DIGITIZE Desplex 32 Series User manual

UM-32
User Manual
Desplex Series 32 (v3.0A)
TM5-32 Transmission Module
TM5-10 Re eiver Module
And
RP-10 Remote Panel
August 2002
Digitize, In
158 Edison Road
Lake Hopatcong, NJ 07849
Tel: (97 ) 66 -1011 Part Number: 700815-0001
Fax: (97 ) 66 -4 Issue Revision: A
http://www.digitize-inc.com Issue Date: 08/02


COPYRIGHT
Copyright© 1987 by Digitize, Inc. All rights reserved. No part of this publication may be reproduced,
transcribed, transmitted, stored in a retrieval system, or translated into any computer language or any language,
in any form or by any means, manual, magnetic, electronic, optical, mechanical, chemical or otherwise, without
the prior written permission of Digitize, Inc., 158 Edison Road, Lake Hopatcong, NJ 07849.
DISCLAIMER
Digitize, Inc. makes no representations or warranties with respect to the contents hereof and specifically
disclaims any implied warranties or merchantability or fitness for any particular purpose. Further, Digitize, Inc
reserves the right to revise this publication and to make changes from time to time in the content hereof without
obligation of Digitize, Inc. to notify any person of such revision to changes.
SECURITY DISCLAIMER
The Digitize, Inc. DESPLEX line of data encryption products is designed to use the Data Encryption Standard
(DES) that has been certified by the National Institute and Technology (formerly National Bureau of
Standards). The DES algorithm is in the public domain, and the security of its use is dependent in the secrecy
of the DES key variable used. While the Digitize, Inc. DEPLEX line of security products provide easy and
flexible key management, the user is totally responsible for implementing a secure DES key variable
management scheme. Digitize, Inc. disclaims any responsibility concerning DES key variable security.
WARNING
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions manual, may cause interference, in which case the user, at his own expense,
will be required to take whatever measures may be required to correct the interferences.
CAUTION
This product contains static-sensitive devices. To avoid possible damage to the circuits during servicing, follow
proper static electricity control procedures. Also, ALL equipment housings must be appropriately electrically
earth grounded.


