...
Technical Manual | TM- |
20240103 iProtect Access / Security | Integrations | Intrusion Detection | |
Installation manuall iProtect → UNii
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
Table of Contents |
---|
...
1 Introduction
...
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
Note! TKH-Security is not responsible for knowledge or programming the alarm panel.
...
The table below shows the necessary software and hardware which is needed:
Hardware |
---|
Type
Generic
interface
Firmwaresoftware
version
API | IPROTECT | License |
---|---|---|
Alphavision |
- UNii |
1.0.0
2.1x | = > 10.x | Yes |
2.17 | = > 10.4. |
12 |
No
iProtect™ Aurora
Medium of Large
Vanaf 10.X.X
Yes
2.18 | = > 10.4.12 |
Note |
---|
Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link. |
...
Go to IP settings and enter the following settings:
Generic interface menu:
Type (Encryption): Full encryption
Local port: 6502
Transport protocol: UDP
Input update interval (s): 3
Encryption key: as desired
API Version: UNii APISave and send this data to the intrusion panel
Note! These settings must correspond with the settings in iProtect.
2.3
...
UNii Programming manual
View file | ||
---|---|---|
|
View file | ||
---|---|---|
|
...
3 Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:
Platform | Protocol | Speed | Ports | Remark |
---|---|---|---|---|
UNii Panel | UDP | 100Mb* | 6501** | iProtect -> UNii |
6502** | UNii -> iProtect |
Note |
---|
Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware. |
...
6.1 Maximum number of items in iProtect
Table | Maximum to be defined |
---|---|
Alarmgroup | 256 |
Alarmpoint | 2500 |
6.2 Intrusion events in iProtect
...