HikVision Hybrid Security Control Panel User Manual

Page 1
Hybrid Security Control Panel
User Manual
Page 2
Hybrid Security Control Panel User Manual
Legal Informaon
©2020 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
About this Manual
The Manual includes instrucons for using and managing the Product. Pictures, charts, images and all other informaon hereinaer are for descripon and explanaon only. The informaon contained in the Manual is subject to change, without noce, due to rmware updates or other reasons. Please www.hikvision.com/ ). Please use this Manual with the guidance and assistance of professionals trained in Product.
Trademarks
Hikvision in various Other trademarks and logos menoned are the properes of their respecve owners.
nd the latest version of this Manual at the Hikvision website ( hps://
supporng the
and other Hikvision's trademarks and logos are the properes of
jurisdicons.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED “AS IS” AND “WITH ALL FAULTS AND ERRORS”. HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS. YOU ACKNOWLEDGE THAT THE NATURE OF INTERNET PROVIDES FOR INHERENT SECURITY RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW. ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
i
Page 3
Hybrid Security Control Panel User Manual
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS ABUSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
ii
Page 4
Hybrid Security Control Panel User Manual
Symbol Convenons
The symbols that may be found in this document are dened as follows.
Symbol Descripon
Indicates a hazardous situaon which, if not avoided, will or could
Danger
Cauon
result in death or serious injury.
Indicates a potenally hazardous situaon which, if not avoided, could result in equipment damage, data loss, performance degradaon, or unexpected results.
Note
Provides addional informaon to emphasize or supplement important points of the main text.
iii
Page 5
Hybrid Security Control Panel User Manual
Contents
Chapter 1 System Descripon ..................................................................................................... 1
Chapter 2 Specicaons ............................................................................................................. 2
Chapter 3 Acvaon ................................................................................................................... 5
3.1 Acvate Device via Web Browser .......................................................................................... 5
3.2 Acvate Device via Client Soware ........................................................................................ 6
3.3 Acvate via SADP ................................................................................................................... 7
Chapter 4 Conguraon ............................................................................................................. 9
4.1 Use the Client Soware ......................................................................................................... 9
4.2 Use the Web Client ................................................................................................................ 9
4.2.1
Communicaon Sengs ............................................................................................. 10
4.2.2 Device Management ................................................................................................... 30
4.2.3 Area
4.2.4 Video Management .................................................................................................... 43
4.2.5 Permission Management ............................................................................................ 46
4.2.6 Maintenance ............................................................................................................... 51
4.2.7 System
4.2.8 Check Status ................................................................................................................ 62
4.3 Use Mobile Client ................................................................................................................. 63
4.3.1 Download and Login the Mobile Client ....................................................................... 63
4.3.2
4.3.3 Add Control Panel to the Mobile Client ...................................................................... 64
4.3.4 Add Peripheral to the Control Panel ........................................................................... 65
4.3.5 Add Card ..................................................................................................................... 66
4.3.6 Add Keyfob .................................................................................................................. 67
Sengs ............................................................................................................... 38
Sengs ........................................................................................................... 53
Acvate Control Panel via Hik-Connect ....................................................................... 63
4.3.7 User Management ...................................................................................................... 68
4.3.8 System
Sengs ........................................................................................................... 69
iv
Page 6
Hybrid Security Control Panel User Manual
4.3.9 Arm/Disarm the Zone ................................................................................................. 73
4.3.10 Bypass Zone .............................................................................................................. 74
4.3.11 Set Zone .................................................................................................................... 75
4.3.12 Set Arming/Disarming Schedule ............................................................................... 76
4.3.13 Check System Status (Zone
4.3.14 Check Alarm Nocaon .......................................................................................... 79
4.3.15 Set Network Camera Channel ................................................................................... 80
4.3.16 Set Event Video Sengs ........................................................................................... 81
4.3.17 Add a Camera to the Zone ........................................................................................ 82
Chapter 5 Operaons ............................................................................................................... 84
5.1 Arming ................................................................................................................................. 84
5.2 Disarming ............................................................................................................................. 85
5.3 Use the Keyfob ..................................................................................................................... 85
5.4 Use the Card ........................................................................................................................ 88
5.5 Use the Client Soware ....................................................................................................... 88
5.5.1 Add Device to the Client Soware .............................................................................. 88
5.5.2 Add Device to the Client
5.5.3 Area Operaon ............................................................................................................ 90
Status/Communicaon Status) ..................................... 78
Soware through Cloud P2P ............................................... 89
5.5.4 Operate the Relay ....................................................................................................... 91
5.5.5 Operate the Sounder .................................................................................................. 91
5.6 Use the Web Client .............................................................................................................. 91
5.6.1 Add/Edit/Delete Tag (Card) ......................................................................................... 92
5.6.2 Add/Edit/Delete Keyfob .............................................................................................. 92
5.6.3 Add/Edit/Delete User .................................................................................................. 94
5.6.4 Check Status ................................................................................................................ 96
5.7 Zone
5.8 Area Operaon .................................................................................................................... 97
5.9 Sounder
Operaon .................................................................................................................... 96
Operaon .............................................................................................................. 97
v
Page 7
Hybrid Security Control Panel User Manual
5.10 Relay Operaon ................................................................................................................. 98
Appendix A. Trouble Shoong .................................................................................................. 99
A.1
Communicaon Fault .......................................................................................................... 99
A.1.1 IP Conict .................................................................................................................... 99
A.1.2 Web Page is Not Accessible ........................................................................................ 99
A.1.3 Hik-Connect is Oine ................................................................................................. 99
A.1.4 Network Camera Drops o Frequently ....................................................................... 99
A.1.5 Failed to Add Device on APP ....................................................................................... 99
A.1.6 Alarm Informaon is Not Reported to APP/4200/Alarm Center ............................... 100
A.2 Mutual Exclusion of Funcons ........................................................................................... 100
A.2.1 Unable to Enter Registraon Mode .......................................................................... 100
A.2.2 Unable to Enter RF Signal Query Mode .................................................................... 100
A.3 Zone Fault .......................................................................................................................... 100
A.3.1 Zone is Oine ........................................................................................................... 100
A.3.2 Zone Tamper-proof ................................................................................................... 101
A.3.3 Zone Triggered/Fault ................................................................................................ 101
A.4 Problems While Arming ..................................................................................................... 101
A.4.1 Failure in Arming (When the Arming Process is Not Started) ................................... 101
Operaonal Failure ............................................................................................................ 101
A.5
