Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

INTELLIGENT VOICE NETWORKING ANTI-THEFT ALARM HOST

USER MANUAL

Thank you for choosing our panel


Please read this manual carefully before using it.
Quick Instruction
1. Function of Remote Controller

-Disarm: Eliminate the alert

-Arm: Arm

-(Stay)
: Arm except for the internal sector

-Emergency: In an emergency,

Press it for 3 seconds. The host will make alarm automatically

2. Appearance of Keypad

3.The key Instructions:


ARM : Press “ARM” button, the system began to enter the state of arm. (No need to enter a

password, a mandatory protection)

DISARM:Press “DISARM” button and input users password “12345”+ “ENTER”, the system

will be in the state of disarm.

ALARM: Press “ALARM” button for 3 seconds, the host will make alarm automatically, no

matter whether the system is in the state of arm or disarm.

ENTER: Login or enter the menu CANCEL: return to the parent menu

Delete: delete the previous menu options Exit: Exit the system
UP: Up page DOWN: Down page
4. Set the remote controller 5. Set networking alarm center telephone number

1. Login the System Menu 2. Set Wireless Zones

Not logged state


Press any key

Enter
Enter

Enter password:888888,
Enter the Installer Password:888888
login the menu
(User password:123456)

Enter
down,.
Page
Enter

Equipment management
Successfully login as programming user

Enter
down,.
Page
Wireless detector
(For exit, press “EXIT” button twice)

Enter
Indicate”21”, add wireless equipment

3. Set User Telephone Number

Enter
Start learning RF equipment

Login the system menu


Enter
Enter
down
Page

Trigger the wireless equipment


System setting
Enter
down,.
Page

Stop triggering
User telephone number
Rrr
Enter

Trigger again

New user telephone number


Enter

Successfully saved, show wireless new number


Input the user telephone number

Enter the zone name menu, select the name of equipment

Return, save successfully


Select the corresponding zone name,
such as “PIR detector”、“smoke detector”
Enter

Login system menu


Login system menu
Starting learning remote controller

Enter
down,.
Page
Enter
down
Page

Enter
System setting
Equipment management Press “ARM” key on the remote

Enter
down,.
Page
controller continuously
Enter
.
down,
Page

Alarm center
Release the remote controller key

Enter
Remote controller
management
Alarm center telephone number
Enter

Press “ARM” key on the remote

Enter
controller again
Add remote controller
Input the alarm center telephone number
Successfully add remote controller

Enter
(The remote controller included in the alarm host can be used directly) User account

Enter
6. Telephone Remote Control

When the alarm host is activated, it Input user account, “ENTER”.


will dial the telephone automatically Successfully set the number.

Press “1” according to the voice prompt, 7. Restore the default setting
the host will broadcast the alert
Login the system menu
down
Page

Press “9” to confirm, and it will broadcast the next alert

Technical support
If no alert, it will prompt you to input password
,.
down
Page

and remote control by telephone

Input password “123456” System maintenance


Enter

System automatic broadcast:1.ARM;2.DISARM;3. ALERT

Restore the default setting and


Operate according to the broadcast confirm the restore operation

( In absence of programming keypad, you can dial the telephone connecting to the alarm host. The alarm host
will answer automatically after 8 rings. Then you can remote control according to the voice prompt: input user
password “12345”. )
Table of Contents

Ⅰ:Function Instruction┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅2
1.1: Profile ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄2
1.2:Precautions ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄2
1.3:Function Instruction ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄2
1.4:Main Technical Performance Indicators ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄3
1.5:System Operation ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄3

Ⅱ:Installation and Wiring Instruction┅┅┅┅┅┅┅┅┅┅4


2.1: Installation and Wiring Diagram ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄4
2.2: Power Supply Connection ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄4
2.3: Connection of Wired Detectors ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄4
2.4: Connection of Siren ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄5
2.5: Telephone Line Connection ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄5
2.6: Monitor Head Connection ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄5
2.7: Installation of Keypad ┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄┄5
2.8: Only Use Wireless detectors, Not Use Wired Detectors ┄┄┄┄┄┄┄┄┄5

Ⅲ:Programming List┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅6

Ⅳ:Troubleshooting ┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅10

1
Ⅰ:Function Instruction
1.1 Profile

This Intelligent Networking Voice Anti-theft Alarm Host supports 8 wired and 30 wireless defense

zones. It adopts advanced 32-bit ARM microprocessor. This guarantees the high integration, high

reliability and a variety of flexible interface. It can store 6 groups of alarm telephone number, and

at the same time two groups center number (e.g., the public security bureau 110 turning center). It

can upload alarm information through PTSN、GSM、GPRS、TCP/IP communication networks.