GLOSSARY'
The following terms shall be used In des ribing the omponents to be Installed throughout this manual. Figure 1 Illustrate* how the various components fit
together to form a complete, alarm monitoring system.
1. Control Unit - Secured area housing containing circuit card, transmission modules, standby battery and keyswitch or keypad
arming / disarming control. Specifically, the control unit refers to the DIGITIZES CU5-1, - , -4, -5, -6, -7, -11, -1 , -14, -15, -17, and - 2.
2. Receiver Rack (also referred to as a Monitor Rack) - Monitoring facility or central station housing containing receiver modules, primary
AC power supply, secondary DC standby battery and communications and annunciation Interface barrier strips and connectors.
Specifically, the receiver rack refers to DIGITIZES IMR510 & IMC5-5.
. Transmission Module (also referred to as a Termination Module, Figure B.0) -Secured areas to monitoring facility communications
device
housed In the secured area control unit. Communicates with Receiving Module In monitoring facility receiver rack. Specifically, the
transmission module refers to DIGITIZES TM5, - , - +, -10, - 2 with “-P”, “-K” or “-2 2” or no suffixes.
-2 2: DESPLEX 1, series Transmission Module that communicates via the RS-2 2 electrical interface standard Instead of the ON
WARD BELL-10 MODEM standard. The -2 2 Transmission Module (and accompanying -2 2 Receiving Module) might be used where
communication interfacing is vie some other medium than direct wire go., If the transmission modules to receiver module communicate
via fiber optic or microwave radio link).
-K: DESPLEX 10, 2 Series receiving module that can have its DES keys loaded via an automated random key generation method that
uses a simple fixture (,DIGITIZES – EB5 (DESPLEX 10) or EB20 (DESPLEX 2) extender board) Inserted into the monitor rack to generate and
load the keys into the receiver and transmission modules. The -K function is optional for DESPLEX 1 +, +, 10 and standard for
DESPLEX 2
-P: Local Event Logging option that allows an RS-2 2compedble printer (PTR5) to be connected directly to the TRANSMISSION module
for local event logging. The -P functions Is optional for DESPLEX 1, , 1 +, +, 10 and standard for DESPLEX 2.
4. Receiver Module (also referred to as a monitor panel, figure A.0) - Monitoring facility device housed in the receiver rack. Receives the
secured area status as sent by the transmission modules in the control units and annunciate* statue/status changes via visual and audible
Indicators. Specifically, the receiver module refers to the DIGITIZES MPG-1, - , 1 +, +, or -10 with the following suffixes:
-NCS-10 or MR16-10: Event logging “Network Controller” for an DIGITIZES IMR5 series receiver rack. Allows for communications with co resident
MP5's In the rack and Interfaces directly to the logging terminal and printer.
-(NO SUFFIX): Standard MP5 for DIGITIZES IMR5 series receiver rack. Allows for event logging to a treminal and printer connected to the rear of
the rack.
-IRA, -WF *** CONSULT FACTORY: Non-event logging MP5 that can be installed in IMR5 series receiver rack. NOT CONFIGURED
with a NC5-10/NR5-10 NETWORK CONTROLLER, or WELLS FARGO (or equivalent) MR series receiver racks.
-2 2: DESPLEX 1, , 1 +, + 10 Series Receiving Module that communicates via the RS-2 2 electrical interface standard instead of the ON-BOARD
BELL-10 MODEM standard. The -2 2 Receiving Module (and accompanying -2 2 Transmission Module) night be used where communications
interfacing is via some other medium than direct wire (i.e., if the transmission module to receiver module communicate via fiber optic or microwave
radio link).
-K: DESPLEX 1 +, + 10 Series Receiving Module that can have its DES keys loaded via an automated random key generation method that uses a
simple fixture (EB5/EB20 extender board) inserted into the receiver rack to generate and load the keys Into the receiver and transmission modules.
5. IXP6: (interface Expansion Panel) -Circuit card that replaces the 'blank" side support panel on receiving module that is to be configured
as a NETWORK CONTROLLER (NC5-10) or REMOTE NETWORK CONTROLLER (NR5-10). This circuit card contains memory expansion
to accommodate the user defined massages (255 total) that are stored an a NETWORK CONTROLLER. (Note: The NC5-10 or NR5-10 were Previously
referred to as a MP5-10N/IXP5 or MPG-10-NR/IXP5).
6. IXM5: (Interface Expansion Module) - Circuit card that Is added to the transmission module processor card when the module Is configured
for;
NON-VOLATILE BUFFER TRANSACTION STORAGE (-IXM5-2 option)
SPECIAL ORDER INTERFACE APPLICATIONS (-IXM5- option)
SCHILAGE ELECTRONICS ACCESS CONTROL SUBSYSTEM INTERFACE (-IXM5-4 option)
The circuits card contains memory expansion (IXM5-2,- ,-4) for NON-VOLATILE transaction storage, dual high speed asynchronous serial parts
(IXM5- .-4).
7. Local Printer - Secured area ('Local' relative to the secured area) printer to log all events. Specifically, the local printer reform to the
DIGITIZES PTR5.
8. Standby Battery - Continuously float charged LEAD ACID battery(s) that power the RECEIVER RACKS/RECEIVER MODULES and
CONTROL UNIT / TRANSMISSION MODULES In the event of primary AC power failure. Specifically, the rack batteries refer to SDS BT6
and the control unit batteries refer to DIGITIZES BT12. Standby battery power Is often just called 'DC POWER'.
9. Remote Panel (RP5-10) - Special type of Receiver Module that only annunciates remotely the state of an accompanying MP5-10 receiver
module and it's up to 9 transmission modules (TM-10, - 2).




