
User’s Manual
IV
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Introduction ............................................................................................................................................................................................ 1
1.1 Overview........................................................................................................................................................................................ 1
1.2 Technical Specifications......................................................................................................................................................... 1
2 Checklist.................................................................................................................................................................................................... 3
3 Appearance ............................................................................................................................................................................................. 4
4 Adding the Keypad to the Hub...................................................................................................................................................... 2
5 Installation............................................................................................................................................................................................... 3
6 Configuration ......................................................................................................................................................................................... 5
6.1 Viewing Status ............................................................................................................................................................................ 5
6.2 Configuring the keypad ......................................................................................................................................................... 6
7 User Management................................................................................................................................................................................ 8
7.1 Adding Users................................................................................................................................................................................ 8
7.2 Adding Card.................................................................................................................................................................................. 9
7.2.1 Adding Card on the User Manager......................................................................................................................... 9
7.2.2 Adding Card in the Accessory List.......................................................................................................................... 9
8 Operations .............................................................................................................................................................................................11
8.1 Frequently Used Commands..............................................................................................................................................11
8.2 Waking Up the Keypad .........................................................................................................................................................11
8.3 Arming ..........................................................................................................................................................................................11
8.4 Disarming ....................................................................................................................................................................................12
8.5 Searching for the Room Status .........................................................................................................................................12
Appendix 1 Cybersecurity Recommendations........................................................................................................................14