The alarm host is suitable for families, residential quarters, villas, commercial auxiliary

networking, the financial system, authority institutions, industrial parks, schools, libraries,

hospitals, and many other areas. It is an ideal choice because it is easy to install, with LCD display

keypad, voice prompt and menu operation.

1.2 Precautions

 If you want to set the local Public Security Bureau’s number as central alarm number, you

need get the consent from the Bureau beforehand.

 Only after check all the system without any problem can you connect to the power.

 It can only use DC12V 7AH sealed lead-acid battery. And be noted that red

positive wire should pole to the positive (+) of battery, while the black negative wire should

pole to the negative (-) of battery. Incorrect wiring will cause damage to the alarm host.

 Maximum charging currency:1.5A

 When install or connect the wires, pay attention to avoid using metal touch attack or

hand touch to other electronic components of the circuit board.

 To avoid wrong wiring and convenient maintenance, it is recommended that each

root access line be labeled.

 Must disconnect all power and telephone lines before repair.

1.3 Function Instruction

 LCD keyboard operation and menu programming instead of the digital code and tedious

manual;

 High-speed digital communications, compatible with the Contact ID digital

communication protocol.

 To prevent the crash, the host has watchdog function.

 Intelligent voice prompt, build-in voice module, can make voice alarm.

2
 Can carry out various programming of the system settings, such as alarm mode, the

types of protection zones, remote control, alarm, telephone number, telephone line detection, etc.

 Wired and wireless defense zones compatible

 1 installer programming password which is 6 digits and can be changed by


himself. 1 main user password, 9 groups sub-user password which are 6 digits and can be set
according to their own requirement. This can enhance security.
 Support fast operation by keypad, easy and convenient.
 Can set six groups of alarm telephone number (either landline or mobile phone
number) and 2 groups alarm center telephone number, 2 groups of special number for arm and
disarm. So the upload is free of charge. And when alert is activated, it will do dial the numbers
circularly.
 7 types of arm: away arm, at home arm, delay arm, remote arm, fast force arm,
timing arm, remote controller arm.
 4 types of disarm: disarm by keypad password, telephone remote disarm, timing
disarm, remote controller disarm.
 7 types of defense zone: Ordinary zone, delay zone, 24-hour zone, internal zone,
doorbell zone, fire alarm zone, emergency zone, medical treatment zone.
 Customizable alarm time delay and time of bell.
 “Black Box” function, can store 1500 event record. Can query the zone alarm
information, arm and disarm information and the battery voltage.
 Can arm by remote controller or telephone. And if the defense zone is triggered, it
will activate the automatic bypass and broadcast the corresponding voice information.
 Telephone line fault detection function. If the telephone line is cut or short circuit,
the system will alarm.
 The telephone has priority to answer the alarm call. Even if the telephone is busy, it
will get through the alarm call to make sure alarm report is upload successfully.
 The host has a charging circuit by DC12V sealed lead-acid battery to guarantee the
working even if it is power failure.
 When the battery can’t charge and discharge and cause low voltage, it will
power-off to avoid damage to the battery.

1.4 Main Technical Performance Indicators


Power supply: AC220V+10%
Static Consumption Current: ≤150mA
Power ≤1W
Alarm Output: ≤800mA, 12V
Output Voltage: DC12V~15V
Wireless Receiving Frequency: 315MHZ/433MHZ optional

3
Working Temperature: -10 ~ 55°C
Working Humidity: 40 ~ 70%

1.5 System Operation


The main use of anti-theft alarm is to detect whether there is intruder to your office or home
and ask for emergency help. Before you leave the office or home, you should make sure that the
windows and doors are closed, and let the alarm system in alert deployment. After the system is armed,
if the alarm zone is triggered, it will make alarm in the ways below:

3.1.1 If the host connects to the siren and the zones are set as sound alarm, there will be a sound alarm

and the keypad will beep.

3.1.2 If the system connects to the alarm center, the alarm host will transmit the alarm information to

the alarm center through telephone network.

3.1.3 If the system set the master or security personnel telephone (fixed telephone or mobile number),

the host will dial the preset numbers in turn. And it will switch to telephone alarm control.