A.5.1 Failed to Enter the Test Mode ................................................................................... 101
A.5.2 The Alarm Clearing
Report ................................................................................................................................ 102
A.6 Mail Delivery Failure .......................................................................................................... 102
A.6.1 Failed to Send Test Mail ............................................................................................ 102
A.6.2 Failed to Send Mail during Use ................................................................................. 102
A.6.3 Failed to Send Mails to Gmail ................................................................................... 102
Operaon on the Panel Does Not Produce the Alarm Clearing
A.6.4 Failed to Send Mails to QQ or Foxmail ...................................................................... 103
A.6.5 Failed to Send Mails to Yahoo ................................................................................... 103
vi
Page 8
Hybrid Security Control Panel User Manual
A.6.6 Mail Conguraon .................................................................................................... 103
Appendix B. Input Types ......................................................................................................... 105
Appendix C. Output Types ...................................................................................................... 108
Appendix D. Event Types ........................................................................................................ 109
Appendix E. Access Levels ....................................................................................................... 110
Appendix F. SIA and CID Code ................................................................................................. 112
Appendix G.
Communicaon Matrix and Device Command .................................................... 118
vii
Page 9
Hybrid Security Control Panel User Manual
Chapter 1 System Descripon
Hybrid security control panel, containing onboard zones, supports wired/wireless alarm inputs and outputs expanding. It works with Wi-Fi, LAN, GPRS, and 3G/ 4G as ISAPI, ISUP 5.0, and DC09 protocol. It is applicable to the scenarios of market, store, house, factory, warehouse, oce, etc.
communicaon methods, as well
• Dual path GPRS and 3G/4G ulizing a main and backup channel with congurable priority
• 4/8 on-board wired zones, and expandable with up to 20/64 wired zones
• Up to 20/64 wireless inputs, 20/64 wireless outputs, 8 keyfobs, 1 wired sounder and 2 wireless sounders
• Camera accessing (only supported by DS-PHAXX-WXX)
• Pre-alarm (5 s/2 s) and post-alarm (2 s/5 s) recording for video email or mobile client
• Uploads alarm events to alarm receiving center or
• Supports arming/disarming via keypad, mobile client, iVMS-4200, SMS, and tag
Conguraon via web client, Hik-Connect, or iVMS-4200
• Pushes alarm
• Alarm video clips via emails and APP
• AES-128-bit data
• LED indicator for indicang system status (-P model)
• Expandable PSTN, 3G/4G, and GPRS interface
• Supports RS-485 input and output expander
• Supports lithium
• 1 maintenance, 1 installer, 1 administrator, and 13 users (DS-PHA20)/45 users (DS-PHA64)
communicaon of alarm events and other signals over LAN, PSTN, Wi-Fi (-W model),
vericaon to the alarm receiving
plaorm
nocaon via messages
encrypon
baery (-P model) or storage baery (-M model)
1
Page 10
Hybrid Security Control Panel User Manual
Chapter 2 Specicaons
Model DS-PHA20-P
DS-PHA20-M DS-PHA64-M
DS-PHA64-P2
Device connecon Wireless Detector Up to 16/56
Wireless Output expander
Sounder 1 wired sounder (on-board connecon)
Keyfob 8
Alarm input Area 4 (DS-PHA20)
Zone 4 on-board zones , and 16 wired/wireless zones
Up to 8
2 wireless sounders
8 (DS-PHA64)
expadable (DS-PHA20)
8 on-board zones, and 56 wired/wireless zones expadable (DS-PHA64)
DS-PHA20-W2M
DS-PHA20-W2P
DS-PHA64-W4M
DS-PHA64-W4P2
Alarm output Alarm output 2 on-board outputs, and 18 wired/wireless
outputs expadable (DS-PHA20)
4 on-board outputs, and 60 wired/wireless outputs expadable (DS-PHA64)
Funcon Scheduled arming/
disarming
SMS nocaon
(with 3G/4G/GPRS module)
Network camera accessing
Applicaon & Protocol Applicaon iVMS-4200 (client soware)
Protocol ISAPI: Supports client soware and web client
Supported
Supports up to 8 mobile phone numbers
N/A 2 (DS-PHA20)
4 (DS-PHA64)
Hik-Connect (mobile client)
Cloud P2P: Supports cloud P2P privacy protocol
2
Page 11
Hybrid Security Control Panel User Manual
Model DS-PHA20-P
DS-PHA20-M DS-PHA64-M
DS-PHA64-P2
DC09: ARC accessible (CID/SIA)
Network Wired network 10M/100M Ethernet
Cellular Network
(with 3G/4G/GPRS module)
Wi-Fi Standard N/A 802.11b/g/n
Encrypon N/A 64/128-bit WEP,WPA/
Conguraon N/A AP Mode
Distance N/A Indoor: ≤ 50 m
Supports report push-nocaon to ARC & Cloud
DS-PHA20-W2M
DS-PHA20-W2P
DS-PHA64-W4M
DS-PHA64-W4P2
WPA2,WPA-PSK/WPA2­PSK
Outdoor: ≤ 100 m
Interface & Component
User User Installer: 1
TAMPER Switch 1, front cover tamper-proof
Network Interface 1, RJ45 10M/100M Ethernet Interface
Telephone Interface 1, PSTN expander interface
RS-485 Terminal 1, extended up to 20 inputs/outputs (with
RS-485 module), and 9 wired keypads extendable (DS-PHA20)
1, extended up to 64 inputs/outputs (with RS-485 module), and 9 wired keypads extendable (DS-PHA64)
Sounder Power Interface
Baery Interface Lithium baery (-P model)
1, 12V
Storage baery (-M model &P2&W4P2)
Administrator: 1
Manufactuer:1
Operator: 13 (DS-PHA20), 45 (DS-PHA64)
Others Auxiliary Power Supply Plasc Case: 7.2W, current: 600mA
3
Page 12
Hybrid Security Control Panel User Manual
Model DS-PHA20-P
DS-PHA20-M DS-PHA64-M
DS-PHA64-P2
Metal Case (&P2&W4P2): 13W, current: 1000mA
Sounder Output Power Plasc Case: 5W, current: 400 mA
Metal Case (&P2&W4P2): 8W, current: 600 mA
RS-485 Device Output Power
Alarm Output Rated Current
Operaon
Temperature
Operaon Humidity 10% to 90% (No condensing)
Plasc Case: 7.2W, current: 600mA
Metal Case (&P2&W4P2): 13W, current: 1000mA
500 mA
–10 °C to 55 °C (-4 °F to 122 °F)
DS-PHA20-W2M
DS-PHA20-W2P
DS-PHA64-W4M
DS-PHA64-W4P2
Dimension (W × H × D) Plasc Case (P&W4P): 220 mm (8.6") × 152 mm
(6.0") × 31.5 mm(1.2")
Plasc Case (P2&W4P2): 310 mm (12.2") × 225 mm (8.6") × 95 mm (3.7")
Metal Case: 351.4 mm (13.8") × 261.4 mm (10.3") × 93.3 mm (3.7")
4
Page 13
Hybrid Security Control Panel User Manual
Chapter 3 Acvaon
In order to protect personal security and privacy and improve the network security level, you should
3.1 Acvate Device via Web Browser
Use web browser to acvate the device. Use SADP soware or PC client to search the online device to get the IP address of the device, and acvate the device on the web page.
Before You Start
Make sure your device and your PC connect to the same LAN.
Steps
1. Open a web browser and input the IP address of the device.
acvate the device the rst me you connect the device to a network.
Note
If you connect the device with the PC directly, you need to change the IP address of your PC to the same subnet as the device. The default IP address of the device is 192.0.0.64.
2. Create and conrm the admin password.
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case leers, lower case leers, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, reseng the password monthly or weekly can beer protect your product.
3.
Click OK to complete acvaon.
4. Edit IP address of the device.
1) Enter IP address
2) Change IP address.
3) Save the
Note
• The default user name of admin account is admin.
• You should login the admin account
• The default password of the installer is installer12345, and the default password of the maintenance (for Italian, the user name is to be changed when rst connected.
• The Italian user name of admin is admin.
sengs.
modicaon page.
rst to enable the installer and the maintenance.
costruore) is hik12345. These password will have
5
Page 14
Hybrid Security Control Panel User Manual
Table 3-1 User Name of Installer
Language User Name Language User Name
English installer Russian монтажник
Italian installatore French installateur
Polish instalator Spanish instalador
German errichter Portuguese instalador
Turkish kurulumcu Czech technik
3.2 Acvate Device via Client Soware
Before You Start
• Get the iVMS-4200 client soware from the supplied disk or the ocial website hp:// www.hikvision.com/en/ . Install the soware by following the prompts.
• The device and the PC that runs the soware should be in the same subnet.
Steps
1. Run the client soware.
2. Oponal: Click , select the Cloud P2P Region, and login the Cloud P2P account.
Note
• For the
Aer logging in, you can store your device on the cloud.
3. Enter Device Management → Device in the Maintenance and Management list.
4. Click Online Device.
5. Check the device status from the online device list, and select an
6. Click
7. Create and conrm the admin password of the device.
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case leers, lower case leers, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can beer protect your product.
rst use, you need to register a cloud P2P account.
inacve device.
Acvate.
Cauon
8. Click OK to start acvaon.
Device status will change to Acve aer successful acvaon.
9. Edit IP address of the device.
6
Page 15
Hybrid Security Control Panel User Manual
1) Select a device and click on the online device list.
2) Change the device IP address to the same subnet with your computer and set port number as 80.
3) Enter the admin password of the device and click OK to complete
10. Oponal: Check the device on the online device list and click Add to add the device to the
device list.
modicaon.
3.3 Acvate via SADP
SADP is a tool to detect, acvate and modify the IP address of the device over the LAN.
Before You Start
• Get the SADP
www.hikvision.com/en/ , and install the SADP according to the prompts.
• The device and the PC that runs the SADP tool should be within the same subnet.
soware from the supplied disk or the ocial website hp://
The following steps show how to and IP addresses modicaon, refer to User Manual of SADP for details.
Steps
1. Run the SADP
2. Find and select your device in online device list.
3. Input new password (admin password) and
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case leers, lower case leers, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, reseng the password monthly or weekly can beer protect your product.
4. Click Acvate to start acvaon.
soware and search the online devices.
acvate a device and modify its IP address. For batch acvaon
conrm the password.
7
Page 16
Hybrid Security Control Panel User Manual
Status of the device becomes Acve aer successful acvaon.
5. Modify IP address of the device.
1) Select the device.
2) Change the device IP address to the same subnet as your computer by either modifying the IP address manually or checking Enable DHCP.
3) Input the admin password and click Modify to
acvate your IP address modicaon.
8
Page 17
Hybrid Security Control Panel User Manual
Chapter 4 Conguraon
Congure the security control panel in the web client or the remote conguraon page in client soware.
4.1 Use the Client Soware
Steps
1. Download, install and register to the client soware.
2. Add device in Device Management → Device .
Note
• Set the device port No. as 80.
• The user name and password when adding device are the
password.
acvaon user name and
3. Click to enter the Remote Conguraon page aer the device is completely added,

