Contents
- 1. Users Manual 1
- 2. Users Manual 2
- 3. Users Manual 3
Users Manual 1
User Manual Agility User Manual Important Notice This guide is delivered subject to the following conditions and restrictions: This guide contains proprietary information belonging to RISCO Group. Such information is supplied solely for the purpose of assisting explicitly and properly authorized users of the system. No part of its contents may be used for any other purpose, disclosed to any person or firm, or reproduced by any means, electronic or mechanical, without the express prior written permission of RISCO Group. The information contained herein is for the purpose of illustration and reference only. Information in this document is subject to change without notice. Corporate and individual names and data used in examples herein belong to their respective owners. All rights reserved. © 2008 RISCO Group August 2008 Page 2 Agility User Manual Table of Contents Chapter 1 Introduction ......................................................................................... 5 NKN=j~áå=cÉ~íìêÉë ....................................................................................................................................... 5 NKO=^Öáäáíó=^êÅÜáíÉÅíìêÉ................................................................................................................................ 6 NKP=rëÉê=léÉê~íáåÖ=qççäë........................................................................................................................... 7 NKQ=pí~íìë=fåÇáÅ~íáçåë ................................................................................................................................. 8 iba=fåÇáÅ~íçêë .................................................................................................................................... 8 pí~íìë=_ìííçå=L=pÉêîáÅÉ=`~ää=EiáëíÉå=C=q~äâF ................................................................................ 8 sçáÅÉ=jÉëë~ÖáåÖ ............................................................................................................................... 9 pjp=jÉëë~ÖáåÖ ................................................................................................................................. 9 bã~áä=jÉëë~ÖáåÖ ............................................................................................................................... 9 pçìåÇ=fåÇáÅ~íáçåë ............................................................................................................................ 10 Chapter 2 Local System Operation.................................................................... 11 OKN=^êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NN= ^ï~ó=EcìääF=~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NN= pí~ó=EeçãÉF=~êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NO= m~êíáíáçå=~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NO= cçêÅÉ=^êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NP= ^êãáåÖ=ïáíÜ=íêçìÄäÉë=áå=íÜÉ=póëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NP= OKO=aáë~êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NQ= póëíÉã=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NQ= m~êíáíáçå=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR= aìêÉëë=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR= aáë~êãáåÖ=~ÑíÉê=~å=^ä~êãW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR= oÉëÉííáåÖ=~ÑíÉê=~å=~ä~êãW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS= ^åíá=`çÇÉ=oÉëÉíKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS= fåëí~ääÉê=oÉëÉí KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS= OKP=pÉåÇáåÖ=~=m~åáÅ=^ä~êã ...................................................................................................................... NT Chapter 3 Remote System Operation................................................................. 18 PKN=oÉãçíÉ=mÜçåÉ=léÉê~íáçå ................................................................................................................. 18 oÉãçíÉäó=^ÅÅÉëëáåÖ=íÜÉ=póëíÉã ................................................................................................. 18 sçáÅÉ=léÉê~íáçåë=jÉåì.................................................................................................................. 18 oÉÅÉáîáåÖ=`~ääë=Ñêçã=íÜÉ=póëíÉã ................................................................................................. 19 ^ÅâåçïäÉÇÖÉ=jÉåì ......................................................................................................................... 20 _áJÇáêÉÅíáçå~ä=`çããìåáÅ~íáçå ....................................................................................................... 20 PKO=pjp=léÉê~íáçå .................................................................................................................................... 21 pjp=oÉãçíÉ=`çåíêçä ...................................................................................................................... 21 pjp=`çåÑáêã~íáçå=jÉëë~ÖÉ ......................................................................................................... 22 Chapter 4 User Functions and Settings............................................................. 23 QKN=rëÉê=`çÇÉë .......................................................................................................................................... 23 QKO=mêçñáãáíó=q~Öë..................................................................................................................................... 25 QKP=aÉÑáåáåÖ=cçääçï=jÉ=aÉëíáå~íáçåë..................................................................................................... 26 QKQ=pÅÜÉÇìäÉê ............................................................................................................................................. 28 QKR=`çãéäÉíÉ=jÉåì=çÑ=rëÉê=cìåÅíáçåë ................................................................................................. 