3.1.4 In a state of alarm, the LCD keypad screen will display the alarm information.

Ⅱ:Installation and Wiring Instruction


2.1 Installation and Wiring Diagram
2.1.1 Installation and Wiring Diagram of the main board

4
2.1.2 Main board lights indicate: (from the left)

1、Power indicator light, light on when power on


2、System working state, light flashes
3、Battery indicator light: Light on means the battery is normal and full charged. Slow
flash means charging. Light off means disconnect to the battery. Fast flash means
discharge (when AC power is disconnected).
4、Bus state indicator. (Not used by far).
5、Telephone line state indicator: Off means disconnect to telephone line. On means
normal connect to telephone. Fast flash means there is a calling. Slow flash means line
busy. Slow flash (but bright for a short time) means need to use the telephone line (but
telephone line is disconnected).

2.2 Power Supply Connection

2.2.1 Transformer connection: two red lines connect to AC220V input, while two black lines connect

to AC20V output connector of main board (connected by the factory.)

2.2.2 DC12V battery connection: Red wire on the circuit main board connects to the positive

pole of acid-lead battery while black wire connects to the negative pole of acid-lead battery.

2.2.3 Auxiliary power output: In case of connecting to external power, if the auxiliary power is short
circuit, the alarm host will power down no more than 20 seconds and recover. But the auxiliary power
output will close. When only AC power supply, if the auxiliary power is overload (not full short), it
may cause main board intermittent power supply (similar like jitter).
In case of battery power supply, should cut the power immediately, and plug the battery again and
recover AC supply.
Auxiliary power current exceed 1.1A for long time ( > 30 seconds), the auxiliary power output will
close and recover automatically after exclude the fault.

2.3 Connection of Wired Detectors

2.3.1 Connect the output of wired detectors: (zone 1 to zone 8)

The zone is default as N.C., so connect the signal wire to N.C. port of detector. If connect to the

N.O. port, should set the corresponding zone as N.O.by program beforehand. (No need connect

to resistant)

2.3.2 Connect wired detector to power supply: Connect the positive pole of wired detector to positive

5
pole of 12V output of main board (no exceed of 1A). And negative pole to negative accordingly.

2.3.3 We can short circuit the zones that do not use. Or choose to prohibit the corresponding zone

alarm by program.

2.4 Connection of Siren


Siren port: Connect the positive pole of siren to connector bell of main board while negative
pole to the common GND pole.

2.5 Telephone Line Connection

The external telephone line and telephone connect to the telephone terminal of main board.

2.6 Monitor Head Connection

Insert the special monitor head into the microphone socket.

2.7 Installation of Keypad

2.7.1 Fix the bracket of keypad, and buckle the keypad to it.

2.7.2 Keypad connection: Plug the data cable to J3 connector on the back of keypad. Another end insert

to J11 white socket of main board. Or connect the red and black wire to 12V output of main board.

(Pay attention to positive and negative). Green and yellow wires of keypad connect to the

corresponding color wires of main board.

The distance is 1000 meters.

2.8 Only Use Wireless detectors, Not Use Wired Detectors (wireless zone from

zone 21 to 50)
If use the wireless detector, should close the wired zones by the below methods:

1、Use wires to short circuit the zone terminals on the main board. 2 、 Prohibit the

corresponding zones by choosing the program. 3、set the corresponding zone as N.O.by program.

6
Special Tips: Before supply power to the host, please check carefully that all wires are

connected correctly. Prevent positive and negative pole misconnection of power line, siren

line and sensor power line. And prevent short circuit or detector power line and signal line

short circuit.

Ⅲ:Programming List

DEFAUL
NO ITEMS T DESCRIPTION

1 common menus

Make the anti-theft system in the state of alert. If it is


1.1 arm triggered when arm, the system will prompt you the
abnormal zone, and exclude the alarm. And automatically
gives re-arm, bypass or cancel the deployment options.
1.2 disarm Remove alert from the anti-theft system.
Make the anti-theft alarm system in the state of alert
1.3 stay (except for the internal sector)
1.4 alarm record Refer to the record of alarm

1.5 system state To query the armed, bypass or triggering zones


View the state of
defense
1.5.1 zone To query the armed, bypass or triggering zones
View the host View the battery voltage, the host power supply voltage
1.5.2 information and host version
device
2 management
2.1 View all devices
2.1.1 alarm host
2.1.1.1 Separate

