Abus SECVEST User guide

SECVEST
Installer manual
ABUS | Security-Center
abus.com
V2.01.08
1
4
7
*
2
5
8
0
3
6
9
#
1
4
7
*
2
5
8
0
3
6
9
#

Contents
2
Deutsch
Nederlands
Diese Bedienungsanleitung enthält wichtige Hinweise
zur Inbetriebnahme und Handhabung.
Achten Sie hierauf, auch wenn Sie dieses Produkt
an Dritte weitergeben.
Eine Auflistung der Inhalte finden Sie im
Inhaltsverzeichnis mit Angabe der entsprechenden
Seitenzahlen.
Deze gebruiksaanwijzing hoort bij dit product.
Er staan belagrijke aanwijzingen in betreffende de
ingebruikname en gebruik, ook als u dit product doorgeeft
aan derden.
U vindt een opsomming van de inhoud in de
inhoudsopgave met aanduiding van de paginanummers.
English
Dansk
These user manual contains important information for
installation and operation.
This should be also noted when this product is passed
on to a third party.
A list of contents with the corresponding page number
can be found in the index.
Denne manual hører sammen med dette produkt.
Den indeholder vigtig information som skal bruges
under opsætning og efterfølgende ved service.
Indholdet kan ses med sideanvisninger kan findes
i indekset .
Français
Italiano
Ce mode d’emploi appartient à de produit.
Il contient des recommandations en ce qui concerne
sa mise en service et sa manutention.
Vous trouverez le récapitulatif des indications du contenu
á la table des matières avec mention de la page
correspondante.
Queste istruzioni contengono avvertenze importanti per
la messa in funzione e l’utilizzo. La preghiamo pertanto
di conservare le presenti istruzioni per eventuali
consultazioni future. Le presenti istruzioni sono parte
integrante del prodotto, pertanto vanno osservate anche
in caso di cessione del prodotto a terzi.
Note
S/W 2.01.08
This manual relates to software version 2.01.08 and all other previously published software versions. All new
features that are only valid from a certain software version are marked accordingly, e.g. >=2.00.00. All other
features that are valid up to a certain software version are also marked accordingly, e.g. <2.00.00.
Declaration of conformity
ABUS Security-Center hereby declares that the radio equipment type FUAA50xxx is in compliance with RED Directive
2014/53/EU. The full EU Declaration of Conformity text can be found at:
www.abus.com Item search FUAA50xxxx/Downloads.
The Declaration of Conformity can also be obtained from the following address:
ABUS Security-Center GmbH & Co. KG
Linker Kreuthweg 5
86444 Affing
GERMANY

Contents
3
Contents
Declaration of conformity ...............................................................................................................................................2
Contents ...........................................................................................................................................................................3
Quickstart guide ..............................................................................................................................................................6
Target audience...............................................................................................................................................................6
Installing Secvest.............................................................................................................................................................6
Configuring Secvest.........................................................................................................................................................6
Secvest function test........................................................................................................................................................6
Safety information ...........................................................................................................................................................7
Explanation of symbols....................................................................................................................................................7
Intended use....................................................................................................................................................................7
General............................................................................................................................................................................7
Power supply ...................................................................................................................................................................8
Wireless operation...........................................................................................................................................................9
Mounting location of the alarm panel...............................................................................................................................9
Processing priority ...........................................................................................................................................................9
Device overview.............................................................................................................................................................10
Device front....................................................................................................................................................................10
International key assignment.........................................................................................................................................11
Device rear (mounting plate) .........................................................................................................................................12
Introduction....................................................................................................................................................................14
Terms and definitions ....................................................................................................................................................14
Mounting/Installation.....................................................................................................................................................21
Connection overview, terminal block.............................................................................................................................21
Fixing the mounting plate to the wall .............................................................................................................................22
Positioning the wireless alarm system (alarm panel)...............................................................................................22
Fixing the mounting plate .........................................................................................................................................22
Connecting the components..........................................................................................................................................23
Installing the optional GSM (FUMO50000) ..............................................................................................................23
Installing the micro SD card......................................................................................................................................23
Final steps ................................................................................................................................................................23
Changing the upper part of the housing, touch front, keypad front..........................................................................23
Commissioning..............................................................................................................................................................24
Initial commissioning/factory reset.................................................................................................................................24
For a system that is already installed ............................................................................................................................25
Logging into the wireless alarm system.........................................................................................................................25
Logging out from the wireless alarm system .................................................................................................................25
Configuration .................................................................................................................................................................27
Notes..............................................................................................................................................................................27
Menu control elements ..................................................................................................................................................28
Login screen ..................................................................................................................................................................29
Main menu.....................................................................................................................................................................30
INFO ..............................................................................................................................................................................32
Alarm panel ..............................................................................................................................................................32
Communication.........................................................................................................................................................34
Status.............................................................................................................................................................................37
Components ..................................................................................................................................................................38
Teach-in via web interface........................................................................................................................................38
Detectors ..................................................................................................................................................................40
Wireless control panel..............................................................................................................................................51

