DAITEM ALARM SYSTEM AND DIALLER User manual

ALARM SYSTEM
AND
DIALLER
PRODUCTS
USER GUIDE

2
You have just bought a DAITEM security system, designed to cover
all your protection needs. We would like to thank you for your
confidence.
• The installation of your system should be carried out according to applicable national standards. f your system is to be
powered by 230 VAC mains power the connection must be carried out by a certified electrician.
• Your security system is simple to use. We advise you to switch it on (arm it) every time you leave your home.
• Do not leave your remote control in view.
• Keep a back-up remote control in a secret place.
• f one of the devices in your system is lost, stolen or sabotaged, call your installer right away.
• Keep the access codes to your control keypads secret.
• Switch your security system to partial protection mode to protect unoccupied rooms.
• Close all the protected doors and windows.
• Switch on (arm) your security system.
• f necessary, check for any fault indications or entrances left open.
When you leave home
• Check that all doors and windows are closed.
• Check your security system is operating properly by performing a real test on the system.
• Switch on (arm) your system.
When you’re going to be away for a while
Precaut ons
nstalling a dialler unit on the control panel (which does not have one when delivered) or installing a separate dialler in your
home can provide your installer with remote access to your alarm system. This will allow your installer to:
• perform maintenance operations,
• modify parameter settings,
• download data via the internet according to the conditions described in the dialler product user manual. t is up to your
installer to define with you the specific contractual conditions for accessing your system.
Important
f you have any comments about how we might improve our guides and our products, we would be grateful if you could
send them in writing to: Daitem - Service consommateur
rue du Pré de l’Orme - F-38926 CROLLES cedex
We would apprec ate your suggest ons
PRODUCT APPLICATION
The equipment marketed by DA TEM is designed to contribute to the protection and comfort of homes and some
professional premises or to contribute to the protection and wellbeing of persons, according to the technical limits and
environments described in the documentation supplied by DA TEM and recommended by the retailer.
CE MARKING AND REGULATIONS
The products marketed by DA TEM comply with the essential requirements of the applicable European directives. CE
marking certifies that the products comply with these directives and the standards that define the technical specifications to
be applied.
Your retailer will provide you with the conditions under which the manufacturer’s guarantee and after-sales service apply.
Disposing of waste electrical and electronic devices at the end of their service life (Applicable in European Union countries and other
European countries with a waste collection system). This symbol on products or product packaging indicates that the product must not be
thrown out with normal household waste. t must be taken to an appropriate collection point for recycling waste electrical and electronic equip-
ment. By disposing of such products in the appropriate manner, you are helping to prevent any harmful effects they may have on the environment
and human health. For further information about recycling this product, you should consult your local authorities, waste collection centre or the shop
where you bought the product.
DA TEM shall in no way be held responsible for the consequences of the temporary or permanent unavailability of the SPTN
switched public telephone network, the GSM/GPRS mobile network or the Ethernet (ADSL) network. Some features are only
available with control panel versions 2.0.0 or later.
Enter on your control panel keypad to check!
Warn ng
master code
(factory: 0000)