29 Chapter 5 System Specifications....................................................................... 32 Chapter 6 EN 50131 Compliance........................................................................ 33 Page 3 Agility User Manual Page 4 Agility User Manual Chapter 1 - Introduction Congratulations on your purchase of Agility - RISCO Group's Flexible Wireless Security System. The Agility has been specifically designed to meet a wide range of security, safety and home automation needs for many residential and commercial applications. Agility is designed to recognize abnormal conditions and inform the system of the status of any protected door, window, hallway, room, or area. Status information is presented visually or verbally. It supports the capabilities of communicating with a Central Monitoring Station or to your mobile phone using friendly and easy to understand verbal messages as well as SMS or E-mail messages. This manual describes how to operate your system. It will guide you through programming instructions for main system features as well as basic arming and disarming commands for the system. 1.1 Main Features Up to 32 wireless zones (1 way or 2 way wireless detectors) + 4 optional wired zones (only with I/O expander) 32 User codes + Grand Master code 4 fixed authority levels for user Proximity tag for each user 3 partitions 3 wireless keypads (1 way or 2 way) 3 wireless sirens (internal or external) 8 Remote controls (1 way or 2 way) 250 Events Log 16 Follow Me destinations 4 outputs (I/O expander) X-10 support Page 5 Agility User Manual 1.2 Agility Architecture Your Agility controls and monitors a variety of sensors, detectors, and contacts placed throughout the premises, which provide external, perimeter and internal burglary protection. The system is supervised, meaning that the panel checks the status of each sensor to detect problems. If the panel detects trouble it will notify you with beeps and indicator lights on the panel itself. The following diagram shows the components that make up the system: Page 6 Agility User Manual 1.3 User Operating Tools The Agility system can be operated using several devices, some of which have been designed as bi-directional. If you have purchased a bi-directional device your system is capable of sending a return reply status indication from the panel to the device for each command that is sent to it. Depending on your purchase you can operate your system via the following: 2-Way 8 Button Remote Control: Using the bi-directional 8 button remote control you can arm, disarm, send a panic alarm, activate outputs and more. Being bi-directional the remote control receives a reply status indication, via its 3 colored LEDs and internal buzzer siren, from the panel for each command that it has sent to the panel. For higher security, commands can be defined to be activated with a 4 digit PIN code. Agility 2-Way Wireless Keypad: Using the bi-directional wireless keypad you can program and operate your system according to your needs. Being bi-directional the keypad receives a reply status indication from the panel for each command that it has sent to the panel. To use functions of the keypad you can use a code or a proximity tag. 4 Button Key fob: Using the 4 button key fob you can arm, disarm, send a panic alarm and activate outputs. Remote Phone Operation: Using any remote, touch-tone phone you can perform remote operations such as arming, disarming, listening in and talking to the premises and more. The system can also provide audible information such as event occurrences and the status of your system SMS: If your system is equipped with a GSM/GPRS module it can provide information about the system such as event occurrences by SMS. You can also operate the system using SMS commands for arming and disarming the system and more Configuration Software: RISCO Group's Configuration Software enables the installer to program the system and operate the system locally or remotely Web Browser: Using the web you can perform a variety of operations on your system such as arming, disarming, output activation, receive status information and viewing event logs Page 7 Agility User Manual 1.4 Status Indications LED Indicators The LED indicators provide typical system indications, as discussed below. Some indicators have additional functions, which are explained later on. Power LED The Power LED indicates system operation. Condition On Rapid flash Slow flash Description Power OK Indicates AC trouble Indicates low battery trouble Arm/Alarm LED (Red) Condition On Rapid flash Slow flash Stay LED Condition On Off Description System armed Alarm System in Exit delay Description System armed at STAY System disarmed Ready LED (Green) Condition On Off Slow Flash Description System ready Open zones System is ready to be armed while a specially designated entry/exit door remains open Trouble LED Condition Rapid Flash Off Description Trouble No trouble Note: When all LEDs flash one after another in sequence the system is in Installation mode. Page 8 Agility User Manual Status Button / Service Call (Listen & Talk) The button on the main unit can be defined as a system status indicator or as a S.O.S button. Once pressed, a service call will be established to the monitoring station, which then enables 2-way communication with the premises. Voice Messaging Three types of spoken messages are heard when using the Agility, locally in the premises or remotely to your mobile: Event messages: Upon selected event occurrence, the Agility initiates a call to a remote Follow Me (FM) telephone number, informing you of a security situation by playing a pre-recorded Event announcement message. Status messages: Upon remote access of the system by initiating a call from a remote telephone or receiving a call from the system, the Agility announces the current system status by playing a pre-recorded Status message. Local Announcement