TABLE OF CONTENTS
SECTION TITLE PAGE
1.0 INTRODUCTION 1
1.1 ASSUMPTIONS 2
1.2 PIN DEFINITION 2
1. KEYPAD FUNCTIONALITY 4
1.4 KEYPAD SIGNON 4
1.5 DURESS PIN ENTRY 4
2.0 COMMAND ENTRY PROCEDURE & SUMMARY 5
2.1 SECURE (ARMING SYSTEM) MODE CHANGE 7
2.2 ACCESS (DISARMING SYSTEM) MODE CHANGE 9
2. INSPECT ALARM LOOPS/POINT & POWER STATUS 1
2.4 NOT DEFINED 17
2.5 SETUP DELAY TIMER 17
2.6 SHUNTING SECURED AREA ALARM LOOP 20
2.7 CANCEL PIN 22
2.8 LIST PIN STATUS 2
2.9 DEFINE AND STORE PIN 24
2.10 ALARM LOOP DEFINITION ON POWERUP 26
2.11 SETUP SECURED AREA DATE-TIME 28
2.12 SECURED AREA REPROT GENERATION 29
2.1 DEFINE REPORT ALARM TEXT GENERATION 2
2.14 EVENT LOGGING MEMORY SHUTDOWN
PRIOR TO POWERDOWN 5
2.15 NOT DEFINED 6
2.16 MULTI TRANSMISSION MODULE MODE CHANGING SETUP
OR CENTRAL STATION MODE CONTROL ENABLE 6
2.17 ALARM POINT DEFINITION ON POWERUP 41
3.0 (OFF-LINE) USERS DEFINABLE OPTIONS 43
.1 PURGE PARAMETER NON-VOLATILE MEMORY 4
.1.1 PURGE TRANSMISSION MODULE PROCEDURE 44
.1.2 PURGE RECEIVER MODULE PANEL 45
.2 DES KEY GENERATION 48
.2.1 AUTOMATED RANDOM DES KEY GENERATION/STORAGE 48
. FACILITY CODE SELECTION/ENTRY/STORAGE 48
.4 PURGE BUFFERNON-VOLATILE MEMORY 48
.4.1 PURGE TRANSMISSION MODULE TRANSACTION BUFFER 49
.5 RECEIVER MODULE DIP SWITCH OPTIONS 50
.6 TRANSMISSION MODULE DIP SWITCH OPTIONS 51
4.0 PERIODIC MAINTENANCE 53
4.1 RECEIVER MODULE/REMOTE PANEL MAINTENANCE
PROCEDURE 5
4.2 TRANSMISSION MODULE MAINTENANCE PROCEDURE 5


TABLE OF CONTENTS CON’T
SECTION TITLE PAGE
APPENDIX A RECEIVER MODULE (MP5-10)/REMOTE PANEL (RP5-10)
OPERATIONAL SUMMARY 55
APPENDIX B TRANSMISSION MODULE (TM5-10) OPERATIONAL
SUMMARY 81
APPENDIX C FACILITY (SITE) CODE MANUAL SETUP 8
APPENDIX D SECURED AREA (TRANSMISSION MODULE)
EVENT LOGGING OPTION 91
APPENDIX E FIRST USAGE AFTER INSTALLATION 99
APPENDIX F NOT DEFINED 10
APPENDIX G TRANSMISSION MODULE ADDRESSING DIP SWITCH
CONFIGURATION 10
APPENDIX H NOT DEFINED 105
APPENDIX I AUTOMATED DES KEY GENERATION/TRANSFER
FOR RECEIVER MODULE AND REMOTE PANEL 107
APPENIDX J AUTOMATED DES KEY GENERATION/TRANSFER
FOR RECEIVER MODULE & TRANSMISSION MODULE 111
APPENDIX K KEYPAD COMMAND SUMMARY 115


