Manual de Hikvision Axhub

Download as pdf or txt
Download as pdf or txt
You are on page 1of 80

Network Security Control Panel Installation Guide

Network Security Control Panel

Installation Guide

1
Network Security Control Panel Installation Guide

User Manual
COPYRIGHT © 2018 Hangzhou Hikvision Digital Technology Co., Ltd.
ALL RIGHTS RESERVED.
Any and all information, including, among others, wordings, pictures, graphs are the properties of
Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be
“Hikvision”). This user manual (hereinafter referred to be “the Manual”) cannot be reproduced,
changed, translated, or distributed, partially or wholly, by any means, without the prior written
permission of Hikvision. Unless otherwise stipulated, Hikvision does not make any warranties,
guarantees or representations, express or implied, regarding to the Manual.
About this Manual
This Manual is applicable to Network Security Control Panel.
The Manual includes instructions for using and managing the product. Pictures, charts, images and all
other information hereinafter are for description and explanation only. The information contained in
the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find
the latest version in the company website (http://overseas.hikvision.com/en/).
Please use this user manual under the guidance of professionals.
Trademarks Acknowledgement
and other Hikvision’s trademarks and logos are the properties of Hikvision in various
jurisdictions. Other trademarks and logos mentioned below are the properties of their respective
owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS
HARDWARE, SOFTWARE AND FIRMWARE, IS PROVIDED “AS IS”, WITH ALL FAULTS AND ERRORS, AND
HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION,
MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-
INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES,
OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT
DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS
PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT
YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS
INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE
APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH
ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.
2
Network Security Control Panel Installation Guide

Regulatory Information
FCC Information
FCC compliance: This equipment has been tested and found to comply with the limits for a digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own expense.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired
operation.
EU Conformity Statement

This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the EMC Directive 2004/108/EC, the RoHS Directive 2011/65/EU.

2012/19/EU (WEEE directive): Products marked with this symbol cannot be


disposed of as unsorted municipal waste in the European Union. For proper
recycling, return this product to your local supplier upon the purchase of equivalent
new equipment, or dispose of it at designated collection points. For more
information see: www.recyclethis.info.

2006/66/EC (battery directive): This product contains a battery that cannot be


disposed of as unsorted municipal waste in the European Union. See the product
documentation for specific battery information. The battery is marked with this
symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury
(Hg). For proper recycling, return the battery to your supplier or to a designated
collection point. For more information see: www.recyclethis.info.
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (A)/NMB-3(A) standards requirements.

Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to avoid danger
or property loss.
The precaution measure is divided into ‘Warnings’ and ‘Cautions’:
Warnings: Serious injury or death may be caused if any of these warnings are neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are neglected.

3
Network Security Control Panel Installation Guide

Warnings Follow these safeguards to prevent Cautions Follow these precautions to prevent
serious injury or death. potential injury or material damage.

Warnings:

 Please adopt the power adapter which can meet the safety extra low voltage (SELV) standard. The
power consumption cannot be less than the required value.
 Do not connect several devices to one power adapter as an adapter overload may cause over-
heating and can be a fire hazard.
 When the product is installed on a wall or ceiling, the device should be firmly fixed.
 To reduce the risk of fire or electrical shock, do not expose the indoor used product to rain or
moisture.
 This installation should be made by a qualified service person and should conform to all the local
codes.
 Please install blackouts equipment into the power supply circuit for convenient supply interruption.
 If the product does not work properly, please contact your dealer or the nearest service center.
Never attempt to disassemble the product yourself. (We shall not assume any responsibility for
problems caused by unauthorized repair or maintenance.)
 Please do not look directly into the laser light within 6 meters because laser is hazardous to humans.

4
Network Security Control Panel Installation Guide

Cautions:

 Make sure the power supply voltage is correct before using the product.
 Do not drop the product or subject it to physical shock. Do not install the product on vibratory
surface or places.
 Do not expose it to high electromagnetic radiating environment.
 Do not aim the lens at the strong light such as sun or incandescent lamp. The strong light can cause
fatal damage to the product.
 The sensor may be burned out by a laser beam, so when any laser equipment is being used, make
sure that the surface of the sensor not be exposed to the laser beam.
 For working temperature, please refer to the specification manual for details.
 To avoid heat accumulation, good ventilation is required for a proper operating environment.
 While shipping, the product should be packed in its original packing.
 Please use the provided glove when open up the product cover. Do not touch the product cover
with fingers directly, because the acidic sweat of the fingers may erode the surface coating of the
product cover.
 Please use a soft and dry cloth when clean inside and outside surfaces of the product cover. Do not
use alkaline detergents.
 Improper use or replacement of the battery may result in hazard of explosion. Please use the
manufacturer recommended battery type.

5
Content
Chapter 1 Introduction ........................................................................... 8
1.1 Overview............................................................................................... 8
1.2 Feature.................................................................................................. 8
Chapter 2 Installation and Wiring ........................................................ 11
2.1 Main Board Overview .......................................................................... 11
2.2 Device Wiring ...................................................................................... 12
2.2.1 Detector Wiring ................................................................................................12
2.2.2 Alarm Output Wiring ........................................................................................14
2.2.3 Keypad Wiring ..................................................................................................14
2.3 System Start-up ................................................................................... 15
2.3.1 Control Panel Start-up ......................................................................................15
2.3.2 Alarm Keypad Start-up .....................................................................................15
2.3.3 Keypad Address ................................................................................................16
2.3.4 Factory Settings ................................................................................................16
2.3.5 Activating the Control Panel .............................................................................17

Chapter 3 Entering Keypad Programming ............................................. 23


Chapter 4 Accessing by Client Software ................................................ 24
4.1 Installing the iVMS-4200 ...................................................................... 24
4.2 User Registration and Login ................................................................. 27
4.3 Network Security Control Panel Settings .............................................. 28
4.3.1 Add/Edit/Delete the Device..............................................................................29
4.4 Security Control Panel Remote Control ................................................. 32
4.4.1 Partition Remote Control..................................................................................32
4.4.2 Zone Remote Control .......................................................................................33
4.5 Remote Configuration .......................................................................... 34
4.5.1 Device Information Configuration ....................................................................35
4.5.2 System Configuration .......................................................................................36
4.5.3 Network Configuration .....................................................................................40
4.5.4 Input Settings ...................................................................................................42
4.5.5 Output Settings ................................................................................................48
4.5.6 Report Settings .................................................................................................50
4.5.7 Other ................................................................................................................51
4.5.8 Alarm Management..........................................................................................53
4.5.9 Status ................................................................................................................54

Chapter 5 Trouble Shooting.................................................................. 55

6
Network Security Control Panel Installation Guide

Appendix1:Specifications ...................................................................... 66
Appendix2:CID Report........................................................................... 67
Appendix3:LED Keypad Prompt Sound .................................................. 70
Appendix4:Command Table .................................................................. 71

7
Network Security Control Panel Installation Guide

Chapter 1 Introduction
1.1 Overview

The DS-19A08-F/Kx(G) is a commercial control panel with 8 partitions supported.


The panel uses embedded microcontroller technology for zones monitoring and
system status detection. The alarm or status reports can be transmitted to the
central alarm monitoring station through programming. An integrated master
keypad with the LED/LCD display is designed for implementing a readable
programming progress. Multiple alarm types and report transmission methods
(telephone network, the Ethernet network and the GPRS wireless network) are
supported for the panel. A mobile client is attached for remote control such as
pushing notifications of the alarm or status reports and remote arming/ disarming.
The control panel is mainly deployed in the security system of shopping malls,
stores, residences, apartments, communities and so on.

1.2 Feature

Hardwire Zones and Relay Outputs


8 hardwire zones;
Tamper supervision on the hardwire zones;
1 channel of relay output;
Up to 8 channel extension relay outputs;
Relay outputs can be triggered by alarm events or system events;

Partitioning
8 partitions, which can be controlled independently;
1 common partition (No.1 partition), that can be programmed to be linked with
any other two partitions;

Event Log *
Provides a Contact ID report cache that can store up to 250 reports;
Up to 8,000 alarm event logs, 2000 operation events logs and 1500 management
event logs can be stored with time tag;
8
Network Security Control Panel Installation Guide

Support event logs tracing over the Ethernet System Communication;


GPRS communication and Short Message Service (SMS) (DS-19A08-
F/KxG only);
ADEMCO Contact ID communication over the telephone network;
Encrypted NAL2300 communication over the Ethernet and the GPRS wireless
network;
HIK-SDK communication over the Ethernet network;

Report Strategy
Support up to 2 independent central stations over the phone lines;
Support up to 2 independent central stations over the Ethernet network;
Support up to 2 independent central stations over the GPRS wireless network;
Support up to 6 independent report channel groups consisted of one main channel
and 3 backup channels each, that can transmit reports in parallel;
Each report channel can be configured to transmit reports to the central alarm
monitoring station over the telephone, Ethernet or GPRS wireless network;
Report can be pushed to a mobile phone with mobile client;
Report message can be transmitted to the mobile users with a bound phone
number (SIM card);
Supports 6 communication channels over the Ethernet network base on the
HIK-SDK protocol;

Remote Control
Up to 32 key fobs for radio transmitter operations;
Allows remote control operations with mobile client;
Message control operations, such as arming, disarming, and clearing the alarm, via
short messages sent from the bound phone number;

Peripherals Devices
Up to 8 addressable keypads;
1 external audio output for alarm warning devices, such as sirens, bells or horns
with 12 VDC power supply;

User Management
Users are consisted of an Installer, a Master User, 15 keypad operators, 16 network
operators, and 6 remote data channels ;
Authority level management of users assigned different security codes;

9
Network Security Control Panel Installation Guide

Power Supply Management


14 VDC power adapter;
Provides a power supply interface with battery sensing hardware to prevent deep
discharging an charge management circuit hardware for the external backup
battery;
Automatically switch between A.C. power supply and backup battery power supply;
1 auxiliary power output rated max. 14 VDC, 750 mA;
Supports manually hardware reset to factory defaults;

Additional Features
Integrated master keypad with the LED/LCD display;
Tamper and movement protection function;
Support scheduling operations, such as arming, disarming, and output activating.

