DSC MAXSYS PC4020 User manual

WARNING: This manual contains information on limitations regarding
product use and function and information on the limitations as to liability
of the manufacturer. The entire manual should be carefully read.
®
PC4020 v3.5 • Instruction Manual

WARNING Please Read Carefully
Note to Installers
This warning contains vital information. As the only individual in
contact with system users, it is your responsibility to bring each
item in this warning to the attention of the users of this system.
System Failures
This system has been carefully designed to be as effective as pos-
sible. There are circumstances, however, involving fire, burglary,
or other types of emergencies where it may not provide protection.
Any alarm system of any type may be compromised deliberately or
may fail to operate as expected for a variety of reasons. Some but
not all of these reasons may be:
■■
■■
■Inadequate Installation
A security system must be installed properly in order to provide
adequate protection. Every installation should be evaluated by a
security professional to ensure that all access points and areas are
covered. Locks and latches on windows and doors must be secure
and operate as intended. Windows, doors, walls, ceilings and other
building materials must be of sufficient strength and construction
to provide the level of protection expected. A reevaluation must be
done during and after any construction activity. An evaluation by
the fire and/or police department is highly recommended if this
service is available.
■■
■■
■Criminal Knowledge
This system contains security features which were known to be
effective at the time of manufacture. It is possible for persons with
criminal intent to develop techniques which reduce the effective-
ness of these features. It is important that a security system be
reviewed periodically to ensure that its features remain effective
and that it be updated or replaced if it is found that it does not
provide the protection expected.
■■
■■
■Access by Intruders
Intruders may enter through an unprotected access point, circum-
vent a sensing device, evade detection by moving through an area
of insufficient coverage, disconnect a warning device, or interfere
with or prevent the proper operation of the system.
■■
■■
■Power Failure
Control units, intrusion detectors, smoke detectors and many other
security devices require an adequate power supply for proper op-
eration. If a device operates from batteries, it is possible for the
batteries to fail. Even if the batteries have not failed, they must be
charged, in good condition and installed correctly. If a device op-
erates only by AC power, any interruption, however brief, will
render that device inoperative while it does not have power. Power
interruptions of any length are often accompanied by voltage fluc-
tuations which may damage electronic equipment such as a secu-
rity system. After a power interruption has occurred, immediately
conduct a complete system test to ensure that the system operates
as intended.
■■
■■
■Failure of Replaceable Batteries
This system’s wireless transmitters have been designed to provide
several years of battery life under normal conditions. The expected
battery life is a function of the device environment, usage and type.
Ambient conditions such as high humidity, high or low tempera-
tures, or large temperature fluctuations may reduce the expected
battery life. While each transmitting device has a low battery moni-
tor which identifies when the batteries need to be replaced, this
monitor may fail to operate as expected. Regular testing and main-
tenance will keep the system in good operating condition.
■■
■■
■Compromise of Radio Frequency
(Wireless) Devices
Signals may not reach the receiver under all circumstances which
could include metal objects placed on or near the radio path or
deliberate jamming or other inadvertent radio signal interference.
■■
■■
■System Users
A user may not be able to operate a panic or emergency switch
possibly due to permanent or temporary physical disability, inability
to reach the device in time, or unfamiliarity with the correct opera-
tion. It is important that all system users be trained in the correct
operation of the alarm system and that they know how to respond
when the system indicates an alarm.
■■
■■
■Smoke Detectors
Smoke detectors that are a part of this system may not properly
alert occupants of a fire for a number of reasons, some of which
follow. The smoke detectors may have been improperly installed
or positioned. Smoke may not be able to reach the smoke de-
tectors, such as when the fire is in a chimney, walls or roofs, or
on the other side of closed doors. Smoke detectors may not
detect smoke from fires on another level of the residence or
building.
Every fire is different in the amount of smoke produced and the
rate of burning. Smoke detectors cannot sense all types of fires
equally well. Smoke detectors may not provide timely warning
of fires caused by carelessness or safety hazards such as smoking
in bed, violent explosions, escaping gas, improper storage of
flammable materials, overloaded electrical circuits, children
playing with matches or arson.
Even if the smoke detector operates as intended, there may be
circumstances when there is insufficient warning to allow all oc-
cupants to escape in time to avoid injury or death.
■■
■■
■Motion Detectors
Motion detectors can only detect motion within the designated
areas as shown in their respective installation instructions. They
cannot discriminate between intruders and intended occupants.
Motion detectors do not provide volumetric area protection. They
have multiple beams of detection and motion can only be detected
in unobstructed areas covered by these beams. They cannot detect
motion which occurs behind walls, ceilings, floor, closed doors,
glass partitions, glass doors or windows. Any type of tampering
whether intentional or unintentional such as masking, painting, or
spraying of any material on the lenses, mirrors, windows or any
other part of the detection system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in
temperature. However their effectiveness can be reduced when
the ambient temperature rises near or above body temperature or if
there are intentional or unintentional sources of heat in or near the
detection area. Some of these heat sources could be heaters, radia-
tors, stoves, barbeques, fireplaces, sunlight, steam vents, lighting
and so on.
■■
■■
■Warning Devices
Warning devices such as sirens, bells, horns, or strobes may not
warn people or waken someone sleeping if there is an interven-
ing wall or door. If warning devices are located on a different
level of the residence or premise, then it is less likely that the
occupants will be alerted or awakened. Audible warning devices
may be interfered with by other noise sources such as stereos,
radios, televisions, air conditioners or other appliances, or
passing traffic. Audible warning devices, however loud, may
not be heard by a hearing-impaired person.
■■
■■
■Telephone Lines
If telephone lines are used to transmit alarms, they may be out of
service or busy for certain periods of time. Also an intruder may
cut the telephone line or defeat its operation by more sophisticated
means which may be difficult to detect.
■■
■■
■Insufficient Time
There may be circumstances when the system will operate as
intended, yet the occupants will not be protected from the emer-
gency due to their inability to respond to the warnings in a
timely manner. If the system is monitored, the response may not
occur in time to protect the occupants or their belongings.
■■
■■
■Component Failure
Although every effort has been made to make this system as
reliable as possible, the system may fail to function as intended
due to the failure of a component.
■■
■■
■Inadequate Testing
Most problems that would prevent an alarm system from oper-
ating as intended can be found by regular testing and mainte-
nance. The complete system should be tested weekly and im-
mediately after a break-in, an attempted break-in, a fire, a storm,
an earthquake, an accident, or any kind of construction activity
inside or outside the premises. The testing should include all
sensing devices, keypads, consoles, alarm indicating devices
and any other operational devices that are part of the system.
■■
■■
■Security and Insurance
Regardless of its capabilities, an alarm system is not a substitute
for property or life insurance. An alarm system also is not a substitute
for property owners, renters, or other occupants to act prudently to
prevent or minimize the harmful effects of an emergency situation.

