...
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
Table of Contents |
---|
...
1. Introduction
1.1 This document
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
...
Hardware | API | IPROTECT | License |
---|---|---|---|
Alphavision - UNii | 2.1x | = > 10.x | Yes |
2.17 | = > 10.4.12 | ||
2.18 | = > 10.4.12 |
Note |
---|
Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link. |
...
2. Configuring the UNii intrusion Panel
2.1 Standard configuration
...
Go to IP settings and enter the following settings:
Generic interface menu:
Type (Encryption): Full Advanced encryption
Local port: 6502
Transport protocolTransmission: UDPTCP
Input update interval (s): 31
Encryption key: as desired
API Version: UNii APISave and send this data to the intrusion panel
...
View file | ||
---|---|---|
|
View file | ||
---|---|---|
|
...
3. Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:
Platform | Protocol | Speed | Ports | Remark |
---|---|---|---|---|
UNii Panel | UDPTCP | 100Mb* | 6501** | iProtect -> UNii |
6502** | UNii -> iProtect |
...
*Depends on hardware version
**Depending of the port setup. See chapter 2.2
...
4. Settings in iProtect
4.1 Add line
Click in iProtect on the menu item Installation | Hardware | Line.
Right-click in the browse window and select ‘Add line’. The detail window opens.
Enter these data:
Name: Type a logical name
Type: ‘server’
Active: (check)
Active with node’ s: (check)
Mode: ‘Virtual line’Save the data.
...
Right-click on the virtual line that just is made and select Add node.
Enter the following data:
Name: Enter a logic name
Type: ‘General intrusion’
Driver name: ‘Alphavision API driver’
Communication: UDP TCP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
Manager code: the manager code of the panel.
Encryption key: Enter the encryption key which is entered or used in chapter 2.2
Active: (check)
Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
IP-address: enter the IP-address of the intrusion panelSave the data.
After a successful connection press on the field Read-in for taking over the programmed configuration from the UNii panel (groups and points). When the read-in starts or stops, an event will be generated.
Note |
---|
Remark! Maximum 33 nodes on a virtual line |
4.3 Add alarm group
Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.
...