4.2 Use the Web Client

Steps
1. Connect the device to the Ethernet.
2. Search the device IP address via the client
3. Enter the searched IP address in the address bar.
Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP mode.
Note
When connecng the network cable with computer directly, the default IP Address is 192.0.0.64
4. Use the acvaon user name and password to login.
Note
Refer to Acvaon chapter for the details.
soware and the SADP soware.
9
Page 18
Hybrid Security Control Panel User Manual
4.2.1 Communicaon Sengs
Wired Network Sengs
You can set the device IP address and other network parameters.
Steps
Note
Funcons varied depending on the model of the device.
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
ConguraonCommunicaon Parameters → Ethernet to enter the page.
Figure 4-1 Wired Network Sengs Page
3. Set the parameters. Automac Sengs: Enable DHCP and set the HTTP port.
-
Manual
-
Server Address.
By default, the HTTP port is 80, which is not editable.
Sengs: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS
Note
10
Page 19
Hybrid Security Control Panel User Manual
4.
Oponal: Set correct DNS server address if the device needs to visit Hik-Connect server via a domain name.
5. Click Save.
Wi-Fi
You can set the Wi-Fi parameters if there are secure and credible Wi-Fi networks nearby.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
ConguraonCommunicaon Parameters → Wi-Fi to enter the Wi-Fi page.
Figure 4-2 Wi-Fi Sengs Page
3. Connect to a Wi-Fi. Manually Connect: Input the SSID Wi-Fi and Wi-Fi Password, select Encrypon Mode and
-
click Save. Select from Network List: Select a target Wi-Fi from the Network list. Click Connect and input
-
Wi-Fi password and click Connect.
4. Click WLAN to enter the WLAN page.
11
Page 20
Hybrid Security Control Panel User Manual
Figure 4-3 WLAN Sengs Page
5. Set IP Address, Subnet Mask, Gateway Address, and DNS Server Address.
Note
If enable DHCP, the device will gain the Wi-Fi parameters automacally.
6. Click Save.
Cellular Network
Set the cellular network parameters if you insert a SIM card inside the device. By using the cellular network, the device can upload alarm mobile phone.
Before You Start
Insert a SIM card into the device SIM card slot.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon Communicaon Parameters → Cellular Data Network to enter the
Cellular Data Network
Sengs page.
nocaons to the alarm center and make a voice call to the
12
Page 21
Hybrid Security Control Panel User Manual
Figure 4-4 Cellular Data Network Sengs Page
3. Enable Wireless Dial.
4. Set the cellular data network parameters.
Access Number
Input the operator dialing number.
User Name
Ask the network carrier and input the user name.
Access Password
Ask the network carrier and input the password.
APN
Ask the network carrier to get the APN
Data Usage Limit
You can enable the funcon and set the data threshold every month. If data usage is more than the and mobile client.
Data Used This Month
The used data will be accumulated and displayed in this text box.
congured threshold, an alarm will be triggered and uploaded to the alarm center
informaon and input the APN informaon.
5. Click Save.
13
Page 22
Hybrid Security Control Panel User Manual
Alarm Center
You can set the alarm center's parameters and all alarms will be sent to the congured alarm center.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon Communicaon Parameters → Alarm Receiving Center to enter the
Alarm Receiving Center page.
soware, select the device on the Device Management page and click , or enter
Figure 4-5 Alarm Receiving Center Parameters
3. Select the Alarm Receiver Center as 1, 2 or 3 for conguraon , and slide the slider to enable
the selected alarm receiver center.
4. Slide the slider to enbale Channel 1.
Note
• Channel 2 and channel 3 are the backup channels. You can enable channel 2 and 3 as needed.
• 4G
funcon needs to be congured before enabling channel 2.
• PTSN
5. Select the Communicaon Type as TCP/IP (LAN&WLAN), Mobile Network or PSTN.
6. Select the Protocol Type as ADM-CID, ISUP, SIA-DCS, *SIA-DCS, *ADM-CID, CSV-IP or PSTN-CID
(only for PSTN communicaon type) to set uploading mode.
Standard DC-09 Protocol ADM-CID: The data presenng method of DC-09 is CID, which is not encrypted and only for uploading alarm report. *ADC-CID: The data uploading alarm report.
funcon needs to be congured before enabling channel 3.
Note
presenng method of DC-09 is CID, which is encrypted and only for
14
Page 23
Hybrid Security Control Panel User Manual
SIA-DCS: The data presenng method of DC-09 is DCS (also called SIA protocol), which is not encrypted and only for uploading alarm report. *SIA-DCS: The data presenng method of DC-09 is DCS (also called SIA protocol), which is encrypted and only for uploading alarm report.
ADM-CID or SIA-DCS
-
You should select the Address Type as IP or Domain Name, and enter the IP/domain name, server address, port number, account code, transmission mode, retry aempts, heartbeat interval and monitoring staon ping interval.
Periodic Test
Aer seng the monitoring staon ping interval, the device will send a test event to the plaorm at the intervals.
meout period,
15
Page 24
Hybrid Security Control Panel User Manual
Figure 4-6 ADM-CID
Note
Set the heartbeat interval with the range from 10 to 3888000 seconds.
ISUP
-
You do not need to set the ISUP protocol parameters.
16
Page 25
Hybrid Security Control Panel User Manual
Figure 4-7 ISUP
*SIA-DCS
-
You should select the Address Type as IP or Domain Name, and enter the IP/domain name, server address, port number, account code, transmission mode, retry aempts, heartbeat interval, encrypon arithmec, password length, secret key and monitoring staon ping interval.
Periodic Test
Aer seng the monitoring staon ping interval, the device will send a test event to the plaorm at the intervals.
meout period ,
17
Page 26
Hybrid Security Control Panel User Manual
Figure 4-8 *SIA-DCS
Note
• Set the heartbeat interval with the range from 10 to 3888000 seconds.
• For
encrypon arithmec: The panel support encrypon format for informaon security according to DC-09, AES-128, AES-192 and AES-256 are supported when you congure the alarm center.
For the secret key: When you use an encrypted format of DC-09, a key should be set when you congure the ARC. The key would be issued oine by ARC , which would be used to encrypt the message for
substuon security.
18
Page 27
Hybrid Security Control Panel User Manual
CSV-IP
-
You should select the Address Type as IP or Domain Name, and enter the IP/domain name, server address, port number, account code, retry meout period , aempts, monitoring staon ping interval and authencaon informaon.
Periodic Test
Aer seng the monitoring staon ping interval, the device will send a test event to the plaorm at the intervals.
Figure 4-9 CSV-IP
PSTN-CID
-
You should select the Communicaon Type as PSTN and select the Protocol Type as PSTN- CID and
number, dialing mes, communicaon protocol, transmission mode and receiver account.
congure the uploading period, uploading the rst test report, center name, center
19
Page 28
Hybrid Security Control Panel User Manual
Periodic Test
Aer seng the monitoring staon ping interval, the device will send a test event to the plaorm at the intervals.
Figure 4-10 PSTN-CID
7. Click Save.
8.
Oponal: Enable channel 2 and congure its parameters.
20
Page 29
Hybrid Security Control Panel User Manual
Figure 4-11 Channel 2
9. Oponal: Enable channel 3 and congure its parameters.
21
Page 30
Hybrid Security Control Panel User Manual
Figure 4-12 Channel 3
Nocaon
When an alarm is triggered, if you want to send the alarm nocaon to the client, alarm center, cloud or mobile phone, you can set the nocaon push parameters.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
3. Enable the target Zone Alarm & Tampering Alarm Nocaon
The device will push nocaons when the zone alarm (on web client, soware client or mobile client) is triggered or the zone tampering alarm is triggered or restored.
Device Tampering Alarm
The device will push nocaons when tampering alarm of any device is triggered or restored.
Control Panel Tampering Alarm Nocaon
Push
ConguraonCommunicaon Parameters → Event Communicaon .
nocaon.
Nocaon
22
Page 31
Hybrid Security Control Panel User Manual
The device will push nocaons when tampering alarm of the control is triggered or restored.
Panic Alarm Nocaon
The device will push nocaons when panic alarm on keypads or keyfobs is triggered or restored by keypads or keyfobs.
Medical Alarm Nocaon
The device will push nocaons when medical alarm on keypads is triggered.
Fire Alarm
The device will push nocaons when re alarm on keypads is triggered or a user presses the re alarm key on the keypad.
Panel Management Nocaon
The device will push nocaons when the user operate the control panel.
Control Panel System Status Nocaon
The device will push nocaons when the control panel system status is changed.
Detector Status Nocaon
The device will push nocaons when any detector status is changed.
Device Status Alarm Nocaon
The device will push nocaons when any device status is changed.
Smart Alarm Event
The device will push
4. Oponal: For Alarm Receiver Center, you need to select center number before sengs.
5. Oponal: If you want to send the alarm nocaons to the mobile client, you should set Mobile Phone parameters.
Nocaon
nocaons when alarm is triggered in network cameras.
23
Page 32
Hybrid Security Control Panel User Manual
Figure 4-13 Mobile Phone Sengs Page
1) Set the Mobile Phone Index and Mobile Phone Number .
2) Check Voice Call on Telephone page.
3) select
Calling.
4) Check SMS on Message page.
5) Select areas that have arming, disarming or alarm clearing permission.
Time Schedule
6. Click Save.
me of Zoom Alarm and Tampering Alarm Nocaon Filtering and Number of
Aer enabled, only if the alarms occurs within the me period, the contact number can
receive message and nicaon call. SMS back control will also take eect according to the schedule.
24
Page 33
Hybrid Security Control Panel User Manual
Result
Note
You can arm/disarm/clear alarm via sending SMS. The number of the SIM card installed in the control panel is the receiver number. You can send help to the control panel to get the SMS command list. The control message is Command + For examples, command 00+1+1 indicates area 1 disarming, and command 01+1+1 indicates area 1 away arming.
Command Operaon Type Target
Operaon Type + Target , and the details are show below.
2 Digits 00: Disarming 01: Away Arming 02: Stay Arming 03: Alarm Clearing
1 Digit 1: Area Operaon
No more than 3 Digits 0: All area arming/disarming/ clearing Alarm 1: Area 1 arming/disarming/ clearing Alarm ... 4: Area 4 arming/disarming/ clearing Alarm ...
Mobile Client Registraon
If you want to register the device to the mobile client for remote conguraon, you should set the mobile client registraon parameters.
Before You Start
• Connect the device to the network via wired
connecon.
• Set the device IP address, subnet mask, gateway and DNS server in the LAN.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon Communicaon Parameters → Hik-Connect Registraon to enter the Hik-Connect
soware, select the device on the Device Management page and click , or enter
Registraon Sengs page.
connecon, dial-up connecon, or Wi-Fi
25
Page 34
Hybrid Security Control Panel User Manual
Figure 4-14 Hik-Connect Registraon Sengs Page
3. Check Register to Hik-Connect.
Note
By default, the device Hik-Connect service is enabled.
You can view the device status in the Hik-Connect server (www.hik-connect.com).
4. Enable Custom Server Address.
The server address is already displayed in the Server Address text box.
5. Select a communicaon method.
Auto
Wired Network & Wi-Fi Priority
Wired &Wi-Fi
communicaon mode from the drop-down list according to the actual device
The system will select the wired network, Wi-Fi network, and cellular data network. Only when the current network is disconnected, will the device connect to other network.
The
connecon priority order from high to low is: wired network, Wi-Fi, cellular data
network.
communicaon mode automacally according to the sequence of,
The system will select wired network rst. If no wired network detected, it will select Wi-Fi network.
Cellular Data Network
The system will select cellular data network only.
26
Page 35
Hybrid Security Control Panel User Manual
6.
Oponal: Change the authencaon password.
Note
• By default, the
• The authencaon password should contain 6 to 12 leers or digits. For security reasons, an
8-character password is suggested, which containing two or more of the following character types: uppercases, lowercases, and digits.
7. Click Save.
authencaon password is displayed in the text box.
ISUP
In this secon, you can create an ISUP account, and edit the IP address/domain name, port number.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon Communicaon Parameters → ISUP Registraon to enter the page.
soware, select the device on the Device Management page and click , or enter
Figure 4-15 ISUP Registraon
3. Slide the slider to enable ISUP protocol.
4. Select the Address Type as IP or Domain Name.
5. Enter IP address or domain name according to the address type.
27
Page 36
Hybrid Security Control Panel User Manual
6. Enter the port number for the protocol.
Note
By default, the port number for ISUP is 7660.
7.
Set an account, including the Device ID and ISUP Login Password.
8. Select Wired Network & Wi-Fi Priority
Wired &Wi-Fi
Cellular Data Network
9. Click Save.
Communicaon Mode.
The
connecon priority order from high to low is: wired network, Wi-Fi, cellular data
network.
The system will select wired network rst. If no wired network detected, it will select Wi-Fi network.
The system will select cellular data network only.
NAT
Universal Plug and Play (UPnP™) is a networking architecture that provides compability among networking equipment, soware and other hardware devices. The UPnP protocol allows devices to connect seamlessly and to simplify the environments.
Enable the UPnP funcon, and you don’t need to congure the port mapping for each port, and the device is connected to the Wide Area Network via the router.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon Communicaon Parameters → NAT to enter the page.
soware, select the device on the Device Management page and click , or enter
implementaon of networks in the home and corporate
28
Page 37
Hybrid Security Control Panel User Manual
Figure 4-16 NAT Sengs
3. Drag the slider to enable UPnP.
4. Oponal: Select the mapping type as Manual
5. Set the HTTP port and the service port.
6. Click Save to complete the
sengs
Set FTP to Save Video
You can congure the FTP server to save alarm video.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
ConguraonCommunicaon Parameters → FTP to enter the page.
29
Page 38
Hybrid Security Control Panel User Manual
Figure 4-17 FTP Sengs
3. Select FTP Type.
4. Drag the slider to enable FTP.
5. Select address type as Domain Name or IP.
6. Enter the domain name or FTP server.
7. Enter port number, user name and password.
8.
Oponal: Drag the slider to enable anonymity.
9. Set Directory Structure as the saving path of snapshots in the FTP server.
10. Click Save.

