Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Technical Manual | TM-

20221022-TV-01

20240103

iProtect Access / Security | Integrations | Intrusion Detection |

Image Modified

Installation manuall iProtect → UNii

Image Removed

Image Added

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

Table of content

Table of Contents

...

1. Introduction

1.1 This document

This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.

Note! TKH-Security is not responsible for knowledge or programming the alarm panel.

...

The table below shows the necessary software and hardware which is needed:

Hardware

Type

Generic
interface

Firmwaresoftware
version

API

IPROTECT

License
needed

Alphavision

- UNii

1.0.0

2

2.1x

= > 10.x

Yes

2.17

= > 10.4.

0

12

No

iProtect™ Aurora

Medium of Large

Vanaf 10.X.X

Yes

...

2.18

= > 10.4.12

Note

Deviations from the specified versions, no guarantee can be given concerning the operation of the link.

...

2. Configuring the UNii intrusion Panel

2.1 Standard configuration

...

  • Go to IP settings and enter the following settings:

  • Generic interface menu:

  • Image Removedimage-20250107-155032.pngImage Added

    Type (Encryption): Full Advanced encryption
    Local port: 6502
    Transport protocolTransmission: UDPTCP
    Input update interval (s): 31
    Encryption key: as desired
    API Version: UNii API

  • Save and send this data to the intrusion panel

Note! These settings must correspond with the settings in iProtect.

2.3

...

UNii Programming manual

View file
nameUNii Programmeer handleiding v2.16.0 NL.pdf
View file
nameUNii programmeerhandleiding v1.6Alarmpanel User manual v2.11 EN+NL.pdf

...

3. Network settings

Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.

When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:

Platform

Protocol

Speed

Ports

Remark

UNii Panel

UDP

TCP

100Mb*

6501**

iProtect -> UNii

6502**

UNii -> iProtect

Note

Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware.

*Depends on hardware version
**Depending of the port setup. See chapter 2.2

...

4. Settings in iProtect

4.1 Add line

  • Click in iProtect on the menu item Installation | Hardware | Line.

  • Right-click in the browse window and select ‘Add line’. The detail window opens.

  • Enter these data:
    Name: Type a logical name
    Type: ‘server’
    Active: (check)
    Active with node’ s: (check)
    Mode: ‘Virtual line’

  • Save the data.

...

  • Right-click on the virtual line that just is made and select Add node.

  • Enter the following data:
    Name: Enter a logic name
    Type: ‘General intrusion’
    Driver name: ‘Alphavision API driver’
    Communication: TCP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
    Manager code: the manager code of the panel.
    Encryption key: Enter the encryption key which is entered or used in chapter 2.2
    Active: (check)
    Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
    IP-address: enter the IP-address of the intrusion panel

  • Save the data.

  • After a successful connection press on the field Read-in for taking over the programmed configuration from the Alpha-ML UNii panel (groups and points). When the read-in starts or stops, an event will be generated.

Note

Remark! Maximum 33 nodes on a virtual line

4.3 Add alarm group

Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.

...

6.1 Maximum number of items in iProtect

Table

Maximum to be defined

Alarmgroup

256

Alarmpoint

2500

6.2 Intrusion events in iProtect

...