Visonic PowerLink2 User's Guide Page 61

  • Download
  • Add to my manuals
  • Print
  • Page
    / 66
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 60
Glossary
60
these detectors are installed during the night. In this mode, the security system
threats all the detectors that are assigned to perimeter zones as immediate
alarm initiators and to all detectors assigned to interior zones as non-alarm
initiators.
Disarm The DISARM mode is usually used when the house is occupied
during day hours. During this mode, non of the detectors will be treated as
alarm initiators except for detectors that are assigned to a 24 Hour zone (such
as a safe room) in which any trigger must be an alarm initiator.
Arm Bypass / Home Bypass The ARM BYPASS and HOME BYPASS
arming modes are used to arm the security system even if some of the
detectors are troubled or in "Open" status that indicates detection. Once armed,
the security system will ignore any triggers from the detectors that were
troubled or "Open" when the security system was armed. Use these arming
modes with caution as when being used, some parts of the house are not
secured even when the security system is armed.
Central Station
A monitoring station capable of receiving alarm indications from security systems.
Central stations usually alert the police or send their own guards to a house that is
alarmed in order to verify the alarm and potentially apprehend the intruder or take
care of the alarm situation (fire, gas, flood, etc.)
Control Panel
The control panel is the main unit of a security system. It collects information from
various detectors and responds in various ways such as sounding a siren or calling the
central station or the home owner.
Latchkey
The Latchkey mode is a special mode in which designated "latchkey users" trigger a
"latchkey message" to be sent to a telephone or a pager when they disarm the system.
For example, if a parent wants to be sure that their child has returned from school and
disarmed the system, they will assign a Latchkey user to the child. Refer to the
security system's user manual in order to find out how to enable the Latchkey
function.
Port Forwarding
IP addresses of computers connected to a LAN are called Unregistered IP Addresses
whereas IP Addresses of computers or devices connected to the WAN are called
Registered IP Addresses. Computers with an Unregistered IP addresses (such as the
Visonic PowerLink2) cannot communicate with computers or devices with a
Registered IP addresses (such as the computer in your office) directly.
The Port Forwarding feature enables computers with a Registered IP address (such as
your office computer) to access services on computers with an Unregistered IP
Address (such as the Visonic PowerLink2). This is done by mapping ports on the
router so each request arriving to the router at a specific port is routed to the computer
that hosts the service on the LAN.
Page view 60
1 2 ... 56 57 58 59 60 61 62 63 64 65 66

Comments to this Manuals

No comments