4.2.2 Device Management

Zone
You can set the zone parameters on the zone page.
In the client soware, select the device on the Device Management page and click , or enter the device IP address in the address bar of the web browser and log in.
Click
Conguraon → Device Management → Zone to enter the Zone page.
30
Page 39
Hybrid Security Control Panel User Manual
Wired Zone Sengs
Steps
1. Select a wired zone and click
to enter the Zone Sengs page.
Figure 4-18 Wired Zone
2. Edit the zone name.
3. Select a zone type. Instant Zone
This Zone type will immediately trigger an alarm event when armed.
Delayed Zone
Exit Delay: Exit Delay provides you
Entry Delay: Entry Delay provides you me to enter the defense area to disarm the system without alarm.
The system gives Entry/Exit delay entrance/exit route (e.g. front door/main entrance), which is a key route to arm/disarm via
operang keyboard for users.
me to leave through the defense area without alarm.
me when it is armed or reentered. It is usually used in
31
Sengs
Page 40
Hybrid Security Control Panel User Manual
Note
You can set 2 dierent me duraons in Area Management → Schedule & Timer .
Follow Zone
The zone acts as delayed zone when it detects triggering event during system Entry Delay, while it acts as instant zone otherwise.
Perimeter Zone
The system will immediately alarm when it detects a triggering event armed. There is a output "Sounder Delay Time (Perimeter Alarm) 0 to 600 Seconds". This check the alarm and cancel the sounder output during the interval me in case of false alarm.
When the zone is armed, you can set the peripheral alarm delayed
Management → Schedule & Timer . You can also mute the sounder in the delayed me.
Silent Panic Zone
This zone type is acve 24hrs, it is used for Panic or HUD (Hold Up Devices) not smoke sensors or break glass detectors.
Panic Zone
The zone smoke detector and glass-break detector.
Fire Zone
The zone acvates all the me with sound or sounder output when alarm occurs. It is usually used in
Gas Zone
The zone acvates all the me with sound or sounder output when alarm occurs. It is usually used in areas equipped with gas detectors (e.g., the kitchen).
acvates all the me. It is usually used in the sites equipped with panic buon,
re hazardous areas equipped with smoke detectors and temperature sensors.
congurable interval mer between the alarm acvaon and sounder
aer the system is
opon allows you to
me in Area
Medical Zone
The zone acvates all the me with beep conrmaon when alarm occurs. It is usually used in places equipped with medical emergency
Timeout Zone
The zone acvates all the me. The zone type is used to monitor and report the "ACTIVE" status of a zone, but it will only report and alarm this status aer the programmed me has expired. (1 to 599) Seconds. It can be used in places equipped with require access but for only a short period (e.g., re hydrant box's door or another external security box door)
Disabled Zone
Alarms will not be disable faulty detectors.
acvated when the zone is triggered or tampered. It is usually used to
buons.
magnec contacts that
32
Page 41
Key Zone
Hybrid Security Control Panel User Manual
By Zone StatusTrigger Arming: The linked area will away arm
triggered, and disarm aer being restored. Reports will be upload.
By Zone StatusTrigger Disarming: The linked area will disarm
triggered, and away arm
By Trigger Time: When the key zone is triggered, if the device has been armed, the linked
area will be disarmed; if the device has been disarmed, the linked area will be armed. Reports will be upload.
• In the case of the tampering alarm, the arming and disarming triggered.
4. Set the zone sensivity and zone resistor.
Note
The resistor wired on the on-board zone should be the same as the resistor congured on this page.
5. Select a detector type.
6. Enable Stay Arming Bypass, Silent Alarm, Dual-Zone Sengs, Forbid Bypass on Arming and Double knockaccording to your actual needs.
Note
Some zones do not support the funcon. Refer to the actual zone to set the funcon.
aer being restored. Reports will be upload.
aer detectors being
aer detectors being
operaon will not be
Dual-Zone
Aer enable the Dual-Zone Sengs, one zone can be expanded to two zones.
Forbid Bypass on Arming
Aer enabled, you can not bypass zones when arming.
Double knock
Aer enabled, the me interval can be set. If the same detector is triggered twice or connuously in a period of me, the alarm will be triggered.
7. Select the panel video channel No. and zone tampering wiring mode.
8. Click OK.
Note
Aer seng the zone, you can enter Device Status → Zone to view the zone status.
Wireless Zone Sengs
Steps
1. Select a wireless zone and click to enter the Zone Sengs page.
33
Page 42
Hybrid Security Control Panel User Manual
Figure 4-19 Wireless Zone Sengs
2. Edit the zone name.
3. Select a zone type. For details, see Wired Zone
4. Enable Stay Arming Bypass, Silent Alarm and Enroll Wireless Detector according to your needs.
5. Enter the serial No. to enroll the detector.
6. Select the module name.
7. Enter the wireless device
8.
9. Enable Forbid Bypass on Arming and Double Knockaccording to your needs. Forbid Bypass on Arming
Aer enabled, you can not bypass zones when arming.
Double knock
Aer enabled, the me interval can be set. If the same detector is triggered twice or connuously in a period of me, the alarm will be triggered.
10. Click OK.
Note
Aer seng the zone, you can enter Device Status → Zone to view the zone status.
disconnecon duraon.
Sengs.
34
Page 43
Hybrid Security Control Panel User Manual
What to do next
Click Zone → Zone Module , you can see the zone module informaon including module status, module addresss, module channel No., and module type.
Sounder
The sounder is enrolled to the control panel via the wireless receiver module, and the 868 Mhz wireless sounder can be enrolled to the hybrid control panel via the wireless receiver that is at the address of 9.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
3. Click to enter the Sounder Sengs page.
Conguraon → Device Management → Sounder to enter the Sounder page.
soware, select the device on the Device Management page and click , or enter
Figure 4-20 Wired Sounder Sengs
Figure 4-21 Wireless Sounder Sengs
4. Set the sounder name, the volume and module name.
Note
The available sounder volume range is from 0 to 3 (funcon varies according to the model of device).
5. Check linked areas.
6. Oponal: Enable Enroll Wireless Sounder and set the sounder serial No.
Note
The sounder in 868 MHZ may not support this funcon.
35
Page 44
Hybrid Security Control Panel User Manual
7. Set the Wireless Supervision Time, and the system determines disconnected duraon of the device is longer than the congured value.
8. Click OK.
Note
Aer the sounder is congured, you can click Device Status → Sounder to view the sounder status.
connecon fault if the
Output
If you want to the link the device with a relay output to output the alarm, set the output parameters.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
3. Click
Conguraon → Device Management → Relay to enter the Output page.
soware, select the device on the Device Management page and click , or enter
and the Output Sengs window will pop up.
Figure 4-22 Output Sengs
4. Edit the relay name and select a link event.
5. Enable LATCH PULSE or set the output delay
Note
If the relay has linked to the wireless output module, the wireless output module informaon will be displayed in the Enroll Wireless Output Module area.
6. Check Event Type .
7. Check areas linked to the relay. (Zone and Manual event do not have this parameter.)
8. Select to enable Contact Status or not. (Only for Arm and Disarm.
me.
36
Page 45
Hybrid Security Control Panel User Manual
ON
When the area arm/disarm, the relay will be opened.
OFF
When the area arm/disarm, the relay will be closed.
9. Click OK.
Note
Aer the relay is congured, you can click Device Status → Relay to view the output status.
Keypad
The keypad is connected to the control panel via RS-485 wiring. You can refer to Hybrid Control Panel Quick Start Guide for wiring details.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon → Control Device → Keypad to enter the page.
3. Click to enter the Keypad Sengs page.
soware, select the device on the Device Management page and click , or enter
Figure 4-23 Edit Keypad
4. Set the keypad name.
5. Select the keypad linked area.
6. Enable Silence the Panic Alarm according to your needs. Silence the Panic Alarm
When enabled, the panic alarm of the wireless keypad will have no linkage prompt.
7. Enter company name and phone number.
37
Page 46
Hybrid Security Control Panel User Manual
Note
Aer congurated, you can check the company name and phone number on the keypad LCD screen.
8. Click OK.
Module
The wired module is connected to the control panel via RS-485 wiring. You can refer to the Hybrid Control Panel Quick Start Guide for details.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
3. Select the Module Type.
4. Click
5. Set the module name.
6. Click OK.
7.
Conguraon → Device Management → Module Informaon to enter the page.
Oponal: Click to delete the module.
soware, select the device on the Device Management page and click , or enter
to enter the module sengs page.
4.2.3 Area
Sengs
Basic Sengs
You can link zones to the selected area.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon → Area Management → Basic Sengs to enter the page.
38
Page 47
Hybrid Security Control Panel User Manual
Figure 4-24 Area Basic Informaon Management Page
3. Select an area.
4. Check the Enable One-Push Arming to enable the One-Push Arming key on the keypad.
5. Check the check box in front of the zone to select zones for the area.
6. Click Save to complete the
Public Area
Denion Public area is considered a special one which can be shared to other areas. It is usually applied to manage or control the public area related with other areas controlled by other areas in one building.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Sengs
soware, select the device on the Device Management page and click , or enter
Conguraon → Area Management → Public Area to enter the page.
sengs.
39
Page 48
Hybrid Security Control Panel User Manual
Figure 4-25 Public Area Sengs
3. Check the checkbox to enable the public area funcon.
Note
the default public area is area 1
4. Select area(s) to link to the public area in the list.
Note
It is required to select at least an area to link to the public parion.
5. Click Save to set the area as public area.
Schedule and Timer
You can set the Entry Delay 1 & Entry Delay 2 me duraon for the delayed zone type and the Exit Delay delayed disarmed according to the congured me schedule.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon → Area Management → Schedule & Timer to enter the Schedule & Timer
page.
me to exit the zone. You can also set the alarm schedule. The zone will be armed/
Sengs
40
Page 49
Hybrid Security Control Panel User Manual
Figure 4-26 Schedule & Timer Sengs
3. Select an area.
4. Set
5. Oponal: Set the following parameters according to actual needs.
me duraon of Entry Delay 1, Entry Delay 2, or Exit Delay respecvely.
Entry Delay 1/Entry Delay 2
If you have set the entry delayed zone, you can set the delayed me duraon here.
Note
The available me duraon range is from 1 s to 600 s.
Exit Delay
If you want to exit the zone without triggering the alarm, you can set the exit delay duraon.
Note
The available me duraon range is from 1 s to 600 s.
Enable Auto Arming
41
Page 50
Hybrid Security Control Panel User Manual
Enable the funcon and set the arming start me. The zone will be armed according to the congured me.
Note
• The auto arming
• The buzzer beeps slowly 2 minutes before the auto arming starts, and beeps rapidly 1 minute before the auto arming starts.
• You can select to enable forced arming on the System Opons page. While the funcon is enabled, the system will be armed regardless of the fault.
• If the public area is enabled, the area 1 dose not support auto arming.
Enable Auto Disarming
Enable the funcon and set the disarming start me. The zone will be disarmed according to the
congured me.
Note
• The auto arming
• If the public area is enabled, the area 1 dose not support auto disarming.
Late to Disarm
Enable the funcon and set the me. If the alarm is triggered aer the congured me, the person will be considered as late.
Note
You should enable the Panel Management Nocaon funcon in Communicaon
Parameters → Event Communicaon before enabling the Late to Disarm funcon.
me and the auto disarming me cannot be the same.
me and the auto disarming me cannot be the same.
Weekend Excepon
Enable the funcon and the zone will not be armed in the weekend.
Excepted Holiday
Enable the funcon and the zone will not be armed/disarmed in the holiday. You should set the holiday schedule
Note
Up to 6 holiday groups can be set.
Sounder Delay Time (Perimeter Alarm)
If you have set the perimeter zone, you can set the delayed me for the zone.
Note
The available me duraon range is from 0 s to 600 s.
Alarm Duraon
aer enabling.
42
Page 51
Hybrid Security Control Panel User Manual
If you have set the perimeter zone, you can set the me duraon of the alarm.
Note
The available me duraon range is from 1 s to 900 s.
6. Click Save.