1
Table of Contents
Introduction 3
Section 1: General System Operation 4
1.1 Getting to Know Your System ............................................ 4
1.2 Arming Your System ........................................................... 5
1.3 Alternate Arming Met ods ................................................ 6
1.4 Disarming Your System ...................................................... 7
1.5 Alarm Memory ..................................................................... 9
1.6 W at to Do If An Alarm Sounds ........................................ 9
1.7 Bypassing Zones or Groups of Zones ............................. 10
1.8 Viewing Trouble Conditions ............................................ 11
Section 2: Access Codes 12
2.1 Programming A New Access Code ................................. 12
2.2 Modifying an Existing Code ............................................ 14
2.3 C anging User Code Options ..........................................15
2.4 Access Code Label Options ..............................................15
2.5 Deleting an Existing Code ................................................ 17
2.6 Special Codes ...................................................................... 17
2.7 Installer Programmed Codes ........................................... 18
Section 3: System Administration 19
3.1 Turning on Quick Arm ...................................................... 19
3.2 Turning on Quick Exit ....................................................... 19
3.3 Controlling Automatic Arming........................................19
3.4 Setting t e Time and Date.................................................20
3.5 Activating Door C ime ..................................................... 21
3.6 Viewing t e Event Buffer .................................................. 21
3.7 [✱][7] Command Outputs 1-8 .......................................... 21
3.8 C anging Keypad Settings ............................................... 22
3.9 Downloading Options ....................................................... 22
3.10 PC-LINK Enable Option ...................................................23
3.11 Audio Options .................................................................... 23
3.12 Turning Background Music On or Off ............................ 23
Section 4: Access Control 24
4.1 About Access Card Readers (PC4820 Modules) ............ 24
4.2 Programming Access Cards (PC4820 Modules) ........... 25
4.3 Searc ing Using Access Card Numbers
(PC4820 Modules) ............................................................. 27
4.4 Adding User Telep one Numbers (PC4850 Modules) . 27
4.5 Adding Tenant Codes for Users (PC4850 Modules) .....28

2
Section 5: Testing and Maintenance 29
5.1 Performing a Walk Test ..................................................... 29
5.2 Performing a System Test ................................................. 30
5.3 Performing a Lamp Test (PC4216) ................................... 30
5.4 System Maintenance .......................................................... 30
Section 6: Fire Safety 31
6.1 Fire Alarm Operation ........................................................ 31
6.2 Guidelines for Locating Smoke Detectors ...................... 31
6.3 House old Fire Safety Audit............................................ 33
6.4 Fire Escape Planning ......................................................... 33
Appendix A – Special Characters 35
Table of Contents

