Manual de Hikvision Axhub
Manual de Hikvision Axhub
Manual de Hikvision Axhub
Installation Guide
1
Network Security Control Panel Installation Guide
User Manual
COPYRIGHT © 2018 Hangzhou Hikvision Digital Technology Co., Ltd.
ALL RIGHTS RESERVED.
Any and all information, including, among others, wordings, pictures, graphs are the properties of
Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be
“Hikvision”). This user manual (hereinafter referred to be “the Manual”) cannot be reproduced,
changed, translated, or distributed, partially or wholly, by any means, without the prior written
permission of Hikvision. Unless otherwise stipulated, Hikvision does not make any warranties,
guarantees or representations, express or implied, regarding to the Manual.
About this Manual
This Manual is applicable to Network Security Control Panel.
The Manual includes instructions for using and managing the product. Pictures, charts, images and all
other information hereinafter are for description and explanation only. The information contained in
the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find
the latest version in the company website (http://overseas.hikvision.com/en/).
Please use this user manual under the guidance of professionals.
Trademarks Acknowledgement
and other Hikvision’s trademarks and logos are the properties of Hikvision in various
jurisdictions. Other trademarks and logos mentioned below are the properties of their respective
owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS
HARDWARE, SOFTWARE AND FIRMWARE, IS PROVIDED “AS IS”, WITH ALL FAULTS AND ERRORS, AND
HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION,
MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-
INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES,
OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT
DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS
PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT
YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS
INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE
APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH
ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.
2
Network Security Control Panel Installation Guide
Regulatory Information
FCC Information
FCC compliance: This equipment has been tested and found to comply with the limits for a digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own expense.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired
operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the EMC Directive 2004/108/EC, the RoHS Directive 2011/65/EU.
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to avoid danger
or property loss.
The precaution measure is divided into ‘Warnings’ and ‘Cautions’:
Warnings: Serious injury or death may be caused if any of these warnings are neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are neglected.
3
Network Security Control Panel Installation Guide
Warnings Follow these safeguards to prevent Cautions Follow these precautions to prevent
serious injury or death. potential injury or material damage.
Warnings:
Please adopt the power adapter which can meet the safety extra low voltage (SELV) standard. The
power consumption cannot be less than the required value.
Do not connect several devices to one power adapter as an adapter overload may cause over-
heating and can be a fire hazard.
When the product is installed on a wall or ceiling, the device should be firmly fixed.
To reduce the risk of fire or electrical shock, do not expose the indoor used product to rain or
moisture.
This installation should be made by a qualified service person and should conform to all the local
codes.
Please install blackouts equipment into the power supply circuit for convenient supply interruption.
If the product does not work properly, please contact your dealer or the nearest service center.
Never attempt to disassemble the product yourself. (We shall not assume any responsibility for
problems caused by unauthorized repair or maintenance.)
Please do not look directly into the laser light within 6 meters because laser is hazardous to humans.
4
Network Security Control Panel Installation Guide
Cautions:
Make sure the power supply voltage is correct before using the product.
Do not drop the product or subject it to physical shock. Do not install the product on vibratory
surface or places.
Do not expose it to high electromagnetic radiating environment.
Do not aim the lens at the strong light such as sun or incandescent lamp. The strong light can cause
fatal damage to the product.
The sensor may be burned out by a laser beam, so when any laser equipment is being used, make
sure that the surface of the sensor not be exposed to the laser beam.
For working temperature, please refer to the specification manual for details.
To avoid heat accumulation, good ventilation is required for a proper operating environment.
While shipping, the product should be packed in its original packing.
Please use the provided glove when open up the product cover. Do not touch the product cover
with fingers directly, because the acidic sweat of the fingers may erode the surface coating of the
product cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the product cover. Do not
use alkaline detergents.
Improper use or replacement of the battery may result in hazard of explosion. Please use the
manufacturer recommended battery type.
5
Content
Chapter 1 Introduction ........................................................................... 8
1.1 Overview............................................................................................... 8
1.2 Feature.................................................................................................. 8
Chapter 2 Installation and Wiring ........................................................ 11
2.1 Main Board Overview .......................................................................... 11
2.2 Device Wiring ...................................................................................... 12
2.2.1 Detector Wiring ................................................................................................12
2.2.2 Alarm Output Wiring ........................................................................................14
2.2.3 Keypad Wiring ..................................................................................................14
2.3 System Start-up ................................................................................... 15
2.3.1 Control Panel Start-up ......................................................................................15
2.3.2 Alarm Keypad Start-up .....................................................................................15
2.3.3 Keypad Address ................................................................................................16
2.3.4 Factory Settings ................................................................................................16
2.3.5 Activating the Control Panel .............................................................................17
6
Network Security Control Panel Installation Guide
Appendix1:Specifications ...................................................................... 66
Appendix2:CID Report........................................................................... 67
Appendix3:LED Keypad Prompt Sound .................................................. 70
Appendix4:Command Table .................................................................. 71
7
Network Security Control Panel Installation Guide
Chapter 1 Introduction
1.1 Overview
1.2 Feature
Partitioning
8 partitions, which can be controlled independently;
1 common partition (No.1 partition), that can be programmed to be linked with
any other two partitions;
Event Log *
Provides a Contact ID report cache that can store up to 250 reports;
Up to 8,000 alarm event logs, 2000 operation events logs and 1500 management
event logs can be stored with time tag;
8
Network Security Control Panel Installation Guide
Report Strategy
Support up to 2 independent central stations over the phone lines;
Support up to 2 independent central stations over the Ethernet network;
Support up to 2 independent central stations over the GPRS wireless network;
Support up to 6 independent report channel groups consisted of one main channel
and 3 backup channels each, that can transmit reports in parallel;
Each report channel can be configured to transmit reports to the central alarm
monitoring station over the telephone, Ethernet or GPRS wireless network;
Report can be pushed to a mobile phone with mobile client;
Report message can be transmitted to the mobile users with a bound phone
number (SIM card);
Supports 6 communication channels over the Ethernet network base on the
HIK-SDK protocol;
Remote Control
Up to 32 key fobs for radio transmitter operations;
Allows remote control operations with mobile client;
Message control operations, such as arming, disarming, and clearing the alarm, via
short messages sent from the bound phone number;
Peripherals Devices
Up to 8 addressable keypads;
1 external audio output for alarm warning devices, such as sirens, bells or horns
with 12 VDC power supply;
User Management
Users are consisted of an Installer, a Master User, 15 keypad operators, 16 network
operators, and 6 remote data channels ;
Authority level management of users assigned different security codes;
9
Network Security Control Panel Installation Guide
Additional Features
Integrated master keypad with the LED/LCD display;
Tamper and movement protection function;
Support scheduling operations, such as arming, disarming, and output activating.
