Risco AGILITY RISCO 2-WAY RF MODULE User Manual

Risco Ltd. RISCO 2-WAY RF MODULE

Contents

Users Manual 1

Download: Risco AGILITY RISCO 2-WAY RF MODULE User Manual
Mirror Download [FCC.gov]Risco AGILITY RISCO 2-WAY RF MODULE User Manual
Document ID1044890
Application IDyB72T1YKfCLr9tsuN65y4g==
Document DescriptionUsers Manual 1
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize131.26kB (1640796 bits)
Date Submitted2008-12-16 00:00:00
Date Available2008-12-18 00:00:00
Creation Date2008-11-11 11:55:16
Producing SoftwareAcrobat Distiller 6.0.1 (Windows)
Document Lastmod2008-11-11 11:55:16
Document Titleuntitled

User Manual
Agility User Manual
Important Notice
This guide is delivered subject to the following conditions and restrictions:
This guide contains proprietary information belonging to RISCO Group. Such
information is supplied solely for the purpose of assisting explicitly and properly
authorized users of the system.
No part of its contents may be used for any other purpose, disclosed to any person
or firm, or reproduced by any means, electronic or mechanical, without the express
prior written permission of RISCO Group.
The information contained herein is for the purpose of illustration and reference
only.
Information in this document is subject to change without notice.
Corporate and individual names and data used in examples herein belong to their
respective owners.
All rights reserved.
© 2008 RISCO Group
August 2008
Page 2
Agility User Manual
Table of Contents
Chapter 1 Introduction ......................................................................................... 5
NKN=j~áå=cÉ~íìêÉë ....................................................................................................................................... 5
NKO=^Öáäáíó=^êÅÜáíÉÅíìêÉ................................................................................................................................ 6
NKP=rëÉê=léÉê~íáåÖ=qççäë........................................................................................................................... 7
NKQ=pí~íìë=fåÇáÅ~íáçåë ................................................................................................................................. 8
iba=fåÇáÅ~íçêë .................................................................................................................................... 8
pí~íìë=_ìííçå=L=pÉêîáÅÉ=`~ää=EiáëíÉå=C=q~äâF ................................................................................ 8
sçáÅÉ=jÉëë~ÖáåÖ ............................................................................................................................... 9
pjp=jÉëë~ÖáåÖ ................................................................................................................................. 9
bã~áä=jÉëë~ÖáåÖ ............................................................................................................................... 9
pçìåÇ=fåÇáÅ~íáçåë ............................................................................................................................ 10
Chapter 2 Local System Operation.................................................................... 11
OKN=^êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NN=
^ï~ó=EcìääF=~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NN=
pí~ó=EeçãÉF=~êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NO=
m~êíáíáçå=~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NO=
cçêÅÉ=^êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NP=
^êãáåÖ=ïáíÜ=íêçìÄäÉë=áå=íÜÉ=póëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NP=
OKO=aáë~êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NQ=
póëíÉã=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NQ=
m~êíáíáçå=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR=
aìêÉëë=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR=
aáë~êãáåÖ=~ÑíÉê=~å=^ä~êãW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR=
oÉëÉííáåÖ=~ÑíÉê=~å=~ä~êãW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS=
^åíá=`çÇÉ=oÉëÉíKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS=
fåëí~ääÉê=oÉëÉí KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS=
OKP=pÉåÇáåÖ=~=m~åáÅ=^ä~êã ...................................................................................................................... NT
Chapter 3 Remote System Operation................................................................. 18
PKN=oÉãçíÉ=mÜçåÉ=léÉê~íáçå ................................................................................................................. 18
oÉãçíÉäó=^ÅÅÉëëáåÖ=íÜÉ=póëíÉã ................................................................................................. 18
sçáÅÉ=léÉê~íáçåë=jÉåì.................................................................................................................. 18
oÉÅÉáîáåÖ=`~ääë=Ñêçã=íÜÉ=póëíÉã ................................................................................................. 19
^ÅâåçïäÉÇÖÉ=jÉåì ......................................................................................................................... 20
_áJÇáêÉÅíáçå~ä=`çããìåáÅ~íáçå ....................................................................................................... 20
PKO=pjp=léÉê~íáçå .................................................................................................................................... 21
pjp=oÉãçíÉ=`çåíêçä ...................................................................................................................... 21
pjp=`çåÑáêã~íáçå=jÉëë~ÖÉ ......................................................................................................... 22
Chapter 4 User Functions and Settings............................................................. 23
QKN=rëÉê=`çÇÉë .......................................................................................................................................... 23
QKO=mêçñáãáíó=q~Öë..................................................................................................................................... 25
QKP=aÉÑáåáåÖ=cçääçï=jÉ=aÉëíáå~íáçåë..................................................................................................... 26
QKQ=pÅÜÉÇìäÉê ............................................................................................................................................. 28
QKR=`çãéäÉíÉ=jÉåì=çÑ=rëÉê=cìåÅíáçåë ................................................................................................. 29
Chapter 5 System Specifications....................................................................... 32
Chapter 6 EN 50131 Compliance........................................................................ 33
Page 3
Agility User Manual
Page 4
Agility User Manual
Chapter 1 - Introduction
Congratulations on your purchase of Agility - RISCO Group's Flexible Wireless Security
System. The Agility has been specifically designed to meet a wide range of security, safety
and home automation needs for many residential and commercial applications.