3
Introduction
About Your Security System
Your DSC security equipment as been designed to give you t e greatest
possible flexibility and convenience. T e LCD keypad will guide you
t roug eac operation wit Englis language prompts. T e keypad
provides audible feedback eac time a key is pressed; wit unique audible
sequences, it will also signal system troubles and ot er indications of
system status.
Read t is manual carefully and ave your installer instruct you on your
system’s operation. Become familiar wit t e features t at ave been
implemented on your system. All users of t is system s ould be equally
instructed in its use.
About this Manual
T is manual is a t oroug explanation of all system functions, including
troubles ooting and programming access codes in addition to performing
basic system functions. Most users of t e system will not need to know
all of t is information. T e first section of t is manual, titled “General
System Operation,” explains general system concepts and instructs t e
user on ow to arm and disarm t e system and bypass zones. P otocopy
t is section and distribute it to general users of t e system. T e remaining
sections of t e manual are reserved for more detailed system information.
Fire Detection
T is equipment is capable of monitoring fire detection devices suc as
smoke detectors and providing a warning alarm if a fire condition is
detected. Good fire detection depends on aving adequate numbers of
fire detectors placed in appropriate locations. T is equipment s ould be
installed in accordance wit NFPA 72 (NFPA, 1 Batterymarc Park,
Quincey MA 02269). Carefully review t e “Fire Escape Planning”
guidelines in t is manual.
NOTE: Your installer must enable the fire detection portion of this
equipment before it will work.
Monitoring
T is system is capable of transmitting alarms, troubles, and emergency
information over telep one lines to a monitoring station. If you
inadvertently initiate an alarm, immediately call t e monitoring station
to prevent an unnecessary response.
NOTE: Your installer must enable the monitoring function before it
will work.

4
Section 1: General System
Operation
1.1 Getting to Know Your System
Your security system is made up of a control panel, one or more keypads
and various detectors and sensors. T e control panel will be mounted
out of t e way in a utility room or basement. T e metal control cabinet
contains t e system’s electronics and stand-by battery. T ere is normally
no reason for anyone except an installer or service person to ave access
to t e control panel.
T e keypads eac ave an audible indicator, an alp anumeric liquid
crystal display (LCD), status lig ts and command entry keys. T e keypad
is used to send commands to t e system and to display t e current system
status. Eac keypad will be mounted in convenient locations inside t e
protected premises, near designated points of entry/exit.
Zones and Partitions
T e protected premises as been divided by your installer into zones and
partitions. A zone is an area of protection t at as one or more detection
sensors connected to it (motion detectors, glassbreak detectors, door
contacts or s ock sensors). A single zone mig t be a room, a allway or a
door or window. Two or more of t ese zones will be linked toget er by
t e control panel to form a partition.
A partition is a region of t e protected premises. A partition can be armed
and disarmed independently from ot er partitions. All of t e partitions
toget er form t e entire system.
Some zones will belong to more t an one partition, suc as points of entry/
exit and allways. T ese are called global zones because t ey are not
assigned to a single partition.
Access Codes
As a user of t e system, you will be assigned a 4- or 6-digit access code.
Access codes are used to arm and disarm t e partition(s) to w ic t ey
are assigned. Some access codes can perform additional system functions,
suc as programming system options and bypassing zones.
Your access code may not allow you to access certain system functions.For
instance, if your code is only allowed to arm and disarm Partition 1, you
will not be able to arm or disarm ot er partitions, or t e entire system.

5
Section 1: General System Operation
Keypads
Several LCD keypads will be installed t roug out t e protected premises,
usually one at eac entry/exit door. Some keypads are programmed only
to access a single partition. T ese are called partition keypads.
If required, t e system may ave a global keypad. A global keypad can
access any partition. W en you enter your access code at a global keypad,
you will be asked w ic partition you would like to arm. T e keypad
will only offer t e partitions available for your access code.
T e keypad will display t e message “Enter Your Access Code” w en it
is not in use. Sometimes, it may display t e time and date. W atever t e
display, enter a valid access code on t e keypad to access t e system.
Audio Help
If your security system as an audio matrix module (PC49XX and intercom
stations) and an Escort4580 connected, it can provide step-by-step audio
instructions t roug t e intercom stations. Access t e elp function by
pressing and olding for 2 seconds t e "Help" button on any system
keypad. T e system will prompt you over t e intercom stations.
NOTE: If a user is accessing the Escort locally over the telephone line,
the Help button will not work.
1.2 Arming Your System
1. Prepare t e partition to be armed by closing all protected doors and
windows. Also, stop any movement in areas covered by motion
detectors.
2. If t e time and date appears on t e LCD keypad display, press t e
[#] key. T e “Enter Code to Arm System” message s ould appear. If
t e display reads “Secure System Before Arming,” ensure t at all
doors and windows ave been s ut and t at all motion as ceased.
3. W en you see t e “Enter Code to Arm System” message, enter your
4- or 6-digit access code. If t e access code was entered incorrectly,
t e keypad will beep steadily for two seconds.
For Single-Partition Access Codes
W en a single-partition access code is entered, t e system will only arm
t e partition your code as access to. T e “Exit delay in Progress” message
will be displayed, t e Armed lig t will turn on, and t e keypad will beep
t ree times quickly. T e exit delay will begin, providing up to two minutes
for you to exit t e partition wit out causing an alarm.
Exit t e premises t roug t e designated exit/entry door. A timer will
appear in t e rig t side of t e LCD keypad display indicating t e
remaining time in t e exit delay period. W en t e allowed exit time
expires, t e partition will be armed. T e message “Enter Code to Disarm
System” will appear on t e keypad.

