Laserfiche WebLink
� + <br /> �•� • • ' <br /> Area Configurations Door-Activated Custom Function <br /> Area programming offers a wide selection of different A custom function activates when user credentials are <br /> system configurations. Each area is assigned an account presented to a D92106 door controller's reader.The <br /> number to define annunciation, control, and reporting custom function behaves as though the user performed a <br /> functions. Multiple areas can be linked to a shared area function at the keypad associated with the door controller. <br /> which is automatically controlled (hallway or lobby).Area passcodes <br /> arming can be conditional on other areas (master or User passcodes contain three to six digits.Assign each user <br /> associate). Any area can be configured for perimeter and one of 14 customized authority levels in each area. Restrict <br /> interior arming, not requiring a separate area for this passcodes to operate only during certain times. <br /> function. <br /> The Two Man Rule and Early Ambush options require two <br /> Two Man Rule passcodes, providing additional security in financial <br /> Two Man Rule provides added security by requiring: establishments such as banks. <br /> • Two people present at opening Communications <br /> • Two unique passcodes on the same keypad to disarm <br /> an area The D9412GV3 Control Panel prioritizes and sends reports <br /> Without the second passcode, the system denies entry. in Contact ID or Modem Illaz communications formats to <br /> Early Ambush four route groups. Each group has a programmable primary <br /> Early Ambush requires two passcode entries on the same and backup destination. <br /> keypad. Enter the same passcode twice or have two unique The D9412GV3 provides flexible communications for most <br /> passcodes, depending on the configuration.The first entry central stations with reporting capabilities such as: <br /> disarms the area and the second entry stops a timer • Individual point numbers <br /> programmed to send a duress event. If the second entry • Opening or closing reports by user and area number <br /> does not occur within the programmed time,the system • Remote programming attempts <br /> generates a duress event. Early Ambush allows users to • Diagnostic reports <br /> The D9412GV3 uses the DX4020 Ethernet Network <br /> inspect the premises and use the system to confirm that the Interface Module and/or the ITS-DX4020-G GPRS/GSM <br /> area is safe to enter, providing added security. <br /> Communicator to communicate with the Conettix D6600 <br /> Easy Exit Control and D6100i Communications Receiver/Gateways. Using <br /> The D9412GV3 Control Panel changes from one armed state Conettix IP communication offers a secure path that <br /> to another armed state without disarming. For example, if includes anti-replay/anti-substitution features and provides <br /> you change the state from MasterArm to PerimeterArm,the enhanced security with encryption. Both the DX4020 and <br /> control panel complies and reports the change. Easy Exit ITS-DX4020-G can be used for remote programming. <br /> Control reduces the number of keystrokes, simplifying Security and Fire Detection <br /> system operation. The D9412GV3 Control Panel provides eight on-board <br /> Programmable Passcode-controlled Menu List points, and up to 238 additional off-board points <br /> The system prompts users to enter a passcode prior to (depending on model and expansion interfaces).You can <br /> viewing the keypad menu. The keypad display shows the program individual points to monitor all types of burglar <br /> user the menu options allowed according to the user's alarms,fire alarms, and supervision devices. <br /> authority level. Passcode-controlled menus provide users Commercial Wireless <br /> only with the options and information pertinent to them, The Commercial Wireless platform, powered by Inovonics <br /> simplifying system operation. <br /> wireless mesh network technology,ensures superior range, <br /> Passcode Follows Scope reliability, and scalability for commercial applications. <br /> Use Passcode Follows Scope to restrict passcode arming Using a wide range of transmitters and repeaters, this <br /> and disarming to the keypad's immediate local area,even if proven technology provides flexibility and performance to <br /> the keypad can report events from other areas. Passcode meet the most stringent requirements.This exclusive <br /> Follows Scope simplifies the arming and disarming protocol is available only on Commercial Wireless products. <br /> procedure without limiting any other keypad capabilities. <br /> Invisible Walk Test <br /> A menu item allows the user to test invisible 24-hour points <br /> within the scope of the keypad without sending a report to <br /> the central station. <br />