Agility is designed to recognize abnormal conditions and inform the system of the status
of any protected door, window, hallway, room, or area. Status information is presented
visually or verbally. It supports the capabilities of communicating with a Central
Monitoring Station or to your mobile phone using friendly and easy to understand verbal
messages as well as SMS or E-mail messages.
This manual describes how to operate your system. It will guide you through
programming instructions for main system features as well as basic arming and disarming
commands for the system.
1.1 Main Features
Up to 32 wireless zones (1 way or 2 way
wireless detectors) + 4 optional wired
zones (only with I/O expander)
32 User codes + Grand Master code
4 fixed authority levels for user
Proximity tag for each user
3 partitions
3 wireless keypads (1 way or 2 way)
3 wireless sirens (internal or external)
8 Remote controls (1 way or 2 way)
250 Events Log
16 Follow Me destinations
4 outputs (I/O expander)
X-10 support
Page 5
Agility User Manual
1.2 Agility Architecture
Your Agility controls and monitors a variety of sensors, detectors, and contacts placed
throughout the premises, which provide external, perimeter and internal burglary
protection. The system is supervised, meaning that the panel checks the status of each
sensor to detect problems. If the panel detects trouble it will notify you with beeps and
indicator lights on the panel itself.
The following diagram shows the components that make up the system:
Page 6
Agility User Manual
1.3 User Operating Tools
The Agility system can be operated using several devices, some of which have been
designed as bi-directional. If you have purchased a bi-directional device your system is
capable of sending a return reply status indication from the panel to the device for each
command that is sent to it.
Depending on your purchase you can operate your system via the following:
2-Way 8 Button Remote Control:
Using the bi-directional 8 button remote control you can arm, disarm,
send a panic alarm, activate outputs and more. Being bi-directional
the remote control receives a reply status indication, via its 3 colored
LEDs and internal buzzer siren, from the panel for each command
that it has sent to the panel. For higher security, commands can be
defined to be activated with a 4 digit PIN code.
Agility 2-Way Wireless Keypad:
Using the bi-directional wireless keypad you can program and
operate your system according to your needs. Being bi-directional the
keypad receives a reply status indication from the panel for each
command that it has sent to the panel. To use functions of the
keypad you can use a code or a proximity tag.
4 Button Key fob:
Using the 4 button key fob you can arm, disarm, send a panic alarm
and activate outputs.
Remote Phone Operation:
Using any remote, touch-tone phone you can perform remote
operations such as arming, disarming, listening in and talking to the
premises and more. The system can also provide audible information
such as event occurrences and the status of your system
SMS:
If your system is equipped with a GSM/GPRS module it can provide
information about the system such as event occurrences by SMS. You
can also operate the system using SMS commands for arming and
disarming the system and more
Configuration Software:
RISCO Group's Configuration Software enables the installer to
program the system and operate the system locally or remotely
Web Browser:
Using the web you can perform a variety of operations on your
system such as arming, disarming, output activation, receive status
information and viewing event logs
Page 7
Agility User Manual
1.4 Status Indications
LED Indicators
The LED indicators provide typical system indications, as discussed below. Some
indicators have additional functions, which are explained later on.
Power LED
The Power LED indicates system operation.
Condition
On
Rapid flash
Slow flash
Description
Power OK
Indicates AC trouble
Indicates low battery trouble
Arm/Alarm LED (Red)
Condition
On
Rapid flash
Slow flash
Stay LED
Condition
On
Off
Description
System armed
Alarm
System in Exit delay
Description
System armed at STAY
System disarmed
Ready LED (Green)
Condition
On
Off
Slow Flash
Description
System ready
Open zones
System is ready to be armed while a specially
designated entry/exit door remains open
Trouble LED
Condition
Rapid Flash
Off
Description
Trouble
No trouble
Note: When all LEDs flash one after another in sequence the system is in Installation mode.
Page 8
Agility User Manual
Status Button / Service Call (Listen & Talk)
The button on the main unit can be defined as a system status indicator or as a S.O.S
button. Once pressed, a service call will be established to the monitoring station,
which then enables 2-way communication with the premises.
Voice Messaging
Three types of spoken messages are heard when using the Agility, locally in the premises
or remotely to your mobile:
Event messages: Upon selected event occurrence, the Agility initiates a call to a
remote Follow Me (FM) telephone number, informing you of a security situation by
playing a pre-recorded Event announcement message.
Status messages: Upon remote access of the system by initiating a call from a
remote telephone or receiving a call from the system, the Agility announces the
current system status by playing a pre-recorded Status message.
Local Announcement messages: Upon event occurrence or user’s keypad
operations, the Agility can announce various local messages to residents.
SMS Messaging
Using the GSM/GPRS Module the system can send predefined SMS event messages to a
remote Follow Me (FM) telephone number, informing you of the status of the security
system and certain events that occurred in the system.
For example:
Email Messaging
Using the Agility IP Module the system can send event messages by Email to predefined email addresses informing you of the status of the security system and certain events that
occurred in the system.