7
alarm host setting
01 common zone.. 08
2.1.1.1.1 common zone
general
2.1.1.1.1.1 types of zone general, delay, interior, perimeter, 24-hour, fire,
emergency, gas, medical, duress, doorbell
allow
2.1.1.1.1.2
alarm If it is set as not allowed, then the zone will be closed.
N.C.
2.1.1.1.1.3
input NC or NO signal of the detector zones
If you want to use the tamper switch of the host, set it as
2.1.1.2 Tamper alarm not allow allowed
2.1.2 LCD keypad
remote controller
2.2 management
11 remote controller *: means zone 11 already studied
11 add remote
remote controller.
2.2.1 controller… 18 add
11 add remote controller: means there is zone 11 does not
remote controller
study the remote controller
2.2..1.1 delete
2.3 wireless detectors

21 add wireless 21 wireless door sensor means zone 21 already studied


devices… 50 add wireless door sensor. 21 add wireless device means
2.3.1 wireless devices zone 21 does not study any wireless device at all.
wireless door sensor, PIR motion detector, smoke
2.3.1.1 items detector, gas detector, panic button, beam sensor
2.3.1.2 zone setting

general, delay, interior, perimeter, 24-hour, fire,


2.3.1.2.1 types general emergency, gas, medical, duress, doorbell
2.3.1.2.2 alarm allow
2.3.1.3 delete
3 system setting
3.1 date and time
3.1.1 current time indicate the current time of the system
3.1.2 update time update the time of host under this menu
3.1.3 update date update the date of the host under this menu
3.1.4 time adjust
3.2 timing parameters
3.2.1 alarm time 60 bell alarm time when alarm is triggered
If the user want to arm the host and exit. It can delay the
arm time so that the user can arm the system by keypad
3.2.3 exit delay 60 before the system is armed to avoid alarm.

8
When the user comes to the defense area, it can delay the
alarm time. If the user failed to disarm the host within the
3.2.2 entry delay 60 entry delay time, the host will make alarm.

The time that the host does not work after Power-off
3.2.3 start-up quiet 10 restart.
Timing arm and
3.2.4 disarm
For example: 18:30-07:30,
means: the alarm host start arming automatically since
Set period 1…. Period 18:30 till 07:30 the next morning. After 07:30 disarms
3.2.4.1 5 automatically.
Week: The timing arm and disarm will be effective for the preset
3.2.4.1.1 Monday--Sunday days from Monday to Sunday

3.2.4.1.2 type: default arm default arm, stay arm, perimeter arm, disarm
3.2.4.1.3 enable: allow whether to enable it to the time period
3.2.4.1.4 return
3.2.4.1.5 delete delete the timing
configuration
3.3 parameter
in the period between arm and disarm, the maximum
3.3.1 the number of alarm number of alarm
in the period between arm and disarm, the maximum
3.3.2 center report number of report to the center
in the period between arm and disarm, the maximum
3.3.3 zone alarm number of alarm for a single zone

3.3.4 priority selection when alarm, priority to call center or user


When dial the phone associated to the alarm host, if the
phone rang 8 times and no answer, the alarm host will
switch on automatically and enter the phone remote
3.3.5 call ring 8 control mode.
3.3.6 speaker volume 100 the voice volume of speaker

3.5 alarm center


3.5.1 alarm center 1 the telephone number of alarm center
the center account that the alarm center assigned to the
3.5.1.1 Center account users
3.5.2 alarm center 2 the telephone number of alarm center
the center account that the alarm center assigned to the
3.5.2.1 Center account users

9
When arm, this telephone will upload the alarm center. It
Telephone line for only dials the alarm center but not get through. In this
3.5.3 arm way, it can save the telephone expense
When disarm, this telephone will upload the alarm center.
Telephone line for It only dials the alarm center but not get through. In this
3.5.4 disarm way, it can save the telephone expense
3.5.5 center report setting
3.5.5.1 Operation event
3.5.5.1.1 user arm allow whether to upload the arm information to the alarm center
whether to upload the disarm information to the alarm
3.5.5.1.2 user disarm allow center
whether to upload the zone bypass information to the
3.5.5.1.3 zone bypass allow alarm center
Configuration whether to upload the Configuration changing
3.5.5.1.4 changes allow information to the alarm center
whether to upload the system start information to the
3.5.5.1.5 system start allow alarm center
3.5.5.2 alert information
whether to upload the zone alarm information to the
3.5.5.2.1 zone alarm allow alarm center
whether to upload the zone restore information to the
3.5.5.2.2 zone restore not allow alarm center
whether to upload the tamper damage information to the
3.5.5.2.3 tamper damage not allow alarm center
3.5.5.3 abnormal situation
whether to upload the AC loss information to the alarm
3.5.5.3.1 AC loss allow center
If AC loses, during the preset period upload the power
3.5.5.3.2 power failure report 0 failure report
whether to upload the battery failure information to the
3.5.5.3.3 battery failure not allow alarm center
whether to upload the bus fault information to the alarm
3.5.5.3.4 bus fault not allow center
3.5.5.4 alarm center test
3.5.5.4.1 test interval 1 the test interval days
the time (how many hours)that needs to upload test
3.5.5.4.2 test time hour information
the time (how many minutes)that needs to upload test
3.5.5.4.3 test time minute information
3.5.5.4.4 random test not allow upload test information at random
3.5.5.5 error process