messages: Upon event occurrence or user’s keypad operations, the Agility can announce various local messages to residents. SMS Messaging Using the GSM/GPRS Module the system can send predefined SMS event messages to a remote Follow Me (FM) telephone number, informing you of the status of the security system and certain events that occurred in the system. For example: Email Messaging Using the Agility IP Module the system can send event messages by Email to predefined email addresses informing you of the status of the security system and certain events that occurred in the system. For example: Subject: Alarm Security Message: Intruder Alarm System Name: John's Residence Event: Fire Alarm, Zone 5, Entrance door Time: 01 April 2008; 16:12 Partition: Partition 1, First floor Service Contact: Monitoring Station 01, 03-5676778 Page 9 Agility User Manual Sound Indications In addition to the visual indications provided by the Agility’s LEDs, your system produces audible notification after certain events. Condition Description Intrusion alarm Continues rapid beeping Fire alarm Staggered rapid beeping Exit delay Slow buzzer beeps until the Exit Delay time period expires Entry delay Slow buzzer beeps until the Entry Delay time period expires. Confirm operation A one-second tone Reject operation Three rapid error beeps Arm/Disarm squawk 1 siren chirp: System armed 2 siren chirps: System is disarmed 4 siren chirps: System disarmed after an alarm Page 10 Agility User Manual Chapter 2 - Local System Operation 2.1 Arming your system Arming your system causes the intrusion detectors to trigger an alarm when violated. The arming operation will be followed by a local message announcement (if defined). Before arming the system check the Ready LED and make sure that the system is ready to be armed. If the system is NOT ready to be armed secure or bypass the violated zone(s), and then proceed. Failing to arm the system will be indicated by the system Your Agility offers the following kinds of arming: Note : If you are unable to arm the system, press the status key to view system messages. Away (Full) arming: Away arming prepares all of the system's intrusion detectors to activate an alarm if violated, and is used when leaving the premises. The system will arm after the designated countdown time (Exit delay) and a local message will sound. Once you have armed the system, exit via the designated final exit door. To arm using Away (Full) arming procedure Quick mode: High security mode: Press Quick mode: High security mode: Press + code + code or proximity tag Send SMS : [Code][A], example, Page 11 1234A Agility User Manual Stay (Home) arming: Stay arming activates only perimeter detectors (as defined by your installer), enabling individuals to remain inside and move about the premises while the system is partially armed. To arm using Stay (Home) arming procedure Quick mode: + code High security mode: Quick mode: High security mode: Press + code or proximity tag button or button 4 (if defined. Advise with your installer) Partition arming: One of the Agility's advantages is its ability to divide the system in up to 3 partitions. Each partition may be managed as a separate security system, each of which can be armed and disarmed individually regardless of the condition of the other. Partitions can be armed or disarmed one at a time, or all at once, and each partition can be armed at Stay or Away. Only users that have been defined to operate multiple partitions can operate more than one partition and arm/disarm all partitions at once To arm using Partition arming (Away or Stay) procedure Quick mode: =L= Quick mode: High security mode: Press =L= =[= =L= =[== =[= =L= High security mode: + code =[= + code or proximity tag button or button 4 (if defined. Advise with your installer) Send SMS: [Code][A or S] [Partition 1,2 or 3]. Example 1234A1. Fore more information refer to page 21. Page 12 Agility User Manual Force Arming: Force arming arms the system regardless of open zones. Your installer must enable this option. Note : Force arming the system results in leaving part of the system unsecured. Arming with troubles in the System If required, and defined by your installer, all troubles in the system should be confirmed to enable the arming operation while performing arming from the wireless keypad. When trying to arm the system with troubles, the display will show a "System Troubles" message. Press the key to view the troubles in the system. Scroll down the troubles list to view all troubles in the system. To enable one time arming from the keypad: 1. Press 2. Go to Activities > Bypass Trouble 3. The following question will appear: "Bypass troubles. Are you sure? N?". Using the 4. and enter your user code to access the user menu. key change to Y and press to confirm. Press to return to main display and perform the arming operation again. Page 13 Agility User Manual 2.2 Disarming your system Disarming your system causes the detectors not to trigger an alarm when violated. When you enter the premises, the Entry Delay begins to count down. You must disarm the system within the Entry Delay time to prevent the system from triggering an alarm. The disarming operation will be followed by a local message announcement (if defined). Note : If an alarm occurred in the system, it is recommended to leave the premises. Only after police investigation should you consider that the burglar is no longer on your premises and you can re-enter. In special cases (if programmed by your installer) arming the system after an alarm might require a technician code. For more information refer to your installer Your Agility offers the following kinds of disarming: System disarming: Disarming deactivates the partitions assigned to the specified user code To disarm using Procedure for Disarming Quick mode: disarmed . All partitions assigned to the button will be High security mode: Press > Code followed by code or