Digitize, Inc 700815-0001 Rev. A 08/02 1
Se tion 1.0
Introdu tion
The operation of the Digitize, Inc high security DESPLEX 2 Series alarm monitoring equipment is relatively
easy and straightforward. The actual day-to-day operation usually requires simple arming/disarming of the
system via a PIN based keypad/LCD display (KEYPAD) in the secured area, and monitoring of the
arming/disarming at the central monitoring facility. This USER MANUAL describes the following standard 9
areas of operation for the DESPEX 2 system CU5- 2 control unit & IMR5-10 or IMC5-5 (or equivalent)
receiver rack environment (see Figure 1).
ARMING & DISARMING (ACCESS & SECURE MODE changing) of the SECURED AREA
STATUS monitoring (alarm loop & power) of the SECURED AREA
Alarm loop DEFINITION (loop SHUNT & RE-ENABLING) of the SECURED AREA
KEYPAD PIN storage (PIN digit data & ID#) in the SECURED AREA
KEYPAD DATE-TIME parameter setup in the SECURED AREA
SYSTEMS parameter setup (DES key, various timing parameters, and site code entry/storage,
APPENDIX “C”, “I”, “J”) in the SECURED AREA
Report generation to a local printer in the SECURED AREA
STATUS monitoring (RECEIVER MODULE operation, see APPENDIX “A”) at the CENTRAL
MONITORING FACILITY and DISPATCH of RESPONSE PERSONNEL to the SECURED
AREA IF THE RECEIVER MODULE INDICATES A RESPONSIBLE ALARM CONDITION
(i.e. THE MODULE ALARM LED(S) ARE RED BLINKING RED AND THE RECEIVER
RACK AUDIBLE IS ON).
SYSTEMS parameter setup (DES key, various timing parameters and site code entry/storage,
APPENDIX “C”, “I”, “J”) at the CENTRAL MONITORING FACILITY.
In addition to standard monitoring using the RECEIVER MODULE’S front panel indicator (APPENDIX
A), if the RECEIVER MODULES are installed in the receiver rack with the SCT option configured, all
events will be logged on the SCT terminal/printer (SCT 1) or host PC (SCTIIe). Operation of the SCT 1 is
detailed in NETWORK CONTROLLER/SCT 1 Users Manual (UM-1 ) and operation of the SCTIIe is
detailed in the “SCTIIe Users Manual” (UM-SCTIIe). Also, if a REMOTE PANEL (RP5-10) is installed in
a remote receiver rack and interfaced to the RECEIVER MODULE, then all RECEIVER MODULE front
panel annunciation will also be annunciated at the REMOTE PANEL (see APPENDIX A).
IMPORTANT NOTE: If the system is being used for the first time just after having been installed, the
procedures described in APPENDIX E must first be performed.

