Laserfiche WebLink
. . <br /> User interface Easy Exit control <br /> ^ Supervision ofupto1hkeypads (up to8% The control panel changes from one armed state to <br /> unsupervised keypads can be used) another armed state without disarming. For example, <br /> ~ Remote Programming Software (RPS) a||uvvs end if you change the state from Perimeter Arm to Master <br /> users to perform control panel managmmenttasks— Arm' the control panel complies and reports the <br /> Add/De|eto/Cban8e user paoscudo» and authorities, change. Easy Exit Control reduces the number of <br /> view and print the panel history event log koystrokes, simplifying system oparation <br /> ^ Custom keypad text io fully programmable, including � <br /> remote programming Programmable passco6e'contro)|e6 Menu List <br /> ^ Full function command menu including Custom The system prompts users to enter a paxsoodo prior to <br /> Functions viewing the keypad menu.The keypad display shows <br /> ` Authority by area and 18-character name for each the user the menu options allowed according to the <br /> user user's authority level. Passcode'contro||ed menus <br /> ^ 14 custom authority levels control user's authority to provide users only with the options and information <br /> chaoge, add, or delete passcodes or access control pertinent to them, simplifying system operation. <br /> credentials;to disarm orbypass points;and to start <br /> system tests Flexible control <br /> The system provides the flexibility to select added <br /> Area configurations convenience ur high socurity For you can <br /> Area programming offers avvide selection of different ' ' <br /> system configurations. Each area an restrict Pamsc»dm arming and disarming toakeypad'a <br /> ' immediate local oca| area' even if the user has access tu <br /> account number to define annunciation, control, and othararaas. This in particularly useful for high securi <br /> ty <br /> reportingfunctions. Multiple areas can be linked to u <br /> areas where a user may have access to the area but <br /> shared area which is automatically controlled (hallway would <br /> prefer to only disarm the area individually rather <br /> or lobby). Area be on other ~ <br /> ' than with the rest of the system. Another option is to <br /> areas (master orasyodate) Any be <br /> ' program the system to disarm all areas the user can <br /> configured for perimeter and interior arming, not access from any keypad <br /> requiring asoparato area for this function. <br /> ' <br /> Invisible walk test <br /> Custom functions <br /> A menu item allows the user to test invisible 24'hour <br /> For added convenience, Custom Functions can be <br /> points within the scope of the keypad without sending <br /> programmed to eliminate keystrokes for users allowing a report to the central station <br /> the installer to program an easy command for a ' <br /> complicate function'. For example, acustom function System users <br /> can be written to bypass agroup of points and arm The system supports up to 1000 uses, each can have <br /> the systom, allowing the user to perform this function a Poas«»de' an access token and awiro|oss koyfob. <br /> with one easy command. This can be used to control a UsprPassoodes contain three to six digits. Passcodos <br /> particular room, or even asing|e door allowing can be assigned to one of14 customized authority <br /> customized access. In additions, Custom Functions levels ineach area, and can be restricted to operate <br /> can be activated with atoken or card, or automatically only during certain times. <br /> as asohedu|ad event (SKED) providing further Communication formats <br /> flexibility and ease ofuse. The con panel prioritizes and sends reports in <br /> ` Door-activated custmnnfoncdmn Contact |D or Modem Ilia' communications formats to <br /> Acustom function activates when user credentials are four route groups. Each group has a programmable <br /> presented toaBS01 or D8210C access control primary and backup destination. <br /> modu/e's door controller's reader. The custom The control panel provides flexible communications for <br /> function behaves as though the user performed a most central stations with reporting capabilities such <br /> function at the keypad associated with the door as: <br /> controller. ^ Individual point numbers <br /> ^ Opening or closing reports by user and area number <br /> Passcodeseour|ty . Remote programming attempts <br /> For high security applications, GV4 can be configured ^ Diagnostic reports <br /> for several different paaucode options. <br /> ^ Dual Authentication—requires a user to enter their |p communication <br /> passoodoand also use atoken or card. The control panel uses the B425/B420 Connetix <br /> ` Two-Man Rule Requires two people with two unique Ethernet Communication Module, DX4O2O and/or the <br /> paoscodostobe present at the time ofopening. |TS'DX4O20-G Cellular Communicator tocommunicate <br /> ^ Early Ambush'A||ovvs uses to verify that the facility with the Con*ttix D6600 and D61001 Communications <br /> is safe by requiring two pasocode entries atdifferent Receive r/Gateways. Using Cnnettix |P communication <br /> keypads within the same area, sending a duress event offers asecure path that includes anti-replay/anti- <br /> if the user does not enter the passcode a second time <br /> after inspecting the premises. <br />