10
Network Security Control Panel Installation Guide
11
Network Security Control Panel Installation Guide
The alarm input interfaces of the control panel are show as follows.
12
Network Security Control Panel Installation Guide
Z NC Z NO
2.2KΩ
2.2KΩ
G C G C
N.O.
N.C.
GND
DETECTOR
13
Network Security Control Panel Installation Guide
The alarm output interfaces of the control panel are show as follows.
NO/NC NO/NC
Breaker Breaker
COM External Device COM External Device
The DC current supplied by the control panel is used for external devices. The
load current cannot be over 1 A.
14
Network Security Control Panel Installation Guide
For configuring the security control panel, you should restore the system of the
control panel after start-up.
The keypad registration will be completed in 10 seconds after the control panel
being powered on. The system then will complete the start-up and enter the
properly working status.
The LED keypad will make continuously prompt tones if the keypad does not
receive the registration respond from the control panel in 20 seconds after it
being power on. While the registration is succeeded, the working status
indicator will turn green. For other keypad indicator/beeper description, please
refer to Network Control Panel User Manual.
LCD Keypad Displayed Information
15
Network Security Control Panel Installation Guide
HIKVISION
2.3.3 Keypad Address
An address is required for each alarm keypad in the system. These addresses
cannot be repeated. Once exchanging the alarm keypad, the address of the new
keypad must be the same as the replaced one. You should configure the
address via DIP switch of the keypad before powering on the system. The
address should be in the range of 1~31.
Purpose:
You are required to activate the control panel first before you can use the
control panel.
Activation via SADP, and Activation via client software are supported.
Activation via SADP Software
SADP software is used for detecting the online device, activating the device,
and resetting the password.
Get the SADP software from the supplied disk or the official website, and install
the SADP according to the prompts. Follow the steps to activate the control
panel.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
17
Network Security Control Panel Installation Guide
3. Create a password and enter the password in the password field, and then
confirm the password.
18
Network Security Control Panel Installation Guide
6. Input the password and click Save to activate your IP address modification.
Activation via Client Software
The client software is versatile video management software for multiple kinds
of devices.
Get the client software from the supplied disk or the official website, and install
the software according to the prompts. Follow the steps to activate the control
panel.
Steps:
1. Run the client software and the control panel of the software pops up, as
shown in the figure below.
19
Network Security Control Panel Installation Guide
3. Check the device status from the device list, and select an inactive device.
4. Click the Activate to pop up the Activation page.
5. Create a password and enter the password, and then confirm the password.
20
Network Security Control Panel Installation Guide
21
Network Security Control Panel Installation Guide
8. Change the device IP address to the same subnet with your computer by
either modifying the IP address manually or checking Enable DHCP.
Input the password to activate your IP address modification.
22
Network Security Control Panel Installation Guide
23
Network Security Control Panel Installation Guide
Insert the installation media of iVMS-4200 into the appropriate computer, and
then perform the following steps to install the iVMS-4200 client software.
Steps:
1. Double-click to enter the welcome panel of the InstallShield
Wizard. Click Next to start the InstallShield Wizard.
2. Read the License Agreement. Click Print if you want to print the license
agreement.
24
Network Security Control Panel Installation Guide
If you accept the terms of the license agreement, check I accept the terms
of license agreement, and click Next to continue.
Otherwise check I do not accept the terms of the license agreement, and
then click Cancel to cancel the installation.
3. On the next panel, you are prompted to select the function module to
install.
25
Network Security Control Panel Installation Guide
26
Network Security Control Panel Installation Guide
For the first time to use iVMS-4200 client, you need to register a super user
for login.
Steps:
1. Enter the super user name and password.
2. Confirm the password.
3. Optionally, check Enable Auto-login to log in the software automatically.
4. Click Register. Then, you can log in the software as the super user.
27
Network Security Control Panel Installation Guide
A user name cannot contain any of the following characters: / \ : * ? “ < >
|
The password cannot be empty and the length of the password should
be no less than six characters.
When opening iVMS-4200 after registration, you can log in the client with the
registered user name and password.
Steps:
1. Input the user name and password you registered.
2. Optionally, check Enable Auto-login to log in the software automatically.
3. Click Login.
28
Network Security Control Panel Installation Guide
29
Network Security Control Panel Installation Guide
Edit a Device
Purpose:
You can edit the device information in this section, including the device name,
address and port number.
Steps:
1. On the Device for Management page, click and select a control panel in
the device list.
2. Click on the Modify button on the upper side of the list to enter the device
modify interface.
30
Network Security Control Panel Installation Guide
3. Enter the required nick name, address, and port number and then enter
the admin username and password.
4. Click Modify to save the changes.
Delete a Device
Select device from the list, click Delete, and then you can delete the
information of the selected device.
