DSC PC4020 User Manual

PC4020 v3.3 • Instruction Manual
WARNING: This manual contains information on limitations regarding product use and function and information on the limitations as to liability of the manufacturer. The entire manual should be carefully read.
®
FCC COMPLIANCE STATEMENT
CAUTION: Changes or modifications not expressly approved by Digital Security Controls Ltd. could void your authority to use this equipment.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Re-orient the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/television technician for help. The user may find the following booklet prepared by the FCC useful: “How to Identify and Resolve Radio/
Television Interference Problems”. This booklet is available from the U.S. Government Printing Office, Washington D.C. 20402, Stock # 004-000-00345-4.
IMPORTANT INFORMATION
This equipment complies with Part 68 of the FCC Rules. On the side of this equipment is a label that contains, among other information, the FCC registration number of this equipment.
NOTIFICATION TO TELEPHONE COMPANY The customer shall notify the telephone company of the particular line to which the connection will be made, and provide the FCC registration number and the ringer equivalence of the protective circuit.
FCC Registration Number: F53CAN-20836-AL-E Ringer Equivalence Number: 0.1B USOC Jack: RJ-31X
TELEPHONE CONNECTION REQUIREMENTS Except for the telephone company provided ringers, all connections to the telephone network shall be made through standard plugs and telephone company provided jacks, or equivalent, in such a manner as to allow for easy, immediate disconnection of the terminal equipment. Standard jacks shall be so arranged that, if the plug connected thereto is withdrawn, no interference to the operation of the equipment at the customer’s premises which remains connected to the telephone network shall occur by reason of such withdrawal.
INCIDENCE OF HARM Should terminal equipment or protective circuitry cause harm to the telephone network, the telephone company shall, where practicable, notify the customer that temporary disconnection of service may be required; however, where prior notice is not practicable, the telephone company may temporarily discontinue service if such action is deemed reasonable in the circumstances. In the case of such temporary discontinuance, the telephone company shall promptly notify the customer and will be given the opportunity to correct the situation.
ADDITIONAL TELEPHONE COMPANY INFORMATION The security control panel must be properly connected to the telephone line with a USOC RJ-31X telephone jack.
The FCC prohibits customer-provided terminal equipment be connected to party lines or to be used in conjunction with coin telephone service. Interconnect rules may vary from state to state.
CHANGES IN TELEPHONE COMPANY EQUIPMENT OR FACILITIES The telephone company may make changes in its communications facilities, equipment, operations or procedures, where such actions are reasonably required and proper in its business. Should any such changes render the customer’s terminal equipment incompatible with the telephone company facilities the customer shall be given adequate notice to the effect modifications to maintain uninterrupted service.
RINGER EQUIVALENCE NUMBER (REN) The REN is useful to determine the quantity of devices that you may connect to your telephone line and still have all of those devices ring when your telephone number is called. In most, but not all areas, the sum of the RENs of all devices connected to one line should not exceed five (5.0). To be certain of the number of devices that you may connect to your line, you may want to contact your local telephone company.