Digitize, Inc 700815-
0001 Rev. A 08/02
2
1.1 ASSUMPTIONS
Operation of the system assumes that the system is properly installed and operational in accordance with
the DESPEX Series INSTALLATION MANUAL (IM- 2). The receiver rack will assume to be
configured WITHOUT the SCT option. If the SCT is installed, then the NETWORK
CONTROLLERS/SCT 1 User Manual UM-1 will describe what supplementary procedures and event-
logging annunciation will occur. Also, it is assumed that the TRANSMISSION MODULE is configured
with IXM5-2 or –4 option that allows the non-volatile storage (event logging) of transaction as they
occur and subsequent report generation to a printer upon keypad request. The TRANSMISSION
MODULE /IXM5 is interfaced to the local printer (PTR5) in the secured area. Also, via the KEYPAD,
the printer has been setup to continuously print all transactions as they occur (i.e., continuous report
generation, see Section 2.12, Step 5 Setup with the “LE” command and “A” Option). If NO IXM5
option exists or a printer is not configured for the system, IGNORE all comments and instruction
relating to the printer. Also, whenever the phase “Message is Generated” appears after a specific
message type, this refers to the message being:
- Stored for printing at the local printer
- Sent to the accompanying Receiver Panel for real time audible & visual annunciation.
- Sent to the SCT I or IIe (via the Receiver Rack & Network Controller(s)) for event logging.
As defined throughout the manual, the TRANSMISSION MODULE can detect the state of 4 alarm
points on each of 8 alarm loops (i.e., 2 points total). An alarm loop may be defined as being either
ACCESS/SECURABLE or SECURE 24 hours. If a loop is made ACCESS/SECURABLE, its mode can
be changed using the keypad between ACCESS (disarmed or disabled) and SECURE (loop is armed or
enabled). If a loop is defined as SECURE 24 hours, it is typically referred to as a TAMPER alarm loop.
When the TRANSMISSION MODULE is first installed (i.e., powered up for the first time from the
factory) it is configured with ALL loops (1-8) being defined as ACCESS/SECURABLE loops.
NOTE: The powered up configuration may be changed using the ‘Alarm Loop Definition” (2.10)
command.
1.2 PIN DEFINITION
The TRANSMISSION MODULE /KEYPAD operations require entry of a sequence of 5 digits called a
PERSONAL IDENTIFICATION NUMBER (PIN). Prior to using any of the 5 digit PIN’S, they must
be STORED (in the TRANSMISSION MODULE non-volatile memory) so that they will be retained
even if power is lost to the MODULE (see Section 2.9 for the specific PIN storage procedure). The
storage of PINs is a user PROGRAMMABLE function as opposed to the USE or ENTRY of the PINs to
perform the various day-to-day security oriented operations.
The memory is capable of storing 74 five digit PINS representing 74 possible USERS and designated
PIN#01 – PIN#74.
Any of the 74 PINs may be programmed (Section 2.9) as “master enabling” PINs and are designated
simply as the MASTER PIN. A MASTER PIN is required to allow storage of the remaining 7 PINs
during PIN storage operations. As shipped from the factory, or as a result of the full erasure or “purge”
of the PIN/DES key memory (Section .1) the only PIN that will operate AT THAT point is PIN #01
(MASTER). It is setup as all zeros (i.e., 0,0,0,0,0).

Digitize, Inc 700815-0001 Rev. A 08/02

Digitize, Inc 700815-
0001 Rev. A 08/02
4
1.3 KEYPAD FUNCTIONALITY
The keypad operation is subject to various functional and timing criteria detailed below. When a keypad
key is momentarily pushed and released, the TRANSMISSION MODULE will cause the keypad
AUDIBLE to go ON for about 1/ of a second, and then go OFF. If NO AUDIBLE pulse is heard, then
try the key again. If after the KEYPAD has been powered up and operational, and it fails for whatever
reason (i.e., the KEYPAD to TRANSMISSION MODULE cable is damaged or removed), a “KEYPAD
TAMPER” messages is generated. The KEYPAD functional operation consists of 4 basic procedures:
- 2 Digit ID #
- 5 Digit PIN entry
- Command selection upon valid PIN entry verification by the TRANSMISSION MODULE.
- Specified COMMAND/DATA data entry (Section 2.0) followed by function termination.
1.4 KEYPAD SIGNON
This procedure consists of entering a 2 digit USER ID# (01-74) that the PIN is assigned to, followed by
a VALID 5 digit that has previously been stored in the transmission module. Prior to any ID # or PIN
digits entry, the LCD bottom line will be in the idle state. While in the idle state, the LCD bottom line
will display: DIG DESPLEX
Feedback via the LCD of the SIGNON procedure is as follows: ENTER a 2 digit USER ID# (01-74)
such that as the first digit is entered, the LCD bottom line changes to “ID#X” where the “X” indicates
that 1 digit (of 2 ID# digits) has been entered. Enter the second digit and a second “X” appears on the
LCD to the right of the first “X”. When the next digit is entered, which is the first digit of the 5 digit
PIN, the LCD bottom line changes to “PIN=X.” The subsequent next 4 digits cause 4 more X’s on the
LCD. If the PIN is valid for the USER ID# entered, the system will go to COMMAND ENTRY state.
The ID# or PIN digits entered, one after the other, queued via the keypad audible. If a mistake is made,
the user can either wait about 10 seconds for the keypad “between keystroke timer” to time-out, and the
display will return to an idling state, or the user can push the ‘ENTER’ (#) key to return the display to an
idle state. At that point, the ID#, PIN entry sequence can again be attempted. When all digits of a valid
ID# and PIN have been entered, a “KEYPAD ID#” message is generated if the PIN is valid for the
specific ID#, or, a “KEYPAD TRY NOK” message is generated if 4 invalid ID# PINs are entered within
a minute. Upon entering the COMMAND ENTRY procedures state, the user has up to 2 minutes to
select, perform and exit any of the valid COMMANDS defined in Section 2. If 2 minutes elapses
without any user keypad activity, the keypad will exit the COMMAND ENTRY state and a “KEYPAD
ALARM” message is generated.
1.5 DURESS PIN ENTRY
In addition to a VALID 5 digit PIN being used to enter the COMMAND ENTRY procedures, the
keypad provides a DURESS function to be used when authorized PIN users are under a DURESS
situation. Specifically, if the ID#70 PIN is entered, a “DURESS ALARM” message is generated. This
ASSUMES the ID #70 PIN has been previously defined (see Section 2.9). NOTE: The transmission
module will NOT send a specific DURESS message to the local printer, but if the printer is setup to run
continuously, the “KEYPAD ID # 70” message WILL be sent to the printer.