31
Network Security Control Panel Installation Guide
In this section, you can control the panel remotely to implement operations such
as arming, disarming, bypass, group bypass, and so on for both the partitions and
zones.
Click Control Panel -> Security Control Panel to enter the page.
On the Security Control Panel page, Click , you can remotely implement
operations of away arming, stay arming, instant arming, disarming, clearing alarm,
group bypass, group bypass recovery and linked zone configuration for the
configured partitions.
32
Network Security Control Panel Installation Guide
Steps:
1. Check and select one or more partitions to be controlled.
2. Click the operations buttons (away arming, stay arming, instant arming,
disarming, clearing alarm, group bypass, and group bypass recovery) on the
upper side of the page.
On the Security Control Panel page, Click , you can remotely implement
bypass, or recovering bypass for the zones, and view the zone status of the
selected partition.
33
Network Security Control Panel Installation Guide
Steps:
1. Select a partition and click to open the zone operation dialog box.
2. Click and select one or more zones to be controlled.
3. Click Bypass/Bypass Recovery on the upper side of the page to control the
selected zones.
The function of Live View is only supported by the security control panel with
video input module.
34
Network Security Control Panel Installation Guide
Device Information
Enter Remote Configuration -> Device Information -> Device Information to view
the device information.
35
Network Security Control Panel Installation Guide
Timing Configuration
Before You Start:
Before you start configuring the security control panel, you need to do timing for
the device first.
Enter Remote Configuration -> Device Information -> Device Information to get
the configuration page. Click Synchronization to complete the settings.
User Configuration
Purpose:
You can add, edit, or delete the network operator, keypad operator and key fob
operator in this section.
Network User
Add a Network User
Steps:
1. Enter the user configuration page.
Remote Configuration -> System -> User -> Network User
36
Network Security Control Panel Installation Guide
3. Enter the corresponding user information including the user type, user
name, password, IP address, and MAC address.
4. Select the permission of the user.
5. Click Save to save the settings.
Edit a Network User
Steps:
1. Click Edit to enter the page of editing the selected user.
37
Network Security Control Panel Installation Guide
2. Edit the corresponding user information including the user type, user
name, password, IP address, and MAC address.
3. Edit the permission of the user.
4. Click Save to save the settings.
Delete a Network user
Steps:
1. Select a user needs to be deleted.
2. Click Delete to delete the user.
38
Network Security Control Panel Installation Guide
3. Select the user index number of the keyboard user, up to 16 numbers can
be selected.
4. Enter the name of the keyboard operator.
5. Enter the password of the operator.
6. Check and select the user permission (Arming Permission, Disarming
Permission, Bypass Permission).
7. Click Save to save the settings.
Edit a keyboard User
Steps:
1. Click Edit to enter the page of editing the selected user.
2. Edit the user name, password and the permission of the user.
3. Click Save to save the settings.
Delete a keyboard user
39
Network Security Control Panel Installation Guide
Steps:
1. Select a user needs to be deleted.
2. Click Delete to delete the user.
Key Fob User
You can add a Key fob user by entering programming commands on the alarm
keyboard.
Edit a Key Fob user
Steps:
1. Enter the user configuration page.
Remote Configuration -> System -> User -> Key fob User
9. Configure the NIC settings, including the IPv4 Address, IPv4 Subnet Mask and
IPv4 Default Gateway.
10. Click Save to save the above settings.
The valid value range of Maximum Transmission Unit (MTU) is 500 ~ 9676.
The default value is 1500.
The Multicast sends a stream to the multicast group address and allows
multiple clients to acquire the stream at the same time by requesting a copy
from the multicast group address.
Before utilizing this function, you have to enable the Multicast function of
your router and configure the gateway of the control panel.
DNS Settings
Steps:
1. Enter the DNS configuration page.
Remote Configuration -> Network -> DNS
41
Network Security Control Panel Installation Guide
Partition Configuration
Purpose:
42
Network Security Control Panel Installation Guide
You can configure the detailed alarm parameters of the zone in the partition in this
section.
Steps:
1. Enter the partition alarm triggering configuration page.
Remote Configuration -> Input Settings -> Partition
partition.
KeyZoneReportUpload: Enable uploading report when the key Zone
arms or disarms the current partition.
e. Check and select zone, keyboard, or keyboard user to add required zone,
keyboard, or keyboard user to the partition.
f. Click Save to save the settings.
3. Click Public Partition to enter the page.
44
Network Security Control Panel Installation Guide
45
Network Security Control Panel Installation Guide
b. Check Enable to enable holiday schedule for the partition. You can select
to enable the Forced Arming.
c. Click the dropdown box to select the time duration.
d. Click / / to select an arming type,
and then click and drag the mouse on the time bar to draw the daily
schedule.
e. Check and select one or more partitions which need to enable the holiday
schedule.
f. Click Save to save the settings or click Cancel to exit the page.
Zone Configuration
Steps:
1. Enter the Zone configuration page.
Remote Configuration -> Input Settings -> Zone -> Basic Settings
46
Network Security Control Panel Installation Guide
3. Edit the general information of the Zone, including name, detector type, zone
type, sensitivity, zone resistor, tampering type, tamper resistor and so on.
47
Network Security Control Panel Installation Guide
Siren Configuration
Steps:
1. Enter the siren configuration page.
Remote Configuration -> Output Settings -> Siren
Relay Configuration
Steps:
1. Enter the Relay configuration page.
Remote Configuration -> Output Settings -> Relay
2. Click Basic Settings, select an alarm input channel and double click the relay to
enter relay configuration page.
3. Edit the general information of the relay, including name, output delay and so
on.
49
Network Security Control Panel Installation Guide
Output Delay (0~5999s): Configure the alarm output time after the alarm
being triggered.
4. Click Partition Event, and then click the dropdown box to select a partition
needs to be configured. Check Open or Close for the detailed operation after
the alarm being triggered on the partition event panel.