EQUIPMENT MAINTENANCE FACILITY If you experience trouble with this telephone equipment, please contact the facility indicated below for information on obtaining service or repairs. The telephone company may ask that you disconnect this equipment from the network until the problem has been corrected or until you are sure that the equipment is not malfunctioning. Digital Security Controls Ltd. 160 Washburn St., Lockport, NY 14094
Table of Contents
Introduction 3 Section 1: General System Operation 4
1.1 Getting to Know Your System ...........................................4
1.2 Arming Your System ...........................................................5
1.3 Alternate Arming Methods ................................................6
1.4 Disarming Your System ......................................................7
1.5 Alarm Memory.....................................................................8
1.6 What to Do If An Alarm Sounds .......................................8
1.7 Bypassing Zones .................................................................. 9
1.8 Viewing Trouble Conditions ............................................10
Section 2: Access Codes 11
2.1 Programming A New Access Code ................................. 11
2.2 Modifying an Existing Code ............................................13
2.3 Changing User Code Options..........................................14
2.4 Access Code Label Options .............................................. 14
2.5 Deleting an Existing Code................................................16
2.6 Special Codes......................................................................16
2.7 Installer Programmed Codes ...........................................17
Section 3: System Administration 18
3.1 Turning on Quick Arm ...................................................... 1 8
3.2 Turning on Quick Exit.......................................................18
3.3 Controlling Automatic Arming .......................................18
3.4 Setting the Time and Date ................................................19
3.5 Activating Door Chime.....................................................20
3.6 Viewing the Event Buffer..................................................20
3.7 [*][7] Command Outputs 1-8 ...........................................20
3.8 Changing Keypad Settings...............................................21
3.9 Downloading Options ......................................................21
3.10 PC-LINK Enable Option ...................................................22
3.11 Audio Options....................................................................22
3.12 Turning Background Music On or Off ........................... 22
Section 4: Access Control 23
4.1 About Access Card Readers (PC4820 Modules)............ 23
4.2 Programming Access Cards (PC4820 Modules) .......... 2 4
4.3 Searching Using Access Card Numbers
(PC4820 Modules) .............................................................26
4.4 Adding User Telephone Numbers
(PC4850 Modules) .............................................................26
4.5 Adding Tenant Codes for Users (PC4850 Modules).....27
1
Table of Contents
Section 5: Testing and Maintenance 28
5.1 Performing a Walk Test.....................................................28
5.2 Performing a System Test .................................................29
5.3 Performing a Lamp Test (PC4216) ..................................29
5.4 System Maintenance..........................................................29
Section 6: Fire Safety 30
6.1 Fire Alarm Operation ........................................................30
6.2 Guidelines for Locating Smoke Detectors......................30
6.3 Household Fire Safety Audit ........................................... 3 2
6.4 Fire Escape Planning ......................................................... 32
Appendix A – Special Characters 34
2
Introduction
About Your Security System
Your DSC security equipment has been designed to give you the greatest possible flexibility and convenience. The LCD keypad will guide you through each operation with English language prompts. The keypad provides audible feedback each time a key is pressed; with unique audible sequences, it will also signal system troubles and other indications of system status.
Read this manual carefully and have your installer instruct you on your system’s operation. Become familiar with the features that have been implemented on your system. All users of this system should be equally instructed in its use.
About this Manual
This manual is a thorough explanation of all system functions, including troubleshooting and programming access codes in addition to performing basic system functions. Most users of the system will not need to know all of this information. The first section of this manual, titled “General System Operation,” explains general system concepts and instructs the user on how to arm and disarm the system and bypass zones. Photocopy this section and distribute it to general users of the system. The remaining sections of the manual are reserved for mor e detailed system information.
Fire Detection
This equipment is capable of monitoring fire detection devices such as smoke detectors and providing a warning alarm if a fire condition is detected. Good fire detection depends on having adequate numbers of fire detectors placed in appropriate locations. This equipment should be installed in accordance with NFPA 72 (NFPA, 1 Batterymarch Park, Quincey MA 02269). Carefully review the “Fire Escape Planning” guidelines in this manual.
NOTE: Your installer must enable the fire detection portion of this equipment before it will work.
Monitoring
This system is capable of transmitting alarms, troubles, and emergency information over telephone lines to a monitoring station. If you inadvertently initiate an alarm, immediately call the monitoring station to prevent an unnecessary response.
NOTE: Your installer must enable the monitoring function before it will work.
3
Section 1: General System
Operation
1.1 Getting to Know Your System
Your security system is made up of a control panel, one or more keypads and various detectors and sensors. The control panel will be mounted out of the way in a utility room or basement. The metal control cabinet contains the system’s electronics and stand-by battery. There is normally no reason for anyone except an installer or service person to have access to the control panel.
The keypads each have an audible indicator, an alphanumeric liquid crystal display (LCD), status lights and command entry keys. The keypad is used to send commands to the system and to display the current system status. Each keypad will be mounted in convenient locations inside the protected premises, near designated points of entry/exit.