4.2.4 Video Management

You can add network cameras (2 to 4, depending on models), NVR and thermal cameras to the control panel, and link the camera with the selected zone for video monitoring. You can also receive and view the event video via client and Email.
Add Channels to the Security Control Panel
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon → Device Management → Channel to enter the page.
soware, select the device on the Device Management page and click , or enter
Figure 4-27 Channel Management
3. Click Add, and enter the basic informaon of the camera, such as IP address and port No., and
select the protocol type.
4. Enter the user name and password of the device.
5. Click OK.
Note
• You can add 2 to 4 network cameras (depending on models).
• You can add NVR.
• You can add thermal cameras. temperature is abnormal, the system will upload the alarm.
6. Oponal: Click Edit or Deleteto edit or delete the selected device.
7. Click Event Video Sengs to set parameters. Stream Type
The sub-stream can reduce the use of network bandwidth.
Bitrate Type
Aer the relevant funcons are congured, when the
43
Page 52
Hybrid Security Control Panel User Manual
Constant bitrate or variable bitrate can be selected. For constant bitrate, you need to set a xed bitrate. For Variable bitrate, a bitrate upper limit is required.
Resoluon
Select the resoluon according to your needs. The higher the resoluon, the higher the requirement of network bandwidth.
Length of Cached Video
You can set the length of video cache before and aer the alarm.
Link a Camera with the Zone
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon → Device Management → Zone to enter the conguraon page.
3. Select a zone that you wish to include video monitoring, and click the
4. Select the Panel Video Channel No..
5. Click OK.
soware, select the device on the Device Management page and click , or enter
icon.
Set Email to Receive Alarm Video
You can send the alarm video or event to the congured email.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon Communicaon Parameters → Video Vericaon Events to enter the
page.
44
Page 53
Hybrid Security Control Panel User Manual
Figure 4-28 Set Email to Receive Alarm Video
3. Click the block to enable the funcon.
4. Enter the sender's informaon.
Note
It is recommended to use Gmail and Hotmail for sending mails.
5. Enter the receiver's informaon.
6. Click Receiver Address Test and make sure the address is correct.
7. Click Save.
Set Video Parameters
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon → Video & Audio → Event Video Parameters to enter the page.
soware, select the device on the Device Management page and click , or enter
45
Page 54
Hybrid Security Control Panel User Manual
Figure 4-29 Video Sengs
3. Select a camera and set the video parameters. Stream Type
Main Stream: Being used in recording and HD preview, it has a high resoluon, code rate and picture quality.
Sub-Stream: It is used to transmit network and preview pictures as a video streaming with features of lower
Bitrate Type
Select the Bitrate type as constant or variable.
Resoluon
Select the resoluon of the video output.
Video Bitrate
The higher value corresponds to the higher video quality, but the beer bandwidth is required.
resoluon, bit rate and picture quality.

4.2.5 Permission Management

Add/Edit/Delete User
Administrator can add user to the security control panel, edit the user informaon, or delete the user from the security control panel. You can also assign
46
dierent permissions to the new user.
Page 55
Hybrid Security Control Panel User Manual
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
3.
Conguraon → User Management → User to enter the User Management page.
To compliant the EN requirement, slide the block to enable the installer and maintenance .
Note
soware, select the device on the Device Management page and click , or enter
• The default user name of admin account is admin. The password is the
• The default password of the installer is installer12345, and the default password of the
maintenance (for Italian, the user name is costruore) is hik12345. These password will have to be changed when rst connected.
The Italian user name of admin is admin.
Table 4-1 User Name of Installer
Language User Name Language User Name
English installer Russian монтажник
Italian installatore French installateur
Polish instalator Spanish instalador
German errichter Portuguese instalador
Turkish kurulumcu Czech technik
4. Click Add.
5. Set the new user's informaon in the pop-up window, including the user type, the user name,
and the password.
acvaon password.
47
Page 56
Hybrid Security Control Panel User Manual
Figure 4-30 Add User Page
6. Set the keypad password (numeric, 8~16 characters).
Note
• The keypad password +1 or -1 is the duress code. Use the duress code can operate the
keyboard to arm and disarm normally and upload a duress alarm. For example, if the keypad password is 123456, the duress code is 123455 or 123457
• The password cannot contain the user name or the user name in reverse order.
Cauon
The password strength of the device can be automacally checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case leers, lower case leers, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can Proper conguraon of all passwords and other security sengs is the responsibility of the installer and/or end-user.
7. Check areas.
8. Check the check boxes to set the user permission.
beer protect your product.
The user can only operate the assigned permissions.
9. Click OK.
48
Page 57
Hybrid Security Control Panel User Manual
10.
Oponal: Enable the user in the Enable User column to allow the enabled user operang the device.
11. Oponal: Select an user and click Edit and you can edit the user's informaon and permission.
12.
Oponal: Delete a single user or check mulple users and click Delete to delete users in batch.
Note
The admin, the installer and the maintenance cannot be deleted.
Add/Edit/Delete Keyfob
You can add keyfob to the security control panel and you can control the security control panel via the keyfob. You can also edit the keyfob informaon or delete the keyfob from the security control panel.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon → User Management → Keyfob to enter the Keyfob Management page.
soware, select the device on the Device Management page and click , or enter
Figure 4-31 Keyfob Management
3. Click Add and press any key on the keyfob.
4. Set the keyfob linked device type and linked device No..
5. Click OK.
6.
Oponal: Click to edit the keyfob informaon.
49
Page 58
Hybrid Security Control Panel User Manual
Figure 4-32 Edit Keyfob
7. Set the keyfob name.
8. Select the keyfob linked area and related net user.
9. Enable Silence the Panic Alarm according to your needs. Silence the Panic Alarm
When enabled, the panic alarm of the wireless keypad will have no linkage prompt.
10.
Oponal: Click to delete the keyfob.
Add/Edit/Delete Tag (Card)
You can add tag to the security control panel and you can use the tag(card) to arm/disarm the zone. You can also edit the tag informaon or delete the tag from the security control panel.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
3. Click Add to enter the adding page.
4. Select the linked keypad.
5. Click OK and the card(tag)
Conguraon → User Management → Tag to enter the management page.
informaon will be displayed in the list.
Note
The card supports at least 20-thousand serial numbers.
50
Page 59
Hybrid Security Control Panel User Manual
6.
Oponal: Click and you can change the card(tag) sengs, including tage(card) type, related net user, linked area, etc.
7. Oponal: Click to delete the card(tag).

