Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

Installation Manual | IM-20210309-TP-04

iProtect Access / Security | Integrations | Intercom |

Image Added

View file
nameIM-20210309-TP-04.pdf

Table of Contents

...

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

Table of content

...


...

1 Introduction

To iProtect a Commend intercom system can be linked. You can program in iProtect the main and slave stations in such a way that a call is generated when someone is calling from a slave station. For extended installation possibilities and programming the manual from Commend has to be consulted. We suppose that you are familiar with the programming in Commend and in this way the installation in CCT can be programmed.

...

  • Fill in the address at the license which is going to be created in the programming (Interfaces| Data Interfaces). Like in upper example the addresses 0-8 and in the license 0/08 must be equal to each other.

  • Fill in at Intercom Server| General Settings the communication channel (see example below). If Control Stations have been created, here also the communication channel has to be chosen.

...

2.2 License in

...

Commend when link over IP

Make sure at the GE300/GE800 that the license L3-ICX for the GE300 or L8-ICX for the GE800 is created and assigned on the correct GEP card.

...

If a link is being made based on IP, this cable does not have to be connected and the link can
be realized with a iPU-8 or Polyx.

Note: If a link is being made based on IP, this cable does not have to be connected and the link can be realized with a iPU-8 or Polyx.

...

4 Programming of the link

...

There are different ways to handle intercom:

  1. via the keymap

  2. via action/procedure with e.g. a pop-up intercom dialogue

  3. via a fixed intercom dialogue.

6.1 Intercom visualization via Keymap

The status of the stations can be displayed in Keymap. When on a intercom station is pressed
with the left mouse (see A in example below), the intercom dialogue opens.

...

Note

The system user must have alarm manager authorization to operate the intercom stations.

image-20241001-092057.pngImage Added

6.2 Intercom visualization via access request

...

  • Select Installation| Intercom| Intercom group and create a intercom group.

  • Assign to this intercom group the main station via the intercom station list, which you have chosen for the work station.

  • Assign the slave stations via the intercom station connection list, which has to appear in
    the handling screen.

...

Note

The system user must have alarm manager authorization to operate the intercom stations.

image-20241001-092057.pngImage Added

7 Change intercom display lines with iProtect

...