your installer must enable the monitoring function before it will work.
2
Section 1: General System
Operation

1.1 Getting to Know Your System

Your security system is made up of a control panel, one or more keypads and various detectors and sensors. The control panel will be mounted out of the way in a utility room or basement. The metal control cabinet contains the system’s electronics and stand-by battery. There is normally no reason for anyone except an installer or service person to have access to the control panel.
The keypads each have an audible indicator, an alphanumeric liquid crystal display (LCD), status lights and command entry keys. The keypad is used to send commands to the system and to display the current system status. Each keypad will be mounted in convenient locations inside the protected premises, near designated points of entry/exit.
Zones and Partitions
The protected premises has been divided by your installer into zones and partitions. A zone is an area of protection that has one or more detection sensors connected to it (motion detectors, glassbreak detectors, door contacts or shock sensors). A single zone might be a room, a hallway or a door or window. Two or more of these zones will be linked together by the control panel to form a partition.
A partition is a region of the protected premises. A partition can be armed and disarmed independently from other partitions. All of the partitions together form the entire system.
Some zones will belong to more than one partition, such as points of entry/ exit and hallways. These are called global zones because they are not assigned to a single partition.
Access Codes
As a user of the system, you will be assigned a 4- or 6-digit access code. Access codes are used to arm and disarm the partition(s) to which they are assigned. Some access codes can perform additional system functions, such as programming system options and bypassing zones.
Your access code may not allow you to access certain system functions.For instance, if your code is only allowed to arm and disarm Partition 1, you will not be able to arm or disarm other partitions, or the entire system.
Keypads
Several LCD keypads will be installed throughout the protected premises, usually one at each entry/exit door. Some keypads are programmed only to access a single partition. These are called partition keypads.
3
If required, the system may have a global keypad. A global keypad can access any partition. When you enter your access code at a global keypad, you will be asked which partition you would like to arm. The keypad will only offer the partitions available for your access code.
The keypad will display the message “Enter Your Access Code” when it is not in use. Sometimes, it may display the time and date. Whatever the display, entering a valid access code on an idle keypad will access the system.

1.2 How to Arm

Prepare the partition to be armed by closing all protected doors and windows. Also, cease any movement in areas covered by motion detectors.
If the time and date appears on the LCD keypad display, press the [#] key. The “Enter Code to Arm System” message should appear. If the display reads “Secure System Before Arming,” ensure that all doors and windows have been shut and that all motion has ceased.
Once the “Enter Code to Arm System” message has appeared, enter your 4- or 6-digit access code. If the access code was entered incorrectly, the keypad will beep steadily for two seconds.
For Single-Partition Access Codes
When a single-partition access code is entered, the system will select to arm the partition your code has access to. The keypad will display “Exit delay in Progress” and beep three times quickly. The system will begin counting down the exit delay, which provides a period of time for you to exit the partition without causing an alarm.
Exit the premises through the designated exit/entry door. A timer will appear in the right side of the LCD keypad display indicating the remaining time in the exit delay period. When the allowed exit time expires, the partition will be armed. The message “Enter Code to Disarm System” will appear on the keypad.
For Multi-Partition Access Codes
When a multi-partition access code is entered, you must tell the system which partition(s) you wish to arm. The system will only offer to arm the partitions for which your code is programmed. Once you have entered your code, the display will read:
(0) TO ARM < > (Partition Label) R
The lower right hand corner of the display will show the partition status using the letter “R” for the partitions which are Ready to be armed, “A” for the partitions which are already Armed and “N” for those partitions which are not yet secured. To arm the partition indicated on the display, press the number in parentheses (in this case, [0]) or press the [*] key. The system will begin counting down the exit delay, which provides a period of time for you to exit the partition without causing an alarm. Once the exit delay has expired, the partition will be armed.
4
Section 1: General System Operation
If you wish to arm another partition, use the arrow (< >) keys to scroll though the partitions available to be armed by your access code. To select a partition, enter the number indicated in parentheses, or press the [*] key. If you have selected another partition, the keypad will display the following message:
Select (0) < > Arm Partition R
To arm the partition, enter the number indicated in parentheses, or press the [*] key. The exit delay will begin in the other partition and the keypad will read:
Exit Delay In Progress
This display will remain for a few seconds until the keypad returns to the previous “(0) To Arm…” display.

