Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Installation manuall iProtect → UNii

...

Technical Manual | TM-20240103

iProtect Access / Security | Integrations | Intrusion Detection |

Image Added
Image Added

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

Table of content

Table of Contents

...

1. Introduction

1.1 This document

This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.

Note! TKH-Security is not responsible for knowledge or programming the alarm panel.

...

The table below shows the necessary software and hardware which is needed:

Hardware

Type

Generic
interface

Firmwaresoftware
version

API

IPROTECT

License
needed

Alphavision

- UNii

1.0.0

2.1x

= > 10.x

Yes

2.17

= > 10.4.

0

12

No

iProtect™ Aurora

Medium of Large

Vanaf 10.X.X

Yes

2.18

= > 10.4.12

Note

Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link.

...

2. Configuring the UNii intrusion Panel

2.1 Standard configuration

...

  • Go to IP settings and enter the following settings:

  • Generic interface menu:

  • Image Removedimage-20250107-155032.pngImage Added

    Type (Encryption): Full Advanced encryption
    Local port: 6502
    Transport protocolTransmission: UDPTCP
    Input update interval (s): 31
    Encryption key: as desired
    API Version: UNii API

  • Save and send this data to the intrusion panel

Note! These settings must correspond with the settings in iProtect.

2.3

...

UNii Programming manual

View file
nameUNii programmeerhandleiding v1.6Programmeer handleiding v2.16.0 NL.pdf
View file
nameUNii Alarmpanel User manual v2.11 EN+NL.pdf

...

3. Network settings

Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.

When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:

Platform

Protocol

Speed

Ports

Remark

UNii Panel

UDP

TCP

100Mb*

6501**

iProtect -> UNii

6502**

UNii -> iProtect

Note

Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware.

*Depends on hardware version
**Depending of the port setup. See chapter 2.2

...

4. Settings in iProtect

4.1 Add line

  • Click in iProtect on the menu item Installation | Hardware | Line.

  • Right-click in the browse window and select ‘Add line’. The detail window opens.

  • Enter these data:
    Name: Type a logical name
    Type: ‘server’
    Active: (check)
    Active with node’ s: (check)
    Mode: ‘Virtual line’

  • Save the data.

...

  • Right-click on the virtual line that just is made and select Add node.

  • Enter the following data:
    Name: Enter a logic name
    Type: ‘General intrusion’
    Driver name: ‘Alphavision API driver’
    Communication: TCP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
    Manager code: the manager code of the panel.
    Encryption key: Enter the encryption key which is entered or used in chapter 2.2
    Active: (check)
    Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
    IP-address: enter the IP-address of the intrusion panel

  • Save the data.

  • After a successful connection press on the field Read-in for taking over the programmed configuration from the Alpha-ML UNii panel (groups and points). When the read-in starts or stops, an event will be generated.

Note

Remark! Maximum 33 nodes on a virtual line

4.3 Add alarm group

Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.

...

  • In the tree view underneath the new record of the floor map the record “Widget positioning” has appeared. Click on this record. The detail window ‘Widget positioning’ opens.

  • By means of Widgets you can now display each sort status of each / each alarm point. Repeat for each Widget the next steps:

  1. Right-click on the background image and choose ‘Security message (third party)’.
    Choose ‘alarm point’ and then the sort status, which you want to have displayed.
    See for this the next chapter about ‘alarm point statuses’.

  2. The default symbol for the momentary status of a default alarm point appears.
    Drag with the mouse the Widget on the desired place and set the size of the
    Widget.

  3. Click on the tab sheet ‘Widget control’. Select at ‘column value’ the alarm point, of
    which the status has to be shown. – You can adapt at ‘column name’ the status
    once more (you see here a bigger number statuses and parameters from which you
    can choose). On top of this on the tab sheets you can set or determine the size and
    position of the Widget exactly, that the status is not displayed with a symbol, but
    textual.

...

Placing Widgets on the background image. In this example three statuses are stated by a symbol (e.g. ) and – on the right - textual (e.g. ‘sabotage closed’).

...

6.1 Maximum number of items in iProtect

Table

Maximum to be defined

Alarmgroup

256

Alarmpoint

2500

6.2 Intrusion events in iProtect

...