3
Contents
ALARM SYSTEM USER GUIDE
1. Operating your security system.......................................................................................................................................... 4
1.1 Arming or disarming the system....................................................................................................................................... 4
1.2 Deactivating the exit time delay when the last exit is closed.......................................................................................... 4
1.3 Disarming the system under duress (this feature is only available with a remote monitoring service) ......................... 4
1.4 Arming or disarming one or several groups..................................................................................................................... 5
1.5 Partially arming the system............................................................................................................................................... 5
1.6 Arming the system in presence mode.............................................................................................................................. 6
1.7 Arming the system when a door or window is open....................................................................................................... 6
1.8 Automatic timed Arm/Disarm ........................................................................................................................................... 7
1.9 System reactivation........................................................................................................................................................... 7
2. The keypads transfer information about the control panel status................................................................................ 8
3. Configuring the system locally using the keypad built into the control panel ............................................................ 9
3.1 Modifying the language..................................................................................................................................................... 9
3.2 Modifying the date and time............................................................................................................................................. 9
3.3 Modifying your master code ............................................................................................................................................. 9
3.4 Modifying the user codes ............................................................................................................................................... 10
3.5 Disabling or enabling the user codes............................................................................................................................. 10
4. Restricting access to commands..................................................................................................................................... 10
4.1 Restricting access using the user codes ....................................................................................................................... 10
4.2 Restricting access using the tags................................................................................................................................... 11
4.3 Disabling or enabling a tag ............................................................................................................................................. 11
5. Testing the devices............................................................................................................................................................. 12
6. Performing a real test on the system .............................................................................................................................. 13
7. The control panel indicates alarms.................................................................................................................................. 14
8. The control panel indicates faults .................................................................................................................................... 15
9. Consulting the events log.................................................................................................................................................. 16
10. Additional keypad functions............................................................................................................................................ 17
10.1 Querying the status of your system ............................................................................................................................. 17
10.2 Triggering an alarm (if keypad button has been reprogrammed)................................................................................ 17
10.3 Triggering a silent alarm (if keypad button has been reprogrammed) ........................................................................ 17
DIALLER PRODUCT USER GUIDE
Foreword .................................................................................................................................................................................. 18
1. Introduction.......................................................................................................................................................................... 19
1.1 Operation for outgoing calls ........................................................................................................................................... 20
1.2 Operation for incoming calls........................................................................................................................................... 20
2. Configuring a dialler locally using the built-in keypad.................................................................................................. 21
2.1 Modifying the language................................................................................................................................................... 21
2.2 Modifying the date and time........................................................................................................................................... 21
2.3 Modifying your master code ........................................................................................................................................... 21
2.4 Modifying your video code (GSM/GPRS - Ethernet ADSL) .......................................................................................... 22
2.5 Enabling or disabling remote access via the nternet (mains-powered GPRS - Ethernet ADSL) ............................... 22
2.6 Recording or modifying the personalised welcome message for vocal transmissions (PSTN-GSM) ........................ 23
2.7 Modifying the numbers of individual correspondents (PSTN - GSM) .......................................................................... 23
3. Outgoing calls ..................................................................................................................................................................... 24
3.1 Dialler call cycle procedure............................................................................................................................................. 24
3.2 Procedure for voice calls to individuals (PSTN - GSM)................................................................................................. 25
3.3 List of commands possible during listen-in period ....................................................................................................... 25
3.4 List of voice messages and SMS transmitted to an individual correspondent according to the type of event
(PSTN - GSM).................................................................................................................................................................. 26
3.5 Procedure for calls to a remote monitoring centre (PSTN-GSM/GPRS - Ethernet ADSL).......................................... 27
4. Incoming calls ..................................................................................................................................................................... 28
4.1 Voice remote operation over the telephone via the PSTN or GSM network (mains-powered)................................... 28
4.2 Configuring and operating the dialler from a PC connected via nternet (mains-powered GPRS - Ethernet ADSL). 30
4.3 Remote operation over SMS via the GSM network (mains-powered) ......................................................................... 31
5. Testing calls to your correspondents (PSTN-GSM/GPRS- Ethernet ADSL) .............................................................. 32
6. Instructions sheet (to be completed and given to your correspondents).................................................................. 33
DAITEM GUARANTEE AND EXTENSION CONDITIONS .............................................................................................. 35

4
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
1. Operat ng your secur ty system
The control panel can operate up to 8
intrusion protection groups (depending
on the type of control panel) either
individually or at the same time.
• Using a remote control:
or
1.1 Arming or disarming the system
1.2 Deactivating the exit time delay when the last exit is closed
Armed: all groups armed
“bip, Armed”
Off: All groups disarmed
“bip, Off”
• Using a control keypad:
Using a keypad:
+ or
or and
master code
Using a vocal keypad with tag reader and proximity detector
G4 G3
G1G2
master code
Group disarmed
Group armed
This function allows users to quietly alert a correspondent when they are forced to disarm their alarm system by an intruder.
The system behaves as if it is being disarmed but sends a specific silent alarm message via the telephone line to the remote
monitoring centre.
1.3 Disarming the system under duress (this feature is only available with a remote monitoring service)
Users must check that this specific alert message can be processed by their remote monitoring centre.
IMPORTANT: if a telephone transmission unit card has been installed.
Example: 4 intrusion protection groups
The exit time delay can be deactivated when one of the entrances with a detector programmed for this function is closed.
Deactivation of this time delay can be automatically programmed by determining a door or window detector in charge of
arming one, several or all groups.
“bip, Armed”
or
“bip, Off”
ALARM SYSTEM USER GUIDE