proximity tag. Press the button. All partitions assigned to the button will be disarmed. Send SMS: [Code][D], example 1234D Page 14 Agility User Manual Partition disarming: Partition disarming enables you to disarm individual partitions within an armed system To disarm using Procedure for Partition Disarming Quick mode: =L= =L= High security mode: =[= =[= =L= =L= =[= > Code > code or proximity tag. Press the button. All partitions assigned to the button will be disarmed. Send SMS: [Code][D] [Partition 1,2 or 3]. Example 1234D1. Fore more information refer to page 21. Duress disarming: If you are ever coerced into disarming your system, you can comply with the intruder's wishes while sending a silent duress alarm to the Central Station. To do so, you must use a special duress code, which when used, will disarm the system in the regular manner, while simultaneously transmitting the duress alarm. Confer with your installer which of the user's codes is defined as a duress code. Note: Under no circumstances must the duress code be used haphazardly or without reason. Central Stations, along with Police Departments, treat duress codes very seriously and take immediate action. Disarming after an Alarm: When silencing an alarm the system goes into a disarm state. After the system is disarmed the sirens will sound 4 siren chirps indicated that an alarm occurred in the system. If an "Entry door" is opened prior to disarming the system, the following voice announcement message will be heard: "Alarm occurred in the system". Press the key will indicate the cause of the alarm. Page 15 Agility User Manual Note: If an alarm occurred in the system, it is recommended to leave the premises. Only after police investigation should you consider that the burglar is no longer on your premises and you can re-enter. In special cases (if programmed by your installer) arming the system after an alarm might require a technician code. For more information refer to your installer Your installer can define the number of times (0-15) that an alarm will be sent from the same detector during one arming period. This is usually used to prevent an alarm from a malfunction detector, an environmental problem or incorrect installation Resetting after an alarm: Your installation company can define that the reset of the system to a Normal Operation mode will require the intervention of your monitoring station or installer. In this case, after an alarm condition the system will be regarded as Not Ready and while requesting for system status ( trouble message: Technician Reset. )indication you will get a Anti Code Reset 1. Press Enter user code Go to Activities > Anti Code option. 2. Call your monitoring station (MS) or installer and quote the “RANDOM CODE” displayed on your keypad. The MS or installer will give you a return Anti-Code. 3. Enter this Anti code followed by and the system will reset. Installer Reset Your monitoring station (MS) or installer can reset your system remotely or locally from the keypad. To enable local reset by your installer you may need to authorize him using the master code after the installer enters his code. A one hour time window is opened for the installer to program user functions and be able to reset your system locally Page 16 Agility User Manual 2.3 Sending a Panic Alarm Panic alarms enable you to send a message to the monitoring station in the event of an emergency, send a message to a follow me number, announce a local message or activate a local alarm. Panic alarms can be set to be silent (Refer to your installer for more information). To send a Panic Alarm using Procedure Press both and keys simultaneously Press both Note and keys simultaneously : Your installer should define these keys to be set as panic keys. These keys can be either disabled or used to establish a service call to your Monitoring Station. If defined by your installer pressing seconds will send a fire alarm and pressing =simultaneously for 2 simultaneously for 2 seconds will send a special emergency or medical alarm. Press the small blank button (if defined) Note: Your installer can define the small blank button to be used for sending a panic alarm. Note: For full capabilities of the 2-way remote control, the bi-directional keypad and 4 button key fob, refer to the instructions supplied with each product. Press both keys simultaneously Press the panic button Page 17 Agility User Manual Chapter 3 - Remote System Operation 3.1 Remote Phone Operation The Agility enables you to operate the system from a remote touch-tone phone by initiating a telephone call to or from the system and interacting with voice menus that guide you through your required remote operation. Remotely Accessing the System Remotely accessing the system involves initiating a call to the system, and entering your remote access code and the user code you usually enter in the system keypad. To remotely access the system: 1. 2. From a remote touch-tone telephone, dial the number of the premises where Agility is installed. If your system is connected to a land telephone line and an answering machine is in use at the premises let the line ring once, then hang up and call again. If an answering machine is not in use at the premises wait until the system picks up. After the system picks up a short tone is heard. Note: When the system picks up, all phones on the same line are effectively disconnected and cannot be used. 3. Enter your 2 digit remote access code within 10 seconds (Default code = 00). The following message is announced: "Hello, Please Enter Your User Code, Followed By [#]". 