Technical Manual | TM-20210309-TP-09 iProtect Access / Security | Integrations | Intrusion Detection | | PDF Download |
This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.
1 Introduction
1.1 This document
This document describes the programming within iProtect to set or unset security area’s using standard card readers.
In this manual we assume that all the setting have been made and the intrusion panel is linked with iProtect.
Note! Keyprocessor is not responsible for knowledge or programming the alarm panel. |
---|
1.2 iProtect version
This document is based on iProtect version 8.03.31
2 Configuration in iProtect
2.1 Area configuration
Open menu: Access | Settings | Area. The detail window opens.
Click with the right mouse button in the left field and choose Add area
Name: Enter a logical name
Alarm group mode: unsetSave the settings
2.2 Alarm group settings
Open menu: Installation | Hardware | Alarm system | Third party | Alarm group. The detail window opens.
Select the alarm group you want to arm with a iProtect reader:
Access area: select the area that is just programmed in chapter 2.1Save the settings
2.3 Arm- disarm settings
This section is divided in two groups because it is possible to:
trigger the arming with a button next to the reader OR
in case of a pin code reader a button on the keypad
2.3.1 Settings when using a button
Function:
When the button is pressed before presenting a card for the reader, the system will be start arming. For disarming no button need to be pressed but further the conditions are the same One of the conditions which are needed to arm the intrusion system are:
The card must be valid
The card must have access rights for that reader
The card must have rights to arm the system
How to setup:
Open menu: Installation | Hardware | Node. The detail window opens.
Select the node that contains the iProtect reader which is used for arming/disarmingOpen the specific card reader
Open the tab Input/Output:
Add the Intrusion security activation input: Select the input on the card readerOpen the tab APB:
Select the undefined access area “Outside for access control” at “From area”.
Select the access area you enter at “To area”.Open the tab Security area:
Show security area status on LED: Select a desired security area
< The LED from the card reader will blink when security area is Armed>
Arm security area: Select a desired security area
Disarm security area: Select a desired security areaSave the settings
2.3.2 Settings when using a pin code reader
Function:
When a defined button (*) on the keypad is pressed before presenting a card for the reader, the system will be start arming.
For disarming no key press is necessary. Presenting a card will start disarming.
One of the conditions which are needed to arm the intrusion system are:
The arm button on the keypad needs to be defined
The card must be valid and provided of a pin code
The card must have access rights for that reader
The card must have rights to arm the system
How to setup:
Open menu: Installation | Hardware | Node. The detail window opens.
Select the node that contains the iProtect reader which is used for arming/disarmingOpen the specific card reader
Open the tab Input/Output:
Add the Intrusion security activation input: Select the input on the card readerOpen the the Tab APB:
Select the undefined access area “Outside for access control” at “From area”.
Select the access area you enter at “To area”.Open the tab Security area:
Show security area status on LED: Select a desired security area
< The LED from the card reader will blink when security area is Armed>
Arm security area: Select a desired security area
Disarm security area: Select a desired security areaSave the settings
Open menu: Access | Settings | Card coding | Card data interpretation. The detail window opens.
Select the ’’Card number interpretation’’ that is used by the reader
Go to the tab Pincode options
Intrusion system arming key: select *
PIN length: 4 (or 6)Save the settings
2.4 Configuring the Alarm user group
The alarm user Group determines whether the user may arm or disarm the security area.
Open menu: Installation | Hardware Alarm system | Third party | Alarm User Group. The detail window opens.
Click with the right mouse button in the left field and choose add ’’alarm user group’’.
Name: Give a logical name
Arm: check if allowed to arm the security area
Disarm: check if allowed to disarm the security areaSafe the settings
Click in the browse window and click the plus sign of the ‘alarm user group’ and select 'Area list'. Check the desired areas and save.
Open in iProtect™ Aurora the menu Access | Settings | Admittance to add the Alarm user group to an existing Admittance
Save the settings