10
Network Security Control Panel Installation Guide

Chapter 2 Installation and Wiring


2.1 Main Board Overview

11
Network Security Control Panel Installation Guide

No. Description No. Description


1 Power Adapter 8 Handset Interface
2 Alarm Bell 9 Incoming Telco Line
Interface
3 Alarm Output (Alarm 10 Alarm Input Interface
Lamp)
4 RS-485 Terminals 11 SIM Card/2G Card Slot
5 Auxiliary Power Interface 12 TAMPER Switch
(DC Output)
6 RS-485 TERMINATION 13 RTC CLOCK Button Cell
Resister
7 LAN Interface 14 Reset Button

2.2 Device Wiring

2.2.1 Detector Wiring

The alarm input interfaces of the control panel are show as follows.

12
Network Security Control Panel Installation Guide

The wiring of sensor is shown as follows.


Alarm Host Peripheral Security Detector Alarm Host Peripheral Security Detector

Z NC Z NO
2.2KΩ
2.2KΩ

G C G C

Normal Closed Detector Normal Opened Detector

The Tamper-proof wiring is shown below.


2.2KΩ TAMPER
ZONE
2.2KΩ

N.O.
N.C.

GND
DETECTOR

13
Network Security Control Panel Installation Guide

2.2.2 Alarm Output Wiring

The alarm output interfaces of the control panel are show as follows.

The wiring of alarm output is shown as follows:


DC12V DC12V AC220V
Relay

NO/NC NO/NC

Breaker Breaker
COM External Device COM External Device

External DC Load External AC Load

The DC current supplied by the control panel is used for external devices. The
load current cannot be over 1 A.

2.2.3 Keypad Wiring

The keypad wiring is shown as follows.

14
Network Security Control Panel Installation Guide

2.3 System Start-up

For configuring the security control panel, you should restore the system of the
control panel after start-up.

2.3.1 Control Panel Start-up

The keypad registration will be completed in 10 seconds after the control panel
being powered on. The system then will complete the start-up and enter the
properly working status.

2.3.2 Alarm Keypad Start-up

The LED keypad will make continuously prompt tones if the keypad does not
receive the registration respond from the control panel in 20 seconds after it
being power on. While the registration is succeeded, the working status
indicator will turn green. For other keypad indicator/beeper description, please
refer to Network Control Panel User Manual.
LCD Keypad Displayed Information
15
Network Security Control Panel Installation Guide

For LCD keypad, the interface after powering on is shown below.

HIKVISION
2.3.3 Keypad Address

An address is required for each alarm keypad in the system. These addresses
cannot be repeated. Once exchanging the alarm keypad, the address of the new
keypad must be the same as the replaced one. You should configure the
address via DIP switch of the keypad before powering on the system. The
address should be in the range of 1~31.

2.3.4 Factory Settings

If powering on the system before zone connection, a 2.2k Ohm resistance is


required for bridge connection between each zone.
Password and Report
Installer Password: 012345
Main User Password: 1234
Power Recovery Default Installer Password: No
Arming/Disarming Report: Yes
Control Panel Hijack Report: N/A
CID Report:
Account#1#2: No
Dialing Type: DTMF
Remote control Programming: No

For Detailed CID code, Please refer to CID Report.


Zone:
Zone 1 to 8: Real-time zone
Urgent Soft Zone: Buzzing prompt sound
Test:
Testing Report Interval:N/A
Timing:
Entering Duration: 10 sec
16
Network Security Control Panel Installation Guide

Exiting Duration: 30 sec


Belling Duration: 5 min
Network Parameters:
IP Address: 192.0.0.64
Port No.: 8000

2.3.5 Activating the Control Panel

Purpose:
You are required to activate the control panel first before you can use the
control panel.
Activation via SADP, and Activation via client software are supported.
 Activation via SADP Software
SADP software is used for detecting the online device, activating the device,
and resetting the password.
Get the SADP software from the supplied disk or the official website, and install
the SADP according to the prompts. Follow the steps to activate the control
panel.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.

17
Network Security Control Panel Installation Guide

3. Create a password and enter the password in the password field, and then
confirm the password.

STRONG PASSWORD RECOMMENDED– We highly recommend


you create a strong password of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the
security of your product. And we recommend you reset your
password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your
product.

4. Click OK to save the password.


You can check whether the activation is completed on the popup window.
If activation failed, please make sure that the password meets the
requirement and then try again.
5. Change the device IP address to the same subnet with your computer by
either modifying the IP address manually or checking Enable DHCP.

18
Network Security Control Panel Installation Guide

6. Input the password and click Save to activate your IP address modification.
 Activation via Client Software
The client software is versatile video management software for multiple kinds
of devices.
Get the client software from the supplied disk or the official website, and install
the software according to the prompts. Follow the steps to activate the control
panel.
Steps:
1. Run the client software and the control panel of the software pops up, as
shown in the figure below.

19
Network Security Control Panel Installation Guide

2. Click Device Management to enter the Device Management page, as


shown in the figure below.

3. Check the device status from the device list, and select an inactive device.
4. Click the Activate to pop up the Activation page.
5. Create a password and enter the password, and then confirm the password.
20
Network Security Control Panel Installation Guide

STRONG PASSWORD RECOMMENDED– We highly recommend


you create a strong password of your own choosing (using a
minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the
security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting
the password monthly or weekly can better protect your product.

6. Click OK to start activation.


7. Click Modify Netinfo to pop up the Network Parameter Modification page,
as shown in the figure below.

21
Network Security Control Panel Installation Guide

8. Change the device IP address to the same subnet with your computer by
either modifying the IP address manually or checking Enable DHCP.
Input the password to activate your IP address modification.

22
Network Security Control Panel Installation Guide

Chapter 3 Entering Keypad


Programming
The control panel can be configured via alarm keypad operation; configuration
process is generally divided into three steps:
Steps:
1. Enter the programming mode; see the command below:
{Installer Code} + {*} + {0} + {#}
2. Control panel configuration operation (see section 4.1)
3. Exit programming mode; see the command below:
{*} + {#}
You should access the programming mode (only installer can access the
programming mode) before keypad configuration. The command is shown below:
012345 *0#
1 2

{1} Installer password: 012345


{2} Command Key: *0 #

 The command for exiting programming mode is *#.


 For detailed programming commands, refer to Security Control Panel
Programming Guide.

23
Network Security Control Panel Installation Guide

Chapter 4 Accessing by Client


Software
Check the package contents and make sure that the device in the package is
in good condition and all the assembly parts are included.

4.1 Installing the iVMS-4200

Insert the installation media of iVMS-4200 into the appropriate computer, and
then perform the following steps to install the iVMS-4200 client software.
Steps:
1. Double-click to enter the welcome panel of the InstallShield
Wizard. Click Next to start the InstallShield Wizard.

2. Read the License Agreement. Click Print if you want to print the license
agreement.

24
Network Security Control Panel Installation Guide

If you accept the terms of the license agreement, check I accept the terms
of license agreement, and click Next to continue.
Otherwise check I do not accept the terms of the license agreement, and
then click Cancel to cancel the installation.
3. On the next panel, you are prompted to select the function module to
install.

Set installation directory where the client software is to be installed. You


can either accept the default directory that is displayed, or click Browse
and select a different directory, and then click Next to continue.

The default directory is C:\Program Files\iVMS-4200 Station\iVMS-4200.


4. Read the pre-install information and click Install to begin the installation.

25
Network Security Control Panel Installation Guide

5. A panel indicating progress of the installation is displayed. A percentage


completion bar is updated as the installation progresses.

6. Select the setup type according to your need.


You can check Create Desktop for Client to create a shortcut icon on the
desktop for the client software.

26
Network Security Control Panel Installation Guide

7. Read the post-install information and click Finish.

4.2 User Registration and Login

For the first time to use iVMS-4200 client, you need to register a super user
for login.
Steps:
1. Enter the super user name and password.
2. Confirm the password.
3. Optionally, check Enable Auto-login to log in the software automatically.
4. Click Register. Then, you can log in the software as the super user.

27
Network Security Control Panel Installation Guide

 A user name cannot contain any of the following characters: / \ : * ? “ < >
|
 The password cannot be empty and the length of the password should
be no less than six characters.
When opening iVMS-4200 after registration, you can log in the client with the
registered user name and password.
Steps:
1. Input the user name and password you registered.
2. Optionally, check Enable Auto-login to log in the software automatically.
3. Click Login.