6
For Multi-Partition Access Codes
W en a multi-partition access code is entered, you must tell t e system
w ic partition(s) you wis to arm. T e system will only offer to arm t e
partitions for w ic your code is programmed. Once you ave entered
your code, t e display will read:
(0) TO ARM < >
(Partition Label) R
T e lower rig t and corner of t e display will s ow t e partition status
using t e letter “R” for t e partitions w ic are Ready to be armed, “A”
for t e partitions w ic are already Armed and “N” for t ose partitions
w ic are not yet secured. To arm t e partition indicated on t e display,
press t e number in parent eses (in t is case, [0]) or press t e [✱] key.
T e exit delay will begin, providing a period of time for you to exit t e
partition wit out causing an alarm. Once t e exit delay as expired, t e
partition will be armed.
If you wis to arm anot er partition, use t e arrow (< >) keys to scroll
t oug t e partitions available to be armed by your access code. To select
a partition, enter t e number indicated in parent eses, or press t e [✱]
key. If you ave selected anot er partition, t e keypad will display t e
following message:
Select (0) < >
Arm Partition R
To arm t e partition, enter t e number indicated in parent eses, or press
t e [✱] key. T e exit delay will begin in t e ot er partition and t e keypad
will read:
Exit Delay
In Progress
T is display will remain for a few seconds until t e keypad returns to t e
previous “(0) To Arm…” display.
1.3 Alternate Arming Methods
Away Arming
Arming t e system in t e Away mode will ave all interior zones and
perimeter zones active. If motion is detected in t e interior zones, or if
one of t e perimeter zones is violated, t e alarm sequence will begin. To
arm in t e Away mode, enter your access code, select t e partition(s) to
be armed and exit t e premises t roug a designated exit/entry door.
T e system will recognize t at you ave left t e premises. Once t e exit
delay expires, t e system will be armed in t e Away mode.

7
Section 1: General System Operation
Stay Arming
T is feature, if enabled, will allow you to arm t e perimeter zones w ile
leaving some interior zones inactive so t at you can remain on t e premises
w ile t e system is armed. W en you enter your access code to arm t e
system and do not exit t e premises t roug a designated exit/entry door,
t e system will arm in t e Stay mode, automatically bypassing t e interior
zones.
T e interior zones can be reactivated at any time by entering [✱][1] at any
keypad. If you reactivate t e interior zones, be sure t at you do not enter
areas not protected by motion detectors. To access areas protected by
motion sensors, you must enter your security code to disarm t e system.
Arming Without Entry Delay
T e entry delay is t e period during w ic someone may enter an armed
area wit out causing an alarm, providing time to get to a keypad to disarm
t e system. If you wis to arm your system wit out t e entry delay, enter
[✱][9] t en your access code. T e Armed lig t will flas as a reminder
t at t e system is armed and as no entry delay. T e system will bypass
t e interior zones. An entry t roug any exit/entry door will create an
instant alarm.
Quick Arm
W en t e Quick Arm feature is enabled, you can arm t e system by
pressing [✱][0], instead of your access code.
Please note t at pressing [✱][0] will only allow you to arm t e system; to
disarm, you must enter a valid access code. Your system administrator
will inform you if t e Quick Arm feature as been enabled on your system.
1.4 Disarming Your System
1. Enter t e premises t roug a designated exit/entry door. Entering
t e premises t roug any door not designated as a point of entry
will cause an immediate alarm. As soon as t e exit/entry door is
opened, t e keypad sounder will beep and t e entry delay will begin.
T e entry delay provides up to 255 seconds to disarm t e system.
2. Go to t e keypad and enter your access code. If you make an error
when entering the code, press the [#] key and enter the code again.
T e Armed lig t will turn off and t e keypad buzzer will stop. A
valid access code must be entered before t e entry delay time expires.
If an alarm occurred w ile t e panel was armed, t e “View Memory”
message will be on t e display wit t e zone name for t e zone t at caused
t e alarm. T e display will keep t ose messages on for two minutes or
until t e [#] key is pressed. T e keypad will t en return to it’s idle state.