1.3 Alternate Arming Methods

Away Arming
Arming the system in the Away mode will have all interior zones and perimeter zones active. If motion is detected in the interior zones, or if one of the perimeter zones is violated, the alarm sequence will begin. To arm in the Away mode, enter your access code, select the partition(s) to be armed and exit the premises through a designated exit/entry door. The system will recognize that you have left the premises. Once the exit delay expires, the system will be armed in the Away mode.
Stay Arming
This feature, if enabled, will allow you to arm the perimeter zones while leaving some interior zones inactive so that you can remain on the premises while the system is armed. When you enter your access code to arm the system and do not exit the premises through a designated exit/ entry door, the system will arm in the Stay mode, automatically bypassing the interior zones.
The interior zones can be reactivated at any time by entering [*][1] at any keypad. If you reactivate the interior zones, be sure to only inhabit areas not covered by motion detectors. To access areas protected by motion sensors, you must enter your security code to disarm the system.
Arming Without Entry Delay
The entry delay is the period during which someone may enter an armed area without causing an alarm, providing time to get to a keypad to disarm the system. If you wish to arm your system without the entry delay, enter [*][9] then your access code. The Armed light will flash as a reminder that the system is armed and has no entry delay. The system will bypass the interior zones. An entry through any exit/entry door will create an instant alarm.
5
Quick Arm
When the Quick Arm feature is enabled, the system may be armed by simply pressing [*][0] instead of your access code. Please note that pressing [*][0] will only allow you to arm the system; to disarm, you must enter a valid access code. Your system administrator will inform you if the Quick Arm feature has been enabled on your system.

1.4 Disarming

Enter the premises through a designated exit/entry door. Entering the premises through any door not designated as a point of entry will cause an immediate alarm. As soon as the exit/entry door is opened, the keypad sounder will beep and the entry delay will begin. The entry delay provides a window of up to 255 seconds to disarm the system.
Go to the keypad and enter your access code. If an error is made entering the code, press the [#] key and enter the code again. The Armed light will turn off and the keypad buzzer will stop. A valid access code must be entered before the entry delay time expires.
If an alarm occurred while the panel was armed, the “View Memory” message will be on the display with the zone name for the zone that caused the alarm. The display will keep those messages on for two minutes or until the [#] key is pressed. The keypad will then return to it’s idle state.
Disarming Another Partition
If you have a multi-partition access code, you can disarm other partitions before entering them. To disarm another partition, enter your access code. The keypad display will read:
(0) TO ARM < > (Partition Label) R
Use the arrow (< >) keys to scroll to the partition you wish to disarm. Remember that only partitions to which your access code is assigned will be displayed. If the partition you have selected is armed, the letter “A” will appear on the bottom right-hand corner of the display, as in the following example:
(2) TO SELECT < > (Partition Label) A
To disarm the partition, press the number in parentheses (in this case, [2]) or press the [*] key.

1.5 Alarm Memory

To view alarms that occurred while the system was armed, press [*] then [3]. Alarms caused during the last armed period will be displayed. Press [#] when you have finished viewing alarms to exit the alarm memory mode.
NOTE: Tamper alarms will not be shown in alarm memory display.
6
Section 1: General System Operation

1.6 If An Alarm Sounds

Fire Alarm
If your system has been installed with fire detectors, a fire alarm will be indicated by a pulsing siren. If you hear a fire alarm, follow your emergency evacuation plan immediately (see Section 6.5 “Fire Escape Planning”).
Intrusion Alarm
An intrusion alarm will be indicated by a continuous bell or siren. An intrusion alarm may be silenced by entering a valid access code. If the alarm was unintentional, call local authorities immediately to avoid an unnecessary response.
You can determine the source of the alarm by entering the alarm memory mode. Once the source of the alarm has been corrected, the panel can be restored to its original armed state.