Contents
4
Add wireless control panel........................................................................................................................................51
External Sirens .........................................................................................................................................................53
Info module/indoor siren...........................................................................................................................................55
WUM (Wireless Universal Module)...........................................................................................................................56
Door locks.................................................................................................................................................................58
RF repeater...............................................................................................................................................................59
Outputs...........................................................................................................................................................................62
Radio Outputs...........................................................................................................................................................62
Wired Outputs...........................................................................................................................................................63
Partitions........................................................................................................................................................................71
Configure partitions........................................................................................................................................................72
Complete arming ......................................................................................................................................................72
Configure partitions........................................................................................................................................................79
Part Set.....................................................................................................................................................................79
Configure partitions........................................................................................................................................................87
Deactivated...............................................................................................................................................................87
Configure partitions........................................................................................................................................................90
Panic response:........................................................................................................................................................90
System...........................................................................................................................................................................92
General.....................................................................................................................................................................92
Installer details..........................................................................................................................................................97
User access..............................................................................................................................................................98
User reset ...............................................................................................................................................................102
Confirmation ...........................................................................................................................................................103
Hardware ................................................................................................................................................................105
Security settings .....................................................................................................................................................107
Backup/restore........................................................................................................................................................114
Panel upgrade ........................................................................................................................................................115
Communication............................................................................................................................................................116
Network...................................................................................................................................................................116
Email setup.............................................................................................................................................................118
VoIP dialler setup....................................................................................................................................................119
ARC reporting.........................................................................................................................................................121
ARC Reporting, Phone Book..................................................................................................................................122
ARC Reporting, Account Numbers.........................................................................................................................123
ARC Reporting, Fast Fmt Channels (for "Fast Format" protocol only)...................................................................124
ARC Reporting, CID/SIA Triggers (for all protocols EXCEPT "Fast Format")........................................................125
ARC Reporting, More .............................................................................................................................................126
Nursing emergency call..........................................................................................................................................129
Social Care, Phone Book........................................................................................................................................130
Social Care, Account Numbers ..............................................................................................................................131
Voice dialler ............................................................................................................................................................132
Speech Dialler, Triggers.........................................................................................................................................134
Speech Dialler, Destinations ..................................................................................................................................135
SMS........................................................................................................................................................................136
SMS, Triggers.........................................................................................................................................................137
SMS, Destinations ..................................................................................................................................................138
SMS, Destinations, Message .................................................................................................................................139
SMS, Destinations, Message, Telephone Recipients ............................................................................................140
SMS, Messages......................................................................................................................................................141
SMS, PSTN SMS....................................................................................................................................................142
Email.......................................................................................................................................................................144
Email, Triggers........................................................................................................................................................145
Email, Destinations.................................................................................................................................................146
Email, Messages ....................................................................................................................................................147
Communication options..........................................................................................................................................148
Contacts..................................................................................................................................................................151

Contents
5
Nursing emergency call...............................................................................................................................................155
Test..............................................................................................................................................................................156
Log...............................................................................................................................................................................172
Virtual keypad..............................................................................................................................................................173
Appendix.......................................................................................................................................................................174
Technical data .............................................................................................................................................................174
Compatible equipment.................................................................................................................................................184
Default values/factory defaults ....................................................................................................................................189
Installer Mode.........................................................................................................................................................189
User menu..............................................................................................................................................................202
Repairs and maintenance............................................................................................................................................207
S/W upgrade................................................................................................................................................................208
ARC/ESCC reporting...................................................................................................................................................215
ARC/ESCC reporting protocol formats...................................................................................................................215
CID/SIA Events.......................................................................................................................................................217
Email error messages..................................................................................................................................................227
TCP/IP error messages...............................................................................................................................................228
Overview of the SSL-relevant messages ....................................................................................................................228
VoIP error messages...................................................................................................................................................230
Log...............................................................................................................................................................................231
Log book entries.....................................................................................................................................................231
User numbers.........................................................................................................................................................243
Troubleshooting...........................................................................................................................................................244
Manual restart (switching off and switching back on).............................................................................................244
Carry out a GSM manual test call, prepaid ............................................................................................................248
Diagnostic LEDs on the motherboard and GSM module .......................................................................................248
Trace, recording communication sequences..........................................................................................................250
Time zones ..................................................................................................................................................................252
Landline notification centre..........................................................................................................................................252
GSM network notification centre..................................................................................................................................253
SMS notification......................................................................................................................................................253
Email notification/email setup......................................................................................................................................254
Index..............................................................................................................................................................................256

