Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

Table of content


1 Introduction

1.1 This document

This document describes the programming within iProtect to set or unset security area’s using standard card readers.
In this manual we assume that all the setting have been made and the intrusion panel is linked with iProtect.

Note! Keyprocessor is not responsible for knowledge or programming the alarm panel.

1.2 iProtect version

This document is based on iProtect version 8.03.31


2 Configuration in iProtect

2.1 Area configuration

  • Open menu: Access | Settings | Area. The detail window opens.

  • Click with the right mouse button in the left field and choose Add area
    Name: Enter a logical name
    Alarm group mode: unset

  • Save the settings

2.2 Alarm group settings

  • Open menu: Installation | Hardware | Alarm system | Third party | Alarm group. The detail window opens.

  • Select the alarm group you want to arm with a iProtect reader:
    Access area: select the area that is just programmed in chapter 2.1

  • Save the settings

2.3 Arm- disarm settings

This section is divided in two groups because it is possible to:

  1. trigger the arming with a button next to the reader OR

  2. in case of a pin code reader a button on the keypad

2.3.1 Settings when using a button

Function:
When the button is pressed before presenting a card for the reader, the system will be start arming. For disarming no button need to be pressed but further the conditions are the same One of the conditions which are needed to arm the intrusion system are:

  • The card must be valid

  • The card must have access rights for that reader

  • The card must have rights to arm the system

How to setup:

  • Open menu: Installation | Hardware | Node. The detail window opens.
    Select the node that contains the iProtect reader which is used for arming/disarming

  • Open the specific card reader

  • Open the tab Input/Output:
    Add the Intrusion security activation input: Select the input on the card reader

  • Open the tab APB:
    Select the undefined access area “Outside for access control” at “From area”.
    Select the access area you enter at “To area”.

  • Open the tab Security area:
    Show security area status on LED: Select a desired security area
    < The LED from the card reader will blink when security area is Armed>
    Arm security area: Select a desired security area
    Disarm security area: Select a desired security area

  • Save the settings

2.3.2 Settings when using a pin code reader

Function:

When a defined button (*) on the keypad is pressed before presenting a card for the reader, the system will be start arming.
For disarming no key press is necessary. Presenting a card will start disarming.

One of the conditions which are needed to arm the intrusion system are:

  • The arm button on the keypad needs to be defined

  • The card must be valid and provided of a pin code

  • The card must have access rights for that reader

  • The card must have rights to arm the system

How to setup:

  • Open menu: Installation | Hardware | Node. The detail window opens.
    Select the node that contains the iProtect reader which is used for arming/disarming

  • Open the specific card reader

  • Open the tab Input/Output:
    Add the Intrusion security activation input: Select the input on the card reader

  • Open the the Tab APB:
    Select the undefined access area “Outside for access control” at “From area”.
    Select the access area you enter at “To area”.

  • Open the tab Security area:
    Show security area status on LED: Select a desired security area
    < The LED from the card reader will blink when security area is Armed>
    Arm security area: Select a desired security area
    Disarm security area: Select a desired security area

  • Save the settings

  • Open menu: Access | Settings | Card coding | Card data interpretation. The detail window opens.
    Select the ’’Card number interpretation’’ that is used by the reader
    Go to the tab Pincode options
    Intrusion system arming key: select *
    PIN length: 4 (or 6)

  • Save the settings

2.4 Configuring the Alarm user group

The alarm user Group determines whether the user may arm or disarm the security area.

  • Open menu: Installation | Hardware Alarm system | Third party | Alarm User Group. The detail window opens.
    Click with the right mouse button in the left field and choose add ’’alarm user group’’.
    Name: Give a logical name
    Arm: check if allowed to arm the security area
    Disarm: check if allowed to disarm the security area

  • Safe the settings

  • Click in the browse window and click the plus sign of the ‘alarm user group’ and select 'Area list'. Check the desired areas and save.

  • Open in iProtect™ Aurora the menu Access | Settings | Admittance to add the Alarm user group to an existing Admittance

  • Save the settings

  • No labels