Maximum times of uploading a single information to the


3.5.5.5.1 number of retries 3 center. If set to 3, and all the 3 times of uploading are

10
failed, the information will not be uploaded.

whether to trigger the bell when failed to upload the


3.5.5.5.2 failure alarm not allow information to center
whether to dial the user when failed to upload the
3.5.5.5.3 failure note not allow information to center
user's telephone
3.6 number
user's telephone The number to dial when alarms. Either landline
3.6.1 number 1----6 telephone or mobile number

3.7 password permission * means already set the password


This user has the permission to program, to arm and
3.7.1 0.programming user disarm and to change all the passwords.
This users has the permission to arm and disarm, the
permission to change the password of main user and
3.7.2 1 the main user code sub-user ;
the sub-user The users have the permission to arm and disarm and to
3.7.8 code2----9 change their own password

Technical
4 support
4.1 log enquiry
4.1.1 alert log record of alarm information

4.1.2 system log record of system start and center report failure etc.
4.1.3 operation log record of users arm or disarm, usr login.
4.2 system maintenance
Restore factory
4.2.1 default Restore factory default

Ⅳ:Troubleshooting
Phenome Probable cause Elimination method
non
1 . Zone triggered or 1 . System will prompt automatically, choose the
Can not arm
fault corresponding option accordingly.
No voice 1 . No voice prompt 1 . Usually because of frequent operation. The host is
prompt when arm or disarm dialing and voice channel is busy.
sometimes
Can’t exit 1.Wrong operation 1.In sub-menu, press “CANCEL” button. After back to

11
the system the main menu, press “EXIT” button
2、Press “EXIT” button for 3 seconds.
1.Case dose no cover 1. Cover it well.
well
2 . The host speaker 2.Remove the block
Voice low sound hole is blocked
by something
3.Too long distance 3.Take out the speaking from the host and thread it to
somewhere needed.
1 . The user install 1.Connect the host to the ADSL filter on PHONE end.
ADSL filter on the
Can’t internet.
dial users 2.Not input or setting 2. Reset phone number and make sure correct
mobile error of phone number
Phone after 3.The host connects to 3 . Check the telephone connected to the alarm host,
alarm the extension number. whether it can dial the user’s mobile phone or not.
4.Disarmed before dial 4.Before the alarm call, do not disarm. Or it will not
dial.
Wireless 1 . Other wireless 1 . Shield all the detectors, arm, then check whether
detector interference there is alarm.
fault alarm 2.Do not code the 2、Learn the code of wireless detector again.
or no alarm wireless zone
External 1 . Disconnections of 1 . Check whether there is siren DC12V output when
siren no siren alarm.
alarm 2.Check whether the siren is connected correctly. Refer
2.Siren connected
to 2.4 Connection of Siren
3 . Backup battery 3.Check the connection of backup battery and measure
failure the voltage of battery is normal or not.

Warranty Card

Model Main board Installation Home


No type
Client User Contact
name person Commercial
E-mail Tel

Address
Guara Buy date: Year Month Date
ntee One year since the buying date

12
Whole Name Service
saler Stamp Tel
Addres
s
Installation date: ________year______Month______Date
Confirmation of client: ___________________

Warranty Considerations:

1. During the warranty period, we can repair for customer free for all fault caused by the
product quality. Customers only need take the filled warranty card and purchase bill to
contact the wholesaler.
2. Please take good care of the warranty card and purchase bill. As there will be no warranty if
they are lost or changed.
3. After exceed the warranty period, if need repair the product or buy the spare parts, please
contact the local dealer.

There will be no warranty for the problems below:

1. No warranty card or purchasing bill.


2. Damage caused by improper use, storage or maintenance by the consumer.
3. Division or repair damage caused by someone not from our company or not distributor
designated repair personnel.
4. Damage by irresistible force (such as lightning)

13

You might also like