
2
Table of Contents
INTRODUCTION...................................................................................................................3
General Information..........................................................................................................3
Type of Telephone Required..............................................................................................3
TeleCommand User Code..................................................................................................3
OPERATING INSTRUCTIONS............................................................................................4
Introduction........................................................................................................................4
ACCESSING THE SECURITY
SYSTEM USING AN ON-PREMISES TELEPHONE.........................................................5
ACCESSING THE SECURITY
SYSTEM USING AN OFF-PREMISES TELEPHONE .......................................................6
EXECUTING SECURITY SYSTEM COMMANDS .............................................................8
General ...............................................................................................................................8
COMMAND FUNCTIONS AND CONFIRMATION
OF SUCCESSFUL SECURITY SYSTEM COMMAND ENTRY.........................................9
ADEMCO Security System Commands That May Be Executed ....................................9
FBII Security System Commands That May Be Executed ...........................................10
EXAMPLE OF A CALL-IN FROM AN OUTSIDE TELEPHONE....................................11
TELEPHONE ACCESS RESTRICTIONS..........................................................................12
On Premises .....................................................................................................................12
Off Premises.....................................................................................................................12
SYSTEM STATUS REPORTS.............................................................................................13
Fire Alarm........................................................................................................................13
Burglary and other Alarms .............................................................................................13
Checks...............................................................................................................................13
Power Status ....................................................................................................................13
Arming Status..................................................................................................................14
Zone Faults.......................................................................................................................14
CONDITIONS THAT TERMINATE A TELECOMMAND SESSION.............................15
MISCELLANEOUS FUNCTIONS......................................................................................16
Using the Trigger Function.............................................................................................16
Accessing Other Partitions.........................................................................................16
Programming Zone Descriptors ......................................................................................16
Protection Against Outside Tampering..........................................................................17
IF YOU HAVE DIFFICULTY WITH TELEPHONE ACCESS TO THE SECURITY
SYSTEM................................................................................................................................18
IF YOU HAVE TROUBLE WITH YOUR NORMAL TELEPHONE SERVICE...............19