iProtect™ UNii
Installation manuall iProtect → UNii
|
|
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
Table of content
1 Introduction
1.1 This document
This document describes the link between an Alphatronics UNii intrusion panel and iProtect™.
Before getting started, please read the installation manual of the intrusion panel carefully.
Note! TKH Security is not responsible for knowledge or programming the alarm panel.
1.2 Required versions
The table below shows the necessary software and hardware which is needed:
Hardware | Type | Generic | Firmwaresoftware | License |
---|---|---|---|---|
Alphavision | UNii | 1.0.0 | 2.4.0 | No |
iProtect™ Aurora | Medium of Large |
| Vanaf 10.X.X | Yes |
Attention! Deviations from the specified versions, no guarantee can be given concerning the operation of the link.
2 Configuring the UNii intrusion Panel
2.1 Standard configuration
The configuration of the panel like intrusion detection zone’ s and area’ s should be done locally in the intrusion panel.
2.2 Settings in the UNii intrusion panel
Provide the intrusion panel of the following settings (by using the UNii Manager):
Go to IP settings and enter the following settings:
Generic interface menu:
Type (Encryption): Full encryption
Local port: 6502
Transport protocol: UDP
Input update interval (s): 3
Encryption key: as desired
API Version: UNii APISave and send this data to the intrusion panel
Note! These settings must correspond with the settings in iProtect.
2.3 Unii Programming manual
3 Network settings
Note! When planning the network configuration, separate the office- and the technical network from each other. This because of the EN 50131 certification.
When connecting the intrusion panel into the network and link the panel with iProtect™ Aurora, the following network ports are being used:
Platform | Protocol | Speed | Ports | Remark |
---|---|---|---|---|
UNii Panel | UDP | 100Mb* | 6501** | iProtect -> UNii |
|
|
| 6502** | UNii -> iProtect |
Remark! Testing the (Ethernet) connection by using Ping is necessary when commissioning the hardware.
*Depends on hardware version
**Depending of the port setup. See chapter 2.2
4 Settings in iProtect
4.1 Add line
Click in iProtect on the menu item Installation | Hardware | Line.
Right-click in the browse window and select ‘Add line’. The detail window opens.
Enter these data:
Name: Type a logical name
Type: ‘server’
Active: (check)
Active with node’ s: (check)
Mode: ‘Virtual line’Save the data.
4.2 Add node
Right-click on the virtual line that just is made and select Add node.
Enter the following data:
Name: Enter a logic name
Type: ‘General intrusion’
Driver name: ‘Alphavision API driver’
Communication: UDP (These setting must correspond with the Transmission setting in the UNii, see chapter 2.2)
Manager code: the manager code of the panel.
Encryption key: Enter the encryption key which is entered or used in chapter 2.2
Active: (check)
Port: Enter the local port number (6502) of the intrusion panel, see chapter 2.2.
IP-address: enter the IP-address of the intrusion panelSave the data.
After a successful connection press on the field Read-in for taking over the programmed configuration from the UNii panel (groups and points). When the read-in starts or stops, an event will be generated.
4.3 Add alarm group
Normally alarm groups are added automatically when the read-in button is pressed. If desired it is also possible to add alarm groups manually.
Right-click on the General intrusion node that just is made and select add alarm group
Enter the following data:
Name: Enter a logical name (same name as the intrusion area in the panel)
No. at the line: The number of the intrusion area
Alarm group mode: Select ‘Disarm’
Point changes when group off: Select a time zone (example: Office)
< In other words, during which time zone must iProtect monitor the alarm points
for e.g. displaying these statuses on the Keymap™>
Write point events to database: Select a time zone (example: Office)
< In other words, during which time zone must iProtect register the alarm points
for e.g. logging these statuses as event and triggering procedures>Save the record
4.4 Add alarm point
Normally alarm points are added automatically with the read in button. If desired it is also possible to add alarm points manually.
Open the Alarm group that just is made and right click on Alarm point list, select add alarm point.
Enter the following data:
Name: Enter a logical name (same name as the intrusion zone in the panel)
Omit: ‘off’
Addr. No.: The number of the intrusion zone.Enter Save the record.