Zones and Partitions
The protected premises has been divided by your installer into zones and partitions. A zone is an area of protection that has one or more detection sensors connected to it (motion detectors, glassbreak detectors, door contacts or shock sensors). A single zone might be a room, a hallway or a door or window. Two or more of these zones will be linked together by the control panel to form a partition.
A partition is a r egion of the pr otected premises. A partition can be armed and disarmed independently from other partitions. All of the partitions together form the entire system.
Some zones will belong to more than one partition, such as points of entry/ exit and hallways. These are called assigned to a single partition.
global zones global zones
global zones because they are not
global zones global zones
Access Codes
As a user of the system, you will be assigned a 4- or 6-digit access code. Access codes are used to arm and disarm the partition(s) to which they are assigned. Some access codes can perform additional system functions, such as programming system options and bypassing zones.
Y our access code may not allow you to access certain system functions.For instance, if your code is only allowed to arm and disarm Partition 1, you will not be able to arm or disarm other partitions, or the entire system.
4
Section 1: General System Operation
Keypads
Several LCD keypads will be installed throughout the protected premises, usually one at each entry/exit door . Some keypads are pr ogrammed only to access a single partition. These are called partition keypads.
If required, the system may have a
global keypadglobal keypad
global keypad. A global keypad can
global keypadglobal keypad access any partition. When you enter your access code at a global keypad, you will be asked which partition you would like to arm. The keypad will only offer the partitions available for your access code.
The keypad will display the message “Enter Your Access Code” when it is not in use. Sometimes, it may display the time and date. Whatever the display, enter a valid access code on the keypad to access the system.
Audio Help
If your security system has an audio matrix module (PC49XX and intercom stations) and an Escort4580 connected, it can provide step-by-step audio instructions through the intercom stations. Access the help function by pressing and holding for 2 seconds the "Help" button on any system keypad. The system will prompt you over the intercom stations.
NOTE: If a user is accessing the Escort locally over the telephone line, the Help button will not work.
1.2 Arming Your System
1. Prepare the partition to be armed by closing all protected doors and windows. Also, stop any movement in areas covered by motion detectors.
2. If the time and date appears on the LCD keypad display, press the [#] key. The “Enter Code to Arm System” message should appear. If the display reads “Secure System Before Arming,” ensure that all doors and windows have been shut and that all motion has ceased.
3. When you see the “Enter Code to Arm System” message, enter your 4- or 6-digit access code. If the access code was entered incorrectly, the keypad will beep steadily for two seconds.
For Single-Partition Access Codes
When a single-partition access code is entered, the system will only arm the partition your code has access to. The “Exit delay in Progress” message will be displayed, the Armed light will turn on, and the keypad will beep three times quickly. The exit delay will begin, providing up to two minutes for you to exit the partition without causing an alarm.
Exit the premises through the designated exit/entry door. A timer will appear in the right side of the LCD keypad display indicating the remaining time in the exit delay period. When the allowed exit time expires, the partition will be armed. The message “Enter Code to Disarm System” will appear on the keypad.
5
For Multi-Partition Access Codes
When a multi-partition access code is entered, you must tell the system which partition(s) you wish to arm. The system will only offer to arm the partitions for which your code is programmed. Once you have entered your code, the display will read:
(0) TO ARM < > (Partition Label) R
The lower right hand corner of the display will show the partition status using the letter “R” for the partitions which are Ready to be armed, “A” for the partitions which are already Armed and “N” for those partitions which are not yet secured. To arm the partition indicated on the display, press the number in parentheses (in this case, [0]) or press the [ exit delay will begin, providing a period of time for you to exit the partition without causing an alarm. Once the exit delay has expired, the partition will be armed.
If you wish to arm another partition, use the arrow (< >) keys to scroll though the partitions available to be armed by your access code. To select a partition, enter the number indicated in parentheses, or press the [ key. If you have selected another partition, the keypad will display the following message:
Select (0) < > Arm Partition R
To arm the partition, enter the number indicated in parentheses, or press
] key. The exit delay will begin in the other partition and the keypad
the [
*
will read:
Exit Delay In Progress
This display will remain for a few seconds until the keypad returns to the previous “(0) To Arm…” display.