4.2.6 Maintenance

Test
The security control panel supports walk test funcon.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Enter
Conguraon → Maintenance → Test → to enable the funcon.
Note
Only when all the detectors are without fault, you can enter the mode TEST mode.
3. Check the Test check box to start walk test.
4. Click Save to complete the sengs.
5. Trigger the detector in each zone.
6. Check the test result.
Diagnosis
The control panel supports diagnosis of system, alarm, wireless device, Wi-Fi, and cloud plaorm
51
Page 60
Hybrid Security Control Panel User Manual
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Enter
3. Select system, alarm, device, Wi-Fi, cloud plaorm, cellular data network, network camera and
4. Click Diagnosis to start the
5. View the diagnosis result in the informaon box.
Conguraon → Maintenance → Diagnosis .
alarm receiving center as the diagnosis module.
soware, select the device on the Device Management page and click , or enter
operaon.
Export File
You can export debugging le to the PC.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
3. Enable Debugging Log.
4. Click Export to save the debugging le in the PC.
Conguraon → Maintenance → Export File to enter the page.
Figure 4-33 Export File Page
52
Page 61
Hybrid Security Control Panel User Manual
4.2.7 System Sengs
Device infomraon
You can change name and lanuage of device.
In the client soware, select the device on the Device Management page and click , or enter the device IP address in the address bar of the web browser and log in. Click Conguraon System → Device
Informaon to enter the page.
Figure 4-34 Device Informaon
You can view device model, device serial No., device rmware version, web version or click About → View Licenses to view the source soware licenses.
Authority Management
Set the authority opons.
System
Click Conguraon → System → System Opons → System Opons Management to enter the page.
Forced Arming
If the
automacally.
Opons Management
opon is enabled and there are acve faults in a zone, the zone will be bypassed
53
Page 62
Note
Hybrid Security Control Panel User Manual
• If Enable Arming is enabled, Forced Arming is only
• If there is a fault in the zone and the forbidden bypass when arming is opened, the arming
will fail.
System Faults
If the opon is enabled, the device will upload the system fault report automacally.
One-Push Lock
If the opon is enabled, the installer can lock other users.
Audible Tamper Alarm
If the opon is enabled, the tamper alarm will link sounders and the control panel. If disabled, the log will be uploaded when the tamper alarm is triggered, but the sound alarm will not be triggered.
Authority Advanced
Set advanced authority parameters.
Click
Conguraon → System → System Opons → Advanced Sengs to enter the Advanced
Sengs page.
You can set the following parameters:
Sengs
eecve for Auto Arming.
Enable Arming
When you enable the congured fault checklist. When there is fault occurred during the arming procedure, the procedure will be stopped.
Note
PKG keypad and the keyfob do not support this funcon. If this funcon is enabled, the arming will fail if there is a fault. It is necessary to eliminate the fault or close the Enable Arming.
Fault Checklist
The system will check if the device has the faults in the checklist during the arming procedure.
Enable Arming with Fault
Check the faults in the Enable Arming with Fault list, and the device will not stop the arming procedure when faults occurred.
Arming Indicator Keeps Light
If the device applies EN standard, by default, the funcon is disabled. In this case, if the device is armed, the indicator will be solid blue for 5 s. And if the device is disarmed, the indicator will
ash 5 mes.
funcon, during the device arming procedure, the system will check the
54
Page 63
Hybrid Security Control Panel User Manual
When the funcon is enabled, if the device is armed, the indicator will be on all the me. And if the device is disarmed, the indicator will be o.
Note
Only -P model supports this funcon.
Prompt Fault When Arming
If the device applies EN standard, by default, the funcon is disabled. In this case, the device will not prompt faults during the arming procedure.
Note
Only -P model supports this funcon.
Enable Early Alarm
If you enable the funcon, when the zone is armed and the zone is triggered, the alarm will be triggered aer the delay me.
Note
The early alarm will be taken eect only aer the delayed zone is triggered.
Delay
When the early alarm funcon is enabled, you should set the delay me. The alarm will be triggered aer the congured delay me.
Fault Check
The system determines whether to check the faults listed on the page. The system will only check the fault that is selected.
Click
Conguraon → System → System Opons → Fault Check to enter the Advanced Sengs
page.
55
Page 64
Hybrid Security Control Panel User Manual
Figure 4-35 Fault Check Sengs
Detect Network Camera Disconnecon
If the opon is enabled, when the linked network camera is disconnected, an system status event
Baery Supervision
If the opon is enabled, when baery is disconnected or out of charge, the device will not upload events.
Wired Network Fault Check
If the opon is enabled, when the wired network is disconnected or with other faults, an system status event
Wi-Fi Fault Check
If the opon is enabled, when the Wi-Fi is disconnected or with other faults, an system status event nocaon will be uploaded.
Cellular Network Fault Check
If the opon is enabled, when the cellular data network is disconnected or with other faults, an system status event
SIM Tag Fault Check
nocaon will be uploaded.
nocaon will be uploaded.
nocaon will be uploaded.
If the opon is enabled, an system status event nocaon will be uploaded for faults of the SIM card.
56
Page 65
Hybrid Security Control Panel User Manual
Telephone Line Cut O Detecon
If the opon is enabled, an system status event nocaon will be uploaded when telehphone is disconnected.
RS-485
AC Power Down Check Time
Excepon Detecon
If the opon is enabled, an system status event nocaon will be uploaded when the RS-485 bus of device has excepon.
The system checks the fault
To compliant the EN 50131-3, the check me duraon should be 10 s.
aer the congured me duraon aer AC power down.
Enrollment Method
Steps
1. Click Conguraon → System → System Opons → Adding Through to enter the enrollment
method page.
Figure 4-36 Enrollment Method
2. Click Enter the Enrollment Mode.
3. In the pop-up window, Select a RS-485 wireless receiver.
4. Select the wireless device type.
5. Click OK to
Time
You can set the device me zone, synchronize device me, and set the DST me. The device supports
In the client soware, select the device on the Device Management page and click , or enter the device IP address in the address bar of the web browser and log in.
Sengs
nish the enrollment sengs.
me synchronizaon via Hik-Connect server.
57
Page 66
Hybrid Security Control Panel User Manual
Time Management
Click Conguraon → System → Date and Time to enter the Time Management page.
Figure 4-37 Time Management
You can select a me zone from the drop-down list. You can synchronize the device me manually. Or check Sync. with Computer Time to synchronize the device me with the computer me.
Note
While you synchronize the me manually or with the computer me, the system records the log "SDK Synchronizaon".
DST Management
Click Conguraon → System → Date and Time → DST Management to enter the Time Management page. You can enable the DST and set the DST bias, DST start
Security
Sengs
me, and DST end me.
SSH Sengs
Enable or disable SSH (Secure Shell) according to your actual needs.
In the client soware, select the device on the Device Management page and click , or enter the device IP address in the address bar of the web browser and log in.
Click
Conguraon → System → Security → SSH Sengs to enter the SSH Sengs page and you
can enable or disable the SSH
funcon.
58
Page 67
Hybrid Security Control Panel User Manual
Locking User Sengs
Set user locking. You can view the locked user or unlock a user and set the user locked duraon.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
3. Set the following parameters.
Conguraon → System → Security → Locking User Sengs to enter the Locking User
Sengs page.
Max. Failure Aempts
If the user connuously input the incorrect password for more than the congured mes, the account will be locked.
The administrator has two more aempts than the congured value.
Locked Duraon
soware, select the device on the Device Management page and click , or enter
Note
Set the locking duraon when the account is locked.
Note
The available locking duraon is 5s to 1800s.
4. Click to unlock the account or click Unlock All to unlock all locked users in the list.
5. Click Save.
Module Lock
Set the module locking parameters, including the Max Failure Aempts, and locked duraon. The module will be locked for the programmed me duraon, once the module authencaon has failed for the amount of congured mes.
Steps
1. In the client soware, select the device on the Device Management page and click , or enter
the device IP address in the address bar of the web browser and log in.
2. Click
3. Select a module from the list, and click the icon.
4. Set the following parameters of the selected module.
Conguraon → System → Security → Module Lock Sengs to enter the Module Lock
Sengs page.
Sengs
Max. Failure
If a user connuously tries to authencaon a password for more than the congured aempts
Locked Duraon
Aempts
permied, the keypad will be locked for the programmed duraon.
59
Page 68
Hybrid Security Control Panel User Manual
Set the locking duraon when the keypad is locked. Aer the congured duraon, the keypad will be unlocked.
5. Click OK.
6.
Oponal: Click the icon to unlock the locked module.
Figure 4-38 Module Lock Sengs
Maintenance
You can reboot the device, restore default sengs, import/export conguraon le, upgrade the device remotely or search logs.
In the client the device IP address in the address bar of the web browser and log in.
soware, select the device on the Device Management page and click , or enter
System Maintenance
Click Conguraon → System → System Maintenance to enter the Upgrade and Maintenance page.
Reboot
Click Reboot to reboot the device.
Restore Default
Click Partly Restore to restore all parameters except for admin user informaon, wired network, Wi-Fi network, detector informaon, and peripheral informaon to default ones.
Click Restore All to restore all parameters to the factory
Import Conguraon File
Click View to select conguraon le from the PC and click Import Conguraon File to import conguraon parameters to the device. Imporng conguraon le requires entering the
password set at the
Export Conguraon File
Sengs
sengs.
me of exporng.
Click Export Conguraon File to export the device conguraon parameters to the PC. Exporng conguraon le requires a password to be used for le encrypon.
Upgrade File
60
Page 69
Hybrid Security Control Panel User Manual
Select the upgrade type. Click View to select an upgrade le from the PC, click Upgrade and enter the password of
current user to upgrade the device remotely.
Note
Do not power o when the device is upgrading.
Security Audit Log
Enter a short descripon of your task here (oponal).
Steps
1. Click Conguraon → System → System Maintenance → Security Audit Log to enter the page.
Figure 4-39 Security Audit Log
2. Check Enable Log Upload Server.
3. Enter log server IP and port.
4. Click View to select a
Note
Formats include ca.crtca-chan.crtprivate.txt are allowed.
5. Click Install.
6. Click Save.
cercate.
61
Page 70
Hybrid Security Control Panel User Manual
Local Log Search
You can search the log on the device.
In the client the device IP address in the address bar of the web browser and log in. Click Conguraon System → Log to enter the Local Log Search page.
Select a major type and a minor type from the drop-down list, set the log start me and end me and click Filter. All ltered log informaon will be displayed in the list.
You can also click Reset to reset all search condions.
soware, select the device on the Device Management page and click , or enter
Figure 4-40 Local Log Search Page

4.2.8 Check Status

Aer seng the zone, relay, and other parameters, you can view their status.
Click Device Status. You can view the status of zone, relay, sounder, repeater.
• Zone: You can view the zone status, alarm status, detector baery capacity, and signal strength.
• Area: You can view area status.
• Sounder: You can view sounder status,
• Relay: You can view relay status and signal strength.
Baery: You can view the baery charge.
Communicaon: You can view the wired network status, Wi-Fi status, Wi-Fi signal strength, cellular network status, used data, and cloud connecon status.
For more
operaon in this page, refers to Use the Web Client .
baery status, and signal strength.
baery, communicaon, and
62
Page 71
Hybrid Security Control Panel User Manual

4.3 Use Mobile Client

4.3.1 Download and Login the Mobile Client

Download the mobile client and login the client before operang the security control panel.
Steps
1.
Get Hik-Connect mobile client from the following ways.
hps://appstore.hikvision.com to download the applicaon according to your mobile
Visit
-
phone system. Visit the ocial website of our company. Then go to Support → Tools → Hikvision App Store
-
to download the applicaon according to your mobile phone system. Scan the QR code below to download the applicaon.
-
Figure 4-41 Hik-Connect QR Code
2. Oponal: Register a new account if it is the rst me you use the Hik-Connect mobile client.
Note
For details, see User Manual of Hik-Connect Mobile Client.
3. Run and login the client.
4.3.2
Steps
1. Power on the control panel.
2. Select adding type.
3. Tap
4. Tap Next.
5. Enter the device
Acvate Control Panel via Hik-Connect
Tap
-
panel.
Normally, the QR code is printed on the label stuck on the back cover of the control panel. Tap → Manual Adding to enter the Add Device page. Enter the device serial No. with the
-
Hik-Connect Domain adding type.
→ Scan QR Code to enter the Scan QR code page. Scan the QR code on the control
Note
to search the device.
vericaon code if required and tap OK.
63
Page 72
Hybrid Security Control Panel User Manual
Note
By default, the vericaon code is printed on the device label.
6. Tap Wireless
7. Follow the mode. Tap Next.
Note
You need to remove the rear panel of the device and the AP/STA switch is on the back of the device.
8. Select a stable Wi-Fi for the device to connect and tap Next.
Note
Make sure the device and the mobile phone are connect to the same Wi-Fi.
9. Follow the instrucons. Create the device password and tap Acve.
Note
We highly recommend you to create a strong password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case leers, lower case leers, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, reseng the password monthly or weekly can beer protect your product.
Connecon on the Select Connecon Type page.
instrucons on the Turn on Hotspot page and change the control panel to the AP
10. Follow the instrucons on the Turn on Hotspot page and change the control panel to the STA
mode. Tap
You need to remove the rear panel of the device and the AP/STA switch is on the back of the device.
11. Aer the connecon is nished, enter the device alias and tap Save.
12.
Oponal: You can delete the device.
1)On the device list page, tap the security control panel and then log in to the device (if required) to enter the area page.
2)Tap
Conrm.
Note
→ Delete Device to delete the device.

4.3.3 Add Control Panel to the Mobile Client

Add a control panel to the mobile client before other
Before You Start
• The control panel has been
• The control panel has registered to Hik-Connect. For details, see Mobile Client Registraon .
acvated.
operaons.
64
Page 73
Hybrid Security Control Panel User Manual
Steps
1. Power on the control panel.
2. Select adding type.
Tap
-
panel.
Normally, the QR code is printed on the label stuck on the back cover of the control panel. Tap
-
Hik-Connect Domain adding type.
3. Tap
4. Tap Add on the Results page.
5. Enter the vericaon code and tap OK.
6.
Aer adding completed, enter the device alias and tap Save.