Quickstart guide
6
Quickstart guide
Target audience
The instructions for installers aim to help navigate the
individual menus of the program interface.
These instructions are aimed at trained technicians that
have taken an ABUS Security-Center GmbH & Co. KG
seminar and acquired the necessary fundamental
knowledge about the following:
Installing the wireless alarm system.
Installing peripheral devices for the wireless alarm
system (e.g. detectors, sirens, GSM/GPRS module,
surveillance cameras).
Configuring peripheral devices for the wireless alarm
system
These instructions for installers provide an overview of
the setting options in the individual menus.
Installing Secvest
The installation of the Secvest wireless alarm system is
described in chapter Mounting/Installation from page 21.
Additional information can be found in the document
supplied in the scope of delivery, "Quick Guide
FUAA50000".
The installation/user manual can also be downloaded as
a PDF document.
Link to download the document:
www.abus.com/ger/products/FUAA50000
Configuring Secvest
The configuration of the wireless alarm system is
described in chapter Configuration from page 27.
Secvest function test
After installation and configuration, perform a complete
function test for all systems and components.
Train the user in the basic operation of the system:
Logging in/out
Arming/disarming the system
Operating the Secvest and remote control.
Create a handover log
Note
Follow the instructions in user training in the
appendix.

Safety information
7
Safety information
Explanation of symbols
The following symbols are used in this manual and on the
device:
The following conventions are used in the text:
Meaning
1. …
2. …
Required action to be carried out in a set order
…
…
List without a set order, given either in the text
or warning notice
Intended use
Only use the device for the purpose for which it was built
and designed! Any other use is considered unintended.
This device may only be used for the following
purpose(s):
intruder alarm system, alarm system.
General
Before using this device for the first time, please read the
following instructions carefully and observe all warning
information, even if you are familiar with the use of
electronic devices.
Danger
All guarantee claims are invalid in the event of
damage caused by non-compliance with these
instructions.
We cannot be held liable for resulting damage.
Danger
In the event of personal or material damage
caused by improper operation or non-compliance
with the safety information, we cannot be held
liable.
All guarantee claims are void in such cases.
Retain the accompanying quick start guide for future
reference.
If you sell or pass on the device on to third parties,
you must include this quick start guide with the device.
This device has been manufactured in accordance with
international safety standards.
Note
S/W >=1.01.02
During the initial set-up of the alarm control panel there
is neither a predefined standard installer code nor
a predefined standard administrator code. These
need to be individually assigned in the set-up wizard.
After the initial start-up please change the default installer
name (Code = name) as well as the default administrator
name (code = name) to secure user names. When
adding users, please make sure you are careful about
how log-in details are handled.
Handling log-in details for your security systems
Symbol
Signal
word
Meaning
Danger
Indicates a risk of injury or
health hazards.
Danger
Indicates a risk of injury or
health hazards caused by
electrical voltage.
Important
Indicates possible damage to
the device/accessories.
Note
Indicates important information.

Safety information
8
Basics:
User names and codes for logging into security
systems should be known only by the legal owners
and never given out to unauthorised parties.
If you have to pass this information on via email,
please take care to send the user name and code in
two separate emails.
User names and codes should be changed regularly.
Standards
User names must be at least eight characters long.
They should ideally contain characters from at least
three of the following categories: uppercase letters,
lowercase letters, special characters, and numbers.
User names should never contain your own name,
the name of a family member, your pet, your best
friend or your favourite celebrity, or your hobby or
date of birth.
Avoid using user names and codes that you use on
other websites or that could be easily guessed by
others.
Your user name should not be able to be found in
a dictionary and should never be a product name.
It should not be a conventional series of characters,
a repeated pattern or a keyboard pattern, such as
asdfgh or 1234abcd.
You should avoid only using numbers at the end of
your user name or using one of the more typical
special characters (! ? #) at the beginning or end to
compensate for an otherwise simple user name.
User names and codes should be changed at least
every 180 days.
New user names and codes should not be identical
to any of the three combinations used before them.
New user names and codes should differ from user
names and codes that have been used before by at
least two characters.
Macros and scripts should not be used to input user
names and codes.
Power supply
To prevent a fire risk or risk of electric shock, do not
expose the alarm panel or the components to rain or
other sources of moisture.
Do not commission the device near bathtubs,
swimming pools or areas where water is splashed
around.
Do not alter the device.
Discontinue use of damaged devices or accessories.
Using the device for purposes other than those
described may damage this product and may also
lead to hazards such as short circuits, fire or electric
shock.
Note
Connection to the public electrical grid is subject
to your country’s specific regulations.
Please seek information on these regulations
before connecting the product to the public grid.
If the device is brought into a warm environment from
a cold environment, condensation may form on the
inside of the device. In this case, wait about an hour
before commissioning the device.
Disconnect the device from the power supply before
carrying out maintenance or installation work.
Danger
Alterations or modifications to the device
invalidate the guarantee.
Danger
The alarm panel is supplied power via an
integrated power supply unit.
The power supply unitis connected to the
building’s 230 V AC grid via a separately secured
line.
Connection to the building’s grid is subject to the
country’s specific regulations.
The backup power supply is ensured through an
internal battery.
Always replace fuses with fuses of the same type,
never higher.
Danger
Mount the device safely to a dry point in the
building.
Ensure there is sufficient ventilation for the alarm
panel.
Do not expose the alarm panel to temperatures
below 0°C or higher than 50°C.
The alarm panel is designed for indoor use
only.
The maximum humidity must not exceed 90%
(non-condensing).
Ensure that no metal objects can be inserted into
the alarm panel from the outside.
Disconnect the alarm panel from the power supply
before any work is carried out on the device.
On alarm panels in general
Incorrect or unclean installation work may lead to
erroneous interpretation of signals and therefore
false alarms.
The operator is liable for any costs incurred for
involving rescue services such as the fire brigade
or police.