5
Example using a control keypad:
• Arming groups 3 + 4
master code
The LED
indicating the
reading zone
flashes. Hold
the tag against
the pictogram
.
1.4 Arming or disarming one or several groups
Groups 3 + 4 armed
“bip, Armed
group 3-4”
Groups 1 + 2 disarmed
“bip, Off
group 1-2”
• Using a remote keypad:
+ or
...
+ or and
...
master code
• Using a vocal keypad with tag reader:
Group disarmed
Group armed
Group unchanged
group n°
from 1 to 8
group n°
from 1 to 8
Example using a vocal keypad with tag reader:
• Disarming groups 1 + 2
master code
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
“bip, Off,
Group 1-2”
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
• Using a remote control:
or
1.5 Partially arming the system
Armed Partial 1:
Group 1 only is armed
“bip, Armed
Partial 1”
Armed Partial 2:
Group 2 only is armed
“bip, Armed
Partial 2”
• Using a control keypad:
+ or
or and
master code
• Using a vocal keypad with tag reader:
Group disarmed
Group armed
For P2, your installer must
reprogramme the key.
“bip, Armed
Partial 1”
or
“bip, Armed
Partial 2”

6
The control panel is factory programmed to prevent system arming in case a door or window (with a protection device
installed on it) has been left open.
This factory programming can be modified by the installer.
1.7 Arming the system when a door or window is open
Example: arming with exit 2 open
You arm the system You close exit 2 You arm the system End of exit time delay
The control panel does
not arm the system
“bip, exit 2
opened” “bip, armed” “bip, armed”
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
1.6 Arming the system in presence mode
Armed Presence: Group 1 only armed
“bip, Armed
Presence”
• Using a control keypad:
+
and
master code
• Using a vocal keypad with tag reader::
Group disarmed
Group armed
The control panel allows for partial protection and quiet system responses in the event of intrusion: Armed Presence.
IMPORTANT: there is no exit time delay or entry time delay in armed presence mode.
ENTRY TIME DELAY
The entry time delay is the time allowed to disarm the system from inside the premises (e.g. using the keypad) without triggering
the alerts and deterrents. Users can decide on the most suitable time delay for them with their installer.
A vocal warning “BIP, BIP, BIP, BIP, PROTECTION ACTIVE” tells users to disarm the system.
EXIT TIME DELAY
The exit time delay is the time allowed to leave the premises without triggering the alarm system. Users can decide on the most
suitable time delay for them with their installer. The end of this time delay is indicated by the control panel as it repeats the voice
message that the system is armed.
“bip, Armed
Presence”

7
This function makes it possible to send automatically
Arm/Disarm commands to the alarm control panel at
times programmed by your installer, via the TwinLoad®
software.
You can activate or de-activate these timed automatic
ON/OFF commands at the Control panel keypad . n
factory default, this function is not activated.
1.8 Automatic timed Arm/Disarm
Using the Control Panel keypad:
master code
0: disabled
1: enabled
Factory default , this function is not active.
This command authorizes the resetting of the Control Panel after an alarm activation, intrusion alarm or fault (radio, loss of
power... etc.).
This command is accessible locally from a separate/remote keypad or the built-in keypad of the Control Panel while
programming:
1.9 System reactivation
master code
WARNING: this configuration is possible with control panel versions 2.1.0 or later (enter to check the
version).