4. Enter your user code followed by [#]. (Default code=1234) After your code is accepted a system status message is announced, followed by the Operations menu. You can now perform the required remote operations. Voice Operations Menu The Voice Operations menu announces options and instructions on how to use the system functions. The options in the Operations menu vary according to system status and your access rights. Following is a list of the remote operations options: Operation Arming all partitions Arming a selected partition Disarming all partitions Disarming a selected partition Quick Key Combination Press [1][1] Press [1][9] followed by the partition number Press [2][2] Press [2][9] followed by the partition number Page 18 Agility User Manual Operation Changing Zone Bypass status Operating Utility Outputs Changing Follow Me(FM) numbers Listen in to the premises Talking to the premises Listen and Talk to the premises Recording an opening message Recording messages that are not included in the message bank (5 messages) Exiting the System To return to the previous menu To repeat the menu options Quick Key Combination Press [3] followed by the zone number and then [#][9] Press [4] followed by the output number Press [5] followed by the FM number and [#][2]. Enter the new phone number and press [#][1]. Press [6][1] Press [6][2] Press [6][3] Press [7][1] Press [7][2] Press [0] Press [*] Press [#] Receiving Calls from the System Upon event occurrence, such as alarm activation, the system informs you of security situations, for example, intrusion or fire, by calling you and announcing a pre-recorded event announcement message, followed by the Acknowledge menu. The system can call up to 16 Follow Me numbers, enabling you, a relative or neighbor to be informed of the security situation. You can then take the appropriate action, whether this is to inform the authorities or acknowledge the event and remotely operate the system. Notes: Follow Me messages are performed only after reporting to the Monitoring Station. Follow Me numbers are assigned certain events for which they receive calls. The system must be programmed to call a FM number after a specific event occurs in order for that event to trigger the call. To receive an event call: 1. 2. Pick up the phone. Say "Hello" or press [#]. The Event Announcement message is made, informing you of a security situation in your system, for example: “24 Oaklands Street, Intruder alarm, Ground Floor, kitchen” Notes: If no voice is detected, the event message will start playing 5 seconds after phone pick up. Press [#] to begin playback of the event message from the beginning. To repeat the Event Announcement message press [#]. To bypass the Event Announcement message and go directly to the Acknowledge menu, press [* ]. 3. Acknowledge the event. (See Acknowledge Menu Page 19 Agility User Manual Acknowledge Menu After the Event Announcement message is made, the following list of options is announced: Operation Acknowledge Message Acknowledging an event means that you have received a message from the security alarm system about a relevant event in the system and want to confirm this. After you acknowledge an event, the system calls the next FM number. Acknowledge and stop all dialing This option acknowledges the event and stops the system from calling the next FM numbers to report the event. Acknowledge and access the Operations menu The Operations menu lists the available options for remotely operating your system. Listen In and Talk This option enables you to perform bi-directional communication. Repeat the event message Repeat the Acknowledge menu Digit Press [1] Press [2] followed by the code Press [3] followed by the code Press [6] followed by the code Press [#] Press [*] Note: If an invalid code is entered 3 consecutive times, the system hangs up and this FM number is locked for 15 minutes and no calls are initiated to the FM number. If a valid user code is not entered within 10 seconds, the system hangs up. Bi-directional Communication The Listen In and Talk options enable you to remotely and silently listen in to your premises in order to verify the cause of an event occurrence, through the microphone or remotely talk to your premises via the Agility loudspeaker, for example, to guide someone in distress. To listen in or talk: 1. From the Operations/Acknowledge menu, press [6]. The following messages are announced: “To Listen In press 1, To Talk press [2], To Listen and Talk (Open channel) press [3], To return to the previous menu, Press [ ].” 2. Select the desired option. 3. Press [ ] to end listening in and talking communication and return to the Operations menu. Page 20 Agility User Manual Bi-directional Audio Options after an Alarm In the event of Burglary, Fire and Medical alarms, the Agility is able to report these events and then stay on the line. This allows the monitoring service to perform Voice Alarm verification, verify the alarm or Verification in order to verify a cause of event or guide someone in distress. Service call The Service Call feature enables you to call the Monitoring Station by pressing a key. To establish the service call, press the button on the main unit or press simultaneously the buttons on the bi-directional keypad. Note: The Service call should be defined by your installer. 3.2 SMS Operation SMS Remote Control The Agility enables you to perform remote control operations using simple SMS commands. The following section describes the SMS commands and the response of the system to these commands. Note: This application is available only if a GSM/GPRS module is installed in your system. Operation Arm all partitions of a user code Disarm all partitions of a user code Arm by partition Disarm by Partition Bypass a zone Un-bypass a zone Activate Output Deactivate Output Change FM number Get system status Get last alarm memory Get SIM credit level (for prepaid cards) SMS Message Structure Example [Code] D 1234D [Code] A [Partition No.] [Code] D [Partition No.] [Code] B [zone number] [Code] UB [zone No.] [Code] UOON [UO No.] [Code] UOOFF [UO No.] [Code] FMPHONE [FM serial number] NEW [New Phone No.) [Code] ST [Code] AL 1234A1 1234D1 1234B05 1234UB05 1234UOON1 1234UOOFF1 1234FMPHONE 3 NEW0529692345 1234ST 1234AL [Code] CR 1234CR [Code] A Page 21 