4.3 Network Security Control Panel Settings


Purpose:
In this section, you are able to configure or view the basic parameters (such as
the system information, alarm information, network data, device status and
so on) of the security control panel.
Click Tool -> Device Management to enter the page.

28
Network Security Control Panel Installation Guide

4.3.1 Add/Edit/Delete the Device


Add a Device:
Steps:
1. Select Hikvision Device on the Device Type list.
2. Click Add to open the device adding dialog box.

29
Network Security Control Panel Installation Guide

3. Select IP/Domain as the adding mode.


4. Input the required information.
Nickname: Edit a name for the device as you want.
Address: Input the device’s IP address or domain name.
Port: Input the device port number. The default value is 8000.
User Name: Input the device user name.
Password: Input the device password.
5. Optionally, you can check the checkbox Export to Group to create a group
by the device name. All channels and alarm inputs of the device will be
imported to the corresponding group by default.
6. Click Add to add the device.

Edit a Device
Purpose:
You can edit the device information in this section, including the device name,
address and port number.
Steps:
1. On the Device for Management page, click and select a control panel in
the device list.
2. Click on the Modify button on the upper side of the list to enter the device
modify interface.

30
Network Security Control Panel Installation Guide

3. Enter the required nick name, address, and port number and then enter
the admin username and password.
4. Click Modify to save the changes.

Delete a Device
Select device from the list, click Delete, and then you can delete the
information of the selected device.

31
Network Security Control Panel Installation Guide

4.4 Security Control Panel Remote Control

In this section, you can control the panel remotely to implement operations such
as arming, disarming, bypass, group bypass, and so on for both the partitions and
zones.
Click Control Panel -> Security Control Panel to enter the page.

4.4.1 Partition Remote Control

On the Security Control Panel page, Click , you can remotely implement
operations of away arming, stay arming, instant arming, disarming, clearing alarm,
group bypass, group bypass recovery and linked zone configuration for the
configured partitions.

32
Network Security Control Panel Installation Guide

Steps:
1. Check and select one or more partitions to be controlled.
2. Click the operations buttons (away arming, stay arming, instant arming,
disarming, clearing alarm, group bypass, and group bypass recovery) on the
upper side of the page.

4.4.2 Zone Remote Control

On the Security Control Panel page, Click , you can remotely implement
bypass, or recovering bypass for the zones, and view the zone status of the
selected partition.

33
Network Security Control Panel Installation Guide

Steps:
1. Select a partition and click to open the zone operation dialog box.
2. Click and select one or more zones to be controlled.
3. Click Bypass/Bypass Recovery on the upper side of the page to control the
selected zones.

The function of Live View is only supported by the security control panel with
video input module.

4.5 Remote Configuration


Purpose:
In this section, you are able to configure device parameters remotely.
Click Control Panel -> Device Management, select the security control panel in the
device list and click Remote Configuration to enter the Remote Configuration page.

34
Network Security Control Panel Installation Guide

4.5.1 Device Information Configuration


Purpose:
In this section, you can view the device information, and configure the device time.

Device Information
Enter Remote Configuration -> Device Information -> Device Information to view
the device information.

35
Network Security Control Panel Installation Guide

Timing Configuration
Before You Start:
Before you start configuring the security control panel, you need to do timing for
the device first.
Enter Remote Configuration -> Device Information -> Device Information to get
the configuration page. Click Synchronization to complete the settings.

4.5.2 System Configuration


Purpose:
In this section, you can configure the system parameters (such as password
management, user, log, system maintenance and so on) for the device.

User Configuration
Purpose:
You can add, edit, or delete the network operator, keypad operator and key fob
operator in this section.
 Network User
Add a Network User
Steps:
1. Enter the user configuration page.
Remote Configuration -> System -> User -> Network User

2. Click Add to enter the page of adding a new user.

36
Network Security Control Panel Installation Guide

3. Enter the corresponding user information including the user type, user
name, password, IP address, and MAC address.
4. Select the permission of the user.
5. Click Save to save the settings.
Edit a Network User
Steps:
1. Click Edit to enter the page of editing the selected user.

37
Network Security Control Panel Installation Guide

2. Edit the corresponding user information including the user type, user
name, password, IP address, and MAC address.
3. Edit the permission of the user.
4. Click Save to save the settings.
Delete a Network user
Steps:
1. Select a user needs to be deleted.
2. Click Delete to delete the user.

Admin user cannot be deleted.


 Keyboard User
Add a Keyboard User
The control panel supports at most 16 keyboard operators.
Steps:
1. Enter the user configuration page.
Remote Configuration -> System -> User -> Keyboard User

38
Network Security Control Panel Installation Guide

2. Click Add to enter the page of adding a new keyboard user.

3. Select the user index number of the keyboard user, up to 16 numbers can
be selected.
4. Enter the name of the keyboard operator.
5. Enter the password of the operator.
6. Check and select the user permission (Arming Permission, Disarming
Permission, Bypass Permission).
7. Click Save to save the settings.
Edit a keyboard User
Steps:
1. Click Edit to enter the page of editing the selected user.

2. Edit the user name, password and the permission of the user.
3. Click Save to save the settings.
Delete a keyboard user

39
Network Security Control Panel Installation Guide

Steps:
1. Select a user needs to be deleted.
2. Click Delete to delete the user.
 Key Fob User
You can add a Key fob user by entering programming commands on the alarm
keyboard.
Edit a Key Fob user
Steps:
1. Enter the user configuration page.
Remote Configuration -> System -> User -> Key fob User

2. Click Edit to enter the page of editing the selected user.

3. Edit the corresponding partition of the user.


4. Edit the partition of the user.
5. Click Save to finish the settings.
Delete a user
Steps:
1. Select a user needs to be deleted.
2. Click Delete to delete the user.

4.5.3 Network Configuration


Purpose:
40
Network Security Control Panel Installation Guide

You can edit the network parameters in this section.

General Network Parameters Configuration


Steps:
8. Enter the general network configuration page.
Remote Configuration-> Network->General

9. Configure the NIC settings, including the IPv4 Address, IPv4 Subnet Mask and
IPv4 Default Gateway.
10. Click Save to save the above settings.

 The valid value range of Maximum Transmission Unit (MTU) is 500 ~ 9676.
The default value is 1500.
 The Multicast sends a stream to the multicast group address and allows
multiple clients to acquire the stream at the same time by requesting a copy
from the multicast group address.
Before utilizing this function, you have to enable the Multicast function of
your router and configure the gateway of the control panel.

DNS Settings
Steps:
1. Enter the DNS configuration page.
Remote Configuration -> Network -> DNS

41
Network Security Control Panel Installation Guide

2. Enter the corresponding DNS sever address.


3. Click Save to save the settings.

White List Configuration


Purpose:
The whitelist is the list of phone numbers which are authorized to interact with the
control panel.
Steps:
1. Enter the whitelist configuration page.
Remote Configuration -> Network -> White List

2. Select the index of the whitelist.


3. Check Enable to enable the configuration.
4. Enter the phone number of the whitelist into the SIM Card Number.
5. Select the identical message time interval that represents the interval of
sending message triggered by the same event.
6. Select the permission of the whitelist on the permission panel.
7. Click Save to save the settings.

4.5.4 Input Settings


Purpose:
You can configure partition and zone in this section.

Partition Configuration
Purpose:

42
Network Security Control Panel Installation Guide

You can configure the detailed alarm parameters of the zone in the partition in this
section.
Steps:
1. Enter the partition alarm triggering configuration page.
Remote Configuration -> Input Settings -> Partition

2. Click Basic Settings to enter the page.


a. Click the dropdown box to select a partition.
b. Check Enable Partition to enable functions of the partition.
c. Enter the Siren Output Time (unit: second). The siren output time
represents the duration of siren ringing when the alarm of the partition is
triggered.
d. Check the required functions of the partition.
 Enable Hostage Report: Enable uploading the hostage report.
 KeyToneOfArmOrDisarm: Enable the prompt sound when uploading
the arming/disarming report.
 KeyToneOfManualTestReport: Enable the prompt sound when
successfully uploading the manual test report.
 KeyZoomEnable: Support the key Zone to arm or disarm the current
43
Network Security Control Panel Installation Guide

partition.
 KeyZoneReportUpload: Enable uploading report when the key Zone
arms or disarms the current partition.
e. Check and select zone, keyboard, or keyboard user to add required zone,
keyboard, or keyboard user to the partition.
f. Click Save to save the settings.
3. Click Public Partition to enter the page.

a. Check Enable Public Partition to enable functions of public partition


b. Check and select a partition as public partition.
c. Click Save to save the settings.
4. Click Daily Arming/Disarming Schedule to enter the page.
Purpose:
You can set the schedule for turning on/off the relay in this section.

a. Select a partition needs to be configured.


b. Check the Enable of Normal Schedule to enable daily schedule for the
partition. You can select to enable the Forced Arming.
c. Click the template box to enter the schedule configuration page.