Safety information
9
For this reason, read these instructions carefully
and ensure that lines and components used are
labelled precisely when the system is installed.
Wireless operation
Note
No wireless licence is required for Secvest and its
components.
The send/receive properties could be affected by
other signals (e.g. DECT telephones).
The wireless devices in this system have been
tested by an independently accredited laboratory
for RED Directive 2014/53/EU or for R&TTE
certification.
Mounting location of the alarm panel
Note
The alarm panel should be positioned in a safe
place out of sight of possible intruders and easily
accessible to the operator.
The alarm panel should be mounted on a flat
surface in order to ensure that the back of the
device cannot be tampered with when the alarm
panel is mounted.
The alarm panel should be mounted at
a comfortable height (between 1.5 and 2 m).
Note
If small children are present, the alarm panel
should be mounted out of their reach.
Note
Position the alarm panel so that signal tones
can be heard even outside of the area being
monitored.
The alarm panel should be positioned within
a monitored zone so that an unauthorised person
would have to enter a monitored area first before
gaining access to the panel when it is armed.
The alarm panel should be mounted near a socket
or power supply.
If the telephone dialler is used, the alarm panel
must be connected to a telephone connection.
The alarm panel should be mounted at least
1 metre away from metal objects (e.g. mirrors
or radiators).
Processing priority
Note
If several detectors are activated at the same time,
the alarm control panel always processes panic
zones (panic transmitters) and normal alarms
(burglar alarms) first, followed by fire zones
(smoke alarm devices) and then followed by
all other zone types (alarm types)
The alarm control panel always processesalarms
ahead of warnings (fault messages).

Device overview
10
Device overview
Device front
No.
Name/function
No.
Name/function
1
Status display
Display of status and menus
5
Arm button
Monitoring of all available areas is activated
(device armed).
2
Confirmation buttons
Used to navigate to a higher/lower menu level or
to select options or to exit a menu
6
Disarm button
Monitoring is deactivated (device disarmed).
3
Navigation buttons
Used to navigate up/down
7
Proximity reader
Reader for the proximity keyfob. Hold the keyfob
in front of the ABUS logo.
4
Internal arm button
Perimeter monitoring is activated
(device armed internally).

Device overview
11
International key assignment

Device overview
12
Device rear (mounting plate)
No.
Name/function
No.
Name/function
1
Mounting opening for screws
8
Connection for LAN cable
2
Housing tamper switch
9
Connection for mains voltage 110 V/230 V AC
50/60 Hz
3
Code reset PINs , see note below
10
Micro SD card holder
4
Connection for optional GSM module
(FUMO50000)
11
Fuse holder for mains fuse
5
Connection for ribbon cable
12
Holes for plastic holder for optional GSM
module
6
Connections for battery pack
13
USB mini-B
7
Analogue telephone connection
Note
Code reset PINs
If user 1 and/or installer codes are no longer known, all user settings can be deleted.
All users, all proximity tags, all remote controls and all emergency buttons will be deleted. After the reset you will be
prompted to enter a new installer code and a new administrator code.

Device overview
13
1. If possible, go to installation mode.
Note:
If you cannot go into installation mode, the alarm panel will sound a tampering alarm when you open the
housing.
2. Open the housing. Disconnect the entire power supply (mains voltage and batteries).
Note:
This procedure will not work if the tamper switch on the cover is closed.
3. Identify the reset code PIN on the motherboard (see illustration above).
4. Shortly close both of the reset code PINs. Use a screwdriver or jumper to do so. Leave the short circuit until step 6.
5. Reconnect the mains voltage. After a short pause, the system will start. The alarm panel will now delete all user
information and will start with the reallocation of your new installer code and administrator code (like in the start
wizard).
6. Remove the short circuit on the reset code PINs.
7. Reconnect to the battery.
8. Close the alarm panel cover and therefore also the tamper switch.

