...
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
Table of Contents |
---|
...
1. Introduction
1.1 This document
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
...
Hardware | API | IPROTECT | License |
---|---|---|---|
Alphavision - UNii | 2.1x | = > 10.x | Yes |
2.17 | = > 10.4.12 | ||
2.18 | = > 10.4.12 |
Note |
---|
Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link. |
...
2. Configuring the UNii intrusion Panel
2.1 Standard configuration
...
View file | ||
---|---|---|
|
View file | ||
---|---|---|
|
...
3. Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
...
*Depends on hardware version
**Depending of the port setup. See chapter 2.2
...
4. Settings in iProtect
4.1 Add line
Click in iProtect on the menu item Installation | Hardware | Line.
Right-click in the browse window and select ‘Add line’. The detail window opens.
Enter these data:
Name: Type a logical name
Type: ‘server’
Active: (check)
Active with node’ s: (check)
Mode: ‘Virtual line’Save the data.
...