8
2. The keypads transfer nformat on about the control panel status
The keypads can be used to:
•
operate your system,
• check the status of your system.
IMPORTANT
• Only commands sent from control and information keypads light up the LEDs.
• Only commands issued from a vocal keypad trigger voice messages indicating possible alarms, faults and the status of exits.
Commands
sent to:
Command Indications
& messages at the information
& command keypad
Message issued by vocal keypad
with tag reader
LED status Buzzer
A control panel
Disarm keyfob 1.5 s
Glong beep “Bip, Off” or “Bip, Fault System”
OFF/Disarm
with alarm memory G G G 3 short beeps
Arm keyfob 1.5 s
Rlong beep “Bip, Armed”
ON/Arm with fault keyfob 1.5 s
R3 short beeps
Armed partial 1 keyfob 1.5 s
Rlong beep “Bip, Armed Partial 1”
Armed partial 2 keyfob 1.5 s
Rlong beep “Bip, Armed Partial 2”
ON Partial 1, with a fault keyfob 1.5 s
R3 short beeps
ON Partial 2, with a fault keyfob 1.5 s
R3 short beeps
Arm group X keyfob 1.5 s
Rlong beep “Bip, Armed Group X
ON Group X with an anomaly keyfob 1.5 s
R3 short beeps
ON blocked (1) R R R 3 short beeps
Disarm group X keyfob 1.5 s
Glong beep Bip, Off Group X”
OFF group X
with alarm memory G G G 3 short beeps
Arm in presence mode “Bip, Armed Presence”
Alarms memorised “Bip, Off, Alarm System”
Faults memorised “Bip, Armed, Fault System”
or “Bip, Off, Fault System”
Exits open keyfob 1.5 s
R3 short beeps “Bip, Armed, Exit Opened”
Switching receiver,
remote control unit
Transmit a home automation
command (light, relay, etc.) keyfob 1.5 s
G
Switch to test mode “Bip, Test mode”
Switch to installation mode “Bip, Installation mode”
Switch to user mode “Bip, Off”
System status query
“Bip, system status, Armed”
“Bip, System_status, Armed Partial 1 or 2”
“Bip, System_status, Off”
“Bip, System_status, Armed Group X”
“Bip, System_status, Armed Presence”
“Bip, System_status,...Fault System”
“Bip, System_status,...Exit Opened”
“Bip, System_status,...Exit Inhibited”
(1) A stopped ON/Arming operation means the system has been unable
to complete Arming due to a system fault.
X: group 1 to 8 depending on type of control panel
: green LED
: red LED
G
R

9
3. Configur ng the system locally us ng the keypad bu lt nto the control panel
If 5 wrong access codes are entered on the keypad in less than 5 minutes this will block the keypad for 5 minutes and the
control panel will be informed.
You can replace the original language with another language.
To modify the language, enter:
Factory setting: English
Your installer will have already configured your control panel but you can modify some of the programming at any time.
3.1 Modifying the language
0: French
1: Italian
2: German
3: Spanish
4: Dutch
5: English
“bip + chosen
language”
master code
IMPORTANT
• To keep your codes confidential, we recommend you change the keypad access codes often and regularly clean the keys.
• To prevent unwanted calls to correspondents, do not end the master code with a “0”.
The events memorised by the control panel are date and time stamped.
To programme the date and time manually, proceed as follows:
3.2 Modifying the date and time
Do not lose your codes as you will need them in order to programme new codes. However, if you do lose your codes,
contact your installer who will put the system back into its factory configuration and programme the codes again. Your
master code allows you to configure the control panel and access all the system commands using the built-in keypad.
3.3 Modifying your master code
• Date
To modify the date, enter:
“bip + date
announced”
• Time
To modify the time, enter:
“bip + time
announced”
Day onth
Hour inutes
Year
(e.g. for 2012,
enter 12)
master code
master code
To modify the master code, enter:
Factory master code: 0000
Example:
To replace the factory master code “0000” with the new code “1423”, enter:
... ... ...
“beep”
old
master code
new
master code
new master
code repeated
IMPORTANT: all access codes must differ from each other.

10
4. Restr ct ng access to commands
The user codes can have separate and limited access to:
• specific keypad control keys,
• specific groups.
Only the command keys or groups selected during programming can be accessed when the user code is entered.
To restrict a user code to (a) specific command key(s), use the keypad to enter:
To restrict a user code to (a) specific group(s), use the keypad to enter:
...
...
4.1 Restricting access to user codes
master code user code01 to 32
(chosen user
number)
user code command
keys
master code user code01 to 32
(chosen user
number)
user code group(s)
1 to 8
The user codes limit access to certain commands. They are meant for occasional users.
Using the keypad, enter:
3.4 Modifying the user codes
IMPORTANT: a programmed user code is automatically enabled.
master code new user code01 to 32
(chosen user
number)
new user code
repeated
The following procedure can be followed to enable or disable user codes without modifying their programming.
Using the keypad, enter:
3.5 Disabling or enabling the user codes
master code 0: disabled
1: enabled
01 to 32
(chosen user
number)
Example, after entering the master code (1234), to restrict user code 1 (1213) to Group 1 and Group 2, enter:
In this case, user code 1 can only disarm and arm Group 1 and Group 2.
Example, arming groups 1 and 2:
WARNING: the 32 user codes are only available with control panel keypad versions 2.1.0 or later.
Enter to check the version.
user code
master code