Introduction
14
Introduction
Terms and definitions
Access level 1-4
Access level 1-4, also known as level 1-4,
In accordance with
EN50131-1 Section 8.3.1
EN50131-3 Section 8.3.1
EN50136-2 Section 5.2
EN50136-3 Section 6.2
Access level 1
Access for all
Access level 2
User access, e.g. via a controller
Access level 3
User access, e.g. via personnel from a security
company
Access level 4
User access, e.g. via the device manufacturer
Note:
In the event of changing operating software, access level
4 is applied, without activating a tampering device on the
alarm control panel or the additional operating device.
Active intrusion protection
Even an attempt to break in is reported. This can be
done using alarm components that not only combine
state-of-the-art wireless technology with effective
mechanical intrusion protection (mechatronic detectors),
but also monitor attempts to open a door or window
using a lever via innovative magnetic field sensors.
Alarm and relay command centre
See ARC
Alarm panel
The switching panel of the entire alarm system, which
processes all information, forwards it and responds as
necessary.
Alarm system
Common term for a burglar alarm system or danger
alarm system.
Alarm type
Alarm systems may have the following alarm types:
internal, local, external or silent.
Alarm zone
A detector (wireless) or detector group (wired) is
monitored via each zone and can be programmed
separately.
ARC
Receiving centre; in an alarm receiving centre,
messages collected in connected subscriber zones,
e.g. from danger alarm systems or building technical
equipment, are transmitted, received, documented and
processed, and intervention is provided, via the power
supply of the network operator (leased lines), the public
telephone network, Datex-P/X.25/X.31, IP, GSM, ISDN,
or in Switzerland, via TUS (Alarmnet). Receiving centre
from private security service providers also control call
for intervention services (police/fire brigade).
Arm components
Devices that can be used to arm/disarm the alarm panel
(e.g. remote control, key switch, control device).
Arming, disarming
Activating/deactivating the alarm panel.
Arming, disarming
"Activation" of the alarm panel –the panel triggers an
alarm if an intrusion is detected (e.g. a door is opened);
"deactivation" of the alarm panel –the panel does not
trigger an alarm if an intrusion occurs. Danger detectors
are programmed differently: if smoke is detected, for
example, an alarm is triggered even if the alarm panel
is disarmed.
Bidirectional 2-way wireless (2WAY)
Unidirectional: components (e.g. remote control) and
control modules only transmit commands to the alarm
panel. Bidirectional: components can both receive the
feedback from the alarm panel and evaluate it (e.g. via
LED displays).
BS8243
British standard BS8243 describes a set of methods for
reducing false alarms generated by intruder and hold
up alarm systems.
Certifications
Inspection seal from an independent body that
ensures the high quality and safety of alarm systems
(in Germany the following are relevant: certification
as per POS in accordance with accident prevention
regulations and VdS loss prevention)
Chip key/proximity keyfob/Prox Tag
Electronic "key" for quick access to the building without
code entry.
CLIP
Calling Line Identification Presentation

Introduction
15
Coding of wireless signals
Ensures secure transmission of signals without
manipulation or tampering between the alarm panel and
its components.
Combination signalling device
Combined sounder, e.g. siren (acoustic signal) + strobe
(visual signal).
Communication options
Used to transmit alarm notifications using additional
routes, e.g. wirelessly (GSM module) for voice/text
messages or digital protocols.
Components
See system components
Contact ID, CID
Protocol for transmitting data to an ARC (alarm receiving
centre).
Danger alarm system, danger alarm system
Alarm system that triggers an alarm for additional
dangers/emergencies as well as intrusion.
Danger detector
Device that sends a message to the alarm panel when
a certain event occurs (e.g. movement, glass breakage,
vibrations).
DD243
British requirement for sequential alarm confirmation.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is
a communications protocol in computer technology.
It facilitates the assignment of the network configuration
to clients through a server.
DHCP makes it possible to automatically integrate
a computer into an existing network without having to
configure it manually. The client usually only has to be
set to obtain the IP address automatically. When the
computer starts on the network, it is automatically
assigned an IP address, subnet mask, gateway and
DNS server by the DHCP server. Without DHCP some
additional settings are required depending on the
network to which the computer is connecting.
Display
Display field on the alarm panel for operating and
configuring the panel.
DNS
The Domain Name System (DNS) is one of the most
important services in many IP-based networks. Its main
task is to respond to name conversion requests.
The DNS works like a telephone directory enquiries
centre. The user knows the domain (the "friendly"
computer name on the IP network), such as
"example.org". The user sends this domain as the query.
The URL is then converted by the DNS into the
associated IP address (the "connection number" on the
IP network), e.g. an IPv4 address in form 192.168.2.21
and directs it to the correct computer.
Double end of line (DEOL)
Wiring version for wired alarm systems; wired zones
also take on this configuration.
DTMF
Dual Tone Multi-Frequency
Dual tone multi-frequency
The multi-frequency dialling method is commonly used
by analogue telephone systems.
EN50131
European standard for alarm systems, "Intrusion and
hold up systems"
End of line (EOL)
End point of the line system, end point of access to
telephone network.
The line end point or "building distribution for telephone
lines" is the end of the distribution cable for the
consumer connection line within the telephone network.
External alarm
(Alarm type)
Alarm to which all sounders (internal and external)
respond when triggered. An alarm receiving centre
is also notified of the event.
Fast Format, FF
Protocol for transmitting data to an ARC (alarm receiving
centre).
Flood detector
For detecting water damage and flooding, consisting
of a basic device and water sensor. The sensor is
always mounted at a point where flooding would first
start to incur water damage.
Force Set
Zones with this attribute, if opened, are automatically
omitted when the alarm system or a partition is armed.
Glass breakage detectors
These detectors respond to breaking glass. There are
passive, active and acoustic glass break detectors.
GSM
Global System for Mobile Communications (previously
Groupe Spéciale Mobile), a standard for fully digital
wireless mobile networks, mainly used for telephony
but also for line and packet-based data transmission
and short text messages (SMS).