For example:
Subject: Alarm Security Message: Intruder Alarm
System Name: John's Residence
Event: Fire Alarm, Zone 5, Entrance door
Time: 01 April 2008; 16:12
Partition: Partition 1, First floor
Service Contact: Monitoring Station 01, 03-5676778
Page 9
Agility User Manual
Sound Indications
In addition to the visual indications provided by the
Agility’s LEDs, your system produces
audible notification after certain events.
Condition
Description
Intrusion alarm
Continues rapid beeping
Fire alarm
Staggered rapid beeping
Exit delay
Slow buzzer beeps until the Exit Delay time period expires
Entry delay
Slow buzzer beeps until the Entry Delay time period expires.
Confirm operation
A one-second tone
Reject operation
Three rapid error beeps
Arm/Disarm squawk
1 siren chirp: System armed
2 siren chirps: System is disarmed
4 siren chirps: System disarmed after an alarm
Page 10
Agility User Manual
Chapter 2 - Local System Operation
2.1 Arming your system
Arming your system causes the intrusion detectors to trigger an alarm when violated. The
arming operation will be followed by a local message announcement (if defined).
Before arming the system check the Ready LED and make sure that the system is ready
to be armed. If the system is NOT ready to be armed secure or bypass the violated zone(s),
and then proceed.
Failing to arm the system will be indicated by the system
Your Agility offers the following kinds of arming:
Note
: If you are unable to arm the system, press the status key to view system messages.
Away (Full) arming:
Away arming prepares all of the system's intrusion detectors to activate an alarm if
violated, and is used when leaving the premises. The system will arm after the
designated countdown time (Exit delay) and a local message will sound. Once you have
armed the system, exit via the designated final exit door.
To arm using Away (Full) arming procedure
Quick mode:
High security mode: Press
Quick mode:
High security mode:
Press
+ code
+ code or proximity tag
Send SMS : [Code][A], example,
Page 11
1234A
Agility User Manual
Stay (Home) arming:
Stay arming activates only perimeter detectors (as defined by your installer),
enabling individuals to remain inside and move about the premises while the
system is partially armed.
To arm using Stay (Home) arming procedure
Quick mode:
+ code
High security mode:
Quick mode:
High security mode:
Press
+ code or proximity tag
button or button 4 (if defined. Advise with your installer)
Partition arming:
One of the Agility's advantages is its ability to divide the system in up to 3
partitions. Each partition may be managed as a separate security system, each of
which can be armed and disarmed individually regardless of the condition of the
other.
Partitions can be armed or disarmed one at a time, or all at once, and each
partition can be armed at Stay or Away. Only users that have been defined to
operate multiple partitions can operate more than one partition and arm/disarm
all partitions at once
To arm using Partition arming (Away or Stay) procedure
Quick mode:
=L=
Quick mode:
High security mode:
Press
=L=
=[=
=L=
=[==
=[=
=L=
High security mode:
+ code
=[=
+ code or proximity tag
button or button 4 (if defined. Advise with your installer)
Send SMS: [Code][A or S] [Partition 1,2 or 3]. Example 1234A1. Fore more
information refer to page 21.
Page 12
Agility User Manual
Force Arming:
Force arming arms the system regardless of open zones. Your installer must
enable this option.
Note
: Force arming the system results in leaving part of the system unsecured.
Arming with troubles in the System
If required, and defined by your installer, all troubles in the system should be
confirmed to enable the arming operation while performing arming from the
wireless keypad.
When trying to arm the system with troubles, the display will show a "System
Troubles" message. Press the
key to view the troubles in the system. Scroll
down the troubles list to view all troubles in the system.
To enable one time arming from the keypad:
1.
Press
2.
Go to Activities > Bypass Trouble
3.
The following question will appear: "Bypass troubles. Are you sure? N?".
Using the
4.
and enter your user code to access the user menu.
key change to Y and press
to confirm.
Press
to return to main display and perform the arming
operation again.
Page 13
Agility User Manual
2.2 Disarming your system
Disarming your system causes the detectors not to trigger an alarm when violated. When
you enter the premises, the Entry Delay begins to count down. You must disarm the
system within the Entry Delay time to prevent the system from triggering an alarm. The
disarming operation will be followed by a local message announcement (if defined).
Note
: If an alarm occurred in the system, it is recommended to leave the premises. Only after police
investigation should you consider that the burglar is no longer on your premises and you can re-enter. In
special cases (if programmed by your installer) arming the system after an alarm might require a technician
code. For more information refer to your installer
Your Agility offers the following kinds of disarming:
System disarming:
Disarming deactivates the partitions assigned to the specified user code
To disarm using Procedure for Disarming
Quick mode:
disarmed
. All partitions assigned to the button will be
High security mode:
Press
> Code
followed by code or proximity tag.
Press the button. All partitions assigned to the button will be
disarmed.
Send SMS: [Code][D], example 1234D
Page 14
Agility User Manual
Partition disarming:
Partition disarming enables you to disarm individual partitions within an armed
system
To disarm using
Procedure for Partition Disarming
Quick mode:
=L=
=L=
High security mode:
=[=
=[=
=L=
=L=
=[=
> Code
> code or proximity tag.