44
Network Security Control Panel Installation Guide

d. Click Edit to enable the schedule configuration.


e. Click and select a template, you can rename the template.

f. Click / / to select an arming type,


and then click and drag the mouse on the time bar to draw the daily
schedule.
Delete Schedule: Click the drawn color bar and click to delete the
color bar.
Clear Schedule: Click to clear the drawn schedule.
Copy Schedule: Click the drawn color bar and click to copy this
arming schedule to other day of the week.
g. Click Save to save the settings and click Cancel to exit the page.
h. Click Copy to to copy all these settings to other partitions.
i. Click Save to save the settings.
5. Click Priority Schedule Arming/Disarming to enter the page.

45
Network Security Control Panel Installation Guide

a. Click Add to add a new holiday arming/disarming schedule.

b. Check Enable to enable holiday schedule for the partition. You can select
to enable the Forced Arming.
c. Click the dropdown box to select the time duration.
d. Click / / to select an arming type,
and then click and drag the mouse on the time bar to draw the daily
schedule.
e. Check and select one or more partitions which need to enable the holiday
schedule.
f. Click Save to save the settings or click Cancel to exit the page.

Zone Configuration
Steps:
1. Enter the Zone configuration page.
Remote Configuration -> Input Settings -> Zone -> Basic Settings

46
Network Security Control Panel Installation Guide

2. In the zone list, click to configure the corresponding zone parameters.

3. Edit the general information of the Zone, including name, detector type, zone
type, sensitivity, zone resistor, tampering type, tamper resistor and so on.
47
Network Security Control Panel Installation Guide

Detector Type: Select the type of the detector.


Zone Type: Select the type of Zone
Sensitivity: Select the response time of the Zone.
4. Select the linked siren and linked Trigger.
5. Click Copy to to copy all these settings to other Zones.
6. Click Save to save the settings.

4.5.5 Output Settings


Purpose:
You can configure siren and relay in this section.

Siren Configuration
Steps:
1. Enter the siren configuration page.
Remote Configuration -> Output Settings -> Siren

2. Click the dropdown box to select a siren needs to be configured.


3. Check Enable to enable the configuration.
4. Edit the siren name.
5. Click Zone Event, check the zone needs to alarm with siren.
6. Click Partition Event, select the detailed operation after the alarm being
triggered on the partition event panel.
48
Network Security Control Panel Installation Guide

7. Click Global Event, select the global event of alarm triggering.


8. Click Save to save the settings.

Relay Configuration
Steps:
1. Enter the Relay configuration page.
Remote Configuration -> Output Settings -> Relay

2. Click Basic Settings, select an alarm input channel and double click the relay to
enter relay configuration page.

3. Edit the general information of the relay, including name, output delay and so
on.
49
Network Security Control Panel Installation Guide

Output Delay (0~5999s): Configure the alarm output time after the alarm
being triggered.
4. Click Partition Event, and then click the dropdown box to select a partition
needs to be configured. Check Open or Close for the detailed operation after
the alarm being triggered on the partition event panel.
5. Click Global Event, select the global event of alarm triggering.
6. Click Copy to to copy all these settings to other Zones.
7. Click Save to save the settings.

4.5.6 Report Settings


Uploading Method Configuration
Purpose:
You can select to send Zone report, non-zone alarm report and configure the
uploading method of the selected center group in this section.
Steps:
1. Enter the uploading method configuration page.
Remote Configuration -> Report Settings -> Report Settings

2. Click the dropdown box to select a center group.


50
Network Security Control Panel Installation Guide

3. Check Enable to enable the configuration


4. Check the checkbox to select the required Zone for sending the Zone report for
the Zones without Zone report.

At most 6 center groups can be inter-combined to send the alarm report.


5. Check the checkbox to select the type of non-Zone alarm report.
6. Click each dropdown box to configure the uploading channel.
7. Click Save to save the settings.

The alarm channel of each center group should be configured in order.

Test Report
Purpose:
You can configure uploading period of the test report and uploading time of the
first test report in this section.
Steps:
1. Enter the test report configuration page.
Remote Configuration -> Report Settings -> Test Report

2. Check Enable to enable the test report upload function.


3. Enter Report Period and First Report Time.

4.5.7 Other
Fault Audible Warning
Purpose:
You can configure fault audible warning in this section.
Steps:
1. Click Remote Configuration -> Other -> Fault Audible Warning to enter the
page.

51
Network Security Control Panel Installation Guide

2. Select Fault Keyboard and click Disable Audible Warning.

Fault Handling
Purpose:
In this section , you can select the fault detection type, alarm linked keypad and
output mode.
Steps:
1. Enter the fault handling page.
Remote Configuration -> Other -> Fault Handling

2. Check and select the fault detection type.


3. Click the Source of Fault dropdown menu to select the linked keypad.
4. Check and select the alarm output mode and corresponded fault detection
type. The alarm output mode can be selected as Linked Indicative Light and

52
Network Security Control Panel Installation Guide

Linked Keypad Sound.


5. Click Save to save the settings.

4.5.8 Alarm Management


Purpose:
You can configure the partition, zone, relay and siren in this section.
Click Remote Configuration -> Alarm Management to enter the page.
Partition: you can arm/disarm the partition, clear alarm, group bypass, and
recover group bypass of the partition.

Zone: you can bypass or recover bypass of the selected zone.

Tigger: you can click Open or Close to turn on/off the selected relay.

53
Network Security Control Panel Installation Guide

Siren: you can enable/disable the specified siren.

4.5.9 Status
You can view status of the zone, storage battery and module information in this
section.

54
Network Security Control Panel Installation Guide

Chapter 5 Trouble Shooting


Q: What is the function of Project button of LCD keypad?
A: Project button has button switch function besides normal instruction
button, such as:
When sensor or module is abnormal, press and hold the Project button to
switch to other interfaces manually. When the sensor/module is abnormal or
the keypad, press the Project button once and the current display interface will
be paused for 20s; press it again to switch to the next LCD screen interface.

Q: How to manually switch to other abnormal interfaces when the LCD keypad
displays sensor/module is abnormal?
A:
1. Among the LCD keypad abnormal display interfaces, display interface of the
sensor alarm, module abnormal display interface are of first priority; the sensor
abnormal interface is of second priority, sensor bypass interface is of third
priority.
2. If interfaces of different priority exist at same time, the system automatically
displays the interface of first priority.
3. The switch between interfaces of same priority: there are two ways to switch
display interface of the sensor alarm to sensor off-line display interface.
1) System auto-switch: The system will refresh automatically. If the
current display interface is accomplished and other interfaces of same
priority exist, system will auto switch to other interfaces.
2) Manually switch: Press the Project button continuously until it
switches to the interface to display.
4. Switch between interfaces of different priority: from sensor alarm interface to
sensor bypass interface:
Press and hold the Project button for multiple times until it switches to the
interface to display.

Q: What is the meaning of LCD keypad Arm/Disarm, Operate indicators?


A: LCD system keypad indicator:
1. The meaning of Arm/Disarm indicator (Red and Green) is shown below:
Working Status Indicator Status Working Status Indicator Status

55
Network Security Control Panel Installation Guide

Enter Green, Blink Parameters Green, Blink


programming Initialization
System Arming Red, Normally On System Disarming Green, Normally
On
2. The meaning of Operate indicator (Green) is shown below:
Working Status Indicator Status Working Status Indicator Status
Enter Green, Blink Parameters Green, Blink
programming Initialization
System Abnormal Green, Blink System Normal Green, Normally
On

Q: What are the steps of LED keypad to program the control panel?
A:
1. In overall keypad programming mode, the program command is: {installer
password} + {*} + {0} + {#};
2. To view the configuring operation for alarm control panel, please refer to alarm
keypad configuring code;
For example: program user password 2#, the password has arm/disarm
function, does not send arming report, does not allow bypass, password is
5678, and the program code is shown as follow:
Command Code Arming Type Password End
{0}{0}{2} {3} {5}{6}{7}{8} {#}
3. Set program command
There are 2 alert sound of correct or 5 alert sound of error and corresponding
OSD notices after each program command is over. When 5 alert sound of error
is heard and the screen displays Operation Failed, there is error in program
command setting and the user need to reset correct program command.
When 2 alert sound of correct is heard and the screen displays Operation
Succeeded but the setting parameters are not the parameters needed, you
can operate according to program command once again.
4. Exit program mode, the program command is: {*} + {#}.

Q: What is the meaning of LED keypad Arm/Disarm, Operate, Camera indicators?


A:
LED alarm keypad Arm/Disarm indicator:

56
Network Security Control Panel Installation Guide

Working Status Indicator Status Working Status Indicator Status


Armed Red, Normally On Enter Green, Blink
Programming
Disarmed Green, Normally Main Operator Green, Blink
On Change Password
LED alarm keypad Operate indicator:
Working Status Indicator Status Working Status Indicator Status
Normal Green, Normally Keypad Not Red, Blink
On Logged In
System Error Orange, Blink Enter Green, Blink
Programming
Project Red, Normally On Change Password Green. Blink
LED alarm keypad Camera indicator:
Working Status Indicator Status Working Status Indicator Status
Sensor Normal Off Sensor Error Red, Normally On
Sensor Alarm Red, Blink Sensor Bypass Green, Normally
On
LED keypad Camera indicator under Project Mode:
No. Description No. Description
1 Off-hook 5 Send CID Report
2 Dial 6 Receive Alert Sound
3 Alarm Connecter 7 Control Panel Off-hook
Disconnection
4 Receive the Hand-shack 8 Alarm Connector On-hook
Sound
LED keypad Camera indicator under Status Mode:
No. Description No. Description
1 AC Power off 5 Keypad Off-line
2 Battery Low Voltage 6 Network Cable Off-line

57
Network Security Control Panel Installation Guide

3 Control Panel Tamper-proof 7 No SIM Card


On
4 ADSL Cable Off-line 8 Reserved

Q: What is the meaning of LED keypad alert sound?