8
Disarming Another Partition
If you ave a multi-partition access code, you can disarm ot er partitions
before entering t em. To disarm anot er partition, enter your access code.
T e keypad display will read:
(0) TO ARM < >
(Partition Label) R
Use t e arrow (< >) keys to scroll to t e partition you wis to disarm.
Remember t at only partitions to w ic your access code is assigned will
be displayed. If t e partition you ave selected is armed, t e letter “A”
will appear on t e bottom rig t- and corner of t e display, as in t e
following example:
(2) TO SELECT < >
(Partition Label) A
To disarm t e partition, press t e number in parent eses (in t is case, [2])
or press t e [✱] key.
Group Bypassing
If your system is setup for group bypassing you will be allowed to bypass
a group of zones w ile t e system is 'armed or disarmed'.
W en t e system is 'disarmed' t e keypad will display:
'Secure System
'Before Arming < >'
or
'Enter Code to
Arm System < >'
If t e system is armed, t e keypad will display:
' Enter Code To
' Disarm System < >'
Press t e (< >) keys until t e display s ows t e group you wis to bypass,
usually your installer will program an appropriate label to define your
group of zones to make it easier. For example, if you ave a bedroom t at
is setup for group bypassing t e keypad could display:
' ✱To Bypass < >
Bedroom 1'
or if t e label says 'Safe' :
' ✱To Bypass <>
Safe'

9
Section 1: General System Operation
Once you find t e Group you wis to bypass by pressing t e < > keys,
press t e [✱] key to select t e group. Once t e [✱] key is pressed t e keypad
will t en display:
'Enter Your
'Access Code'
Once a valid access code is entered t e keypad will sound t ree beeps,
indicating a successful bypass.
T e group t at is bypassed will be displayed on t e keypad and t e keypad
will sound two beeps. If anot er group is bypassed t e keypad will
automatically advance and s ow t e next group t at is bypassed. T e
keypad will display t e time in w ic t e group of zones will be bypassed
for:
'XXh YYm Bypass 'XXh YYm Bypass
Bedroom 1' Safe'
XX is t e number of ours remaining and YY is t e number of minutes
remaining until t e bypass is automatically removed.
If t ere is no zone activity for one minute t e countdown will automatically
jump to one minute.
'00h 01m Bypass
(Bypass Group Label)
T e keypad will beep six times as a warning t at t e bypass will be
removed in one minute.
1.5 Alarm Memory
To view alarms t at occurred w ile t e system was armed, press [✱] t en
[3]. Alarms caused during t e last armed period will be displayed. Press [#]
w en you ave finis ed viewing alarms to exit t e alarm memory mode.
NOTE: Tamper alarms will not be shown in alarm memory display.
1.6 What to Do If An Alarm Sounds
Fire Alarm
If your system as been installed wit fire detectors, a fire alarm will be
indicated by a pulsing siren.
If you ear a fire alarm, follow your emergency evacuation plan
immediately (see Section 6.5 “Fire Escape Planning”).
Intrusion Alarm
An intrusion alarm will be indicated by a continuous bell or siren.
You can silence an intrusion alarm by entering a valid access code. If t e
alarm was unintentional, call local aut orities immediately to avoid an
unnecessary response.
You can determine t e source of t e alarm by entering t e alarm memory
mode. Once t e source of t e alarm as been corrected, t e panel can be
restored to its original armed state.

10
1.7 Bypassing Zones or Groups of Zones
You can use zone bypassing or group bypassing w en access is needed to
part of t e protected area w ile t e system is armed. Zones w ic are
temporarily out of service due to damaged wiring or contacts may be
bypassed to allow system arming until repairs can be made.
Group Bypassing
Group bypassing is t e same as zone bypassing except 'group bypassing'
includes a 'group' of zones bypassed for a period of time. T ese groups
and times s ould already be pre-defined by your service tec nician. Group
Bypassing can be used in t e armed or disarmed state.
Bypassed zones\groups will not cause an alarm. Zones cannot be bypassed
once t e system is armed. Bypassed zones are automatically canceled eac
time t e system is disarmed and must be reapplied before t e next arming.
NOTE: For security reasons, your System Administrator may program
the system to prevent you from bypassing certain zones.
Bypassing zones reduces your security protection. If you are bypassing a
zone due to damaged wiring or contacts, please notify your system
administrator or call a service tec nician immediately so t at t e problem
can be resolved and your system returned to proper working order.
To bypass zones:
1. Enter [✱][1]. You may be required to enter your access code.
2. A menu will outline t e various bypassing options. Use t e arrow (< >)
keys to scroll t roug t e options. W en you find t e correct option, press
t e [✱] key to select it, or press t e corresponding number in parent eses.
T e bypassing options are as follows:
[0] Bypass pen Zones - T is section will only display t e zones w ic
are currently open or bypassed. Use t e arrow (< >) keys to scroll t roug
t ese zones. Zones t at are open will be indicated by an exclamation (!)
mark in t e lower rig t and side of t e keypad display. To select a zone
to be bypassed, press t e [✱] key. A "✱" will appear next to t e zone label
to indicate t at t e zone as been bypassed. W en you are done selecting
zones, press [#] to exit.
[1] Bypass Zones - T is selection takes you immediately to bypassing zones.
Use t e arrow (< >) keys to find t e zone to be bypassed and press t e [✱] key
to select it. A "✱" will appear next to t e zone label to indicate t at t e zone
as been bypassed. W en you are done selecting zones, press [#] to exit.
[2] Clear Bypasses - T is selection will allow you to turn bypassing off
for all of t e zones in your partition.
[3] Recall Bypasses - T is selection will automatically bypass t e same
group of zones w ic were bypassed t e last time t e partition was armed.
[4] Group Bypassing - T is selection will only appear if your system is
setup for group bypassing. Once in t is menu, you can eit er scroll (< >)
or press t e number key of t e corresponding group You wis to bypass.
[5] Previous Menu - T is selection will return t e display to "Enter Code
to Arm System." From ere, you will be able to arm t e system.