Introduction
16
HTTPS
HyperText Transfer Protocol Secure, a communications
protocol on the web, used to transfer data securely.
HTTPS is used online to establish confidentiality and
integrity in communications between web server and web
browsers (clients). This is achieved through encryption
and authentication.
Without encryption, data transmitted over the internet can
be read as plain text by anyone who has access to the
corresponding network.
IMEI
International Mobile Station Equipment Identity, a unique
15-digit serial number which can be used to uniquely
identify each GSM or UMTS end device.
IMSI
International Mobile Subscriber Identity, used in GSM
and UMTS wireless mobile networks to uniquely identify
network subscribers (internal subscriber identification).
In addition to other data, the IMSI is saved on a special
chip card known as a SIM (Subscriber Identity Module).
The IMSI number is uniquely assigned worldwide to each
customer by the wireless mobile network operators.
The IMSI has nothing to do with the telephone number
assigned to the SIM card.
Individual identification of detectors
Makes it possible to determine exactly which detector
has triggered (see also wireless alarm zone).
Indoor siren
Sounder for indoor use, usually a purely acoustic
sounder (in addition to outdoor sirens).
Installation
Mounting of the alarm panel and components, including
commissioning.
Interior protection
The indoor area of the premises is protected here,
especially areas that an intruder most likely has to enter;
motion detectors and light barriers are usually used here.
Internal alarm
Alarm sounds only within the building. The outdoor sirens
do not sound.
Intruder alarm system, burglar alarm system
Alarm system that detects an intrusion and triggers an
alarm.
Intuitive operation
Easy operation of a device using a menu that is logical
from the point of view of the user.
IP
Internet Protocol, a network protocol widely used in
computer networks.
Jamming
Interference that makes normal reception of wireless
emissions of electromagnetic waves difficult or
impossible. The source of interference sends out energy
in the form of electromagnetic waves, just like the
instruments affected by the interference, which overlap
the original waves either partially or completely.
Level 1-4
See access level 1-4
Line
Another term for zone, mainly used in wired areas.
Local alarm
(Alarm type)
If this alarm is triggered the sounders indoors and
outdoors sound (outdoors the acoustic alarm (siren) must
stop after 3 minutes if in Germany, but the visual alarm
(strobe) can remain on).
MAC
The MAC address (Media Access Control, Ethernet ID)
is the hardware address of every single network adaptor,
used to uniquely identify the device in the network.
Medical emergency
Personal medical emergency, for which help can be
arranged using an alarm.
Motion detectors
Detector used to identify people by thermal movement
(PIR), ultrasound (US) or microwave/radar (MW).
NC
Normally Closed; contact or switch that opens when
actuated
NO
Normally Open; contact or switch that closes when
actuated
NTP
Network Time Protocol
The Network Time Protocol (NTP) is a standard for
synchronizing clocks in computer systems via packet-
based communication networks. NTP uses the UDP
connection free transport protocol, which was specially
developed to facilitate reliable time setting across
networks with variable packet run times.
Generally, references to NTP refer to both the protocol
and its software reference implementation. The SNTP
(Simple Network Time Protocol) represents a simpler
form of the NTP.

