...
Technical Manual | TM- |
20240103 iProtect Access / Security | Integrations | Intrusion Detection | |
Installation manuall iProtect → UNii
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
Table of Contents |
---|
...
1. Introduction
1.1 This document
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
Note! TKH-Security is not responsible for knowledge or programming the alarm panel.
...
The table below shows the necessary software and hardware which is needed:
Hardware |
---|
Type
Generic
interface
Firmwaresoftware
version
API | IPROTECT | License |
---|---|---|
Alphavision |
- UNii |
1.0.0
2.1x | = > 10.x | Yes |
2.17 | = > 10.4. |
12 |
No
iProtect™ Aurora
Medium of Large
Vanaf 10.X.X
Yes
...
2.18 | = > 10.4.12 |
Note |
---|
Deviations from the specified versions, no guarantee can be given concerning the operation of the link. |
...
2. Configuring the UNii intrusion Panel
2.1 Standard configuration
...
Go to IP settings and enter the following settings:
Generic interface menu:
Type (Encryption): Full Advanced encryption
Local port: 6502
Transport protocolTransmission: UDPTCP
Input update interval (s): 31
Encryption key: as desired
API Version: UNii APISave and send this data to the intrusion panel
Note! These settings must correspond with the settings in iProtect.
2.3
...
UNii Programming manual
View file | ||
---|---|---|
|
View file | ||
---|---|---|
|
...
3. Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:
Platform | Protocol | Speed | Ports | Remark |
---|---|---|---|---|
UNii Panel |
TCP | 100Mb* | 6501** | iProtect -> UNii | |
6502** | UNii -> iProtect |
Note |
---|
Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware. |
*Depends on hardware version
**Depending of the port setup. See chapter 2.2
...
4. Settings in iProtect
4.1 Add line
Click in iProtect on the menu item Installation | Hardware | Line.
Right-click in the browse window and select ‘Add line’. The detail window opens.
Enter these data:
Name: Type a logical name
Type: ‘server’
Active: (check)
Active with node’ s: (check)
Mode: ‘Virtual line’Save the data.
...
Right-click on the virtual line that just is made and select Add node.
Enter the following data:
Name: Enter a logic name
Type: ‘General intrusion’
Driver name: ‘Alphavision API driver’
Communication: TCP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
Manager code: the manager code of the panel.
Encryption key: Enter the encryption key which is entered or used in chapter 2.2
Active: (check)
Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
IP-address: enter the IP-address of the intrusion panelSave the data.
After a successful connection press on the field Read-in for taking over the programmed configuration from the Alpha-ML UNii panel (groups and points). When the read-in starts or stops, an event will be generated.
Note |
---|
Remark! Maximum 33 nodes on a virtual line |
4.3 Add alarm group
Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.
...
6.1 Maximum number of items in iProtect
Table | Maximum to be defined |
---|---|
Alarmgroup | 256 |
Alarmpoint | 2500 |
6.2 Intrusion events in iProtect
...