4.3.4 Add Peripheral to the Control Panel

→ Scan QR Code to enter the Scan QR code page. Scan the QR code on the control
Note
→ Manual Adding to enter the Add Device page. Enter the device serial No. with the
to search the device.
It is required to enter the acvaon name and the password login the control panel aer it being added. The tampering alarm will not be detected within 5 minutes seer and does not operate the device.
Before You Start
Make sure the control panel is disarmed.
Steps
Note
Some control panel models do not support add zones or wireless devices remotely. You should add them to the control panel directly. For details, see the user manual of the wireless device.
1. On the device list, tap the security control panel and then log in to the device (if required) to
enter the Area page.
2. Tap
3. Scan the QR code of the peripheral.
The QR code is usually on the back cover of the device.
4. Oponal: If the QR code fails to be recognized, tap and enter the serial number of the device,
and then select the device type.
to enter the Scan QR Code page.
Note
aer you login the device as a
Note
The serial number is usually on the back cover of the device.
5. Tap Add.
65
Page 74
Hybrid Security Control Panel User Manual
Note
• When the adding peripheral is a detector, the detector will be linked to the zone. You can view the detector informaon in the Zone tab.
• Up to 32 detectors can be linked to the zone.
The added peripheral will be listed in the Zone tab or the Peripheral Device tab.
Note
One of the most important factors for a reliable wireless installaon is the signal strength between a wireless device and the panel. If a device is out of range it will not be able to send events to the control panel therefore it is recommended that a signal strength test is performed before operates by monitoring all inputs/bells on the web browser. The page will need to be re-freshed every me for a new test. See also Appearance-Funcon Buon. When performing a signal strength test it is recommended that the system is tested in the 'worst case scenario'. For example with all doors and windows closed.
xing devices into place. The control panel has advanced signal strength mechanism that

4.3.5 Add Card

You can add card to the control panel. Use the card to arm, disarm, or clear alarm.
Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the area page.
66
Page 75
Hybrid Security Control Panel User Manual
Figure 4-42 Area Page
2. Tap → User Management → Card/Tag Management to enter the Card/Tag Management
page.
3. Tap +.
4. When hearing the voice prompt "Swipe Card", you should present the card on the control panel
card
presenng area.
When hearing a beep sound, the card is recognized.
5. Create a card name and tap Finish.
Note
The name should contain 1 to 32 characters.
The card is displayed in the Card/Tag Management page.

4.3.6 Add Keyfob

You can add keyfobs to the control panel and control area arming/disarming status. You can also clear alarm when an alarm is triggered.
67
Page 76
Hybrid Security Control Panel User Manual
Steps
Note
Make sure the keyfob's frequency is the same as the control panel's.
1.
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page.
2. Tap
3. Tap Add Keyfob.
4.
Follow the
5. Create a name for the keyfob and tap Finish.
The keyfob is listed in the Wireless Device page.
6.
Oponal: You can view the keyfob's serial No. and you can also delete it.

4.3.7 User Management

Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the control panel page.
2. Tap
to enter the Scan QR Code page.
instrucon on the page and press any key on the keyfob to add.
→ User Management → User .
3. Tap Add User.
Figure 4-43 User Managment
68
Page 77
Hybrid Security Control Panel User Manual
Figure 4-44 Add User
4. Select User Type. Enter User Name and Password.
5. Enter Keypad Password.
Note
The keypad password +1 or -1 is the duress code. Use the duress code can operate the keyboard to arm and disarm normally and upload a duress alarm. For example, if the keypad password is 123456, the duress code is 123455 or 123457.
6. Tap Add to add the user.
7. Oponal: Tap a user to edit the parameters. You can choose to enable the user or not. Select
the linked area and the permission.
8.
Oponal: Tap a user and tap Delete to delete the user.
Note
Admin, installer and mabufacturer can not be deleted.
4.3.8 System Sengs
System Opon
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. Tap For
→ System Opon to set parameters.
Opon Management:
69
Page 78
Hybrid Security Control Panel User Manual
Figure 4-45 Opon Managment
Forced Arming
If the opon is enabled and there are acve faults in a zone, the zone will be bypassed automacally.
Note
If Enable Arming is enabled, Forced Arming is only eecve for Auto Arming.
System Faults
If the opon is enabled, the device will upload the system fault report automacally.
One-Push Lock
If the opon is enabled, the installer can lock other users.
For Fault Check:
70
Page 79
Hybrid Security Control Panel User Manual
Figure 4-46 Fault Check
Detect Network Camera Disconnecon
If the opon is enabled, when the linked network camera is disconnected, an alarm will be triggered.
Baery Supervision
If the opon is enabled, when baery is disconnected or out of charge, the device will not upload events.
Wired Network Fault Check
If the
opon is enabled, when the wired network is disconnected or with other faults, the alarm
will be triggered.
Wi-Fi Fault Check
If the opon is enabled, when the Wi-Fi is disconnected or with other faults, the alarm will be triggered.
Cellular Network Fault Check
If the
opon is enabled, when the cellular data network is disconnected or with other faults, the
alarm will be triggered.
SIM Card Fault Check
If the opon is enabled, the alarm will be triggered for faults of the SIM card.
Telephone Line Cut O Detecon
If the opon is enabled, the alarm will be triggered when telehphone is disconnected.
RS-485 Excepon Detecon
71
Page 80
Hybrid Security Control Panel User Manual
If the opon is enabled, the alarm will be triggered when the RS-485 bus of device has
excepon.
AC Power Down Check Time
The system checks the fault aer the congured me duraon aer AC power down.
To compliant the EN 50131-3, the check me duraon should be 10 s.
System Maintenance
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. Tap → System Maintenance to set parameters.
Reboot Device
The device will restore all parameters to the default
Partly Restore
The device will restore to its default sengs except for admin user informaon, wired network parameters, Wi-Fi network, detector informaon, and wireless device parameters.
sengs.
Public Area Conguraon
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. Tap → Area Management → Public Area Conguraon to set parameters.
Figure 4-47 Public Area Conguraon
Aer slide Enable, the area 1 will be regarded as the public area. You can select linked area as well.
72
Page 81
Hybrid Security Control Panel User Manual

4.3.9 Arm/Disarm the Zone

Arm or disarm the zone manually as you desired.
Note
Axiom security control panel supports 4 areas.
On the device list page, tap the security control panel and then log in to the device (if required) to enter the Area page. You can swipe to the le or right to switch areas.
Figure 4-48 Area Page
Operaons for a Single Area
Away: When all the people in the detecon area leave, turn on the Away mode to arm all zones
in the area aer the dened dwell me.
Stay: When the people stays inside the detecon area, turn on the Stay mode to arm all the
perimeter burglary detecon (such as perimeter detector, magnec contacts, curtain detector in the balcony). At the meanme, the detectors inside the detecon area are bypassed (such as PIR detectors). People can move inside the area and alarm will not be triggered.
Disarm: In Disarm mode, all the zones in the area will not trigger alarm, no
happen or not.
Clear Alarm: Clear all the alarms triggered by the zones of the area.
73
maer alarm events
Page 82
Hybrid Security Control Panel User Manual
Operaons for All Areas
Away: When all the people in the
in all areas aer the dened dwell me.
Stay: When the people stays inside the detecon area, turn on the Stay mode to arm all the
perimeter burglary the balcony) set in all the zones of all areas. At the meanme, the detectors inside the detecon area are bypassed (such as PIR detectors). People can move inside the area and alarm will not be triggered.
Disarm: In Disarm mode, all the zones of all areas will not trigger alarm, no maer alarm events
happen or not.
Clear Alarm: Clear all the alarms triggered by the all the zones of all the areas.
detecon (such as perimeter detector, magnec contacts, curtain detector in
detecon area leave, turn on the Away mode to arm all zones

4.3.10 Bypass Zone

When the area is armed, you can bypass a parcular zone as you desired.
Before You Start
Link a detector to the zone.
Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the Area page.
2. Select a zone in the Zone tab to enter the
3. Select a zone and enter the Sengs page.
sengs page.
Figure 4-49 Zone Sengs Page
74
Page 83
Hybrid Security Control Panel User Manual
4. Enable Zone Bypass and the zone will be in the bypass status.
The detector in the zone does not detect anything and you will not receive any alarm from the zone.

4.3.11 Set Zone

Aer the detector is added, you can set the zone, including the zone name, the zone type, zone bypass, linked camera, stay/away status, the sounder, and the silent zone. You can also view the detector serial No. (only device in 433 HMz) and the detector type of the zone.
Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the control panel page.
2. Tap Zone and then tap a zone in the Area page to enter the zone
sengs page.
Figure 4-50 Zone Seng Page
3. Set the following parameters as you desired. Zone Type
Select a zone type from the zone type list. If you select Delayed Zone, you should select an entry delay (Entry Delay 1 or Entry Delay 2)
on the pop-up page. If you select Timeout Zone, you should select a
value.
Zone Bypass
meout value or tap Custom to set a custom
75
Page 84
Hybrid Security Control Panel User Manual
Enable the funcon and the zone will be bypassed. No alarm will be received while the zone is bypassed.
Link Camera
You can link the zone to cameras. When an alarm is triggered, you can monitor the zone via the linked cameras.
Stay/Away
If this opon is Enabled the zone will be auto bypassed when the alarm system is stay armed. To re-enable the zone deselect the
Enable Silent Zone
Enable the funcon and no sounder will be triggered if an event or alarm occurs.

4.3.12 Set Arming/Disarming Schedule

Set the arming/disarming schedule to arm/disarm a parcular zone automacally.
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page.
opon.
Tap page.
Enable the auto arm/disarm the late to disarm me, entry delay me, exit delay me, sounder delay me, weekend excepon and excepted holiday.
→ Area Management and select a area, or tap on the Parion page to enter the Sengs
funcon and set the auto arm me/auto disarm me. You can also set
76
Page 85
Hybrid Security Control Panel User Manual
Figure 4-51 Arming or Disarming Schedule Page
Entry Delay 1 Entry Delay 2
Set a value for Entry Delay 1 and Entry Delay2. Entry delay is a me concept. If entry delay is congured for the delayed zone, when you enter an armed delayed zone, the zone alarm will not be triggered unl the end of entry delay.
Note
Aer set value for Entry Delay 1 and Entry Delay 2, you should set the entry delay of a specic zone to the value of Entry Delay 1 or Entry Delay 2.
Exit Delay
Set exit delay for the delayed zone. If exit delay is congured for the delayed zone, aer you arm the zone on the indoor unit, you can exit the zone without triggering alarm delay.
Auto Arm
unl the end of exit
77
Page 86
Hybrid Security Control Panel User Manual
Enable the area to automacally arm itself in a specic me point.
Auto Arm Time
Set the schedule for the area to automacally arm itself.
Late to Disarm
Enable the device to push a nocaon to the phone or tablet to remind the user to disarm the area when the area is sll armed aer a specic me point.
Note
You should enable the Panel Management Nocaon funcon on the Web Client of Communicaon Parameters → Event Communicaon before enabling the Late to Disarm
funcon.
Late to Disarm Time
Set the me point menoned in Late to Disarm.
Weekend Excepon
If enabled, Auto Arm, Auto Disarm, and Late to Disarm are disabled on the weekend.
Excepted Holiday
Enable the funcon and the zone will not be armed/disarmed in the holiday. You should set the holiday schedule aer enabling.
Note
Up to 6 holiday groups can be set.
4.3.13 Check System Status (Zone Status/Communicaon Status)
You can view the zone status and the communicaon status via the mobile client.
View Zone Status
In the Area page, tap Zone to enter the Zone tab. You can view the each zone's status in the list.
Communicaon Mode
In the Area page, tap → Device Informaon to enter the page. You can view the device
communicaon status, including the baery, Ethernet network, Wi-Fi, mobile network, data usage and so on.
Enable Arming Process
In the Area page, tap to enter the page. Slide to enable Enable Arming Process. Aer enabled, the device will auto detect its faults during the arming process. You can determine whether to connue arming or not if faults are detected.
78
Page 87
Hybrid Security Control Panel User Manual
4.3.14 Check Alarm Nocaon
When an alarm is triggered, and you will receive an alarm nocaon. You can check the alarm informaon from the mobile client.
Before You Start
• Make sure you have linked a zone with a detector.
• Make sure the zone is not bypassed.
• Make sure you have not enabled the silent zone funcon.
Steps
1. Tap Nocaon in the mobile client to enter the page.
Figure 4-52 Nocaon Page
All alarm nocaons are listed in Nocaon page.
2. Select an alarm and you can view the alarm details.
79
Page 88
Hybrid Security Control Panel User Manual
Figure 4-53 Alarm Details
3. Oponal: If the zone has linked a camera, you can view the playback when the alarm is
triggered.