Press the button. All partitions assigned to the button will be
disarmed.
Send SMS: [Code][D] [Partition 1,2 or 3]. Example 1234D1. Fore more
information refer to page 21.
Duress disarming:
If you are ever coerced into disarming your system, you can comply with the
intruder's wishes while sending a silent duress alarm to the Central Station. To do
so, you must use a special duress code, which when used, will disarm the system in
the regular manner, while simultaneously transmitting the duress alarm. Confer
with your installer which of the user's codes is defined as a duress code.
Note: Under no circumstances must the duress code be used haphazardly or without reason.
Central Stations, along with Police Departments, treat duress codes very seriously and take
immediate action.
Disarming after an Alarm:
When silencing an alarm the system goes into a disarm state. After the system is
disarmed the sirens will sound 4 siren chirps indicated that an alarm occurred in
the system.
If an "Entry door" is opened prior to disarming the system, the following voice
announcement message will be heard: "Alarm occurred in the system". Press the
key will indicate the cause of the alarm.
Page 15
Agility User Manual
Note: If an alarm occurred in the system, it is recommended to leave the premises. Only after
police investigation should you consider that the burglar is no longer on your premises and
you can re-enter. In special cases (if programmed by your installer) arming the system after an
alarm might require a technician code. For more information refer to your installer
Your installer can define the number of times (0-15) that an alarm will be sent from the same
detector during one arming period. This is usually used to prevent an alarm from a
malfunction detector, an environmental problem or incorrect installation
Resetting after an alarm:
Your installation company can define that the reset of the system to a Normal
Operation mode will require the intervention of your monitoring station or
installer. In this case, after an alarm condition the system will be regarded as Not
Ready and while requesting for system status (
trouble message: Technician Reset.
)indication you will get a
Anti Code Reset
1. Press
Enter user code
Go to Activities > Anti Code option.
2. Call your monitoring station (MS) or installer and quote the “RANDOM
CODE” displayed on your keypad. The MS or installer will give you a return
Anti-Code.
3. Enter this Anti code followed by
and the system will reset.
Installer Reset
Your monitoring station (MS) or installer can reset your system remotely or locally
from the keypad.
To enable local reset by your installer you may need to authorize him using the master
code after the installer enters his code. A one hour time window is opened for the
installer to program user functions and be able to reset your system locally
Page 16
Agility User Manual
2.3 Sending a Panic Alarm
Panic alarms enable you to send a message to the monitoring station in the event of an
emergency, send a message to a follow me number, announce a local message or activate a
local alarm. Panic alarms can be set to be silent (Refer to your installer for more
information).
To send a Panic
Alarm using
Procedure
Press both
and
keys simultaneously
Press both
Note
and
keys simultaneously
: Your installer should define these keys to be set as panic keys. These keys
can be either disabled or used to establish a service call to your
Monitoring Station.
If defined by your installer pressing
seconds will send a fire alarm and pressing
=simultaneously for 2
simultaneously
for 2 seconds will send a special emergency or medical alarm.
Press the small blank button (if defined)
Note:
Your installer can define the small blank button to be used for sending a
panic alarm.
Note:
For full capabilities of the 2-way remote control, the bi-directional keypad and 4 button key fob,
refer to the instructions supplied with each product.
Press both keys simultaneously
Press the panic button
Page 17
Agility User Manual
Chapter 3 - Remote System Operation
3.1 Remote Phone Operation
The Agility enables you to operate the system from a remote touch-tone phone by
initiating a telephone call to or from the system and interacting with voice menus that
guide you through your required remote operation.
Remotely Accessing the System
Remotely accessing the system involves initiating a call to the system, and entering your
remote access code and the user code you usually enter in the system keypad.
To remotely access the system:
1.
2.
From a remote touch-tone telephone, dial the number of the premises where
Agility is installed.
If your system is connected to a land telephone line and an answering
machine is in use at the premises let the line ring once, then hang up and call
again.
If an answering machine is not in use at the premises wait until the system
picks up. After the system picks up a short tone is heard.
Note: When the system picks up, all phones on the same line are effectively disconnected and
cannot be used.
3.
Enter your 2 digit remote access code within 10 seconds (Default code = 00).
The following message is announced: "Hello, Please Enter Your User Code,
Followed By [#]".
4.
Enter your user code followed by [#]. (Default code=1234)
After your code is accepted a system status message is announced, followed by
the Operations menu. You can now perform the required remote operations.
Voice Operations Menu
The Voice Operations menu announces options and instructions on how to use the system
functions. The options in the Operations menu vary according to system status and your
access rights.
Following is a list of the remote operations options:
Operation
Arming all partitions
Arming a selected partition
Disarming all partitions
Disarming a selected partition
Quick Key Combination
Press [1][1]
Press [1][9] followed by the partition number
Press [2][2]
Press [2][9] followed by the partition number
Page 18
Agility User Manual
Operation
Changing Zone Bypass status
Operating Utility Outputs
Changing Follow Me(FM)
numbers
Listen in to the premises
Talking to the premises
Listen and Talk to the premises
Recording an opening message
Recording messages that are not
included in the message bank (5
messages)
Exiting the System
To return to the previous menu
To repeat the menu options
Quick Key Combination
Press [3] followed by the zone number and then [#][9]
Press [4] followed by the output number
Press [5] followed by the FM number and [#][2].