A: The meaning of LED keypad alert sound is as follows:
No. Keypad Alert Sound Description
1 1 Sound Keypad Prompt, Error Operating Prompt
2 2 Sound Correctly answered, report uploading
succeeded
3 5 Sound Incorrectly answered, report uploading
failed in 60s
4 Last for 2s Error Prompt
5 Intermittent Slow Sound, Enter/Exit Delay
Continuously
6 Intermittent Rapid Sound, Enter/Exit Delay, 10s Left
Continuously
7 Rapid Beep Sensor Alarm, Keypad not logged in
8 3 Long 2 Short Keypad Tamper-proof On
Q: How to remove alarm memory?
A: There are two situations of removing alarm memory as shown below:
1) Under disarming mode: Press {*} + {1} + {#} or {Password} + {*} + {1} + {#}.
2) Under arming mode: Press {Password} + {*} + {1} + {#}.

Q: How to input hexadecimal number?


A: Input hexadecimal number with {*} button and number button {0} ~ {5}.
Conversion Table
Hexadecimal Number Corresponding Key
A *0
B *1
C *2
D *3
E *4
F *5

58
Network Security Control Panel Installation Guide

Q: How to set LED keypad address?


A: Set LED keypad address with the DIP address of keypad.

59
Network Security Control Panel Installation Guide

DIP Add DIP Add DIP Add DIP Add


. . . .
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
0 1 2 3 4 5
1 1 2 3 4 5
2 1 2 3 4 5
3
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
4 1 2 3 4 5
5 1 2 3 4 5
6 1 2 3 4 5
7
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
8 1 2 3 4 5
9 1 2 3 4 5
10 1 2 3 4 5
11
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
12 1 2 3 4 5
13 1 2 3 4 5
14 1 2 3 4 5
15
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
16 1 2 3 4 5
17 1 2 3 4 5
18 1 2 3 4 5
19
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
20 1 2 3 4 5
21 1 2 3 4 5
22 1 2 3 4 5
23
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
24 1 2 3 4 5
25 1 2 3 4 5
26 1 2 3 4 5
27
ON DIP ON DIP ON DIP ON DIP

1 2 3 4 5
28 1 2 3 4 5
29 1 2 3 4 5
30 1 2 3 4 5
31

Q: Why is it needed to input E at the end of keypad configured phone number?


A: Control panel can process phone number with 31 characters. Input number with
16 characters in each command address so that 2 addresses are needed for
storage phone number. However, the phone numbers are different in every
place so the control panel needs a special data bit to check if the phone
number is complete. Character E ({*} {4}) is for checking if the phone number
is complete.
For example: The first Alarm connecter phone number is 0571-88075998, user
can input the following command:
Command Address 460
0 5 7 1 8 8 0 7 5 9 9 8 E
For example: The first alarm connecter phone number is 17951-88075998, user
can input the following command:
Command Address 460
1 7 9 5 1 F F F 8 8 0 7 5 9 9 8
Command Address 461
E
For example: The first alarm connecter phone number is 0571-88075998-8888,
user can input the following command:
Command Address 460
60
Network Security Control Panel Installation Guide

0 5 7 1 8 8 0 7 5 9 9 8 F F F 8
Command Address 461
8 8 8 E

Q: What are notes for setting password?


A: The password for each operator should be different; otherwise the setting will
be failed. For example, if the password of operator 1 is set to be 1234 hen
password of operator 2 is also 1234, it will prompt to be error. In addition, the
password of each operator should be different from the control panel age code
of other operators; otherwise the setting will be failed. For example if the
password of operator No.3 is 3456 and the password of operator No.4 is set to
be3455 or 3457, it will prompt to be error.

Q: What are notes for setting duress code?


A:
1. The description of duress code is as follow:
Input duress code when the user is under duress, it will work as if the user
inputs valid password, but the system will auto-upload the alarm information.
For example when a criminal forces the user to disarm the alarm, user can input
the control panel age code to disarm the system and upload the alarm
information to the center automatically and off the criminal’s guard.
2. Please note when setting duress code: duress code is the valid password with
its last number±1.
For example: Valid Password: 1234, Duress Code: 1235 and 1233.
For example: Valid Password: 1230, Duress Code: 1231 and 1239.
For example: Valid Password: 1239, Duress Code: 1230 and 1238.
3. Please take the following notes while using duress code:
While using duress code, it is needed to enable duress report firstly, as to
program the control panel age report and delay. The programming command
to enable Control Panel Hijack Report is as follow:
Command Address {4}{6}{4}
Enter Delay {3}
Exit Delay {6}
Siren Working Duration {2}
Control Panel Hijack Report {1}
End {#}

Q: How to solve the problem of two LED keypad address being same?
61
Network Security Control Panel Installation Guide

A: When two LED keypad addresses are the same, the situation of two keypads
demanding bus communication at the same time will appear and cause conflict.
The only solution is to remove one keypad and reset the other keypad to an
unused legal address. Restore the control panel by processing program code
({Main Operator}{*}{6}{8}{#})

Q: Why there is no Disarming Report?


A: To make sure the user has permission of Disarming Report, please refer to
Operator Configuration.

Q: What to do if the user cannot disarm after arming the system?


A: There are two different situations:
1. The user does not have permission to disarm, please contact the administrator.
2. Take the follow instructions when there is only one user in the system without
permission to disarm;
1) Initialize the hardware, restore the password of operator, main operator
password and permission, and then disarm with main operator. The
initialization password of operator is: 012345, the initialization password of
main operator is: 1234, the permission is: arm/disarm. There is arm/disarm
report and bypass is permitted. Please refer to FAQ of hardware
initialization for more information about hardware initialization.
2) The command code to restore factory parameters: {Password of operator}
+ {*} + {8} + {9} + {#}.
This method is not recommended because it will initialize all
programming contents.

Q: How to do the hardware initialization?


A: Control panel hardware initialization only initializes operator password: 012345
and main operator password: 1234, main operator permission is arm/disarm.
There are arming/disarming report and allows bypass.
Steps:
1) Power off the control panel and open the cover;
2) Short the restore switch of the control panel with shorting nut or
connection cables;
3) Power on the control panel and power off it 10s later;
4) Please remove the shorting nut or connection cable on the restore switch;
5) Cover the control panel well;
6) Recharge the control panel;

62
Network Security Control Panel Installation Guide

Q: Why is there no response for keypad operational order but alert sound of error
10s later?
A: It may be caused by follow situations:
1) Poor contact of the connection cable between LED keypad and the control
panel, please check if the cable is normal;
2) The LED keypad is considered as off-line in the communication. If there is
other keypad operates normal, process program command {Main Operator
Password} + {*} + {6} + {8} + {#}to restore it or power off the control panel
and reboot.

Q: How does the control panel detect alternating current, storage battery,
control panel tamper-proof and ADSL cable?
A: The status of the control panel detection is as follows:
1) The control panel detects AC power supply status once in a while;
2) The control panel detects storage battery status once in a while;
3) The control panel detects tamper-proof status once in a while;
4) The control panel detects ADSL cable status once in a while.

Q: The network is disconnected.


A:
1) Please check if the network status indicator of the board is normal on;
2) If the network status indicator is not normal on, please check if the network
cable connection is normal.

Q: What if the client cannot log in the device?


A: Troubleshoot according to the prompt.
Please check if the device IP Address and Port No. are correct. The device
default IP Address is: 192.0.0.64, and the Port No. is: 8000.

Please check if the user name and password to log in the control panel are
correct. The default user name is: admin, the word is: 12345.

Q: Why the control panel cannot communicate with the alarm center group?
A: Please check if the uploading mode and its corresponding parameters are
correct.
You can configure the uploading mode in Remote Configuration -> Report Settings
-> Uploading Method Configuration, and the configuration of control panel
63
Network Security Control Panel Installation Guide

communicating with the alarm center group is as follows:


1) If the user communicates with the center via LAN: Configure parameters
such as IP Address, Port, User Name and Protocols Type of the remote
alarm center in Remote Configuration-> Report Settings -> Uploading
Method Configuration -> Settings;
2) If the user communicates via dialing: Configure parameters such as Center
Phone Number, Receiver ID and Communication Protocol of the remote
alarm center in Remote Configuration -> Report Settings -> Uploading
Method Configuration -> Settings;
3) If the user communicates via WIFI: Configure APN Name and Parameters of
remote alarm center in Remote Configuration-> Report Settings ->
Uploading Method Configuration -> Settings. The parameters include IP
Address, Port, Protocol Type and APN User Account, etc..