Introduction
17
Opening detector
A detector that identifies when a window, door, shutter,
garage door, etc. is opened.
Outdoor siren
Sounder for outdoor use, usually designed as a
combination sounder (siren + strobe).
Overlapping signal
See jamming.
Partitions
An alarm system can be divided into sub-areas
(partitions), each of which functions separately as an
individual alarm system.
Each sub-area (e.g. apartment, workshop) can be
operated and configured separately and can contain
any number of zones/detectors.
Perimeter protection
All points of access to the premises are monitored,
including house doors, terrace doors, cellar doors,
skylights and all windows. Usually magnetic contacts,
glass breakage detectors and wireless window/door locks
are used. The building’s occupants can still move around
freely within the building when the alarm system is armed
internally.
Perimeter surveillance
Continuous monitoring of large areas of open land
around the periphery or the areas used for approaching
the property, e.g. using light barriers and motion
detectors on the premises and/or surveillance cameras
with intelligent motion detection.
Port
Part of a network address.
Programming
Detailed settings for the alarm panel according to the
user’s requirements (e.g. zones/sub-areas can be
defined).
Protected outdoor area
Area outside of the buildings that is protected from heavy
rain (e.g. a covered entrance area or terrace).
PSTN
Public Switched Telephone Network, analogue, a/b
Receiving centre
See ARC
Relay outputs
Switching outputs for external devices (lighting control,
electric shutters, other sounders, etc.)
Remote access/remote configuration
Servicing/configuration of the alarm panel from outside
of the monitored premises (e.g. via the internet).
Rolling code (RC)
Rolling code is a technology which provides optimum
protection against code scanning and code grabbing
in order to prevent unauthorised access.
Sabotage
See "Tampering"
Scancom
A social care alarm protocol.
Scancom is the same as Scanfast, except for channel 8.
Channel 8 in this case is used to establish a 2-way voice
connection between the alarm panel and the alarm
receiving centre.
Scanfast
A social care alarm protocol
Scanfest is the same as Fast Format, except that in this
case only channel 2 (social care alarm) and channel 3
(inactivity) are used. Channels 1, 4, 5, 6, 7, 8 are always
"5" (unused).
SD card, micro SD card
Micro SD storage card for saving:
Application software in the INSTALL folder
Language files in the INSTALL folder
Images from the TVIP41550 in the IMG_X folder
Traces in the TRACE folder
A circular buffer function is integrated for images, etc.
The alarm panel checks whether the storage is full or not
every minute.
If the SD card is full, the oldest recordings will be
automatically deleted. However, you will still receive the
error message “SD card full”. In order to confirm this error
message, data must be manually deleted from the SD
card.
Security frequency band
(868 MHz)
This frequency range is approved by the authorities
for the security field. Signals from wireless earphones,
mobile phones, garage door openers, etc. cannot
interfere with devices operating in these ranges.
Europe: frequency use specification of the European
Conference of Postal and Telecommunications
Administrations (CEPT)
Germany: Bundesnetzagentur (BNetzA) –Federal
Network Agency for Electricity, Gas,
Telecommunications, Post and Railway
Austria: the frequency use plan is published by the
Federal Ministry for Traffic, Innovation and Technology

Introduction
18
Switzerland: the frequency use plan is set out in the
Swiss National Frequency Assignment Plan (NaFZ) and
published by the Federal Office of Communications
Seismic sensor
See shock detector.
Server
A program that waits for contact from a client in order to
perform a certain service.
SHA
SHA-2 (secure hash algorithm) is the general term for the
four cryptological hash functions, SHA-224, SHA-256,
SHA-384 and SHA-512, which were standardised in 2001
by the American NIST as a successor to SHA-1.
Shock detector
This detector identifies vibrations that occur when an
attempt to break in is made.
SIA
Protocol for transmitting data to an ARC (alarm receiving
centre).
SIA-IP (DC-09)
An IP-based protocol for transmitting data (e.g. FF, SIA
or CID) to an ARC.
Signal generator
Sounder that triggers an alarm when it receives
a corresponding command from the alarm panel (siren,
strobe, etc.)
Silent alarm
(Alarm type)
This alarm does not trigger any sounders (indoors and
outdoors remains quiet and calm), but a monitoring
station is discreetly notified (intruder is not scared off,
rather caught in the act, aggressive intruders are not
provoked, etc.)
SIM
Subscriber Identity Module, a chip card for mobile
telephones
Smoke alarm device
Optical smoke alarm devices save lives, as they respond
to smoke particles in the air (usually poisonous gases).
Heat detectors/heat difference detectors respond to
a maximum temperature (e.g. 65°C) or a rapid increase
in temperature.
SMS
Short Message Service, text message;
a telecommunications service for transmitting text
messages, first developed for GSM wireless mobile
networks and now available on landlines as well.
SMSC
Short Message Service Centre
F-SMSC = SMSC for landlines
SMTP, SMTP server
Simple Mail Transfer Protocol
An internet protocol used to exchange email in computer
networks.
It is mainly used to send and forward email. Other
specialised protocols such as POP3 or IMAP are used
to retrieve messages.
SMTP servers use conventional connections to port 25
("smtp"). Newer servers also use port 587 in order to
receive mail for authenticated users that must be sent
to other mail servers ("submission").
SNTP
Simple Network Time Protocol
The Network Time Protocol (NTP) is a standard for
synchronizing clocks in computer systems via packet-
based communication networks. NTP uses the UDP
connection free transport protocol, which was specially
developed to facilitate reliable time setting across
networks with variable packet run times.
Generally, references to NTP refer to both the protocol
and its software reference implementation. The SNTP
(Simple Network Time Protocol) represents a simpler
form of the NTP.
Sounder
Device that sends an alarm message acoustically (siren)
or visually (strobe). Even diallers are sounders.
SSL
Secure Sockets Layer, a network protocol for the secure
transmission of data.
Transport Layer Security (TLS), widely known under its
previous designation, Secure Sockets Layer (SSL), is
a hybrid encryption protocol for secure data transmission
on the internet. Since version 3.0, the SSL protocol has
been further developed and standardised under the new
name TLS, where version 1.0 of TLS corresponds to
version 3.1 of SSL.
TLS encryption is mainly used today with HTTPS. Most
web servers support TLS 1.0, and many also support
SSLv2 and SSLv3 with a number of encryption methods.
Status feedback
Feedback from the alarm panel to a module (arming
device, info module, etc.) about its current status.
Status query
Query sent to the alarm panel about the system status
(e.g. by pressing the button on the wireless remote
control).