4.3.15 Set Network Camera Channel

Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the control panel page.
2. Tap
3. Tap Add Channel.
→ Network Camera Channel .
Figure 4-54 Add Channel
80
Page 89
Hybrid Security Control Panel User Manual
4. Enter IP Address, Port, User Name and Password.
5. Tap
6.
Oponal: Edit a channel.
1) Select a channel in the list.
to add channel.
Figure 4-55 Network Camera Sengs
2) Tap to enetr the eding mode.
3) Edit parameters.
4) Tap
7.
Oponal: Select a channel and tap Delete to delete it.
4.3.16 Set Event Video
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page.
Tap
You need to select the video channel and set parameters.
to save.
Sengs
→ Event Video Sengs to enter the page.
81
Page 90
Hybrid Security Control Panel User Manual
Figure 4-56 Event Video Sengs
Stream Type
Main Stream: Being used in recording and HD preview, it has a high resoluon, code rate and picture quality.
Sub-Stream: It is used to transmit network and preview pictures as a video streaming with features of lower resoluon, bit rate and picture quality.
Bitrate Type
Select the Bitrate type as constant or variable.
Resoluon
Select the resoluon of the video output
Bitrate
The higher value corresponds to the higher video quality, but the
Before Alarm
Length of cached video before alarm.
Aer Alarm
Length of cached video aer alarm.
beer bandwidth is required.

4.3.17 Add a Camera to the Zone

You can link a camera to the zone to monitor the zone. You can view the alarm videos when an alarm is triggered.
Before You Start
Make sure you have installed the camera in the target zone and the camera has connected the same LAN as the security control panel's.
82
Page 91
Hybrid Security Control Panel User Manual
Steps
1. On the device list page, tap the security control panel and then log in to the device (if required)
to enter the control panel page.
2. Tap Zone to enter the zone list page.
3.
Select a zone to enter the zone
4. Tap Link Camera to enter the Link Camera page.
sengs page.
Figure 4-57 Link Camera Page
5. Select a camera in the available cameras, and tap Link.
83
Page 92
Hybrid Security Control Panel User Manual
Chapter 5 Operaons
You can use the client keyfob, card, client soware, or mobile client to do arming, disarming, bypass, and zone disabling.

5.1 Arming

You can use keypad, keyfob, card, client Aer the arming command is sending to control panel, the sytem will check the detector status. If the detector is in fault, you will need to choose whether to arm the system with fault. While the system is armed, the control panel will prompt the result in 5s, and upload the arming report.
soware, mobile client to arm your system.
Figure 5-1 Arming Process
Access level of Arming
The user in level 2 or 3 has the permission to arm or partly arm the system.
Arming Indicaon
The arming/disaring indicator keeps solid blue for 5s.
84
Page 93
Hybrid Security Control Panel User Manual
Reason of Arming Failure
• Intrusion detector triggered (excepts the detector on the exit route).
• Panic alarm device triggered.
• Tampering alarm occurred.
Communicaon excepon
• Main power supply
• Backup
• Alarm receiving fault
• Sounder fault
• Low baery of the keyfob
• Others
baery excepon
Arming with Fault
While the arming is stopped with fault, user in level 2 has the permission to arm the system with fault (forced arming). Fored arming only taks eect on the current arming operaon. The forced arming operaon will be record in the event log.
excepon

5.2 Disarming

You can disarm the system with keypad, keyfob, card, client soware, or mobile client.
Disarming Indicaon
The arming/disarming indicator ashes 30s while the user successfully disarm the system through the entry/exit route. The system will report the disarming result
aer the operaon completed.
Entry Delay Duraon
Ensure that mer is no longer than 45 seconds in order to comply with EN50131-1.
Early Alarm
If either the intrusion or tampering alarm occurs on the enter/exit route when the control panel is in the status of entry delay, the control panel then enters the early alarm mode. The early alarm The control panel will reports the alarm only if the alarm event lasts over the duraon of early alarm with the addion of entry delay.
duraon can be set (> 30s).

5.3 Use the Keyfob

The keyfod is used for away arming, stay arming, disarming, panic alarm, and clearing alarm.
85
Page 94
Hybrid Security Control Panel User Manual
Figure 5-2 Type Keyfob
Table 5-1 Type Keyfob Keys
No. Descripon
1 Indicator
Green: Successful Operaon
Red: Press the Key
2 Away Arming
3 Clearing Alarm
4 Stay Arming
5 Disarming
6 Panic Alarm (Duress Alarm)
Hold the key for 2 seconds, an alarm report will be send to the alarm center secretly without alerng.
86
Page 95
Hybrid Security Control Panel User Manual
Figure 5-3 Type Keyfob
Table 5-2 Type Keyfob Keys
No. Descripon
1 Arming (Lock)
2 Disarming( Unlock)
3 Combo-Funcon Key
Custom Combinaon Funcons (except Arming +Ⅱ and Disarming +Ⅰ) : Away Arming, Stay Arming, Disarming, Panic Alarm, Clearing Alarm, Fault Inspecon, and Arming Status Check.
The following table shows the keyfob
Table 5-3 Type
Keyfob Operaon Result Indicaon
Armed Red LED Flashes Once
Arming Failed Green LED Flashes Once
Arming Green LED Flashes 9 Times
No Arming Permission Yellow LED Flashes 4 Times
Fault Checking Finished Yellow LED Flashes 4 Times
Alarm Cleared Green LED Flashes Once
No Permission for Clearing Alarm Yellow LED Flashes 4 Times
Disarmed Green LED Flashes Once
No Disarming Permission Yellow LED Flashes 4 Times
operaon and responded indicaons.
Keyfob Operaons and Indicaons
Panic Alarm Uploaded Green LED Flashes Once
No Panic Alarm Permission Yellow LED Flashes 4 Times
87
Page 96
Hybrid Security Control Panel User Manual

5.4 Use the Card

It is poissible to arm or disarm the system with the card.
While the system is not armed, present a valid card to the control panel to arm the system.
While the system is armed, present a valid card to the control panel to disarm the system.
5.5 Use the Client Soware
Steps
1. Download, install and register to the client soware.
2. Add device in Device Management → Device .
Note
• Set the device port No. as 80.
• The user name and password when adding device are the
password.
acvaon user name and
3. Click to enter the Remote Conguraon page aer the device is completely added,
5.5.1 Add Device to the Client
Before You Start
Acvate the device and ensure that the device is on the same subnet as the PC.
Soware
Figure 5-4 Client Soware Main Page
In the client soware, go to Device Management → Device on the Maintenance and Management list. You can add devices to client
soware by several methods on the device management page.
88
Page 97
Hybrid Security Control Panel User Manual
The following describes how to add devices through IP/Domain Name. For more informaon, see iVMS-4200 Client Soware User Manual.
Steps
1. On the Device page, click Add.
2. Select IP/Domain as the adding mode, edit the device Port, User Name, and Password.
Note
The port No. is 80.
3. Check Import to Group.
4. Click Add to add the device.
informaon, including Name, Address,
5.5.2 Add Device to the Client
Before You Start
Enter the prerequisites here (oponal).
Steps
1. Click Device Management → Device on the Maintenance and Management list to enter the
page.
2. Log in the Cloud P2P account.
Click and select the region. Enter the user name and password on the pop-up
-
window. Click Login . Click Add, select the region and click Login on the pop-up winodow. Enter user name,
-
password and click Login.
Soware through Cloud P2P
89
Page 98
Hybrid Security Control Panel User Manual
Figure 5-5 Login Cloud P2P Account
Note
• If you have added a device to your Cloud P2P account, the device will appear in the device
list. If not, you need to add a device via cloud P2P or IP.
Aer you exit your Cloud P2P account, the device you added to your Cloud P2P account will
be remove.
3. Click Add, select adding mode as Cloud P2P.
4. Enter Serial No. and Vericaon Code or click Online Device to select a device.
Note
• The device should be on the same network segment as the computer so you can
online device list.
• You can check DDNS and enter parameters to enbale it.
5. Check Import to Group.
6. Click Add.
5.5.3 Area
Operaon
nd it in the
In the client soware, click Security Control Panel → Area to enter the page. You can control the selected area, such as Away Arming, Stay Arming, Disarm and Clear Alarm.
90
Page 99
Hybrid Security Control Panel User Manual
Click to enter the zone operaon page. You can Bypass and Bypass Recovered the selected zones here.

5.5.4 Operate the Relay

In the client soware, click Security Control Panel → Relay to enter the page. You can Enable or Close the selected relays.
Figure 5-6 Relay Operaon

5.5.5 Operate the Sounder

Steps
1. In the client
2. You can Enable or Close the selected sounders.
soware, click Security Control Panel → Sounder to enter the page.

5.6 Use the Web Client

Steps
1. Connect the device to the Ethernet.
2. Search the device IP address via the client
3. Enter the searched IP address in the address bar.
Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP mode.
soware and the SADP soware.
Note
When connecng the network cable with computer directly, the default IP Address is 192.0.0.64
91
Page 100
Hybrid Security Control Panel User Manual
4. Use the
Refer to Acvaon chapter for the details.
acvaon user name and password to login.
Note

5.6.1 Add/Edit/Delete Tag (Card)

You can add tag to the security control panel and you can use the tag(card) to arm/disarm the zone. You can also edit the tag informaon or delete the tag from the security control panel.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click Conguraon → User Management → Tag to enter the management page.
3. Click Add to enter the adding page.
4. Select the linked keypad.
5. Click OK and the card(tag)
Note
The card supports at least 20-thousand serial numbers.
soware, select the device on the Device Management page and click , or enter
informaon will be displayed in the list.
6. Oponal: Click and you can change the card(tag) sengs, including tage(card) type, related net user, linked area, etc.
7.
Oponal: Click to delete the card(tag).

5.6.2 Add/Edit/Delete Keyfob

You can add keyfob to the security control panel and you can control the security control panel via the keyfob. You can also edit the keyfob informaon or delete the keyfob from the security control panel.
Steps
1. In the client
the device IP address in the address bar of the web browser and log in.
2. Click
Conguraon → User Management → Keyfob to enter the Keyfob Management page.
soware, select the device on the Device Management page and click , or enter
92
Loading...