11
The tags can have separate and limited access to specific command keys and specific groups. Only the command keys or
groups selected during programming can be accessed using the tag.
To restrict a tag to (a) specific command key(s), use the keypad to enter:
To restrict a tag to (a) specific group(s), use the keypad to enter:
...
...
4.2 Restricting access using the tags
master code tag n°
from 01 to 32
tag n°
from 01 to 32
command
key(s)
master code tag n°
from 01 to 32
tag n°
from 01 to 32
group(s)
1 to 8
• To cancel a tag’s restricted access, use the keypad to enter:
Example: to cancel the restrictions linked to tag 02, use the keypad to enter:
master code tag n°
from 01 to 32
tag n°
from 01 to 32
The access restrictions linked
to tag 02 will be cancelled.
• To restrict access to a command key and a group, use the keypad to enter:
Example: to restrict tag 01 to Armed/Off Group 1 and Armed Partial 1 commands, use the keypad to enter:
group(s)
1 to 8
“Armed Partial 1”
command key
Only the commands for Off
and Armed Group 1 and Armed
Partial One are accessible
using tag 01.
master code tag n°
from 01 to 32
tag n°
from 01 to 32
A registered tag is automatically enabled.
To disable or enable a tag, use the keypad to enter:
Examples:
• to disable tag 01, enter:
• to enable tag 02, enter:
4.3 Disabling or enabling a tag
0: disabled
1: enabled
master code tag n°
from 01 to 32
WARNING: the 32 tags are only available with control panel keypad versions 2.1.0 or later.
Enter to check the version.
master code
WARNING: the 32 tags are only available with control panel keypad versions 2.1.0 or later.
Enter to check the version.
master code

12
IMPORTANT: once a year or before going away for a long period, we advise you to test your security system. The TEST MODE
allows you to test each device in the system without triggering the sirens.
IMPORTANT: before moving in front of an infrared detector,
wait for 90 seconds in an unprotected area.
5. Test ng the dev ces
4. Switch the control panel to user mode
3. Test each remote control unit
• Press the Off key on each remote
control unit.
or
• Enter your master code and press
the Off key on each keypad.
1. Switch the control panel to test mode
• Open then close all exits protected
by a door/window or multicontact
detector.
• Check the message issued by the
control panel.
2. Test each detector
• Move in front of each motion detector.
• Check the message issued by the control panel.
master code
“bip, Test_mode”
“bip, intrusion,
detector n°”
“bip, intrusion,
detector n°”
“bip, Off, Remote
Control Unit n°”
“bip, Off”
master code
TEST MODE
or
)))))
)))))
)))))
)))))

13
1. Close all the exits and leave the protected areas for at least 90 seconds.
2. Arm the system
ƒwhen it receives the Arm command, the control panel responds: “beep, Armed”
3. Wait until the end of the Exit time delay
ƒthe control panel announces: “Armed”
4. Enter a protected room
ĥ the control panel and sirens are triggered,
• the telephone dialler calls the programmed correspondents depending
on the type of events transmitted. (1) (2)
5. Let the sirens sound for 30 seconds and then disarm the system (3)
ƒon receipt of the “Off” command, the sirens stop
and the control panel responds. For example:
“Bip, Off, on 21 10 2012 at 7:30 P , intrusion, detector 3, group 1”.
6. Check transmission of the alarm (and any alarm images or films)
to your programmed correspondents. (1) (2)
(((((
(((((
(((((
(((((
“beep, Armed”
“Armed”
(1) f a dialler unit or separate dialler have been installed.
(2) ntrusions alarms which appear during an entry delay, are transmitted only 60 seconds after termination of the “Entry
beeps” and provided that during this entry period no system “OFF” command is received.
(3) For voice calls only, the transmission of the call to correspondents is stopped when the system is disarmed.
IMPORTANT
• You are now going to perform a real test on your security system.
This test will trigger the alarm units and transmit a message to your correspondents by phone. We recommend you warn your
correspondents beforehand (if a dialler unit has been installed in the control panel or a separate dialler has been installed).
• The sounding level of the sirens can cause hearing disorders. The necessary precautions must therefore be taken before
carrying out the tests.
6. Perform ng a real test on the system
USER MODE
) ) ) ) )
)))))
“Bip, Off, on 21 10 2012
at 7:30 P , intrusion,
detector 3, group 1”