1234A Agility User Manual Notes: SMS commands can be sent from any mobile phone or from an SMS website. Command words are not case sensitive. A separator between command words is not required although it is accepted. SMS Confirmation Message A confirmation message following a SMS operation is sent to the user, upon request, by adding the letters “RP” at the end of the SMS messages listed below. Example: 1234 A RP - A confirmation message following an arming operation will be sent to the user. Confirmation or Fail operation messages can be assigned to the actions of arming, disarming, bypassing, activating outputs or changing follow me definitions. Page 22 Agility User Manual Chapter 4 - User Functions and Settings The functions and settings explained in this chapter can only be performed via your keypad and the Configuration Software. This chapter refers to these functions and settings as performed via the keypad. Refer to the Configuration Software manual for more information regarding how these functions and settings are performed via the Configuration Software. When using the keypad during the programming mode use the following table to be familiar with the functionality of the keys: Function Sequence Exits from the current menu Terminates commands and confirms data to be stored Used to browse through the menu: Scrolls up a list or moves the cursor Changes data Numerical keys are used to input the numeric codes that may be required for arming, disarming, or used to activate specific functions 4.1 User Codes To perform many of the Agility functions, a security code (often called a user code) must be used. Each individual using the system is assigned a user code, which, in turn, is linked to an Authority Level. Those with a "higher authority" have access to a greater number of system functions, while those with a "lower authority" are more restricted in what they may do. There are four different authority levels available for users of the Agility. Notes: To define the authority levels refer to your installer. Agility can support up to 32 different user codes. User codes may have variable lengths up to 6 digits. Your Agility was given a Grand Master Code of 1-2-3-4 during manufacturing. Unless your alarm company has already changed it to suit your preference, it's best to modify this code to one that is unique and personalized as herein described. Page 23 Agility User Manual Setting / Changing User Codes The user assigned the Grand Master authority level can change all user codes but cannot view the digits in the user code fields. Users with other authority levels can only change their own codes. The system must be disarmed in order to set or change user codes. To set/change a user code: 1. 2. and Press Enter your code 3. Using the arrow keys, scroll to the option Codes/Tags and press Note: If you enter a wrong user code, the keypad produces 3 short beeps and the "Wrong Code. Please Try Again " message will be heard. Press quickly and re-enter the above sequence correctly. 4. Scroll to User Codes and press 5. 6. You will see the option New/Change. Press Using the arrows scroll to select the User Index number to which you want to assign a user code and press Note: In the Agility system, the User Index number is from 00 to 32, where 00 belongs to the Grand Master. 7. 8. Enter the new code and then re-enter the code. If successful, a single confirmation beep is sounded, if not, 3 quick error beeps are sounded Repeat the above steps for additional codes until you have completed your list Deleting User Codes At times, you may want to completely delete a user code. Note that it is impossible to delete the Master Code (although it can be changed). The system must be disarmed in order to delete user codes. To set/change a user code: 1. Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes) 2. 3. Scroll the menu to the option "Delete By User". Press Using the arrows scroll to select the User Index number which you want to delete and press 4. 5. The display will show: "Delete User. Are you sure?". Use the key to select [Y] and press . If successful, a single confirmation beep is sounded, if not, 3 quick error beeps are sounded Repeat the above steps for deleting additional codes Page 24 Agility User Manual 4.2 Proximity Tags The bi-directional keypad enables you to replace the use of a code with a proximity tag to arm and disarm the security system or to activate and deactivate home appliances and utilities, such as heating and lights. Proximity tag programming is performed from the User Functions menu. When programming a proximity tag, the following three options are available: Adding a new tag Deleting a tag by the user serial number Deleting a tag by the user tag Adding a Proximity Tag The Grand Master can assign a tag to any user in the system. Each proximity tag can be assigned to only one user. To add a proximity tag: 1. 2. 3. Press Enter your user code Using the arrow keys scroll to the option Codes/Tags from the User Functions menu and press 4. Scroll to Proximity Tags and press 5. 6. Select the option New/Change. Press Using the arrows scroll to select the User Index number to which you want to assign a tag. Within 10 seconds, hold the proximity tag at a distance of 1 to 2 cm. from the keypad’s keys. The keypad automatically reads the proximity tag and saves it into the system’s memory. Once the proximity tag has been successfully recorded, a long confirmation beep sounds, and a confirmation message is displayed. If the proximity tag is already stored in the system’s memory, 3 error beeps will sound and a reject message will appear. 7. Page 25 Agility User Manual Deleting a proximity tag Deleting proximity tags can be done by in two options: By user number: Use this option to delete a tag for which the user is known By tag: Use this option to delete a tag for which the user is not known To delete by user: 1. Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes) 2. Scroll the menu to the option Delete by user. Press 3. Using the arrows scroll to select the user for which you want to delete the proximity tag and press . 4. The display will show: "Delete User. Are you sure?". Use the key to select [Y] and press . If successful, a single confirmation beep is sounded, if not, 3 quick error beeps are sounded. To delete by tag: 1. Follow steps 1-4 of the previous procedure (See Setting/Changing User Codes). 2. Scroll the menu to the option Delete by tag. Press 3. Within 10 seconds, approach the proximity tag at a distance of 1 to 2 cm. from the keypad’s keys. A confirmation message will be displayed. 4.3 Defining Follow Me Destinations In the case of an alarm or event, the system can initiate a phone call to a designated telephone, send a SMS or send an E-mail and employ unique tones or messages to express the active event. To enter/edit a Follow Me number: 1. Press 2. Enter your user code 3. Scroll the menu using the arrow keys to the option Follow Me and press 4. Select the Follow Me index number you want to edit and press . 5. Press to enter the Define menu. 6. Enter the phone number, including the area code (if required) or an e-mail address, as requested on the screen and press Up to 32 digits can be included in the phone number. 7. If required, include the special functions described below to achieve the related effect. You can press the or keys to toggle to the required character. Page 26 Agility User Manual Results Function Stop dialing and wait for a new dial tone Wait a fixed period before continuing Send the DTMF character Send the DTMF # character Delete numbers from the cursor position 8. When done with your complete entry, press Page 27 simultaneously to store it. Agility User Manual 4.4 Scheduler The Agility enables you to automate some system operations. This is performed by defining weekly programs by your installer. Each program can be defined with up to two time intervals per day, during which the system automatically performs one of the following functionsW= Automatic Arming/Disarming: An arming program automatically arms and disarms the system during your required time intervals. Automatic UO Activation: A UO (home appliance) activation program automatically activates and deactivates UOs during your required intervals. In addition, each program can be defined to be activated in a different manner during vacation. Once your installer defines a schedule program it will be activated. You have the option to deactivate a program according to your needs. To disable a weekly program: 1. 2. Press Enter your user code 3. Scroll the menu using the arrow keys to the option Clock and press 4. Press 5. Select the Scheduling program index number. Use the to enter the Scheduler menu. deactivate and press Page 28 key to activate / Agility User Manual 4.5 Complete Menu of User Functions The Agility comes with a variety of selectable user functions that become available when you enter the User Functions mode. The following section lists these functions. Note: Although these functions are in the User Functions menu, you can ask you installer to program them for you. To enter the User Functions mode press followed by your user code. The following table shows full Keypad Operations according to users. √ - User is able to perform this function - User is unable to perform or see this function Operation Grand Activities Bypass Zone: Provides the ability to bypass any of the system's intrusion zones. Bypass zone Select zone Main Buzzer ON/OFF: Used to control the main unit buzzer. Walk Test: Used to easily test and evaluate the operation of selected zones in your system Output Control: Allows user control of previously designated external devices (e.g. an appliance, a motor-driven garage door, etc.) using the Installer √ √ √ √ √ √ √ √ √ √ √ √ √ Define [Y] using the key and press Output Control User Master Select Output Define [Y] key and press Bypass Troubles: Used to confirm all troubles in the system in order to enable arming operation. Anti Code: If defined by your engineer the Agility can be defined to be not ready to Arm after an alarm or tamper condition. To restore the system to Normal Operation mode, installer code or an Anticode must be entered. Entering the code supplied by the installer at this location will restore the system to the Normal Operation mode Page 29 Agility User Manual Operation Grand Activities Advanced Prepaid SIM User Installer √ √ √ √ √ √ √ √ √ √ √ √ √ √ Master Check Credit Use this function to receive information by SMS or Voice of the credit level in your prepaid SIM card. For more information refer to your installer. Advanced Prepaid SIM Reset SIM After charging a prepaid SIM card, the user has to reset the SIM Expire Time manually. The time duration for expiration is defined by your installer. Advanced Restore Alarm: The user must approve an alarm that occurred in the system. After disarming an alarm, an Alarm Memory Display will appear on the screen. Restore Trouble: If defined by your installer, use this option to reset a trouble condition after it has been corrected. Siren TMP Mute : Used to silence an alarm initiated by a tamper from a siren for 20 minutes. Use this option when replacing the siren battery. View IP Address: Use this option to view the IP √ address of the Agility Follow Me Define : Used to define Follow Me destinations phone number or Email address according to its type: Voice message, SMS or E-mail Test FM : Used to test Follow Me reporting. Codes/Tags Use this menu to set tags and user codes in the system. For detailed information refer to Chapter 4, page 23. Clock Time & Date : Allows the setting of the system time and date. This definition is required for setting the scheduler programming in the system. Page 30 Agility User Manual Operation Grand User Installer √ √ √ √ √ √ Master Activities Scheduler : Enables you to activate or deactivate preprogrammed schedules that