5. Click Global Event, select the global event of alarm triggering.
6. Click Copy to to copy all these settings to other Zones.
7. Click Save to save the settings.
Test Report
Purpose:
You can configure uploading period of the test report and uploading time of the
first test report in this section.
Steps:
1. Enter the test report configuration page.
Remote Configuration -> Report Settings -> Test Report
4.5.7 Other
Fault Audible Warning
Purpose:
You can configure fault audible warning in this section.
Steps:
1. Click Remote Configuration -> Other -> Fault Audible Warning to enter the
page.
51
Network Security Control Panel Installation Guide
Fault Handling
Purpose:
In this section , you can select the fault detection type, alarm linked keypad and
output mode.
Steps:
1. Enter the fault handling page.
Remote Configuration -> Other -> Fault Handling
52
Network Security Control Panel Installation Guide
Tigger: you can click Open or Close to turn on/off the selected relay.
53
Network Security Control Panel Installation Guide
4.5.9 Status
You can view status of the zone, storage battery and module information in this
section.
54
Network Security Control Panel Installation Guide
Q: How to manually switch to other abnormal interfaces when the LCD keypad
displays sensor/module is abnormal?
A:
1. Among the LCD keypad abnormal display interfaces, display interface of the
sensor alarm, module abnormal display interface are of first priority; the sensor
abnormal interface is of second priority, sensor bypass interface is of third
priority.
2. If interfaces of different priority exist at same time, the system automatically
displays the interface of first priority.
3. The switch between interfaces of same priority: there are two ways to switch
display interface of the sensor alarm to sensor off-line display interface.
1) System auto-switch: The system will refresh automatically. If the
current display interface is accomplished and other interfaces of same
priority exist, system will auto switch to other interfaces.
2) Manually switch: Press the Project button continuously until it
switches to the interface to display.
4. Switch between interfaces of different priority: from sensor alarm interface to
sensor bypass interface:
Press and hold the Project button for multiple times until it switches to the
interface to display.
55
Network Security Control Panel Installation Guide
Q: What are the steps of LED keypad to program the control panel?
A:
1. In overall keypad programming mode, the program command is: {installer
password} + {*} + {0} + {#};
2. To view the configuring operation for alarm control panel, please refer to alarm
keypad configuring code;
For example: program user password 2#, the password has arm/disarm
function, does not send arming report, does not allow bypass, password is
5678, and the program code is shown as follow:
Command Code Arming Type Password End
{0}{0}{2} {3} {5}{6}{7}{8} {#}
3. Set program command
There are 2 alert sound of correct or 5 alert sound of error and corresponding
OSD notices after each program command is over. When 5 alert sound of error
is heard and the screen displays Operation Failed, there is error in program
command setting and the user need to reset correct program command.
When 2 alert sound of correct is heard and the screen displays Operation
Succeeded but the setting parameters are not the parameters needed, you
can operate according to program command once again.
4. Exit program mode, the program command is: {*} + {#}.
56
Network Security Control Panel Installation Guide
57
Network Security Control Panel Installation Guide
58
Network Security Control Panel Installation Guide
59
Network Security Control Panel Installation Guide
1 2 3 4 5
0 1 2 3 4 5
1 1 2 3 4 5
2 1 2 3 4 5
3
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
4 1 2 3 4 5
5 1 2 3 4 5
6 1 2 3 4 5
7
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
8 1 2 3 4 5
9 1 2 3 4 5
10 1 2 3 4 5
11
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
12 1 2 3 4 5
13 1 2 3 4 5
14 1 2 3 4 5
15
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
16 1 2 3 4 5
17 1 2 3 4 5
18 1 2 3 4 5
19
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
20 1 2 3 4 5
21 1 2 3 4 5
22 1 2 3 4 5
23
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
24 1 2 3 4 5
25 1 2 3 4 5
26 1 2 3 4 5
27
ON DIP ON DIP ON DIP ON DIP
1 2 3 4 5
28 1 2 3 4 5
29 1 2 3 4 5
30 1 2 3 4 5
31
0 5 7 1 8 8 0 7 5 9 9 8 F F F 8
Command Address 461
8 8 8 E
Q: How to solve the problem of two LED keypad address being same?
61
Network Security Control Panel Installation Guide
A: When two LED keypad addresses are the same, the situation of two keypads
demanding bus communication at the same time will appear and cause conflict.
The only solution is to remove one keypad and reset the other keypad to an
unused legal address. Restore the control panel by processing program code
({Main Operator}{*}{6}{8}{#})
62
Network Security Control Panel Installation Guide
Q: Why is there no response for keypad operational order but alert sound of error
10s later?
A: It may be caused by follow situations:
1) Poor contact of the connection cable between LED keypad and the control
panel, please check if the cable is normal;
2) The LED keypad is considered as off-line in the communication. If there is
other keypad operates normal, process program command {Main Operator
Password} + {*} + {6} + {8} + {#}to restore it or power off the control panel
and reboot.
Q: How does the control panel detect alternating current, storage battery,
control panel tamper-proof and ADSL cable?
A: The status of the control panel detection is as follows:
1) The control panel detects AC power supply status once in a while;
2) The control panel detects storage battery status once in a while;
3) The control panel detects tamper-proof status once in a while;
4) The control panel detects ADSL cable status once in a while.
Please check if the user name and password to log in the control panel are
correct. The default user name is: admin, the word is: 12345.
Q: Why the control panel cannot communicate with the alarm center group?
A: Please check if the uploading mode and its corresponding parameters are
correct.
You can configure the uploading mode in Remote Configuration -> Report Settings
-> Uploading Method Configuration, and the configuration of control panel
63
Network Security Control Panel Installation Guide
Q: How to configure the communication way of control panel and alarm center
group?