14
Control panel voice message Events
“bip, date, time, intrusion, detector n°, group n°” ntrusion on premises.
“bip, date, time, intrusion confirmed, detector n°, group n°” Movement of the intruder on the premises.
Intrusion protection
IMPORTANT: the alarm memory is automatically deleted the next time the system is armed.
* Requires the installation of a dialler unit in the control panel or the installation of a separate dialler.
• Alarms (intrusion, personal, technical, tamper or fire) are
indicated:
- on receipt of an Off order,
- when the system is operated remotely.
• Voice indications specify:
- the date and time at which the alarm occurred,
- the type of alarm,
- the identity of the device having triggered the alarm.
7. The control panel nd cates alarms
Control panel voice message Events
“bip, bip, bip, bip, Technical Alarm, Technical Detector n°”
Message repeated every 10 seconds for 3 minutes
(except in Total Arm mode)
Technical protection triggered by a sensor associated with a universal
transmitter.
Technical protection
Control panel voice message Events
“bip, date, time, Fire Alarm, Detector n°” Fire protection triggered by a detector.
Fire protection
“bip, date, time, Fire Alarm, Remote Control_Unit n°” Fire protection triggered by a remote control unit.
24/24
Control panel voice message Events
Protection against system tampering
“bip, date, time, Tamper, Remote Control Unit n°” Attempt to open or remove a keypad.
“bip, date, time, Tamper, Control Panel” Attempt to remove or open the control panel.
“bip, date, time, Tamper, Siren n°” or “Tamper, relay n°” Attempt to remove a siren or radio repeater relay.
“bip, date, time, Tamper, Detector n°, Group n°” Attempt to open or remove a detector.
“bip, date, time, Tamper, Radio” Detection of radio scrambling.
24/24 24/24

15
* Requires the installation of a dialler unit in the control panel or the installation of a separate dialler.
• The control panel permanently monitors the state of
devices:
- power supply,
- tamper system,
- telephone line availability*,
- radio link.
• The control panel indicates faults:
- on receipt of an Off or Arm order,
- when the system status is queried or consulted remotely.
8. The control panel nd cates faults
Control panel voice message Events
“bip, Fault, Voltage, Control_panel” Control panel battery low
“bip, Fault, Voltage, Detector n°” Detector battery low
Device power supply faults
“bip, Fault, Voltage, Battery, Control panel” The control panel does not have a Li- on back-up battery
“bip, Fault, Voltage, Siren n°” Siren battery low
“bip, Fault, Voltage, Relay n°” Radio relay battery low
“bip, Fault, Voltage, Remote Control Unit n°” Keypad or keyfob Low battery power
Control panel voice message Events
“bip, Fault, Tamper, Control panel” Control panel tamper fault
“bip, Fault, Tamper, Detector n°, Group n°” Detector tamper fault
Device tamper faults
“bip, Fault, Tamper, Siren n° or Tamper, Relay n°” Siren or radio repeater relay tamper fault
“bip, Fault, Tamper, Remote Control Unit n°” Keypad tamper fault
Control panel voice message Events
Device radio link faults
“bip, Fault, Radio_link, Detector n°, Group n°” Loss of radio link between a detector and the control panel
“bip, Fault, Radio_link, Siren n° or Tamper, Relay n°” Loss of radio link with a siren or radio repeater relay
“bip, Fault, Radio_link, Remote Control Unit n°” Loss of radio link between a keypad and the control panel

16
The events log contains the last 1,000 date and time stamped event to have occurred in the system. t makes it possible to
keep track of all system operation and maintenance activities.
The complete events log can be consulted locally using the control panel keypad.
The events log records:
• intrusion protection status changes,
• automatic inhibitions of exits left open,
• alarms,
• faults,
• system mode changes.
To access the events log,
enter:
then press: for the next event
ƒto repeat the event
ƒfor previous
ƒto fast forward (10 events by 10 events)
ƒto end consultation
Each event in the log is displayed with the following information:
• date and time,
• event name,
• identity of devices having triggered the event,
• detection zone (for intrusion and fire alarms).
Example:
9. Consult ng the events log
master code
After 30 seconds without the keypad
being pressed, the control panel
automatically exits the events log.
“bip, on 25/02/2012 at 3 P ,
Intrusion, Detector 3, Group 1”
“bip, on 13/01/2012 at 12 P ,
Tamper, Siren 1”