Enter the new phone number and press [#][1].
Press [6][1]
Press [6][2]
Press [6][3]
Press [7][1]
Press [7][2]
Press [0]
Press [*]
Press [#]
Receiving Calls from the System
Upon event occurrence, such as alarm activation, the system informs you of security
situations, for example, intrusion or fire, by calling you and announcing a pre-recorded
event announcement message, followed by the Acknowledge menu. The system can call
up to 16 Follow Me numbers, enabling you, a relative or neighbor to be informed of the
security situation. You can then take the appropriate action, whether this is to inform the
authorities or acknowledge the event and remotely operate the system.
Notes: Follow Me messages are performed only after reporting to the Monitoring Station.
Follow Me numbers are assigned certain events for which they receive calls.
The system must be programmed to call a FM number after a specific event occurs in order for that
event to trigger the call.
To receive an event call:
1.
2.
Pick up the phone.
Say "Hello" or press [#]. The Event Announcement message is made, informing
you of a security situation in your system, for example:
“24 Oaklands Street, Intruder alarm, Ground Floor, kitchen”
Notes: If no voice is detected, the event message will start playing 5 seconds after phone pick up. Press [#] to
begin playback of the event message from the beginning.
To repeat the Event Announcement message press [#].
To bypass the Event Announcement message and go directly to the Acknowledge menu, press [* ].
3.
Acknowledge the event. (See
Acknowledge Menu
Page 19
Agility User Manual
Acknowledge Menu
After the Event Announcement message is made, the following list of options is
announced:
Operation
Acknowledge Message
Acknowledging an event means that you have received a message from
the security alarm system about a relevant event in the system and
want to confirm this. After you acknowledge an event, the system calls
the next FM number.
Acknowledge and stop all dialing
This option acknowledges the event and stops the system from calling
the next FM numbers to report the event.
Acknowledge and access the Operations menu
The Operations menu lists the available options for remotely operating
your system.
Listen In and Talk
This option enables you to perform bi-directional communication.
Repeat the event message
Repeat the Acknowledge menu
Digit
Press [1]
Press [2]
followed by
the code
Press [3]
followed by
the code
Press [6]
followed by
the code
Press [#]
Press [*]
Note: If an invalid code is entered 3 consecutive times, the system hangs up and this FM number is locked
for 15 minutes and no calls are initiated to the FM number.
If a valid user code is not entered within 10 seconds, the system hangs up.
Bi-directional Communication
The Listen In and Talk options enable you to remotely and silently listen in to your
premises in order to verify the cause of an event occurrence, through the microphone or
remotely talk to your premises via the Agility loudspeaker, for example, to guide someone
in distress.
To listen in or talk:
1. From the Operations/Acknowledge menu, press [6]. The following messages are
announced:
“To Listen In press 1, To Talk press [2], To Listen and Talk (Open channel) press
[3], To return to the previous menu, Press [ ].”
2. Select the desired option.
3. Press [ ] to end listening in and talking communication and return to the
Operations menu.
Page 20
Agility User Manual
Bi-directional Audio Options after an Alarm
In the event of Burglary, Fire and Medical alarms, the
Agility is able to report these events
and then stay on the line. This allows the monitoring service to perform Voice Alarm
verification, verify the alarm or Verification in order to verify a cause of event or guide
someone in distress.
Service call
The Service Call feature enables you to call the Monitoring Station by pressing a key. To
establish the service call, press the button on the main unit or press simultaneously the
buttons
on the bi-directional keypad.
Note: The Service call should be defined by your installer.
3.2 SMS Operation
SMS Remote Control
The
Agility enables you to perform remote control operations using simple SMS
commands. The following section describes the SMS commands and the response of the
system to these commands.
Note: This application is available only if a GSM/GPRS module is installed in your system.
Operation
Arm all partitions of a
user code
Disarm all partitions
of a user code
Arm by partition
Disarm by Partition
Bypass a zone
Un-bypass a zone
Activate Output
Deactivate Output
Change FM number
Get system status
Get last alarm
memory
Get SIM credit level
(for prepaid cards)
SMS Message Structure
Example
[Code] D
1234D
[Code] A [Partition No.]
[Code] D [Partition No.]
[Code] B [zone number]
[Code] UB [zone No.]
[Code] UOON [UO No.]
[Code] UOOFF [UO No.]
[Code] FMPHONE [FM serial number]
NEW [New Phone No.)
[Code] ST
[Code] AL
1234A1
1234D1
1234B05
1234UB05
1234UOON1
1234UOOFF1
1234FMPHONE 3
NEW0529692345
1234ST
1234AL
[Code] CR
1234CR
[Code] A
Page 21
1234A
Agility User Manual
Notes: SMS commands can be sent from any mobile phone or from an SMS website.
Command words are not case sensitive.
A separator between command words is not required although it is accepted.
SMS Confirmation Message
A confirmation message following a SMS operation is sent to the user, upon request, by
adding the letters “RP” at the end of the SMS messages listed below.