Introduction
19
Status
Alarm panel status: armed, internally armed or disarmed.
Supervision
The alarm panel monitors whether detectors are present
and active. The components report approx. every 4 min.
The alarm panel responds if it fails to receive status
messages over a longer period of time.
TAE
The Telekommunikations-Anschluss-Einheit
(telecommunications connection unit) is a type of
connector used in Germany for telephone connections.
It is used as a connection to the public telephone network
or as an a/b interface for analogue telephone
connections to additional devices.
Tampering, tampering protection, sabotage
So that the alarm panel and its components cannot be
tampered with, each component is monitored for
tampering. Opening a detector and disconnecting cables
ALWAYS triggers an alarm. The components are usually
protected by a cover contact (alarm when detector is
opened) and an anti-removal wall contact.
TAP
Telocator Alphanumeric Protocol, a transmission protocol
for SMS messages
Technical damage
For example, water damage or escaped gas (protection
against these things is only provided by special danger
detectors).
Telephone dialler
Device used to send alarm messages from a alarm panel
by telephone line. Telephone diallers can be integrated in
alarm panels or added as additional components.
Tunstall
A social care alarm protocol
UCP
Universal Computer Protocol
User guidance
Electronically guided help for operating the alarm panel.
User
Different users of the alarm system (e.g. owners, tenants)
can be assigned separate rights and user codes.
VdS
Verband der Schadensversicherer (German Association
of Insurers against Loss or Damage); defines guidelines
for different safety and security levels.
VDS-A for the non-commercial sector
VDS-Home for home risk management systems
VDS-B for the commercial sector
VDS-C for banks and jewellers (high-risk commercial
entities)
Voice dialler
Component in the alarm panel for transmitting voice
messages. The alarm information is transmitted in plain
text. The text to be transmitted is recorded using a
microphone on the alarm panel.
Wired detector, wired detectors
Alarm and danger detectors that are connected via wire
to the alarm panel.
Wired zone, wired alarm zone
Alarm zone monitored via one or more wired detectors
(usually switched in series).
Wireless alarm system
Alarm system with detectors that are connected to the
alarm panel wirelessly (quick and easy installation, high
flexibility).
Wireless alarm zone, wireless zone
Zone of the wireless alarm panel that is used to identify
and monitor every individual wireless detector
Wireless control panel
For convenient arming/disarming of the alarm panel,
e.g. in another room (in entrance area etc.) The status
can be queried if a bidirectional wireless control device
is used.
Wireless detector
Alarm and danger detectors that are connected
wirelessly to the alarm panel.
Wireless key switches
For convenient arming/disarming of the alarm panel
without entering a code (using a key).
Wireless range
The max. distance between the alarm panel and wireless
detector varies depending on the properties of the
building.

Introduction
20
Wireless Remote Control
For convenient arming/disarming of the alarm panel,
status query, emergency alarm, etc. regardless of the
user’s location.
Wireless window lock/wireless door lock
Combination of mechanical lock and electronic detector.
Pry-attempt monitoring is also possible. i.e. even
attempts to break in are detected.
Zone
Another term for a line. Describes a closed circuit to
which alarm or tamper contacts are connected, which are
then connected to the alarm panel. With wireless zones
usually one zone is used per detector.
Other manuals for SECVEST
5
Table of contents
Other Abus Security System manuals

Abus
Abus Terxon SX User manual

Abus
Abus PPIC35520 User manual

Abus
Abus Terxon SX AZ4000 User manual

Abus
Abus FU2938 User manual

Abus
Abus FU8110 User manual

Abus
Abus TVVR30004 User manual

Abus
Abus Alarmbox 2.0 User manual

Abus
Abus Eyseo ECOLINE TV7026 User manual

Abus
Abus TVAC71070 User manual

Abus
Abus 56829 9 User manual