17
• Control keypad:
or
• Vocal keypad with tag reader:
or
• Control keypad:
or
• Vocal keypad with tag reader:
or or
10. Add t onal keypad funct ons
10.1 Querying the status of your system
master code master code
master code
“bip,
system_status”
10.2 Triggering an alarm (if a keypad button has been reprogrammed)
master code Alarm
Press and hold
longer than 2 s
IMPORTANT: the sounding level of the sirens can cause hearing disorders. The necessary precautions must therefore be taken
before carrying out the tests.
(((((
(((((
(((((
(((((
Alarm
Press and hold
longer than 2 s
• Control keypad:
or
• Vocal keypad with tag reader:
or
10.3 Triggering a silent alarm (if a keypad button has been reprogrammed)
master code Silent alarm
Press and hold
longer than 2 s
Silent alarm
Press and hold
longer than 2 s
(((((
(((((
“bip,
system_status”
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .
The LED indicating
the reading zone flashes.
Hold the tag against
the pictogram .

18
USER INFORMATION
The dialler is designed to protect homes and some business premises. This alarm transmission device triggers a
remote alarm in the event of a break-in but is also able to remotely transmit films and videos of the monitored site in
real time.
t should be noted that the installation of a video monitoring system in a public building is subject to regulations.
Employees and members of the public entering the building must be clearly and constantly informed of the presence
of the video monitoring system in compliance with legal requirements.
The installation of a video monitoring system on private premises is authorised, on condition that the cameras cannot
see beyond the premises.
Furthermore, individuals who are filmed on a private property must be duly informed of this.
The installer is responsible for the installation of such a video monitoring system while the user is responsible for its
use and compliance with associated legal specifications.
Exclusion of liability and communication networks (unavailability):
DA TEM shall not be held liable for use of the equipment described herein that does not comply with contractual
stipulations.
DA TEM reminds users that its systems operate via telecommunications networks such as switched public telephone,
radio, GSM, P, GPRS, W F networks, etc.
As DA TEM is not responsible for managing such networks, it has no control over them. Their availability can only be
guaranteed by their operator.
DA TEM also draws users’ attention to the fact that should these networks become unavailable, its own systems may also
become unavailable.
f such a situation should arise, independent of the will of DA TEM, the company informs users that neither it nor the
manufacturer shall be held liable for the damaging consequences that such a situation may result in.
ONLY FOR VIDEOS
Foreword
DIALLER PRODUCT USER GUIDE
GSM/
GPRS ET ERNET
(ADSL)
fionly concerns dialler units using the media stipulated
(present example: GSM/GPRS and/or Ethernet ADSL)
KEY:
fiOnly concerns an alarm system fitted with one or several image transmission detector(s).
ONLY WITH THE USE OF IMAGE TRANSMISSION DETECTORS
fiOnly concerns an alarm system fitted with one or several compatible P video cameras
ONLY WITH COMPATIBLE IP CAMERAS

19
1. Introduct on
A dialler unit can either be factory-mounted in a separate dialler or integrated into a control panel with siren and keypad
transforming the device into a control panel with siren, keypad and dialler.
n what follows all of the products cited above shall be referred to as diallers.
The different control panels with siren and
keypad: each control panel can be fitted with
one of the dialler units listed opposite hence
transforming the product into a control panel
with dialler.
The different separate diallers:
Dialler unit and transmission media:
Depending on its reference, the dialler unit has different transmission media (see tables above). To describe the use of the
product, it is assumed that the dialler has three transmission media: PSTN, GSM/GPRS and ADSL.
Control
panel
reference
Choice of
dialler Transmission media
SH320AU
SH340AU
SH380AU
SH501AX PSTN -
Ethernet
(ADSL)
SH502AX - GSM/GPRS
SH503AX PSTN GSM/GPRS
SH504AX - -
Separate dialler
reference Transmission media
SH511AX PSTN -
Ethernet
(ADSL)
SH512AX - GSM/GPRS
SH513AX PSTN GSM/GPRS
SH514AX - -
Dialler
Loudspeaker
Three-colour LED
Microphone
12 programming buttons
4 customisable control buttons:
• armed
• off
• armed partial 1
• armed partial 2
Blue light
(1) Only concerns a control panel with siren, keypad and dialler when the system is disarmed in user mode.
LEDs
Colours
LED status Indication
Three-
colour
LED
red steady button pressed or line occupied (incoming/outgoing call)
continuous rapid flashing operation blocked when powered (power supply, radio, transmission module link or keypad)
12 s maximum rapid flashing connection test, date and reference
1 flash every 5 s permanent indication of test mode
2 flashes every 10 s permanent indication of installation mode
3 rapid flashes error
green steady for 10 seconds valid access code
steady recording of 10 s maximum voice message
orange rapid flashing memory zone transfer
1 flash every 20 s (1) system fault (voltage fault, media fault or loss of system product radio link)
Blue light modulated indication of renewed
control panel transmissions
mode change: installation, test and use
arming or disarming
system status command
one of the 4 customisable keys pressed (arm, disarm, arm partial 1 and 2)
LED indications