A:
1. Center uploading mode supports at most 6 center groups, each center group
divides in main channel and 3 backup channels;
2. If the center group is enabled. Enable the center group before the use.
3. For example: The control panel needs to upload report to network alarm center
1 and dialing alarm center1 and network alarm center 1 needs to upload report
to network alarm center 2 when it fails to upload it. The configurations are as
follows:
1) Enable Center Group1 and Center Group2;
2) In the uploading method configuration list, select N1 in center group 1 main
channel, select N2 in backup channel 1, select T1 in Center group2 main
channel.
3) Click Save.
If the client is not opened, the user can realize communication with alarm
center by programming with keypad. For detailed operations please refer to
program command 611~634.
64
Network Security Control Panel Installation Guide
65
Network Security Control Panel Installation Guide
Appendix1:Specifications
Model DS-19A08-F/Kx DS-19A08-F/KxG
Alarm Input 8 Zones Alarm Input
Alarm Output Local 1-ch+8-ch expandable, 1 A/30 VDC
Siren Power Supply DC12 V/300 mA
Telephone Line 1-ch PSTN
Keypad K1: LED Keypad; K2: LCD Keypad
Supported Keypads
8
(LCD/LED)
Security Support Tamper-proof and Movement Prevention
Tamper-proof Switch
control panel Function of Security control panel
Parameters Timed Arm/Disarm 8 Time Periods Each Day
Partition 8 Partitions, 1 Public Partition
Sensor Tamper-proof
Support
Alarm
Message Alarm N/A Support
Message Arm/disarm N/A Support
Supported Remote
32 (Unobstructed Effective Range of 100 m)
Controllers
1, Support Alarming
Wireless Interface
Report Upload
Wireless Wireless Network
Network N/A GPRS
Standard
Parameters
UIM Card Slot 1
SMA Antenna Interface 1
Network SADP (Search IP Address Automatically), DHCP
Network Protocol
Management (Obtain IP address Automatically) etc.
Network Interface 1 RJ45 10M/100M Self-adaptive
External Keypad Bus 1, RS485 Half-duplex
Interface Port for Storage
1 Port, for Storage Battery Accessing
Battery
Power Supply DC14.3 V/1.7 A
Consumption (Without
HDD and Power Supply 2W 3W
for External Device)
Others Working Temperature -10 °C~+55 °C
Working Humidity 10%~90%
Mounting Wall-mounted
Dimensions 170 × 125 × 29 mm
Weight ≤ 0.32 kg
66
Network Security Control Panel Installation Guide
Appendix2:CID Report
CID Description CID Description
Code Code
1103 Real-time Zone 3103 Real-time Zone Alarm
Alarm Recovery
1110 Fire Zone Alarm 3110 Fire Zone Alarm Recovery
1122 24-hour Non-voiced 3122 24-hour Non-voiced Zone
Zone Alarm Alarm Recovery
1123 24-hour Voiced 3123 24-hour Voiced Zone
Zone Alarm Alarm Recovery
1131 Perimeter Zone 3131 Perimeter Zone Alarm
Alarm Recovery
1132 Internal Delay Zone 3132 Internal Delay Zone Alarm
Alarm Recovery
1134 3134 Delay Zone Alarm
Delay Zone Alarm
Recovery
1137 3137 Tampering Alarm
Tampering Alarm
Recovery
1301 AC Power Down 3301 AC Power Down Recovery
1302 Low Battery 3302 Low Battery Recovery
1305 Control Panel 1121 Control Panel Age
Restoring
1336 Printer 3336 Printer Disconnection
Disconnection Recovery
1354 Phone Line 3354 Phone Line Disconnection
Disconnection Recovery
1382 Local Expanded 3382 Local Expanded Zone
Zone Fault Recovery
67
Network Security Control Panel Installation Guide
68
Network Security Control Panel Installation Guide
69
Network Security Control Panel Installation Guide
70
Network Security Control Panel Installation Guide
Appendix4:Command Table
Control Panel Command Table
Installer
0 0 0 0 1 2 3 4 5
# Password
*2 1 2 3 4 1#Password 6 0 0 0 0 2#Password
0 0 1 # User Name: 0 0 2 # User Name:
6 0 0 0 0 3#Password 6 0 0 0 0 4#Password
0 0 3 # User Name: 0 0 4 # User Name:
6#PasswordPa
6 0 0 0 0 5#Password 6 0 0 0 0
ssword
0 0 5 # User Name: 0 0 6 # User Name:
6 0 0 0 0 7#Password 6 0 0 0 0 8#Password
0 0 7 # User Name: 0 0 8 # User Name:
6 0 0 0 0 9#Password 6 0 0 0 0 10#Password
0 0 9 # User Name: 0 1 0 # User Name:
6 0 0 0 0 11#Password 6 0 0 0 0 12#Password