] key. The
*
]
*
1.3 Alternate Arming Methods
Away Arming
Arming the system in the Away mode will have all interior zones and perimeter zones active. If motion is detected in the interior zones, or if one of the perimeter zones is violated, the alarm sequence will begin. To arm in the Away mode, enter your access code, select the partition(s) to be armed and exit the premises through a designated exit/entry door. The system will recognize that you have left the premises. Once the exit delay expires, the system will be armed in the Away mode.
6
Section 1: General System Operation
Stay Arming
This feature, if enabled, will allow you to arm the perimeter zones while leaving some interior zones inactive so that you can remain on the premises while the system is armed. When you enter your access code to arm the
do not
system and the system will arm in the Stay mode, automatically bypassing the interior zones.
The interior zones can be reactivated at any time by entering [ keypad. If you reactivate the interior zones, be sure that you do not enter areas not protected by motion detectors. To access areas protected by motion sensors, you must enter your security code to disarm the system.
Arming Without Entry Delay
The entry delay is the period during which someone may enter an armed area without causing an alarm, providing time to get to a keypad to disarm the system. If you wish to arm your system without the entry delay, enter
][9] then your access code. The Armed light will flash as a reminder
[
*
that the system is armed and has no entry delay. The system will bypass the interior zones. An entry through any exit/entry door will create an instant alarm.
Quick Arm
When the Quick Arm feature is enabled, you can arm the system by pressing [
Please note that pressing [ disarm, you must enter a valid access code. Your system administrator will inform you if the Quick Arm featur e has been enabled on your system.
*
exit the premises through a designated exit/entry door ,
][0], instead of your access code.
][0] will only allow you to arm the system; to
*
][1] at any
*
1.4 Disarming Your System
1. Enter the premises through a designated exit/entry door. Entering the premises through any door not designated as a point of entry will cause an immediate alarm. As soon as the exit/entry door is opened, the keypad sounder will beep and the entry delay will begin. The entry delay provides up to 255 seconds to disarm the system.
2. Go to the keypad and enter your access code. when entering the code, press the [#] key and enter the code again.when entering the code, press the [#] key and enter the code again.
when entering the code, press the [#] key and enter the code again.
when entering the code, press the [#] key and enter the code again.when entering the code, press the [#] key and enter the code again. The Armed light will turn off and the keypad buzzer will stop. A valid access code must be entered before the entry delay time expires.
If an alarm occurred while the panel was armed, the “View Memory” message will be on the display with the zone name for the zone that caused the alarm. The display will keep those messages on for two minutes or until the [#] key is pressed. The keypad will then return to it’s idle state.
If you make an errorIf you make an error
If you make an error
If you make an errorIf you make an error
7
Disarming Another Partition
If you have a multi-partition access code, you can disarm other partitions before entering them. T o disarm another partition, enter your access code. The keypad display will read:
(0) TO ARM < > (Partition Label) R
Use the arrow (< >) keys to scroll to the partition you wish to disarm. Remember that only partitions to which your access code is assigned will be displayed. If the partition you have selected is armed, the letter “A” will appear on the bottom right-hand corner of the display, as in the following example:
(2) TO SELECT < > (Partition Label) A
T o disarm the partition, pr ess the number in par entheses (in this case, [2]) or press the [*] key.
1.5 Alarm Memory
To view alarms that occurred while the system was armed, press [*] then [3]. Alarms caused during the last armed period will be displayed. Press [#] when you have finished viewing alarms to exit the alarm memory mode.
NOTE: Tamper alarms will not be shown in alarm memory display.
1.6 What to Do If An Alarm Sounds
Fire Alarm
If your system has been installed with fire detectors, a fire alarm will be indicated by a pulsing siren.
If you hear a fire alarm, follow your emergency evacuation plan immediately (see Section 6.5 “Fire Escape Planning”).