11
Section 1: General System Operation
1.8 Viewing Trouble Conditions
T e alarm control panel continuously monitors a number of possible
trouble conditions. If one of t ese conditions occurs, t e keypad Trouble
lig t will turn on and a beeping sound will be eard every 10 seconds.
Press t e [#] key to silence t e keypad. T e Trouble lig t will stay on until
t e trouble is cleared.
To view w ic trouble conditions are present:
1. Enter [✱][2] at any keypad.
2. Use t e arrow (< >) keys to scroll t roug t e list of trouble conditions:
If AC Trouble is present, t e system as lost its power. T is trouble may
be due to a power outage and s ould be cleared once t e power is restored.
If t e power on t e premises is running normally and t e trouble condition
persists, call your installer for service.
If TLM Trouble is present, t ere is a problem wit t e telep one line. If
t e telep ones on t e premises are running normally and t e trouble
condition persists, call your installer for service.
Any ot er trouble condition will require t e assistance of your installer.
As soon as a trouble condition occurs, call your installer to ave t e
problem corrected as soon as possible.

12
Section 2: Access Codes
Access codes are used to arm and disarm t e system as well as to access
system functions. T ere are many different codes available on t e system.
T e Grand System Master Code will be able to perform all system
functions. T is includes zone bypassing, activating outputs enabling user
options and programming access codes. T e Grand System Master Code
is access code 0001. Normally, only your installer can c ange t is code.
Please ask your installer if you wis to be able to alter t is code.
T e following sections explain ow to program new codes and modify
existing codes. All access code options will also be described.
2.1 Programming A New Access Code
T is section describes t e basic aspects to programming an access code:
• How to select a new access code for programming
• How to program t e 4- or 6-digit code
• How to program t e user’s name to identify t e code
• How to select t e partitions t e code will be active on
To select a new access code for programming, perform t e following steps:
1. Enter [✱][5] followed by a Master Code.
2. T e display will read:
Select (0) < >
User No. Search
Press [0] or [✱].
3. T e display will read:
Sel. Code (0001) < >
User 1
User 1 (Access Code 0001) is t e System Master Code. Your installer
may already ave programmed t is code. Use t e rig t arrow (>)
key to scroll to t e code you wis to program (for example, access
code 0002). Press [✱] to select t e code.
4. T e display will read:
Select (0) < >
Program Code
T is is t e Program Code menu. Use t e rig t arrow (>) key to scroll
t oug eac display in t e Program Code menu. Eac display
pertains to a different aspect of access code programming, including
t e t ree listed below. To select any menu item for programming,
press [✱].

13
Section 2: Access Codes
Program Code
You will need to program a four-digit code for eac user. Six-digit
access codes are also available. Talk to your installer if you require six-
digit access codes on your system.
To program t e code for t e new access code, perform t e following:
1. From t e Program Code menu, use t e arrow keys to scroll to t e
first message: “Select (0) Program Code.” Press [0] or [✱] to program
t e access code.
2. T e display will indicate “Enter Digits” followed by “AAAA.” T is
is t e default setting for t e access code. Enter a new four- or six-
digit code.
3. Press [#]. T e display will return to “Select (0) Program Code.” T e
new code as been programmed.
NOTE: Do not program access codes that can be easily guessed and
will compromise the security of your system (e.g. 1111 or 1234).
NOTE: Your installer may have set up your system to prevent you from
programming the same access code for more than one user.
Edit User Name
You can program a name for eac user. T is name is displayed on t e
keypad w en you are editing access codes, and is also s own in t e event
buffer for t e system. If a PC4850 Telep one Access module is connected
to t e system, t e User Name will be displayed on t e PC4850 LCD screen
for visitors.
To program t e user name for t e new access code, perform t e following:
1. From t e Program Code menu, use t e rig t arrow (>) key to scroll
to t e following display:
Select (2) < >
Edit User Name
2. Press [2] or [✱].
3. T e display will read “Program Name.” For access code 0002, t e
default name will be “User 2.” Enter t e new access code name using
t e number keys in t e following manner:
T e letters of t e alp abet ave been divided up among t e 1 to 9 number
keys on t e keypad as follows:
[1] = A, B, C, 1 [2] = D, E, F, 2 [3] = G, H, I, 3 [4] = J, K, L, 4
[5] = M, N, O, 5 [6] = P, Q, R, 6 [7] = S, T, U, 7 [8] = V, W, X, 8
[9] = Y, Z, 9, 0 [0] = Space
For example, if you press t e [4] key once, t e letter “J” will appear above
t e cursor on t e display. Press t e [4] key again, t e next letter “K” will
appear, and so on. If a different number key is pressed, t e cursor will
automatically move to t e rig t one space. To erase a c aracter, use t e [<]
[>] keys to move t e cursor under t e c aracter, t en press t e [0] key. (See
section 2.4 for ot er options available w en programming user names.)