Digitize, Inc 700815-0001 Rev. A 08/02 5
Se tion 2.0
Command Entry Pro edure & Summary
The following section consists of a command-by-command description for all user commands. For all
examples that follow, refer to Figure 1.1 for the keypad layout and, unless otherwise state, ID#01’s PIN
will be used in the “ENTER a valid PIN” step.
For most commands, the procedure consists of the following steps:
1. Enter a 2 digit ID# (01-74)
2. The LCD bottom line will respond with the following after the first of the 2 digits:
ID# X
. Enter the VALID 5 digit PIN associated with the ID#.
4. The Receiver Module will respond with a 2-4 second audible “BEEP” and the Access LED will
pulsate for about 4-6 seconds.
NOTE: The RECEIVER MODULE ACCESS LED pulsation will override any present LED response
for 4-6 seconds.
5. The CU5- 2 LCD bottom line will respond with the following after the first of the 5 digits:
PIN= X
6. If the SECURE AREA is in ACCESS, and the local printer is setup for continuous printing, the
printer will respond with:
04/04/94 13:12:01 KEYPAD ID#01 Zone xx
7. The LCD bottom line will respond with:
REQUEST
8. Enter a VALID 2 character command followed by a “*” (SELECT key). The LCD bottom line will
respond with an appropriate command feedback display if the 2 character command was VALID,
and will respond with the following if the command was invalid:
REQUEST NOK

Digitize, Inc 700815-
0001 Rev. A 08/02
6
Some commands such as, SHUNTING ACCESS/SECURABLE ALARM LOOP (see Section 2.6)
will ONLY work with a specific ID# (ID#7 for SHUNTING an ALARM LOOP). If a 2 character
command is entered using an ID# and PIN that are NOT defined for command, the LCD bottom line
will respond with:
ID# NOK
At this point, press the “#” (ENTER) key to exit to the IDLE state.
9. Any required parameters would be entered if appropriate. If an entry error is made at this point,
enter the “*” (SELECT) to ABORT the COMMAND ENTRY procedure and return to the idle state.
10. Enter 1 or 2 “#” (ENTER) characters and the command will be performed, and the LCD bottom line
will display a POST COMMAND FEEDBACK response, or, will return to the idle display.
For most commands, if the local printer is SETUP for CONTINUOUS PRINTING, it will respond
with a printed transaction line that consists of the following fields of information:
- 8 Character date; 2 digit months (01-12), 1 digit “/”, 2 day digit (01- 1), 1 digit “/”, and 2 digit year
(00-99).
- 8 Character time; 2 digit hours (00-2 ), 1 digit “:”, 2 digit minutes (00-59), 1 digit “:”, and 2 digit
seconds (01-59)
- 1 Space Character
- 16 Characters describing the event/transaction (including ID# if it’s a keypad function, or entered
parameter if appropriate)
- Zone (i.e., CU5- 2) numbers (01-10) used by the accompanying RECEIVER PANEL
- Appropriate loop & point numbers
NOTE: Before performing ANY of the commands described below, read the entire section describing
the step-by-step procedure for the specific command. This will assure the time between keypad
keystrokes (see Section 1.4) is not so great as to cause the keypad to return to the idle state because
greater than 10 seconds elapsed between keystrokes.