0 1 1 # User Name: 0 1 2 # User Name:
6 0 0 0 0 13#Password 6 0 0 0 0 14#Password
0 1 3 # User Name: 0 1 4 # User Name:
16#PasswordP
6 0 0 0 0 15#Password 6 0 0 0 0
assword
0 1 5 # User Name:
0 1 6 # User Name:
6 0 0 0 0 17#Password 6 0 0 0 0 18#Password
0 1 7 # User Name: 0 1 8 # User Name:
6 0 0 0 0 19#Password 6 0 0 0 0 20#Password
0 1 9 # User Name: 0 2 0 # User Name:
6 0 0 0 0 21#Password 6 0 0 0 0 22#Password
0 2 1 # User Name: 0 2 2 # User Name:
6 0 0 0 0 23#Password 6 0 0 0 0 24#Password
0 2 3 # User Name: 0 2 4 # User Name:
6 0 0 0 0 25#Password 6 0 0 0 0 26#Password
0 2 5 # User Name: 0 2 6 # User Name:
6 0 0 0 0 27#Password 6 0 0 0 0 28#Password
0 2 7 # User Name: 0 2 8 # User Name:
6 0 0 0 0 29#Password 6 0 0 0 0 30#Password
0 2 9 # User Name: 0 3 0 # User Name:
6 0 0 0 0 31#Password 6 0 0 0 0 32#Password
0 3 1 # User Name:
0 3 2 # User Name:
6 0 0 0 0 33#Password 6 0 0 0 0 34#Password
0 3 3 # User Name:
0 3 4 # User Name:
6 0 0 0 0 35#Password 6 0 0 0 0 36#Password
0 3 5 # User Name: 0 3 6 # User Name:
6 0 0 0 0 37#Password 6 0 0 0 0 38#Password
0 3 7 # User Name: 0 3 8 # User Name:
6 0 0 0 0 39#Password 6 0 0 0 0 40#Password
0 3 9 # User Name: 0 4 0 # User Name:
6 0 0 0 0 41#Password 6 0 0 0 0 42#Password
0 4 1 # User Name: 0 4 2 # User Name:
6 0 0 0 0 43#Password 6 0 0 0 0 44#Password
0 4 3 # User Name: 0 4 4 # User Name:
6 0 0 0 0 45#Password 6 0 0 0 0 46#Password
0 4 5 # User Name: 0 4 6 # User Name:
6 0 0 0 0 47#Password 6 0 0 0 0 48#Password
0 4 7 # User Name: 0 4 8 # User Name:
6 0 0 0 0 49#Password 6 0 0 0 0 50#Password
0 4 9 # User Name:
0 5 0 # User Name:
71
Network Security Control Panel Installation Guide
6 0 0 0 0 51#Password 6 0 0 0 0 52#Password
0 5 1 # User Name: 0 5 2 # User Name:
6 0 0 0 0 53#Password 6 0 0 0 0 54#Password
0 5 3 # User Name: 0 5 4 # User Name:
6 0 0 0 0 55#Password 6 0 0 0 0 56#Password
0 5 5 # User Name: 0 5 6 # User Name:
6 0 0 0 0 57#Password 6 0 0 0 0 58#Password
0 5 7 # User Name: 0 5 8 # User Name:
6 0 0 0 0 59#Password 6 0 0 0 0 60#Password
0 5 9 # User Name: 0 6 0 # User Name:
6 0 0 0 0 61#Password 6 0 0 0 0 62#Password
0 6 1 # User Name: 0 6 2 # User Name:
6 0 0 0 0 63#Password 6 0 0 0 0 64#Password
0 6 3 # User Name: 0 6 4 # User Name:
6 0 0 0 0 65#Password 6 0 0 0 0 66#Password
0 6 5 # User Name:
0 6 6 # User Name:
6 0 0 0 0 67#Password 6 0 0 0 0 68#Password
0 6 7 # User Name: 0 6 8 # User Name:
6 0 0 0 0 69#Password 6 0 0 0 0 70#Password
0 6 9 # User Name: 0 7 0 # User Name:
6 0 0 0 0 71#Password 6 0 0 0 0 72#Password
0 7 1 # User Name: 0 7 2 # User Name:
6 0 0 0 0 73#Password 6 0 0 0 0 74#Password
0 7 3 # User Name: 0 7 4 # User Name:
6 0 0 0 0 75#Password 6 0 0 0 0 76#Password
0 7 5 # User Name: 0 7 6 # User Name:
6 0 0 0 0 77#Password 6 0 0 0 0 78#Password
0 7 7 # User Name: 0 7 8 # User Name:
6 0 0 0 0 79#Password 6 0 0 0 0 80#Password
0 7 9 # User Name: 0 8 0 # User Name:
6 0 0 0 0 81#Password 6 0 0 0 0 82#Password
0 8 1 # User Name:
0 8 2 # User Name:
6 0 0 0 0 83#Password 6 0 0 0 0 84#Password
0 8 3 # User Name:
0 8 4 # User Name:
6 0 0 0 0 85#Password 6 0 0 0 0 86#Password
0 8 5 # User Name: 0 8 6 # User Name:
6 0 0 0 0 87#Password 6 0 0 0 0 88#Password
0 8 7 # User Name: 0 8 8 # User Name:
6 0 0 0 0 89#Password 6 0 0 0 0 90#Password
0 8 9 # User Name: 0 9 0 # User Name:
6 0 0 0 0 91#Password 6 0 0 0 0 92#Password
0 9 1 # User Name: 0 9 2 # User Name:
6 0 0 0 0 93#Password 6 0 0 0 0 94#Password
0 9 3 # User Name: 0 9 4 # User Name:
6 0 0 0 0 95#Password 6 0 0 0 0 96#Password
0 9 5 # User Name: 0 9 6 # User Name:
6 0 0 0 0 97#Password 6 0 0 0 0 98#Password
0 9 7 # User Name: 0 9 8 # User Name:
6 0 0 0 0 99#Password 6 0 0 0 0 100#Password
0 9 9 # User Name:
1 0 0 # User Name:
72
Network Security Control Panel Installation Guide
6 0 0 0 0 101#Password 6 0 0 0 0 102#Password
1 0 1 # User Name: 1 0 2 # User Name:
6 0 0 0 0 103#Password 6 0 0 0 0 104#Password
1 0 3 # User Name: 1 0 4 # User Name:
6 0 0 0 0 105#Password 6 0 0 0 0 106#Password