14
NOTE: If a user does not want their name listed on the PC4850 display,
but does want to have an access code, you can put a “!” at the
beginning of the user name. To enter a “!”, press [
✱
], then scroll to
the message “ASCII Entry”. Press [
✱
], then enter [033][
✱
].
4. Once t e new name as been entered, press [#]. T e display will return
to “Select (2) Edit User Name.”
Edit Partition Mask
Your installer as divided t e system into partitions. T e system may
contain one or more partitions. In order for an access code to function,
you must program w ic partitions t e code will be active on. If your
system only as one partition, you must activate t e code for partition 1.
To program partition access for t e new access code, perform t e following:
1. From t e Program Code menu, use t e rig t arrow (>) key to scroll
to t e following display:
Select (6) < >
Edit Part. Mask
2. Press [6] or [✱]. T e display will read “Select Toggle < >.” Partition 1
will be displayed, followed by t e letter “N.” T is means t at
Partition 1 is not available for t at code. Press [✱] to select Partition
1 (Y). T e [✱] key will alternately enable (Y) and disable (N) t e
partition for t e selected code.
3. Use t e rig t arrow (>) key to scroll to t e next partition on t e system.
Press [✱] to enable or disable t e partition. Repeat t is step for t e
rest of t e partitions on t e system until t e desired partition access
as been granted for t e selected code.
4. Press [#] once you ave finis ed programming t e partition mask
for t e code. T e display will return to “Select (6) Edit Part. Mask.”
2.2 Modifying an Existing Code
To modify an existing code, you must first searc for it using one of two
met ods: searc by user number or by user name.
To searc for t e code by user number, perform t e following:
1. Enter [✱][5] followed by a Master code.
2. T e display will read:
Select (0) for
User Number Search
Press [0] or [✱].
3. Enter t e access code number and press [✱] to continue
programming. You can also use t e arrow (< >) keys to scroll to t e
desired number.
To searc for t e code by user name, perform t e following:
1. Enter [✱][5] followed by a Master code.
2. T e display will read “Select (0) for User Number Searc .” Use t e
rig t arrow (>) key to scroll to t e following display:

15
Section 2: Access Codes
Select (1) for
User Name Search
Press [1] or [✱].
3. T e first letter of t e access code name using t e corresponding
number key. For example, for Jo n, enter t e letter “J” by pressing
t e [4] key once.
4. T e keypad will display t e first available name starting wit t e
selected letter. Use t e rig t arrow (>) key to scroll t roug
subsequent names.
5. Once t e appropriate user name is displayed, press [✱] to continue
programming.
Once t e code as been selected, t e Program Code menu will be s own.
Reprogram t e access code, code label or partition access using t e steps
outlined in Section 2.1 “Program a New Code”.
Changing Access Codes
If you ave an access code t at as t e ability to c ange your own code
t e following steps are required:
1. Enter [✱] [5] followed by your access code.
2. T e display will indicate "Enter Digits" Enter a new four-digit access
code. Even if six-digit is enabled you will only be allowed to c ange t e
last four digits of your access code.
3. Press [#].
2.3 Changing User Code Options
User code options determine w ic system features t e code will be able to
access. Table 2-1 s ows all of t e available access code options. T e table
also indicates w ic options are enabled by default for eac type of code.
To c ange t e user options for a code from its default settings, perform
t e following:
1. Enter [✱][5] followed by a Master code.
2. Locate t e code using one of t e code searc ing met ods (see Section
2.2). Press [✱] to select.
3. Use t e rig t arrow (>) key to scroll to t e following display:
Select (5) < >
Edit User Opt’s
Press [5] or [✱].
4. Use t e arrow (< >) keys to scroll t roug eac option. Press [✱] to
turn eac option on (Y) or off (N).
5. W en t e desired options ave been programmed, press [#].
2.4 Access Code Label Options
In Section 2.1, you learned ow to program t e access code label (“Program
User Name”). T ere are ot er options available w en programming labels.
W en programming t e label, press t e [✱] key for t e options menu. Use
t e arrow (< >) keys to scroll t roug eac option. Press t e [✱] key to select.

