...
Installation manuall iProtect → UNii
...
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
Table of Contents |
---|
...
1. Introduction
1.1 This document
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
Note! TKH-Security is not responsible for knowledge or programming the alarm panel.
...
The table below shows the necessary software and hardware which is needed:
Hardware |
---|
Type
Generic
interface
Firmwaresoftware
version
API | IPROTECT | License |
---|---|---|
Alphavision |
- UNii |
2.1x | = > 10.x | Yes |
2.17 | = > 10.4. |
12 |
No
iProtect™ Aurora
Medium of Large
Vanaf 10.X.X
2.18 | = > 10.4.12 |
Note |
---|
Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link. |
...
2. Configuring the UNii intrusion Panel
2.1 Standard configuration
...
Go to IP settings and enter the following settings:
Generic interface menu:
Type (Encryption): Full Advanced encryption
Local port: 6502
Transport protocolTransmission: UDPTCP
Input update interval (s): 31
Encryption key: as desired
API Version: UNii APISave and send this data to the intrusion panel
Note! These settings must correspond with the settings in iProtect.
2.3
...
UNii Programming manual
View file | ||
---|---|---|
|
View file | ||
---|---|---|
|
...
3. Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:
Platform | Protocol | Speed | Ports | Remark |
---|---|---|---|---|
UNii Panel |
TCP | 100Mb* | 6501** | iProtect -> UNii | |
6502** | UNii -> iProtect |
Note |
---|
Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware. |
*Depends on hardware version
**Depending of the port setup. See chapter 2.2
...
4. Settings in iProtect
4.1 Add line
Click in iProtect on the menu item Installation | Hardware | Line.
Right-click in the browse window and select ‘Add line’. The detail window opens.
Enter these data:
Name: Type a logical name
Type: ‘server’
Active: (check)
Active with node’ s: (check)
Mode: ‘Virtual line’Save the data.
...
Right-click on the virtual line that just is made and select Add node.
Enter the following data:
Name: Enter a logic name
Type: ‘General intrusion’
Driver name: ‘Alphavision API driver’
Communication: TCP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
Manager code: the manager code of the panel.
Encryption key: Enter the encryption key which is entered or used in chapter 2.2
Active: (check)
Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
IP-address: enter the IP-address of the intrusion panelSave the data.
After a successful connection press on the field Read-in for taking over the programmed configuration from the Alpha-ML UNii panel (groups and points). When the read-in starts or stops, an event will be generated.
Note |
---|
Remark! Maximum 33 nodes on a virtual line |
4.3 Add alarm group
Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.
...
In the tree view underneath the new record of the floor map the record “Widget positioning” has appeared. Click on this record. The detail window ‘Widget positioning’ opens.
By means of Widgets you can now display each sort status of each / each alarm point. Repeat for each Widget the next steps:
Right-click on the background image and choose ‘Security message (third party)’.
Choose ‘alarm point’ and then the sort status, which you want to have displayed.
See for this the next chapter about ‘alarm point statuses’.The default symbol for the momentary status of a default alarm point appears.
Drag with the mouse the Widget on the desired place and set the size of the
Widget.Click on the tab sheet ‘Widget control’. Select at ‘column value’ the alarm point, of
which the status has to be shown. – You can adapt at ‘column name’ the status
once more (you see here a bigger number statuses and parameters from which you
can choose). On top of this on the tab sheets you can set or determine the size and
position of the Widget exactly, that the status is not displayed with a symbol, but
textual.
...
Placing Widgets on the background image. In this example three statuses are stated by a symbol (e.g. ) and – on the right - textual (e.g. ‘sabotage closed’).
...
6.1 Maximum number of items in iProtect
Table | Maximum to be defined |
---|---|
Alarmgroup | 256 |
Alarmpoint | 2500 |
6.2 Intrusion events in iProtect
...