Visonic powermax complete user manual
Previous Page. Next Page. Special Functions Introduction Overview The PowerMaxComplete is a wireless alarm control Proximity tags enable authorized people to enter system that provides protection against burglary, fire restricted areas. Presenting valid proximity tag, while the system is armed and when partitioning is set to and tampering. If such a message partition. A valid proximity tag that is presented to the control panel transmits a coded RF signal back to the control unit.
When Partition is Disabled Your system responds to valid proximity tags enrolled to the system. Vacate the premises before the exit delay expires. To find out which zone alarmed and what kind of C.
Special Functions Looking after People Left at Home To make this possible, ask your installer to define one of the 28 zones of the PowerMaxComplete as an important characteristic emergency zone. PowerMaxComplete is its ability to function in a mode contrary to the usual behavior of an alarm Then, obtain one of the transmitters listed below and system. The display will show: function normally. When A. This will transmit to the Power Max Pro unit and enroll the sensor.
Close it back up. Now, do that for all your sensors. Once that is complete, we can go into each zone and define the type and name. Used for smoke detectors, this type is always active and sounds the siren and calls out whenever triggered. Interiror types are basically the inside of the building.
Most of your motion detectors will be this type. You can refer to the manual for the list of available names. Pick the ones closest to the purpose of the zone you are assigning it to. NOTE: Whenever plugging or unplugging any modules, be sure to remove power and the battery backup! No matter what port I plug it into. So, I fire up my favorite terminal program putty, choose serial, leave it at COM1 and To enroll up to two 2-way keypads, refer to figure 4.
Presenting valid proximity tag, while the system is armed, causes the system to disarm. Here you determine whether to enroll a wireless device by normal transmission or by device Tamper function opening its cover. Options: normal, or by tamper.
Eight system users use them for better, quicker and safer control over various system functions. No black box indicates that the device is not enrolled. In addition, it also allows you to assign a name to each zone and determine whether the zone will operate as a chime zone only while the system is in the disarmed or Home arming state.
When a chime zone is triggered, chime melody or zone name is heard there are 3 selectable chime modes - Melody chime, Zone Name Chime or Chime Off. You may fill out the blank columns even before you start and proceed to program according to your own list. A delay zone is also a perimeter zone by definition. Zone types are fully explained in Appendix D.
Selectable Zone Names 31 zone names can be selected, 26 fixed names and 5 custom names defined by the installer - see chap. Inter-follow 2. Perimeter 3. Perim-follow 4. Delay 1 5. Delay 2 6. Fire 9. Non-alarm Emergency Gas Flood To review the options, repeatedly click or button, until the desired option is displayed, then click a dark box will be displayed at the right side.
Enter your own choice in the last column and program accordingly. An illustrated process is shown in figure 4. In this illustration, each selected option is displayed with a dark box at the right side. Two different entry delays allow the user to enter the protected site while the system is in the armed state via 2 specific doors and routes without causing an alarm. Following entry, the user must disarm the control panel before the entry delay expires.
Slow-rate warning beeps start sounding once the door is opened, until the last 10 seconds of the delay, during which the beeping rate increases.
Locations No. Available options for each delay are: 00s, 15s, 30s, 45s, 60s , 3m and 4m. If the user disarms the system within the allowed abort interval, the alarm is aborted. Available options are: 00s, 15s, 30s, 45s, 60s, 2m, 3m, 4m. Available options are: 1, 5, 15, 60 minutes, 4 hours and also cancel inactive. Here you determine whether the user will be allowed to perform quick arming or not. Once quick arming is permitted, the control panel does not request a user code before it arms the system.
An exit delay allows the user to arm the system and leave the protected site via specific routes and doors without causing an alarm. Slow-rate warning beeps start sounding once the arming command has been given, until the last 10 seconds of the delay, during which the beeping rate increases. Location No. Available options are: 30s, 60s, 90s, s, 3m, 4m.
If desired, press the arming key twice if you want to eliminate the delay beeps that continue during a force arming. If "no bypass" is selected, neither manual bypassing nor force arming is allowed. Options: manual bypass, force arm and no bypass. Here you select the length of time the bell or siren is allowed to function upon alarm. The bell time starts upon activation of the siren.
Once the bell time expires, the siren is automatically shut down. Available options are: 1, 3, 4, 8, 10, 15 and 20 minutes.
During this interval, the buzzer sounds a warning but D Fig. Restarting the exit delay is helpful if the user re-enters immediately after going out to retrieve an item that he left behind.
Three types of exit mode are available: Restart Exit - Exit delay restarts when the door is reopened during exit delay. The restart occurs once only. Off by door - When the door is closed, the exit delay is automatically terminated even if the defined exit delay was not completed.
Normal - The exit delay is exactly as defined, regardless of whether the door is open or closed. Here you determine whether warning beeps will sound or muted during exit and entry delays. Options: enable beeps, off when home and disable beeps. Under trouble conditions, the sounder emits a series of 3 short beeps once per minute. The 3 options are: enable beeps, off at night 8 PM through 7 AM and disable beeps. Audible panic activates the siren and simultaneously transmits a message via telephone.