1.7 Zone Bypassing

You can use zone bypassing when access is needed to part of the protected area while the system is armed. Zones which are temporarily out of service due to damaged wiring or contacts may be bypassed to allow system arming until repairs can be made. Armed zones cannot be bypassed.
Bypassed zones will not cause an alarm. Zones cannot be bypassed once the system is armed. Bypassed zones are automatically canceled each time the system is disarmed and must be reapplied before the next arming.
NOTE: For security reasons, your system administrator may program the system to prevent you from bypassing certain zones.
Bypassing zones reduces your security protection. If you are bypassing a zone due to damaged wiring or contacts, please notify your system administrator or call a service technician immediately so that the problem can be resolved and your system returned to proper working order.
NOTE: Your installer may have included the ability to bypass fire zones on your system. Ask your installer for more information.
If fire zone bypassing is possible, when you bypass a fire zone the panel will indicate a fire trouble until the bypass is turned off. You cannot turn off fire zone bypasses by disarming and/or arming the system. You must turn off the bypass manually, as described below.
To bypass zones, enter [*] [1]. You may be required to enter your access code. A menu will appear outlining the various bypassing options. Use the arrow (< >) keys to scroll through each option and press the [*] key to select it, or press the corresponding number in parentheses. The bypassing options are as follows:
[0] Bypass Open Zones – This section will only display the zones which are currently open or bypassed. Use the arrow (< >) keys to scroll through these zones. Zones that are open will be indicated by an exclamation (!) mark in the lower right hand side of the keypad display. To select a zone to be bypassed, press the [*] key. A “*” will appear next to the zone label to indicate that the zone has been bypassed.
7
[1] Bypass Zones – This selection takes you immediately to bypassing zones. Use the arrow (< >) keys to find the zone to be bypassed and press the [*] key to select it. A “*” will appear next to the zone label to indicate that the zone has been bypassed.
[2] Clear Bypasses – This selection will allow you to turn bypassing off for all of the zones in your partition.
[3] Recall Bypasses – This selection will automatically bypass the same group of zones which were bypassed the last time the partition was armed.
[4] Previous Menu – This selection will return the display to “Enter Code to Arm System.” From here, you will be able to arm the system.

1.8 Trouble Conditions

The alarm control panel continuously monitors a number of possible trouble conditions. If one of these conditions occurs, the keypad Trouble light will turn on and a beeping sound will be heard every 10 seconds. Press the [#] key to silence the keypad. The Trouble light will stay on until the trouble is cleared.
To view which trouble conditions are present, enter [*] [2] at any keypad. Use the arrow (< >) keys to scroll through the list of trouble conditions:
If AC Trouble is present, the system has lost its power. This trouble may be due to a power outage and should be cleared once the power is restored. If the power on the premises is running normally and the trouble condition persists, call your installer for service.
If TLM Trouble is present, the is a problem with the telephone line. If the telephones on the premises are running normally and the trouble condition persists, call your installer for service.
Any other trouble condition will require the assistance of your installer. As soon as a trouble condition occurs, call your installer to have the problem corrected as soon as possible.
8

Section 2: Access Codes

Access codes are used to arm and disarm the system as well as to access system functions. There are many different codes available on the system.
The Grand System Master Code will be able to perform all system functions. This includes zone bypassing, activating outputs enabling user options and programming access codes. The Grand System Master Code is access code 0001. Normally, only your installer can change this code. Please ask your installer if you wish to be able to alter this code.
The following sections explain how to program new codes and modify existing codes. All access code options will also be described.

2.1 Program A New Access Code

This section describes three basic aspects to programming an access code:
• How to select a new access code for programming
• How to program the 4- or 6-digit code
• How to program the user’s name to identify the code
• How to select the partitions the code will be active on
To select a new access code for programming, perform the following steps:
1. Enter [*][5] followed by a Master Code.
2. The display will read:
Select (0) < > User No. Search
Press [0] or [*].
3. The display will read:
Sel. Code (0001) < > User 1
User 1 (Access Code 0001) is the System Master Code. Your installer may already have programmed this code. Use the right arrow (>) key to scroll to the code you wish to program (for example, access code 0002). Press [*] to select the code.
4. The display will read:
Select (0) < > Program Code
This is the Program Code menu. Use the right arrow (>) key to scroll though each display in the Program Code menu. Each display pertains to a different aspect of access code programming, including the three listed below. To select any menu item for programming, press [*].
9
Loading...
+ 25 hidden pages