Intrusion Alarm
An intrusion alarm will be indicated by a continuous bell or siren. You can silence an intrusion alarm by entering a valid access code. If the
alarm was unintentional, call local authorities immediately to avoid an unnecessary response.
Y ou can determine the sour ce of the alarm by entering the alarm memory mode. Once the source of the alarm has been corrected, the panel can be restored to its original armed state.
8
Section 1: General System Operation
1.7 Bypassing Zones
Y ou can use zone bypassing when access is needed to part of the protected area while the system is armed. Zones which are temporarily out of service due to damaged wiring or contacts may be bypassed to allow system arming until repairs can be made.
Bypassed zones will not cause an alarm. Zones cannot be bypassed once the system is armed. Bypassed zones are automatically canceled each time the system is disarmed and must be reapplied before the next arming.
NOTE: For security reasons, your system administrator may program the system to prevent you from bypassing certain zones.
Bypassing zones reduces your security protection. If you are bypassing a zone due to damaged wiring or contacts, please notify your system administrator or call a service technician immediately so that the problem can be resolved and your system returned to proper working order.
To bypass zones:
1. Enter [
2. A menu will outline the various bypassing options. Use the arrow (< >) keys to scroll through the options. When you find the correct option, press the [ number in parentheses. The bypassing options are as follows:
[0] Bypass Open Zones[0] Bypass Open Zones
[0] Bypass Open Zones – This section will only display the zones which
[0] Bypass Open Zones[0] Bypass Open Zones are currently open or bypassed. Use the arrow (< >) keys to scr oll through these zones. Zones that are open will be indicated by an exclamation (!) mark in the lower right hand side of the keypad display. To select a zone to be bypassed, press the [ to indicate that the zone has been bypassed. When you are done selecting zones, press [#] to exit.
[1] Bypass Zones[1] Bypass Zones
[1] Bypass Zones – This selection takes you immediately to bypassing
[1] Bypass Zones[1] Bypass Zones zones. Use the arrow (< >) keys to find the zone to be bypassed and press the [
*
that the zone has been bypassed. When you are done selecting zones, press [#] to exit.
[2] Clear Bypasses[2] Clear Bypasses
[2] Clear Bypasses – This selection will allow you to turn bypassing off
[2] Clear Bypasses[2] Clear Bypasses for all of the zones in your partition.
[3] Recall Bypasses[3] Recall Bypasses
[3] Recall Bypasses – This selection will automatically bypass the same
[3] Recall Bypasses[3] Recall Bypasses group of zones which were bypassed the last time the partition was armed.
[4] Pr[4] Pr
[4] Pr
[4] Pr[4] Pr to Arm System.” From here, you will be able to arm the system.
] [1]. You may be required to enter your access code.
*
] key to select it, or press the corresponding
*
] key. A “*” will appear next to the zone label
*
] key to select it. A “*” will appear next to the zone label to indicate
evious Menuevious Menu
evious Menu – This selection will return the display to “Enter Code
evious Menuevious Menu
9
1.8 Viewing Trouble Conditions
The alarm control panel continuously monitors a number of possible trouble conditions. If one of these conditions occurs, the keypad Trouble light will turn on and a beeping sound will be heard every 10 seconds. Press the [#] key to silence the keypad. The Trouble light will stay on until the trouble is cleared.
To view which trouble conditions are present:
1. Enter [
2. Use the arrow (< >) keys to scroll through the list of trouble conditions:
AC TAC T
rr
If be due to a power outage and should be cleared once the power is restored. If the power on the premises is running normally and the trouble condition persists, call your installer for service.
If the telephones on the premises are running normally and the trouble condition persists, call your installer for service.
Any other trouble condition will require the assistance of your installer. As soon as a trouble condition occurs, call your installer to have the problem corrected as soon as possible.
oubleouble
AC T
r
ouble is present, the system has lost its power. This trouble may
AC TAC T
rr
oubleouble
TLM TTLM T
TLM T
TLM TTLM T
] [2] at any keypad.
*
rr
oubleouble
r
ouble is present, there is a problem with the telephone line. If
rr
oubleouble
10
Loading...
+ 28 hidden pages