Example:
1234 A RP - A confirmation message following an arming operation will be sent to the
user.
Confirmation or Fail operation messages can be assigned to the actions of arming,
disarming, bypassing, activating outputs or changing follow me definitions.
Page 22
Agility User Manual
Chapter 4 - User Functions and Settings
The functions and settings explained in this chapter can only be performed via your
keypad and the Configuration Software. This chapter refers to these functions and settings
as performed via the keypad. Refer to the Configuration Software manual for more
information regarding how these functions and settings are performed via the
Configuration Software.
When using the keypad during the programming mode use the following table to be
familiar with the functionality of the keys:
Function
Sequence
Exits from the current menu
Terminates commands and confirms data to be stored
Used to browse through the menu: Scrolls up a list or moves the cursor
Changes data
Numerical keys are used to input the numeric codes that may be required
for arming, disarming, or used to activate specific functions
4.1 User Codes
To perform many of the Agility functions, a security code (often called a user code) must
be used. Each individual using the system is assigned a user code, which, in turn, is linked
to an Authority Level. Those with a "higher authority" have access to a greater number of
system functions, while those with a "lower authority" are more restricted in what they
may do. There are four different authority levels available for users of the Agility.
Notes: To define the authority levels refer to your installer.
Agility can support up to 32 different user codes. User codes may have variable lengths up to 6 digits.
Your Agility was given a Grand Master Code of 1-2-3-4 during manufacturing. Unless your alarm
company has already changed it to suit your preference, it's best to modify this code to one that is
unique and personalized as herein described.
Page 23
Agility User Manual
Setting / Changing User Codes
The user assigned the Grand Master authority level can change all user codes but cannot
view the digits in the user code fields. Users with other authority levels can only change
their own codes. The system must be disarmed in order to set or change user codes.
To set/change a user code:
1.
2.
and
Press
Enter your code
3.
Using the arrow keys, scroll to the option Codes/Tags and press
Note: If you enter a wrong user code, the keypad produces 3 short beeps and the "Wrong Code. Please Try
Again
" message will be heard. Press
quickly and re-enter the above sequence correctly.
4.
Scroll to User Codes and press
5.
6.
You will see the option New/Change. Press
Using the arrows scroll to select the User Index number to which you want to
assign a user code and press
Note: In the Agility system, the User Index number is from 00 to 32, where 00 belongs to the Grand Master.
7.
8.
Enter the new code and then re-enter the code. If successful, a single
confirmation beep is sounded, if not, 3 quick error beeps are sounded
Repeat the above steps for additional codes until you have completed your list
Deleting User Codes
At times, you may want to completely delete a user code. Note that it is impossible to
delete the Master Code (although it can be changed).
The system must be disarmed in order to delete user codes.
To set/change a user code:
1.
Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes)
2.
3.
Scroll the menu to the option "Delete By User". Press
Using the arrows scroll to select the User Index number which you want to
delete and press
4.
5.
The display will show: "Delete User. Are you sure?". Use the
key to select
[Y] and press
. If successful, a single confirmation beep is sounded, if not, 3
quick error beeps are sounded
Repeat the above steps for deleting additional codes
Page 24
Agility User Manual
4.2 Proximity Tags
The bi-directional keypad enables you to replace the use of a code with a proximity tag to
arm and disarm the security system or to activate and deactivate home appliances and
utilities, such as heating and lights. Proximity tag programming is performed from the
User Functions menu. When programming a proximity tag, the following three options are
available:
Adding a new tag
Deleting a tag by the user serial number
Deleting a tag by the user tag
Adding a Proximity Tag
The Grand Master can assign a tag to any user in the system. Each proximity tag can be
assigned to only one user.
To add a proximity tag:
1.
2.
3.
Press
Enter your user code
Using the arrow keys scroll to the option Codes/Tags from the User Functions
menu and press
4.
Scroll to Proximity Tags and press
5.
6.
Select the option New/Change. Press
Using the arrows scroll to select the User Index number to which you want to
assign a tag.
Within 10 seconds, hold the proximity tag at a distance of 1 to 2 cm. from the
keypad’s keys. The keypad automatically reads the proximity tag and saves it
into the system’s memory. Once the proximity tag has been successfully
recorded, a long confirmation beep sounds, and a confirmation message is
displayed. If the proximity tag is already stored in the system’s memory, 3 error
beeps will sound and a reject message will appear.
7.
Page 25
Agility User Manual
Deleting a proximity tag
Deleting proximity tags can be done by in two options:
By user number: Use this option to delete a tag for which the user is known
By tag: Use this option to delete a tag for which the user is not known
To delete by user:
1. Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes)
2. Scroll the menu to the option Delete by user. Press
3. Using the arrows scroll to select the user for which you want to delete the
proximity tag and press .
4. The display will show: "Delete User. Are you sure?". Use the
key to select
[Y] and press . If successful, a single confirmation beep is sounded, if not, 3
quick error beeps are sounded.
To delete by tag:
1. Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes).
2. Scroll the menu to the option Delete by tag. Press
3. Within 10 seconds, approach the proximity tag at a distance of 1 to 2 cm. from
the keypad’s keys. A confirmation message will be displayed.