Silent panic only transmits a message via telephone. The options are: silent panic, audible panic and disable panic. If the alarms number from a specific zone exceeds the programmed number, the control panel automatically bypasses the zone to prevent recurrent siren noise and nuisance reporting to the central station.
The zone will be reactivated upon disarming, or 48 hours after having been bypassed if the system remains armed. Available options are: shut after 1, shut after 2, shut after 3 and no shutdown.
Here you determine whether cross zoning will be active or inactive. Cross zoning is a method used to counteract false alarms - an alarm will not be initiated unless two adjacent zones are violated within a second time limit.
Note: If one of two crossed zones is bypassed see Para. Note: Every 2 crossed zones must be of the allowed zone type Interior, Perimeter, Perimeter follower. Here you determine the time limit for reception of supervision reports from various supervised wireless devices. The options are: 1, 2, 4, 8, 12 hours and disable. Options: normal and in supervision. Here you determine whether jamming interfering trans- missions, on the radio channel used by the system will be detected and reported or not.
If a jam detection option is selected, the system does not allow arming under the relevant jamming conditions. Disabled no jamming detection and reporting.
Here you determine whether the system can be armed in the latchkey mode. You can record a name for latchkey users. Here you determine the time limit for reception of signals from sensors used to monitor the activity of sick, elderly or disabled people. Options: 3, 6, 12, 24, 48, 72 hours and no act disable. Here you determine whether the keypad back lighting will remain on at all times or will come on when a key is pressed and go off within 10 seconds if no further keystrokes are sensed.
The two options are: always on and off after 10 s. Option Fig. A duress alarm ambush message can be sent to the central station if the user is forced to disarm the system under violence or menace. To initiate a duress message, the user must disarm the system with the duress code by default. Here you can change the code digits or enter "" to disable the duress feature. The system does not allow the user to program the duress code saved in this memory location as an existing user code. Available options are: EN standard and other.
Here you determine whether the user will hear or will not hear low battery sound when he tries to disarm the system with a keyfob whose battery voltage is low. Available options are: keyfob L-B on the user has to acknowledge the keyfob low battery message or keyfob L-B off the user does not have to acknowledge the keyfob low battery message. Here you determine whether the internal siren will sound or remain silent upon alarm according to the user preference.
Options: piezo siren on, piezo siren off. Options: user reset or engineer reset. If Engineer Reset is selected, the system can be rearmed only by the installer; by entering and exiting the installer menu, by entering and exiting the event log see section 7 , or by remote telephone.
To perform Engineer Reset via the telephone, establish communication with the PowerMaxComplete see user guide, par. Wait for 2 beeps c. Here you determine whether zone tamper will be reported or ignored. Here you determine whether the siren will be activated or not when the telephone line fails during system armed state.
Available options are: enable on fail, disable on fail. Here you determine whether the user will receive indication that an alarm has been activated. Available options are: enable and disable.
Here you determine when it is possible to disarm the system: A. Any time. You can determine that button normal display will return after pressing the followed by entering user code Refresh by Code or after pressing any key Refresh by Key.
If Refresh by Key is selected, the first pressing of any key except Fire and Emergency will cause normal display return and the second press will perform the key function. Options: scrn saver OFF, refresh by code, refresh by key.
Here you determine that if 2 successive alarms will occur during a specific period, the second alarm will be considered as a confirmed alarm for confirmed alarm reporting, see par. Options: disable 30 min, 45 min, 60 min, or 90 min. Here you determine the time interval between AC power failure occurrence and the failure reporting.
Options: 5 minutes, 30 minutes, 60 minutes or minutes. Options: Enable, Disable. Here you determine which type of battery pack is used, so that the system will supply proper charge current.
Options: 7. To review the options, repeatedly click or until the desired option is displayed, then click OK a dark box will be displayed at the right side.
In telephone number locations, these digits are used as codes to control the dialer: Hex. Here you determine the time at which the telephone line will be tested and reported to the central station. Here you determine the time interval between consecutive telephone line test messages sent to the central station.
The control panel performs this at regular intervals to verify proper communications. The options are: test every 1, 5, 7, 14, 30 days and test off. Here you enter the system tel. Here you enter the number that is used as a prefix to access an outside telephone line if exists. Here you program telephone number of the 1st central station including area code, 16 digit max to which the system will report the event groups defined in memory location 11 see note in Fig.
Here you enter number that will identify your specific alarm control system to the first central station. The number consists of 4 or 6 hexadecimal digits see note in Fig.
Here you program telephone number of the 2nd central station including area code, 16 digit max to which the system will report the event groups defined in memory location 11 see note in Fig. D 4. Here you enter number that will identify your system to the 2nd central station. The account number consists of 4 or 6 hexadecimal digits see note in Fig. Here you select the reporting format used by the control panel to report events to central stations see note in figure 4.
The options are: 10, 20, 33 and 40 pps. Here you determine which types of event will be reported to central stations. The asterisk J is a separator between events reported to central station 1 and events reported to central station 2. Here you determine whether the system will report whenever 2 or more events confirmed alarm occur during a specific period see par.
0コメント