were defined by your installer. Up to 8 weekly programs can be defined in the system during which the system automatically arms / disarms or activates utility outputs. Event Log To view a list of system events that have occurred Service Information Allows the display of any previously entered service information. (Name and phone) Page 31 Agility User Manual Chapter 5 - System Specifications The following technical specifications are applicable for the Agility: Electrical Characteristics System Power Units Consumptions Backup Battery Battery Dimensions (HxWxD) Internal Siren intensity Operating Temperature Storage temperature 230VAC (-15%+10%), 50Hz, 50mA= Optional: 9VAC, 50-60Hz= Main board: Typical 130mA GSM: Stand by 35mA, Communication 300mA Modem: Stand by 20mA, Communication 60mA IP Card: 90mA (Max) Sealed Lead Acid Battery 6V 3.3Ah = 67mm x 134mm x 34mm 90 dBA @ 1m= -10°C to 40°C (14°F to 104°F) -20°C to 60°C (-4°F to 140°F) Physical Characteristics Dimension (HxWxD) Weight (Without battery) 268.5 mm x 219.5 mm x 64 mm (10.57 x 8.64 x 2.52 inch)= 1.31Kg (Full configuration)= Wireless Characteristics RF immunity Frequency According to EN 50130-4= 868.65 MHz or 433.92 MHz Page 32 Agility User Manual Chapter 6 - EN 50131 Compliance Compliance Statement Hereby, RISCO Group declares that the Agility series of central units and accessories are designed to comply with: EN50131-1, EN50131-3 Grade 2 EN50130-5 Environmental class II EN50131-6 Type A UK: PD 6662:2004, ACPO DD243:2004 (Police) Possible logical keys calculations: Logical codes are codes typed in the wireless keypad to allow level 2 (users) and level 3 (installer) access All code lengths are 4 digits: xxxx 0-9 can be used for each digit There are no disallowed codes, all codes from 0000 to 9999 are acceptable Invalid codes cannot be created since after 4 digits have been typed "Enter" is automatic. Codes rejection occurs only when trying to create a code that does not exist. Possible physical keys calculations: Physical keys are implemented in the Wireless Remote Controls. It is assumed only a user can have remote controls, so having a physical key is considered as access level 2 Each remote control has an identification code of 24 bit, so the number of options is 2^24 For a remote control to operate with the Agility, a "write" process must be made after which the keypad is registered with the panel. A valid remote control is one "Learned" by the panel and allows Arm/Disarm A non valid remote control is one not "Learned" by the panel and does not allow Arm/Disarm Page 33 FCC NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -- Reorient or relocate the receiving antenna. -- Increase the separation between the equipment and receiver. -- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -- Consult the dealer or an experienced radio/TV technician for help. FCC ID: JE4AGILITY Valid for P/N RW132x4t0zzA IC: 6564A-AGILITY Valid for P/N RW132x4t0zzA FCC Warning: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. Such modifications could void the user's authority to operate the equipment. Notes RISCO Group Limited Warranty RISCO Group and its subsidiaries and affiliates ("Seller") warrants its products to be free from defects in materials and workmanship under normal use for 24 months from the date of production. Because Seller does not install or connect the product and because the product may be used in conjunction with products not manufactured by the Seller, Seller cannot guarantee the performance of the security system which uses this product. Seller's obligation and liability under this warranty is expressly limited to repairing and replacing, at Seller's option, within a reasonable time after the date of delivery, any product not meeting the specifications. Seller makes no other warranty, expressed or implied, and makes no warranty of merchantability or of fitness for any particular purpose. In no case shall seller be liable for any consequential or incidental damages for breach of this or any other warranty, expressed or implied, or upon any other basis of liability whatsoever. Seller's obligation under this warranty shall not include any transportation charges or costs of installation or any liability for direct, indirect, or consequential damages or delay. Seller does not represent that its product may not be compromised or circumvented; that the product will prevent any personal injury or property loss by burglary, robbery, fire or otherwise; or that the product will in all cases provide adequate warning or protection. Buyer understands that a properly installed and maintained alarm may only reduce the risk of burglary, robbery or fire without warning, but is not insurance or a guaranty that such event will not occur or that there will be no personal injury or property loss as a result thereof. Consequently seller shall have no liability for any personal injury, property damage or loss based on a claim that the product fails to give warning. However, if seller is held liable, whether directly or indirectly, for any loss or damage arising under this limited warranty or otherwise, regardless of cause or origin, seller's maximum liability shall not exceed the purchase price of the product, which shall be complete and exclusive remedy against seller. No employee or representative of Seller is authorized to change this warranty in any way or grant any other warranty. : This product should be tested at least once a week. WARNING «=ofp`l=dêçìé===MULMU= == RfkNMQN=`
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Page Count : 36 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:292264fd-009f-431c-ba43-4ee6ac4f94de Producer : Acrobat Distiller 6.0.1 (Windows) Modify Date : 2008:11:11 11:55:16+02:00 Create Date : 2008:11:11 11:55:16+02:00 Document ID : uuid:8465aadb-d18f-4d20-b8cc-cb9e398d17ce Format : application/pdf Title : untitled Creator : Author :EXIF Metadata provided by EXIF.tools