4.3 Defining Follow Me Destinations
In the case of an alarm or event, the system can initiate a phone call to a designated
telephone, send a SMS or send an E-mail and employ unique tones or messages to express
the active event.
To enter/edit a Follow Me number:
1. Press
2. Enter your user code
3. Scroll the menu using the arrow keys to the option Follow Me and press
4. Select the Follow Me index number you want to edit and press .
5. Press to enter the Define menu.
6. Enter the phone number, including the area code (if required) or an e-mail
address, as requested on the screen and press
Up to 32 digits can be included in the phone number.
7.
If required, include the special functions described below to achieve the related
effect. You can press the
or keys to toggle to the required character.
Page 26
Agility User Manual
Results
Function
Stop dialing and wait for a new dial tone
Wait a fixed period before continuing
Send the DTMF
character
Send the DTMF # character
Delete numbers from the cursor position
8.
When done with your complete entry, press
Page 27
simultaneously
to store it.
Agility User Manual
4.4 Scheduler
The Agility enables you to automate some system operations. This is performed by
defining weekly programs by your installer. Each program can be defined with up to two
time intervals per day, during which the system automatically performs one of the
following functionsW=
Automatic Arming/Disarming: An arming program automatically arms and
disarms the system during your required time intervals.
Automatic UO Activation: A UO (home appliance) activation program
automatically activates and deactivates UOs during your required intervals.
In addition, each program can be defined to be activated in a different manner during
vacation.
Once your installer defines a schedule program it will be activated.
You have the option to deactivate a program according to your needs.
To disable a weekly program:
1.
2.
Press
Enter your user code
3.
Scroll the menu using the arrow keys to the option Clock and press
4.
Press
5.
Select the Scheduling program index number. Use the
to enter the Scheduler menu.
deactivate and press
Page 28
key to activate /
Agility User Manual
4.5 Complete Menu of User Functions
The Agility comes with a variety of selectable user functions that become available when
you enter the User Functions mode. The following section lists these functions.
Note: Although these functions are in the User Functions menu, you can ask you installer to program them
for you.
To enter the User Functions mode press
followed by your user code.
The following table shows full Keypad Operations according to users.
√
- User is able to perform this function
- User is unable to perform or see this function
Operation
Grand
Activities
Bypass Zone: Provides the ability to bypass any of
the system's intrusion zones.
Bypass zone
Select zone
Main Buzzer ON/OFF: Used to control the main
unit buzzer.
Walk Test: Used to easily test and evaluate the
operation of selected zones in your system
Output Control: Allows user control of previously
designated external devices (e.g. an appliance, a
motor-driven garage door, etc.)
using the
Installer
√
√
√
√
√
√
√
√
√
√
√
√
√
Define [Y] using the
key and press
Output Control
User
Master
Select Output
Define [Y]
key and press
Bypass Troubles: Used to confirm all troubles in the
system in order to enable arming operation.
Anti Code: If defined by your engineer the Agility
can be defined to be not ready to Arm after an
alarm or tamper condition. To restore the system to
Normal Operation mode, installer code or an Anticode must be entered. Entering the code supplied
by the installer at this location will restore the
system to the Normal Operation mode
Page 29
Agility User Manual
Operation
Grand
Activities
Advanced Prepaid SIM
User
Installer
√
√
√
√
√
√
√
√
√
√
√
√
√
√
Master
Check Credit
Use this function to receive information by SMS or
Voice of the credit level in your prepaid SIM card.
For more information refer to your installer.
Advanced Prepaid SIM
Reset SIM
After charging a prepaid SIM card, the user has to
reset the SIM Expire Time manually. The time
duration for expiration is defined by your installer.
Advanced Restore Alarm:
The user must approve
an alarm that occurred in the system. After
disarming an alarm, an Alarm Memory Display will
appear on the screen.
Restore Trouble:
If defined by your installer, use
this option to reset a trouble condition after it has
been corrected.
Siren TMP Mute
: Used to silence an alarm initiated
by a tamper from a siren for 20 minutes. Use this
option when replacing the siren battery.
View IP Address:
Use this option to view the IP
√
address of the Agility
Follow Me
Define
: Used to define Follow Me destinations
phone number or Email address according to its
type: Voice message, SMS or E-mail
Test FM
: Used to test Follow Me reporting.
Codes/Tags
Use this menu to set tags and user codes in the
system. For detailed information refer to Chapter 4,
page 23.
Clock
Time & Date
: Allows the setting of the system time
and date. This definition is required for setting the
scheduler programming in the system.
Page 30
Agility User Manual
Operation
Grand
User
Installer
√
√
√
√
√
√
Master
Activities
Scheduler
: Enables you to activate or deactivate
preprogrammed schedules that were defined by
your installer. Up to 8 weekly programs can be
defined in the system during which the system
automatically arms / disarms or activates utility
outputs.
Event Log
To view a list of system events that have occurred
Service Information
Allows the display of any previously entered
service information.