20
1.1 Operation for outgoing calls
Via its different communication networks, the dialler remotely alerts correspondents of intrusion or other events
arising on the protected site.
• The dialler alerts individual correspondents or a remote monitoring centre in case of:
- intrusion,
- technical alarm,
- fire alarm,
- tamper alarm,
- system device fault.
• n the event of intrusion, the dialler provides the following remote functions:
- listen-in and speak-out/talk-back,
- visual alarm confirmation via the transmission of images or films from image transmission detectors and/or compatible P
cameras installed on the protected site.
1.2 Operation for incoming calls
• The remote control function via the phone (landline and/or mobile) using a dialler fitted with a PSTN or GSM module
(mains-powered) makes it possible to:
- remotely operate the alarm system (disarm, arm the system),
- start a listen-in period (repeatable) to remotely listen in to background sounds,
- speak out to a person on the premises where the alarm has been triggered by remotely activating the loudspeaker,
- operate comfort applications (e.g. lighting) using external receivers,
- modify correspondent telephone numbers (for calls to individuals).
• When no event has been triggered, the secure Internet Portal, which can be accessed from a computer via the DA TEM
web site, makes it possible to connect up to a dialler linked to the Ethernet (ADSL) or GPRS (mains-powered) network in
order to:
- check the system status (installation, armed, disarmed, etc.), faults, access points, etc.)
- perform a simple system configuration operation (change telephone numbers for calls, etc.),
- operate the system (change the system status, operate receivers, etc.),
- consult and save the system events log,
Transmission des événements
Separate dialler
reference
Dialler unit
reference
For transmission of an alarm to an
INDIVIDUAL
For transmission of an alarm to a
REMOTE MONITORING CENTRE
SH511AX SH501AX voice via PSTN network via PSTN and ADSL network
SH512AX SH502AX voice and SMS via GSM network via GSM and (ADSL or GPRS) network
SH513AX SH503AX
voice via PSTN network
or
voice and SMS via GSM network
via (PSTN or GSM) network
and (ADSL or GRS)
SH514AX SH504AX with remote monitoring service contract (ADSL) via ADSL network
Separate dialler
reference
Dialler unit
reference
For transmission of images from image
transmission motion detectors
or IP cameras to an INDIVIDUAL
For transmission of alarm films
from image transmission motion
detectors or IP cameras to a
REMOTE MONITORING CENTRE
SH511AX SH501AX with remote monitoring service contract (ADSL) via ADSL network
SH512AX SH502AX MMS via GSM with MMS option (to n° 9) via ADSL or GPRS network
SH513AX SH503AX MMS via GSM with MMS option (to n° 9) via ADSL or GPRS network
SH514AX SH504AX with remote monitoring service contract (ADSL) via ADSL network
Transmission of alarm images and films
- change the video code,
- consult archived alarm films from image transmission detectors,
- ask an image transmission detector to film the protected site.
ONLY WITH THE USE OF IMAGE TRANSMISSION DETECTORS
- change the video code,
- consult archived alarm films from P cameras,
- view live video from P cameras (only possible with Ethernet/ADSL media via nternet).
ONLY WITH COMPATIBLE IP CAMERAS
GSM/
GPRS ET ERNET
(ADSL)
GSM/
GPRS ET ERNET
(ADSL)
Table of contents
Other DAITEM Security System manuals

DAITEM
DAITEM SH401AX User manual

DAITEM
DAITEM SH601AU User manual

DAITEM
DAITEM SH640AX User manual

DAITEM
DAITEM SH511AX User manual

DAITEM
DAITEM Espace range User manual

DAITEM
DAITEM SH195AX User manual

DAITEM
DAITEM SH402AX User manual

DAITEM
DAITEM SH402AX User manual

DAITEM
DAITEM MD500 Operation and maintenance manual

DAITEM
DAITEM DP8406 User manual