5 Visualization in Keymap
5.1 Placing Widgets for visualization and control
Create under General | Settings | Keymap a floor plan / Keymap™.
Click in the frame of the detail window and load a picture of the building or from a floor where detectors are installed. Save the record. The image will now be displayed as a background image for the alarm visualization.
Loading the background image for the floor map (Dutch working station)
In the tree view underneath the new record of the floor map the record “Widget positioning” has appeared. Click on this record. The detail window ‘Widget positioning’ opens.
By means of Widgets you can now display each sort status of each / each alarm point. Repeat for each Widget the next steps:
Right-click on the background image and choose ‘Security message (third party)’.
Choose ‘alarm point’ and then the sort status, which you want to have displayed.
See for this the next chapter about ‘alarm point statuses’.The default symbol for the momentary status of a default alarm point appears.
Drag with the mouse the Widget on the desired place and set the size of the
Widget.Click on the tab sheet ‘Widget control’. Select at ‘column value’ the alarm point, of
which the status has to be shown. – You can adapt at ‘column name’ the status
once more (you see here a bigger number statuses and parameters from which you
can choose). On top of this on the tab sheets you can set or determine the size and
position of the Widget exactly, that the status is not displayed with a symbol, but
textual.
Placing Widgets on the background image. In this example three statuses are stated by a symbol (e.g. ) and – on the right - textual (e.g. ‘sabotage closed’).
You can set comparable statuses of alarm groups.
Which default symbols represents which value of a alarm point or alarm group status,
can you view at General | Settings | Keymap | Icon assignment.Open at General | Overviews the new floor map. Check whether changes at the detectors are shown in the right way.
5.2 Alarm point status
You can have 3 sorts status of an alarm point (detector) shown:
Physical status (or ‘point status’ in the detail window of the alarm point)
Logical status
Calculating status (or ‘alarm status’ in the detail window of the alarm point)
5.2.1 Physical status
The physical status can be separated thus into 3 groups:
Extreme resistance values which can only be explained by sabotage of the detector (‘Sabotage closed’/‘Sabotage opened’), this alarm situation will be notified with the highest priority – independent of e.g. the detector operation
Unusual resistance values which cannot be explained by normal detector operation and e.g. can hint on cable contact (‘Low resistance’/‘High resistance’)
Resistance values, which the detector can assume at regular function (‘Normal’/ ‘Open’)
5.2.2 Logical status
The logical status is a first interpretation of the resistance value based on the sort detector and entered parameters (e.g. ‘bypassed’ on ‘yes’):
Idle: the detector does not notice an insecure situation
Active: the detector notices an insecure situation, but his alarm group does not stand on ‘armed’
Alarm: the detector notices an insecure situation and his alarm group stands on ‘armed’
Bypassed: the messages of this detector will be ignored by the system
Sabotage: e.g. someone opens the housing of the detector without permission
Local alarm
Hold-up alarm
Unknown
5.2.3 Calculated status
The calculated status is a combination of the logical status of the detector and the en de arming of the alarm group of the alarm point:
Idle: the alarm group of the alarm point is not standing anymore on “armed’ and the alarm point does not send an alarm message
Activated: the alarm group of the alarm point stands on “armed’ and the alarm point sends no alarm message
Active: the alarm group of the alarm point does not stand on ‘armed’, the alarm point has passed an alarm message and the alarm group has not been reset
Alarm: the alarm group of the alarm point stands on armed’, the alarm point has passed an alarm message and the alarm group has not been reset
Bypassed: the alarm group of the alarm point stands on ‘bypassed’
6 General
6.1 Maximum number of items in iProtect
Table | Maximum to be defined |
---|---|
Alarmgroup | 256 |
Alarmpoint | 2500 |
6.2 Intrusion events in iProtect
Within iProtect the next event types can appear regarding the intrusion detection panel
Alarm point: Status changed
Alarm point: Bypass status changed
Alarm point: Mode changed
Alarm group: Status changed
Alarm group: Mode changed
Alarm group: Alarm changed
Security device message
Read-in event