(Name and phone)
Page 31
Agility User Manual
Chapter 5 - System Specifications
The following technical specifications are applicable for the Agility:
Electrical Characteristics
System Power
Units Consumptions
Backup Battery
Battery Dimensions (HxWxD)
Internal Siren intensity
Operating Temperature
Storage temperature
230VAC (-15%+10%), 50Hz, 50mA=
Optional: 9VAC, 50-60Hz=
Main board: Typical 130mA
GSM: Stand by 35mA, Communication 300mA
Modem: Stand by 20mA, Communication 60mA
IP Card: 90mA (Max)
Sealed Lead Acid Battery 6V 3.3Ah =
67mm x 134mm x 34mm
90 dBA @ 1m=
-10°C to 40°C (14°F to 104°F)
-20°C to 60°C (-4°F to 140°F)
Physical Characteristics
Dimension (HxWxD)
Weight (Without battery)
268.5 mm x 219.5 mm x 64 mm
(10.57 x 8.64 x 2.52 inch)=
1.31Kg (Full configuration)=
Wireless Characteristics
RF immunity
Frequency
According to EN 50130-4=
868.65 MHz or 433.92 MHz
Page 32
Agility User Manual
Chapter 6 - EN 50131 Compliance
Compliance Statement
Hereby, RISCO Group declares that the Agility series of central units and accessories are
designed to comply with:
EN50131-1, EN50131-3 Grade 2
EN50130-5 Environmental class II
EN50131-6 Type A
UK: PD 6662:2004, ACPO DD243:2004 (Police)
Possible logical keys calculations:
Logical codes are codes typed in the wireless keypad to allow level 2 (users) and
level 3 (installer) access
All code lengths are 4 digits: xxxx
0-9 can be used for each digit
There are no disallowed codes, all codes from 0000 to 9999 are acceptable
Invalid codes cannot be created since after 4 digits have been typed "Enter" is
automatic. Codes rejection occurs only when trying to create a code that does not
exist.
Possible physical keys calculations:
Physical keys are implemented in the Wireless Remote Controls.
It is assumed only a user can have remote controls, so having a physical key is
considered as access level 2
Each remote control has an identification code of 24 bit, so the number of options is
2^24
For a remote control to operate with the Agility, a "write" process must be made
after which the keypad is registered with the panel.
A valid remote control is one "Learned" by the panel and allows Arm/Disarm
A non valid remote control is one not "Learned" by the panel and does not allow
Arm/Disarm
Page 33
FCC NOTE:
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed
to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following
measures:
-- Reorient or relocate the receiving antenna.
-- Increase the separation between the equipment and receiver.
-- Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
-- Consult the dealer or an experienced radio/TV technician for help.
FCC ID: JE4AGILITY Valid for P/N RW132x4t0zzA
IC: 6564A-AGILITY Valid for P/N RW132x4t0zzA
FCC Warning:
The manufacturer is not responsible for any radio or TV interference caused by
unauthorized modifications to this equipment. Such modifications could void the user's
authority to operate the equipment.
Notes
RISCO Group Limited Warranty
RISCO Group and its subsidiaries and affiliates ("Seller") warrants its products to be free
from defects in materials and workmanship under normal use for 24 months from the date
of production. Because Seller does not install or connect the product and because the
product may be used in conjunction with products not manufactured by the Seller, Seller
cannot guarantee the performance of the security system which uses this product. Seller's
obligation and liability under this warranty is expressly limited to repairing and replacing,
at Seller's option, within a reasonable time after the date of delivery, any product not
meeting the specifications. Seller makes no other warranty, expressed or implied, and
makes no warranty of merchantability or of fitness for any particular purpose.
In no case shall seller be liable for any consequential or incidental damages for breach of
this or any other warranty, expressed or implied, or upon any other basis of liability
whatsoever.
Seller's obligation under this warranty shall not include any transportation charges or costs
of installation or any liability for direct, indirect, or consequential damages or delay.
Seller does not represent that its product may not be compromised or circumvented; that
the product will prevent any personal injury or property loss by burglary, robbery, fire or
otherwise; or that the product will in all cases provide adequate warning or protection.
Buyer understands that a properly installed and maintained alarm may only reduce the risk
of burglary, robbery or fire without warning, but is not insurance or a guaranty that such
event will not occur or that there will be no personal injury or property loss as a result
thereof.
Consequently seller shall have no liability for any personal injury, property damage or loss
based on a claim that the product fails to give warning. However, if seller is held liable,
whether directly or indirectly, for any loss or damage arising under this limited warranty or
otherwise, regardless of cause or origin, seller's maximum liability shall not exceed the
purchase price of the product, which shall be complete and exclusive remedy against seller.
No employee or representative of Seller is authorized to change this warranty in any way
or grant any other warranty.
: This product should be tested at least once a week.
WARNING
«=ofp`l=dêçìé===MULMU=
==
RfkNMQN=`

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Page Count                      : 36
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:292264fd-009f-431c-ba43-4ee6ac4f94de
Producer                        : Acrobat Distiller 6.0.1 (Windows)
Modify Date                     : 2008:11:11 11:55:16+02:00
Create Date                     : 2008:11:11 11:55:16+02:00
Document ID                     : uuid:8465aadb-d18f-4d20-b8cc-cb9e398d17ce
Format                          : application/pdf
Title                           : untitled
Creator                         : 
Author                          : 
EXIF Metadata provided by EXIF.tools
FCC ID Filing: JE4AGILITY

Navigation menu