Q: How to configure the communication way of control panel and alarm center
group?
A:
1. Center uploading mode supports at most 6 center groups, each center group
divides in main channel and 3 backup channels;
2. If the center group is enabled. Enable the center group before the use.
3. For example: The control panel needs to upload report to network alarm center
1 and dialing alarm center1 and network alarm center 1 needs to upload report
to network alarm center 2 when it fails to upload it. The configurations are as
follows:
1) Enable Center Group1 and Center Group2;
2) In the uploading method configuration list, select N1 in center group 1 main
channel, select N2 in backup channel 1, select T1 in Center group2 main
channel.
3) Click Save.
If the client is not opened, the user can realize communication with alarm
center by programming with keypad. For detailed operations please refer to
program command 611~634.

Q: Why cannot it upload report and control after WIFI is enabled?


A: The follow situations may lead to WIWI connection failure:
1) No SIM Card or poor contact;
2) 3G module antenna is not normally connected or with poor signal;
3) WIFI parameter setting is incorrect;

64
Network Security Control Panel Installation Guide

4) SIM Card has no enough tariffs.

65
Network Security Control Panel Installation Guide

Appendix1:Specifications
Model DS-19A08-F/Kx DS-19A08-F/KxG
Alarm Input 8 Zones Alarm Input
Alarm Output Local 1-ch+8-ch expandable, 1 A/30 VDC
Siren Power Supply DC12 V/300 mA
Telephone Line 1-ch PSTN
Keypad K1: LED Keypad; K2: LCD Keypad
Supported Keypads
8
(LCD/LED)
Security Support Tamper-proof and Movement Prevention
Tamper-proof Switch
control panel Function of Security control panel
Parameters Timed Arm/Disarm 8 Time Periods Each Day
Partition 8 Partitions, 1 Public Partition
Sensor Tamper-proof
Support
Alarm
Message Alarm N/A Support
Message Arm/disarm N/A Support
Supported Remote
32 (Unobstructed Effective Range of 100 m)
Controllers
1, Support Alarming
Wireless Interface
Report Upload
Wireless Wireless Network
Network N/A GPRS
Standard
Parameters
UIM Card Slot 1
SMA Antenna Interface 1
Network SADP (Search IP Address Automatically), DHCP
Network Protocol
Management (Obtain IP address Automatically) etc.
Network Interface 1 RJ45 10M/100M Self-adaptive
External Keypad Bus 1, RS485 Half-duplex
Interface Port for Storage
1 Port, for Storage Battery Accessing
Battery
Power Supply DC14.3 V/1.7 A
Consumption (Without
HDD and Power Supply 2W 3W
for External Device)
Others Working Temperature -10 °C~+55 °C
Working Humidity 10%~90%
Mounting Wall-mounted
Dimensions 170 × 125 × 29 mm
Weight ≤ 0.32 kg

66
Network Security Control Panel Installation Guide

Appendix2:CID Report
CID Description CID Description
Code Code
1103 Real-time Zone 3103 Real-time Zone Alarm
Alarm Recovery
1110 Fire Zone Alarm 3110 Fire Zone Alarm Recovery
1122 24-hour Non-voiced 3122 24-hour Non-voiced Zone
Zone Alarm Alarm Recovery
1123 24-hour Voiced 3123 24-hour Voiced Zone
Zone Alarm Alarm Recovery
1131 Perimeter Zone 3131 Perimeter Zone Alarm
Alarm Recovery
1132 Internal Delay Zone 3132 Internal Delay Zone Alarm
Alarm Recovery
1134 3134 Delay Zone Alarm
Delay Zone Alarm
Recovery
1137 3137 Tampering Alarm
Tampering Alarm
Recovery
1301 AC Power Down 3301 AC Power Down Recovery
1302 Low Battery 3302 Low Battery Recovery
1305 Control Panel 1121 Control Panel Age
Restoring
1336 Printer 3336 Printer Disconnection
Disconnection Recovery
1354 Phone Line 3354 Phone Line Disconnection
Disconnection Recovery
1382 Local Expanded 3382 Local Expanded Zone
Zone Fault Recovery

67
Network Security Control Panel Installation Guide

CID Description CID Description


Code Code
1401 Disarming 3401 Arming
1406 Alarm Clearing 1810 Soft Zone Emergency
Memory Canceling Alarm
1570 Zone Bypass 3570 Zone Bypass Recovery
1574 Group Bypass 3574 Group Bypass Recovery
1601 Manual Testing 1602 Regular Testing Report
Report
1627 Programming 1628 Programming Exiting
Entering
1910 Keypad 3910 Keypad Disconnection
Disconnection Recovery
1911 Keypad Bus Trigger 3911 Keypad Bus Trigger
Disconnection Disconnection Recovery
1921 Wireless Network 3921 Wireless Network
Exception Recovery
1931 Wired Network 3931 Wired Network Recovery
Exception
1930 IP Address Conflict 3930 IP Address Recovery
1931 Network Cable 3931 Network Cable Recovery
Disconnection
1940 Motion Detection 3940 Motion Detection
Enabling Disabling
1941 Tampering Alarm 3941 Tampering Alarm
Enabling Disabling
1942 Video Loss Alarm 3942 Video Loss Alarm
Enabling Disabling
1943 Unmatched Input/ 3943 Input/ Output Format
Output Format Recovery

68
Network Security Control Panel Installation Guide

CID Description CID Description


Code Code
1944 Video Input 3944 Video Input Recovery
Exception
1945 3945 HDD Recovery (For HDD
HDD Full Alarm
Full)
1946 3946 HDD Recovery (For HDD
HDD Fault Alarm
Fault)
3408 Real-time Arming 3441 Stay Arming

69
Network Security Control Panel Installation Guide

Appendix3:LED Keypad Prompt


Sound
No. Sound Prompt Description
Pressing keys prompt; The command is timed
1 One Beep
out or the command is too long.
Valid command. Uploading the report
2 Two Beeps
completed.
Invalid command. Failed to upload the report
3 Five Beeps
in 60s.
Continuous Beeping
4 Fault Prompt
For Two Seconds
Slowly Continuous
5 Entry/Exit Delay
Beeps
Rapidly Continuous
6 Entry/Exit Delay, less than 10s.
Beeps
7 Rapid Beeps Zone Alarm; The keyboard is not registered.
Three Long Beeps The tampering prevention of the keyboard is
8
and Two Short Beeps turned on.
9 Three Beeps Registering the keyboard completed.
Two minutes before auto arming/disarming;
One Beep In Two
10 One minute before arming for temporary
Seconds
password.
Three Beeps In One One minute before auto arming/disarming;
11
Second 15s before arming for temporary password.

70
Network Security Control Panel Installation Guide

Appendix4:Command Table
Control Panel Command Table
Installer
0 0 0 0 1 2 3 4 5
# Password

*2 1 2 3 4 1#Password 6 0 0 0 0 2#Password
0 0 1 # User Name: 0 0 2 # User Name:

6 0 0 0 0 3#Password 6 0 0 0 0 4#Password
0 0 3 # User Name: 0 0 4 # User Name:

6#PasswordPa
6 0 0 0 0 5#Password 6 0 0 0 0
ssword
0 0 5 # User Name: 0 0 6 # User Name:

6 0 0 0 0 7#Password 6 0 0 0 0 8#Password
0 0 7 # User Name: 0 0 8 # User Name:

6 0 0 0 0 9#Password 6 0 0 0 0 10#Password
0 0 9 # User Name: 0 1 0 # User Name:

6 0 0 0 0 11#Password 6 0 0 0 0 12#Password
0 1 1 # User Name: 0 1 2 # User Name:

6 0 0 0 0 13#Password 6 0 0 0 0 14#Password
0 1 3 # User Name: 0 1 4 # User Name:
16#PasswordP
6 0 0 0 0 15#Password 6 0 0 0 0
assword
0 1 5 # User Name:
0 1 6 # User Name:

6 0 0 0 0 17#Password 6 0 0 0 0 18#Password
0 1 7 # User Name: 0 1 8 # User Name:

6 0 0 0 0 19#Password 6 0 0 0 0 20#Password
0 1 9 # User Name: 0 2 0 # User Name:

6 0 0 0 0 21#Password 6 0 0 0 0 22#Password
0 2 1 # User Name: 0 2 2 # User Name:

6 0 0 0 0 23#Password 6 0 0 0 0 24#Password
0 2 3 # User Name: 0 2 4 # User Name:

6 0 0 0 0 25#Password 6 0 0 0 0 26#Password
0 2 5 # User Name: 0 2 6 # User Name:

6 0 0 0 0 27#Password 6 0 0 0 0 28#Password
0 2 7 # User Name: 0 2 8 # User Name:

6 0 0 0 0 29#Password 6 0 0 0 0 30#Password
0 2 9 # User Name: 0 3 0 # User Name:

6 0 0 0 0 31#Password 6 0 0 0 0 32#Password
0 3 1 # User Name:
0 3 2 # User Name:

6 0 0 0 0 33#Password 6 0 0 0 0 34#Password
0 3 3 # User Name:
0 3 4 # User Name:

6 0 0 0 0 35#Password 6 0 0 0 0 36#Password
0 3 5 # User Name: 0 3 6 # User Name:

6 0 0 0 0 37#Password 6 0 0 0 0 38#Password
0 3 7 # User Name: 0 3 8 # User Name:

6 0 0 0 0 39#Password 6 0 0 0 0 40#Password
0 3 9 # User Name: 0 4 0 # User Name:

6 0 0 0 0 41#Password 6 0 0 0 0 42#Password
0 4 1 # User Name: 0 4 2 # User Name:

6 0 0 0 0 43#Password 6 0 0 0 0 44#Password
0 4 3 # User Name: 0 4 4 # User Name:

6 0 0 0 0 45#Password 6 0 0 0 0 46#Password
0 4 5 # User Name: 0 4 6 # User Name:

6 0 0 0 0 47#Password 6 0 0 0 0 48#Password
0 4 7 # User Name: 0 4 8 # User Name:

6 0 0 0 0 49#Password 6 0 0 0 0 50#Password
0 4 9 # User Name:
0 5 0 # User Name:

71
Network Security Control Panel Installation Guide

6 0 0 0 0 51#Password 6 0 0 0 0 52#Password
0 5 1 # User Name: 0 5 2 # User Name:

6 0 0 0 0 53#Password 6 0 0 0 0 54#Password
0 5 3 # User Name: 0 5 4 # User Name:

6 0 0 0 0 55#Password 6 0 0 0 0 56#Password
0 5 5 # User Name: 0 5 6 # User Name:

6 0 0 0 0 57#Password 6 0 0 0 0 58#Password
0 5 7 # User Name: 0 5 8 # User Name:

6 0 0 0 0 59#Password 6 0 0 0 0 60#Password
0 5 9 # User Name: 0 6 0 # User Name:

6 0 0 0 0 61#Password 6 0 0 0 0 62#Password
0 6 1 # User Name: 0 6 2 # User Name:

6 0 0 0 0 63#Password 6 0 0 0 0 64#Password
0 6 3 # User Name: 0 6 4 # User Name:

6 0 0 0 0 65#Password 6 0 0 0 0 66#Password
0 6 5 # User Name:
0 6 6 # User Name:

6 0 0 0 0 67#Password 6 0 0 0 0 68#Password
0 6 7 # User Name: 0 6 8 # User Name:

6 0 0 0 0 69#Password 6 0 0 0 0 70#Password
0 6 9 # User Name: 0 7 0 # User Name:

6 0 0 0 0 71#Password 6 0 0 0 0 72#Password
0 7 1 # User Name: 0 7 2 # User Name:

6 0 0 0 0 73#Password 6 0 0 0 0 74#Password
0 7 3 # User Name: 0 7 4 # User Name:

6 0 0 0 0 75#Password 6 0 0 0 0 76#Password
0 7 5 # User Name: 0 7 6 # User Name:

6 0 0 0 0 77#Password 6 0 0 0 0 78#Password
0 7 7 # User Name: 0 7 8 # User Name:

6 0 0 0 0 79#Password 6 0 0 0 0 80#Password
0 7 9 # User Name: 0 8 0 # User Name:

6 0 0 0 0 81#Password 6 0 0 0 0 82#Password
0 8 1 # User Name:
0 8 2 # User Name:

6 0 0 0 0 83#Password 6 0 0 0 0 84#Password
0 8 3 # User Name:
0 8 4 # User Name:

6 0 0 0 0 85#Password 6 0 0 0 0 86#Password
0 8 5 # User Name: 0 8 6 # User Name:

6 0 0 0 0 87#Password 6 0 0 0 0 88#Password
0 8 7 # User Name: 0 8 8 # User Name:

6 0 0 0 0 89#Password 6 0 0 0 0 90#Password
0 8 9 # User Name: 0 9 0 # User Name:

6 0 0 0 0 91#Password 6 0 0 0 0 92#Password
0 9 1 # User Name: 0 9 2 # User Name:

6 0 0 0 0 93#Password 6 0 0 0 0 94#Password
0 9 3 # User Name: 0 9 4 # User Name:

6 0 0 0 0 95#Password 6 0 0 0 0 96#Password
0 9 5 # User Name: 0 9 6 # User Name:

6 0 0 0 0 97#Password 6 0 0 0 0 98#Password
0 9 7 # User Name: 0 9 8 # User Name:

6 0 0 0 0 99#Password 6 0 0 0 0 100#Password
0 9 9 # User Name:
1 0 0 # User Name:

72
Network Security Control Panel Installation Guide

6 0 0 0 0 101#Password 6 0 0 0 0 102#Password
1 0 1 # User Name: 1 0 2 # User Name:

6 0 0 0 0 103#Password 6 0 0 0 0 104#Password
1 0 3 # User Name: 1 0 4 # User Name:

6 0 0 0 0 105#Password 6 0 0 0 0 106#Password
1 0 5 # User Name: 1 0 6 # User Name:

6 0 0 0 0 107#Password 6 0 0 0 0 108#Password
1 0 7 # User Name: 1 0 8 # User Name:

6 0 0 0 0 109#Password 6 0 0 0 0 110#Password
1 0 9 # User Name: 1 1 0 # User Name:

6 0 0 0 0 111#Password 6 0 0 0 0 112#Password
1 1 1 # User Name: 1 1 2 # User Name:

6 0 0 0 0 113#Password 6 0 0 0 0 114#Password
1 1 3 # User Name: 1 1 4 # User Name:

6 0 0 0 0 115#Password 6 0 0 0 0 116#Password
1 1 5 # User Name:
1 1 6 # User Name:

6 0 0 0 0 117#Password 6 0 0 0 0 118#Password
1 1 7 # User Name: 1 1 8 # User Name:

6 0 0 0 0 119#Password 6 0 0 0 0 120#Password
1 1 9 # User Name: 1 2 0 # User Name:

6 0 0 0 0 121#Password 6 0 0 0 0 122#Password
1 2 1 # User Name: 1 2 2 # User Name:

6 0 0 0 0 123#Password 6 0 0 0 0 124#Password
1 2 3 # User Name: 1 2 4 # User Name:

6 0 0 0 0 125#Password 6 0 0 0 0 126#Password
1 2 5 # User Name: 1 2 6 # User Name:

6 0 0 0 0 127#Password 6 0 0 0 0 128#Password
1 2 7 # User Name: 1 2 8 # User Name:

6 0 0 0 0 129#Password 6 0 0 0 0 130#Password
1 2 9 # User Name: 1 3 0 # User Name:

6 0 0 0 0 131#Password 6 0 0 0 0 132#Password
1 3 1 # User Name:
1 3 2 # User Name:

6 0 0 0 0 133#Password 6 0 0 0 0 134#Password
1 3 3 # User Name:
1 3 4 # User Name:

6 0 0 0 0 135#Password 6 0 0 0 0 136#Password
1 3 5 # User Name: 1 3 6 # User Name:

6 0 0 0 0 137#Password 6 0 0 0 0 138#Password
1 3 7 # User Name: 1 3 8 # User Name:

6 0 0 0 0 139#Password 6 0 0 0 0 140#Password
1 3 9 # User Name: 1 4 0 # User Name:

6 0 0 0 0 141#Password 6 0 0 0 0 142#Password
1 4 1 # User Name: 1 4 2 # User Name:

6 0 0 0 0 143#Password 6 0 0 0 0 144#Password
1 4 3 # User Name: 1 4 4 # User Name:

6 0 0 0 0 145#Password 6 0 0 0 0 146#Password
1 4 5 # User Name: 1 4 6 # User Name:

6 0 0 0 0 147#Password 6 0 0 0 0 148#Password
1 4 7 # User Name: 1 4 8 # User Name:

6 0 0 0 0 149#Password 6 0 0 0 0 150#Password
1 4 9 # User Name:
1 5 0 # User Name:

73
Network Security Control Panel Installation Guide

6 0 0 0 0 151#Password 6 0 0 0 0 152#Password
1 5 1 # User Name: 1 5 2 # User Name:

6 0 0 0 0 153#Password 6 0 0 0 0 154#Password
1 5 3 # User Name: 1 5 4 # User Name:

6 0 0 0 0 155#Password 6 0 0 0 0 156#Password
1 5 5 # User Name: 1 5 6 # User Name:

6 0 0 0 0 157#Password 6 0 0 0 0 158#Password
1 5 7 # User Name: 1 5 8 # User Name:

6 0 0 0 0 159#Password 6 0 0 0 0 160#Password
1 5 9 # User Name: 1 6 0 # User Name:

6 0 0 0 0 161#Password 6 0 0 0 0 162#Password
1 6 1 # User Name: 1 6 2 # User Name:

6 0 0 0 0 163#Password 6 0 0 0 0 164#Password
1 6 3 # User Name: 1 6 4 # User Name:

6 0 0 0 0 165#Password 6 0 0 0 0 166#Password
1 6 5 # User Name:
1 6 6 # User Name:

6 0 0 0 0 167#Password 6 0 0 0 0 168#Password
1 6 7 # User Name: 1 6 8 # User Name:

6 0 0 0 0 169#Password 6 0 0 0 0 170#Password
1 6 9 # User Name: 1 7 0 # User Name:

6 0 0 0 0 171#Password 6 0 0 0 0 172#Password
1 7 1 # User Name: 1 7 2 # User Name:

6 0 0 0 0 173#Password 6 0 0 0 0 174#Password
1 7 3 # User Name: 1 7 4 # User Name:

6 0 0 0 0 175#Password 6 0 0 0 0 176#Password
1 7 5 # User Name: 1 7 6 # User Name:

6 0 0 0 0 177#Password 6 0 0 0 0 178#Password
1 7 7 # User Name: 1 7 8 # User Name:

6 0 0 0 0 179#Password 6 0 0 0 0 180#Password
1 7 9 # User Name: 1 8 0 # User Name:

6 0 0 0 0 181#Password 6 0 0 0 0 182#Password
1 8 1 # User Name:
1 8 2 # User Name:

6 0 0 0 0 183#Password 6 0 0 0 0 184#Password
1 8 3 # User Name:
1 8 4 # User Name:

6 0 0 0 0 185#Password 6 0 0 0 0 186#Password
1 8 5 # User Name: 1 8 6 # User Name:

6 0 0 0 0 187#Password 6 0 0 0 0 188#Password
1 8 7 # User Name: 1 8 8 # User Name:

6 0 0 0 0 189#Password 6 0 0 0 0 190#Password
1 8 9 # User Name: 1 9 0 # User Name:

6 0 0 0 0 191#Password 6 0 0 0 0 192#Password
1 9 1 # User Name: 1 9 2 # User Name:

6 0 0 0 0 193#Password 6 0 0 0 0 194#Password
1 9 3 # User Name: 1 9 4 # User Name:

6 0 0 0 0 195#Password 6 0 0 0 0 196#Password
1 9 5 # User Name: 1 9 6 # User Name:

6 0 0 0 0 197#Password 6 0 0 0 0 198#Password
1 9 7 # User Name: 1 9 8 # User Name:

6 0 0 0 0 199#Password 6 0 0 0 0 200#Password
1 9 9 # User Name:
2 0 0 # User Name:

74
Network Security Control Panel Installation Guide

2 5 0 1 0 1 Region1 2 5 0 1 0 1 Region2
2 0 1 # Parameters
Configuration
2 0 2 # Parameters
Configuration

2 5 0 1 0 1 Region3 2 5 0 1 0 1 Region4
2 0 3 # Parameters
Configuration
2 0 4 # Parameters
Configuration

2 5 0 1 0 1 Region5 2 5 0 1 0 1 Region6
2 0 5 # Parameters
Configuration
2 0 6 # Parameters
Configuration

2 5 0 1 0 1 Region7 2 5 0 1 0 1 Region8
2 0 7 # Parameters
Configuration
2 0 8 # Parameters
Configuration

2 5 0 1 0 1 Region9 2 5 0 1 0 1 Region10
2 0 9 # Parameters
Configuration
2 1 0 # Parameters
Configuration

2 5 0 1 0 1 Region11 2 5 0 1 0 1 Region12
2 1 1 # Parameters
Configuration
2 1 2 # Parameters
Configuration

2 5 0 1 0 1 Region13 2 5 0 1 0 1 Region14
2 1 3 # Parameters
Configuration
2 1 4 # Parameters
Configuration

2 5 0 1 0 1 Region15 2 5 0 1 0 1 Region16
2 1 5 # Parameters
Configuration
2 1 6 # Parameters
Configuration

0 0 3 3 Communication
4 5 7 # Control

0 0 0 0 Alarm Center 1 0 0 0 0 Alarm Center 2


4 5 8 # Account
Settings
4 5 9 # Account
Settings

E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Alarm Center 1Phone


4 6 0 # Number Settings

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Alarm Center 1Phone


4 6 1 # Number Settings

E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Alarm Center 2Phone


4 6 2 # Number Settings

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Alarm Center 2Phone


4 6 3 # Number Settings

0 0 0 0 0 0
4 6 7 # Region Linked Trigger Configuration

0 0 0 0 0 0 0 Enable Trigger Event Linkage


4 6 8 # Configuration

0 0 0 0 0 0 0
Disable Trigger Event Linkage
4 6 9 # Configuration

0 0 0 0 0 0 1
4 7 0 # Trigger Time Settings 4 7 1 # Siren Settings

75
Network Security Control Panel Installation Guide

2 0 1 3 0 1 0 1 0 8 0 0 0 0 Host Time
4 7 2 # Settings
1 9 2 0 0 0 0 0 0 0 6 4 Host IP Address
4 7 3 # Settings

0 8 0 0 0 Host Port Number


4 7 4 # Settings

2 5 5 2 5 5 2 5 5 0 0 0 Subnet Mask
4 7 5 # Settings

0 0 0 0 0 0 0 0 0 0 0 0
4 7 6 # Gateway Settings

0 0 0 0 0 0 0 0 0 0 0 0 Network Center 1 IP
4 8 5 # Configuration Programming
Address
0 0 0 0 0 Network Center 1 Port
4 8 6 # Configuration Programming
Address
Network Center 1 Protocol and
2 0 0 0 0 0 0
4 8 7 # Account Configuration
Programming Address

0 0 0 0 0 0 0 0 0 0 0 0 Network Center 2 IP
4 8 8 # Configuration Programming
Address
0 0 0 0 0 Network Center 2 Port
4 8 9 # Configuration Programming
Address
2 0 0 0 0 0 0 Network Center 2 Protocol and
4 9 0 # Account Configuration
Programming Address

0 0 0 0 0 0 0 0 0 0 0 0 Wireless Center 1 IP
4 9 1 # Configuration Programming
Address
0 0 0 0 0 Wireless Center 1 Port
4 9 2 # Configuration Programming
Address
2 0 0 0 0 0 0 Wireless Center 1 Protocol and
4 9 3 # Account Configuration
Programming Address

0 0 0 0 0 0 0 0 0 0 0 0 Wireless Center 2 IP
4 9 4 # Configuration Programming
Address
0 0 0 0 0 Wireless Center 2 Port
4 9 5 # Configuration Programming
Address
2 0 0 0 0 0 0 Wireless Center 2 Protocol and
4 9 6 # Account Configuration
Programming Address

76
Network Security Control Panel Installation Guide

0 0 0 0 0 0 Alarm Information
Printer
4 9 9 # Configuration 5 0 0 # Printing
Configuration

0 0 0 0 0 0 0 0 Device Information
5 0 1 # Printing
Configuration
0 0 0 0 0 0 0 Operation Programming
5 0 2 # Information Printing
Configuration
0 0 Alarm and Bypass Recovery
5 0 3 # Printing Configuration

0 0 0 0 0 0 0 Device Recovery
5 0 4 # Information Printing
Configuration

0 1 0
5 1 0 # System Emergency Alarm Linked Siren Configuration

0
Host Tamper-proof
5 1 1 # Configuration

0 1 5 Testing Report
5 1 3 # Configuration

5 1 3 2 0 System Time and Hostage


5 3 1 # Report Configuration

6 0 0 0 0 System Report and


5 3 1 # Arming/Disarming Prompt
Configuration

7 1 1 1 1 System Key User


5 3 1 # Permission
Configuration

1 1 1 1 1 1 1 Host System Fault


5 6 4 # Detection Configuration
System Fault
0 1 1 1 1 1 1 1 1
Display
5 6 7 # Configuration

0 1 1 1 1 1 1 1 1 System Keyboard
5 6 8 # Fault Prompt Sound
Configuration

0
6 1 1 # Center Group 1 Enabling Configuration

0 0 0 0
6 1 2 # Center Group 1 Uploading Mode
Configuration

0 0 0 0 Center Group 1 Region


6 1 3 # Alarm Report
Configuration
1 1 1 1 1 1 1 1 1 1
Center Group 1 Non-region
6 1 4 # Alarm Report Configuration

77
Network Security Control Panel Installation Guide

0
6 1 5 # Center Group 2 Enabling Configuration

0 0 0 0
6 1 6 # Center Group 2 Uploading Mode
Configuration

0 0 0 0 Center Group 2 Region


6 1 7 # Alarm Report
Configuration
1 1 1 1 1 1 1 1 1 1
6 1 8 # Center Group 2 Non-region
Alarm Report Configuration

0
6 1 9 # Center Group 3 Enabling Configuration

0 0 0 0
6 2 0 # Center Group 3 Uploading Mode
Configuration

0 0 0 0 Center Group 3 Region


6 2 1 # Alarm Report
Configuration
1 1 1 1 1 1 1 1 1 1
Center Group 3 Non-region
6 2 2 # Alarm Report Configuration

0
Center Group 4 Enabling Configuration
6 2 3 #
0 0 0 0 Center Group 4 Uploading Mode
6 2 4 # Configuration

0 0 0 0 Center Group 4 Region


6 2 5 # Alarm Report
Configuration
1 1 1 1 1 1 1 1 1 1 Center Group 4 Non-region
6 2 6 # Alarm Report Configuration

0
Center Group 5 Enabling Configuration
6 2 7 #
0 0 0 0
6 2 8 # Center Group 5 Uploading Mode
Configuration
0 0 0 0 Center Group 5 Region
6 2 9 # Alarm Report
Configuration

1 1 1 1 1 Center Group 5 Non-region


6 3 0 1 1 1 1 1
# Alarm Report Configuration

78
Network Security Control Panel Installation Guide

0
6 3 1 # Center Group 6 Enabling Configuration

0 0 0 0 Center Group 6 Uploading Mode


6 3 2 # Configuration

0 0 0 0 Center Group 6 Region


6 3 3 # Alarm Report
Configuration
1 1 1 1 1
1 1 Center Group 6 Non-region
6 3 4 1 1 1
# Alarm Report Configuration

79
First Choice for Security Professionals

UD07462B-B

You might also like