Digitize, Inc 700815-0001 Rev. A 08/02 7
2.1 SECURE (ARMING SYSTEM) MODE CHANGE
All transmission modules ACCESS/SECURE defined alarm loops will be put into the SECURE state.
1. Enter a 2 digit ID# (01-74). The LCD bottom line will display the following as the digits are
entered:
ID#X {up to 2 “X”}
2. Enter the 5 digit PIN associated with the ID#. The LCD bottom line will display the following as the
digits are entered:
PIN = X {up to 5 “X”}
. If the PIN is VALID, the LCD bottom line will display the following after the 5th PIN digit is
entered:
REQUEST
4. Enter the following characters:
S, E, *
The LCD bottom line will display the following:
REQUEST SERVICE
5. Press the “#” (ENTER) key and the LCD bottom line will display the following:
REQUEST
NOTE: The local printer will NOT respond because the transmission module has been put into
SECURE and printing ONLY occurs while the module is in ACCESS. When the module is later
switched back to ACCESS, the printer will respond with:
04/04/94 1 :40:12 ACCESS OK Zone xx
04/04/94 1 :45:09 SECURE OK Zone xx
6. Press the “#” (Enter) key, and the LCD bottom line will display the following if no alarm loops are
SHUNTED:
DIG DESPLEX
The LCD bottom line will display the following PULSATING LINE:
**************
If the following condition exists:

Digitize, Inc 700815-
0001 Rev. A 08/02
8
- ANY ACCESS/SECURABLE ALARM Loop(s) are setup for two man reset with the EXIT DELAY
TIMER (see Section 2.5) running.
7. The RECEIVER MODULE will respond with a SECURE MODE change ALARM as follows:
- AUDIBLE goes ON
- SECURE LED go to BLINKING GREEN
- ACCESS LED remain SOLID YELLOW
- ALARM LED go to BLINKING RED
- COMM STATUS LED remains UNCHANGED
NOTE: Upon the RECEIVER MODULE being RESET from a SECURE MODE CHANGE ALARM
(see Section A. ) if the secured area has ANY LOOPS SHUNTED (see Section A.6) the RECEIVER
MODULE SECURE LED’S will go to BLINKING GREEN state instead of SOLID GREEN. Also, if
the SECURED AREA has pending alarms when the CU5- 2 is switched to the SECURE mode (i.e., the
area did not “setup” correctly) then the RECEIVER MODULE will probably respond with a
ACCESS/SECURABLE SECURE ALARM annunciation (see APPENDIX A) that will override the
MODE CHANGE ALARM. When the alarm device “clears” the RECEIVER MODULE will then
annunciate a SECURED NON-ALARM state upon MODULE reset (push-button as SCT control).
This manual suits for next models
1
Table of contents
Other DIGITIZE Network Hardware manuals
Popular Network Hardware manuals by other brands

Mitsubishi
Mitsubishi FR-F800 Series instruction manual

Ubiquiti
Ubiquiti UniFi Dream Machine Pro quick start guide

Siemens
Siemens SINUMERIK 840Di sl Function manual

Cisco
Cisco GS7000 Installation and operation guide

TP-Link
TP-Link TL-WPA4226KIT Quick installation guide

Nortel
Nortel Meridian 1 Option 11C Compact Technical reference guide