1 0 5 # User Name: 1 0 6 # User Name:
6 0 0 0 0 107#Password 6 0 0 0 0 108#Password
1 0 7 # User Name: 1 0 8 # User Name:
6 0 0 0 0 109#Password 6 0 0 0 0 110#Password
1 0 9 # User Name: 1 1 0 # User Name:
6 0 0 0 0 111#Password 6 0 0 0 0 112#Password
1 1 1 # User Name: 1 1 2 # User Name:
6 0 0 0 0 113#Password 6 0 0 0 0 114#Password
1 1 3 # User Name: 1 1 4 # User Name:
6 0 0 0 0 115#Password 6 0 0 0 0 116#Password
1 1 5 # User Name:
1 1 6 # User Name:
6 0 0 0 0 117#Password 6 0 0 0 0 118#Password
1 1 7 # User Name: 1 1 8 # User Name:
6 0 0 0 0 119#Password 6 0 0 0 0 120#Password
1 1 9 # User Name: 1 2 0 # User Name:
6 0 0 0 0 121#Password 6 0 0 0 0 122#Password
1 2 1 # User Name: 1 2 2 # User Name:
6 0 0 0 0 123#Password 6 0 0 0 0 124#Password
1 2 3 # User Name: 1 2 4 # User Name:
6 0 0 0 0 125#Password 6 0 0 0 0 126#Password
1 2 5 # User Name: 1 2 6 # User Name:
6 0 0 0 0 127#Password 6 0 0 0 0 128#Password
1 2 7 # User Name: 1 2 8 # User Name:
6 0 0 0 0 129#Password 6 0 0 0 0 130#Password
1 2 9 # User Name: 1 3 0 # User Name:
6 0 0 0 0 131#Password 6 0 0 0 0 132#Password
1 3 1 # User Name:
1 3 2 # User Name:
6 0 0 0 0 133#Password 6 0 0 0 0 134#Password
1 3 3 # User Name:
1 3 4 # User Name:
6 0 0 0 0 135#Password 6 0 0 0 0 136#Password
1 3 5 # User Name: 1 3 6 # User Name:
6 0 0 0 0 137#Password 6 0 0 0 0 138#Password
1 3 7 # User Name: 1 3 8 # User Name:
6 0 0 0 0 139#Password 6 0 0 0 0 140#Password
1 3 9 # User Name: 1 4 0 # User Name:
6 0 0 0 0 141#Password 6 0 0 0 0 142#Password
1 4 1 # User Name: 1 4 2 # User Name:
6 0 0 0 0 143#Password 6 0 0 0 0 144#Password
1 4 3 # User Name: 1 4 4 # User Name:
6 0 0 0 0 145#Password 6 0 0 0 0 146#Password
1 4 5 # User Name: 1 4 6 # User Name:
6 0 0 0 0 147#Password 6 0 0 0 0 148#Password
1 4 7 # User Name: 1 4 8 # User Name:
6 0 0 0 0 149#Password 6 0 0 0 0 150#Password
1 4 9 # User Name:
1 5 0 # User Name:
73
Network Security Control Panel Installation Guide
6 0 0 0 0 151#Password 6 0 0 0 0 152#Password
1 5 1 # User Name: 1 5 2 # User Name:
6 0 0 0 0 153#Password 6 0 0 0 0 154#Password
1 5 3 # User Name: 1 5 4 # User Name:
6 0 0 0 0 155#Password 6 0 0 0 0 156#Password
1 5 5 # User Name: 1 5 6 # User Name:
6 0 0 0 0 157#Password 6 0 0 0 0 158#Password
1 5 7 # User Name: 1 5 8 # User Name:
6 0 0 0 0 159#Password 6 0 0 0 0 160#Password
1 5 9 # User Name: 1 6 0 # User Name:
6 0 0 0 0 161#Password 6 0 0 0 0 162#Password
1 6 1 # User Name: 1 6 2 # User Name:
6 0 0 0 0 163#Password 6 0 0 0 0 164#Password
1 6 3 # User Name: 1 6 4 # User Name:
6 0 0 0 0 165#Password 6 0 0 0 0 166#Password
1 6 5 # User Name:
1 6 6 # User Name:
6 0 0 0 0 167#Password 6 0 0 0 0 168#Password
1 6 7 # User Name: 1 6 8 # User Name:
6 0 0 0 0 169#Password 6 0 0 0 0 170#Password
1 6 9 # User Name: 1 7 0 # User Name:
6 0 0 0 0 171#Password 6 0 0 0 0 172#Password
1 7 1 # User Name: 1 7 2 # User Name:
6 0 0 0 0 173#Password 6 0 0 0 0 174#Password
1 7 3 # User Name: 1 7 4 # User Name:
6 0 0 0 0 175#Password 6 0 0 0 0 176#Password
1 7 5 # User Name: 1 7 6 # User Name:
6 0 0 0 0 177#Password 6 0 0 0 0 178#Password
1 7 7 # User Name: 1 7 8 # User Name:
6 0 0 0 0 179#Password 6 0 0 0 0 180#Password
1 7 9 # User Name: 1 8 0 # User Name:
6 0 0 0 0 181#Password 6 0 0 0 0 182#Password
1 8 1 # User Name:
1 8 2 # User Name:
6 0 0 0 0 183#Password 6 0 0 0 0 184#Password
1 8 3 # User Name:
1 8 4 # User Name:
6 0 0 0 0 185#Password 6 0 0 0 0 186#Password
1 8 5 # User Name: 1 8 6 # User Name:
6 0 0 0 0 187#Password 6 0 0 0 0 188#Password
1 8 7 # User Name: 1 8 8 # User Name:
6 0 0 0 0 189#Password 6 0 0 0 0 190#Password
1 8 9 # User Name: 1 9 0 # User Name:
6 0 0 0 0 191#Password 6 0 0 0 0 192#Password
1 9 1 # User Name: 1 9 2 # User Name:
6 0 0 0 0 193#Password 6 0 0 0 0 194#Password
1 9 3 # User Name: 1 9 4 # User Name:
6 0 0 0 0 195#Password 6 0 0 0 0 196#Password
1 9 5 # User Name: 1 9 6 # User Name:
6 0 0 0 0 197#Password 6 0 0 0 0 198#Password
1 9 7 # User Name: 1 9 8 # User Name:
6 0 0 0 0 199#Password 6 0 0 0 0 200#Password
1 9 9 # User Name:
2 0 0 # User Name:
74
Network Security Control Panel Installation Guide
2 5 0 1 0 1 Region1 2 5 0 1 0 1 Region2
2 0 1 # Parameters
Configuration
2 0 2 # Parameters
Configuration
2 5 0 1 0 1 Region3 2 5 0 1 0 1 Region4
2 0 3 # Parameters
Configuration
2 0 4 # Parameters
Configuration
2 5 0 1 0 1 Region5 2 5 0 1 0 1 Region6
2 0 5 # Parameters
Configuration
2 0 6 # Parameters
Configuration
2 5 0 1 0 1 Region7 2 5 0 1 0 1 Region8
2 0 7 # Parameters
Configuration
2 0 8 # Parameters
Configuration
2 5 0 1 0 1 Region9 2 5 0 1 0 1 Region10
2 0 9 # Parameters
Configuration
2 1 0 # Parameters
Configuration
2 5 0 1 0 1 Region11 2 5 0 1 0 1 Region12
2 1 1 # Parameters
Configuration
2 1 2 # Parameters
Configuration
2 5 0 1 0 1 Region13 2 5 0 1 0 1 Region14
2 1 3 # Parameters
Configuration
2 1 4 # Parameters
Configuration
2 5 0 1 0 1 Region15 2 5 0 1 0 1 Region16
2 1 5 # Parameters
Configuration
2 1 6 # Parameters
Configuration
0 0 3 3 Communication
4 5 7 # Control
0 0 0 0 0 0
4 6 7 # Region Linked Trigger Configuration
0 0 0 0 0 0 0
Disable Trigger Event Linkage
4 6 9 # Configuration
0 0 0 0 0 0 1
4 7 0 # Trigger Time Settings 4 7 1 # Siren Settings
75
Network Security Control Panel Installation Guide
2 0 1 3 0 1 0 1 0 8 0 0 0 0 Host Time
4 7 2 # Settings
1 9 2 0 0 0 0 0 0 0 6 4 Host IP Address
4 7 3 # Settings
2 5 5 2 5 5 2 5 5 0 0 0 Subnet Mask
4 7 5 # Settings
0 0 0 0 0 0 0 0 0 0 0 0
4 7 6 # Gateway Settings
0 0 0 0 0 0 0 0 0 0 0 0 Network Center 1 IP
4 8 5 # Configuration Programming
Address
0 0 0 0 0 Network Center 1 Port
4 8 6 # Configuration Programming
Address
Network Center 1 Protocol and
2 0 0 0 0 0 0
4 8 7 # Account Configuration
Programming Address
0 0 0 0 0 0 0 0 0 0 0 0 Network Center 2 IP
4 8 8 # Configuration Programming
Address
0 0 0 0 0 Network Center 2 Port
4 8 9 # Configuration Programming
Address
2 0 0 0 0 0 0 Network Center 2 Protocol and
4 9 0 # Account Configuration
Programming Address
0 0 0 0 0 0 0 0 0 0 0 0 Wireless Center 1 IP
4 9 1 # Configuration Programming
Address
0 0 0 0 0 Wireless Center 1 Port
4 9 2 # Configuration Programming
Address
2 0 0 0 0 0 0 Wireless Center 1 Protocol and
4 9 3 # Account Configuration
Programming Address
0 0 0 0 0 0 0 0 0 0 0 0 Wireless Center 2 IP
4 9 4 # Configuration Programming
Address
0 0 0 0 0 Wireless Center 2 Port
4 9 5 # Configuration Programming
Address
2 0 0 0 0 0 0 Wireless Center 2 Protocol and
4 9 6 # Account Configuration
Programming Address
76
Network Security Control Panel Installation Guide
0 0 0 0 0 0 Alarm Information
Printer
4 9 9 # Configuration 5 0 0 # Printing
Configuration
0 0 0 0 0 0 0 0 Device Information
5 0 1 # Printing
Configuration
0 0 0 0 0 0 0 Operation Programming
5 0 2 # Information Printing
Configuration
0 0 Alarm and Bypass Recovery
5 0 3 # Printing Configuration
0 0 0 0 0 0 0 Device Recovery
5 0 4 # Information Printing
Configuration
0 1 0
5 1 0 # System Emergency Alarm Linked Siren Configuration
0
Host Tamper-proof
5 1 1 # Configuration
0 1 5 Testing Report
5 1 3 # Configuration
0 1 1 1 1 1 1 1 1 System Keyboard
5 6 8 # Fault Prompt Sound
Configuration
0
6 1 1 # Center Group 1 Enabling Configuration
0 0 0 0
6 1 2 # Center Group 1 Uploading Mode
Configuration
77
Network Security Control Panel Installation Guide
0
6 1 5 # Center Group 2 Enabling Configuration
0 0 0 0
6 1 6 # Center Group 2 Uploading Mode
Configuration
0
6 1 9 # Center Group 3 Enabling Configuration
0 0 0 0
6 2 0 # Center Group 3 Uploading Mode
Configuration
0
Center Group 4 Enabling Configuration
6 2 3 #
0 0 0 0 Center Group 4 Uploading Mode
6 2 4 # Configuration
0
Center Group 5 Enabling Configuration
6 2 7 #
0 0 0 0
6 2 8 # Center Group 5 Uploading Mode
Configuration
0 0 0 0 Center Group 5 Region
6 2 9 # Alarm Report
Configuration
78
Network Security Control Panel Installation Guide
0
6 3 1 # Center Group 6 Enabling Configuration
79
First Choice for Security Professionals
UD07462B-B