16
System Master
System MasterSystem Master
System Master
Select this option to program a Grand System Master
Code
Ye s
Supervisor
SupervisorSupervisor
Supervisor
Select this option to program a Supervisor code. You
must also program the partition mask for this code.
Ye s ** Ye s
Arm
ArmArm
Arm
Allows arming of the assigned partition(s). Ye s Yes Yes Yes Yes
Disarm
DisarmDisarm
Disarm
Allows disarming of the assigned partition(s). Ye s Yes Yes Yes Yes
Bypass
BypassBypass
Bypass
Allows bypassing of zones on the assigned partition(s). Ye s Yes Yes Yes Yes
Command Output
Command OutputCommand Output
Command Output
Allows activation of a [*][7][X] command output when an
access code is required. For more information, ask your
installer.
Ye s Yes Yes Yes Yes
Duress Pulse
Duress PulseDuress Pulse
Duress Pulse
Select option for Duress codes only.
One-Time Use
One-Time UseOne-Time Use
One-Time Use
Select option for One-Time Use codes only (see
"Special Codes")
Escort4580 Access
Escort4580 AccessEscort4580 Access
Escort4580 Access
Allows access to the Escort4580 audio assistant, if
installed.
Ye s Yes Yes Yes Yes
Global Access
Global AccessGlobal Access
Global Access
Allows use of a Global keypad. Ye s Yes Yes Yes Yes
Partition Select Menu
Partition Select MenuPartition Select Menu
Partition Select Menu
Allows all accessible partitions to be viewed when the
code is entered.
Ye s Yes Yes Yes Yes
Card Valid
Card ValidCard Valid
Card Valid For Access Control Systems only. Ye s Ye s Ye s Ye s Ye s
Privilege Card
Privilege CardPrivilege Card
Privilege Card (same as previous) Ye s Ye s
Wait for Prvl
Wait for PrvlWait for Prvl
Wait for Prvl (same as previous)
Silence Fire
Silence FireSilence Fire
Silence Fire
Allows the user to silence and reset any Fire Alarms on
the selected partitions by entering their access code on
the partition keypad.
Ye s Yes Yes Yes Yes
T- Co d e
T- Co d eT- Co d e
T- Co d e
T-codes can be turned on or off by partition using
the “Special - T-code” function key.
Telephone Number
Telephone NumberTelephone Number
Telephone Number
If a PC4850 Telephone Entry module is connected,
enter a 12-digit telephone number for each user.
Tenant Code
Tenant CodeTenant Code
Tenant Code
If a PC4850 Telephone Entry module is connected,
enter a 4-digit tenant code (tenant codes cannot
start with 0).
Change Code
Change CodeChange Code
Change Code
When this option is enabled, the user will only be
allowed to change their access code.
No No No No No
Disarm Delay
Disarm DelayDisarm Delay
Disarm Delay
When this option is enabled, the user will not be able to
disarm the partition immediately. A delay will occur before
disarming (see Section 8.4).
No No No No No
Group Bypass
Group BypassGroup Bypass
Group Bypass
When this option is enabled, the user will be able to bypass
a group of zones that are set up for Group Bypassing (see
Section 5.5).
Yes Yes Yes No No
* Code abbreviations: GM = Grand System Master; 2M = Second Master;
SM = System Master; S = Supervisor; AC = Access Code (default).
The options for the Grand System Master and Second Master codes cannot be
changed from their default settings.
**For the System Master code, the supervisor option changes to Yes after you exit
access code programming.

17
Section 2: Access Codes
T e available options are:
• Clear Display: Selecting t is option will clear t e entire code label.
• Clear to End: T is will clear t e display from t e c aracter w ere
t e cursor was located to t e end of t e display.
• Change Case: T is will toggle t e letter entry between uppercase
and lowercase letters.
• ASCII Entry: T is is for entering uncommon c aracters. Use t e arrow
(< >) keys to scroll t roug t e available c aracters. Eac c aracter
will be displayed along wit t e corresponding 3-digit ASCII number.
If you know t e c aracter’s 3-digit number, enter it. Press t e [✱] key
to enter t e c aracter into t e code label. See Appendix A at t e back
of t is manual for a list of t e available ASCII c aracters.
2.5 Deleting an Existing Code
An access code may be erased in two parts. First, all data pertaining to t e
code may be deleted (access code, user options, partition access, etc.). T e
access code label is erased separately.
To delete all access code data from an existing code, perform t e following:
1. Enter [✱][5] followed by a Master code.
2. Locate t e code using one of t e code-searc ing met ods (see Section
2.2 “Modifying an Existing Code”). Press [✱] to select.
3. Use t e rig t arrow (>) key to scroll to t e following display:
Select (1) < >
Erase Data
4. Press [1] or [✱]. All data pertaining to t e access code, except t e
access code name, will be erased.
To delete t e access code name from an existing code, perform t e
following:
1. Enter [✱][5] followed by a Master code.
2. Locate t e code using one of t e code-searc ing met ods (see Section
2.2 “Modifying an Existing Code”). Press [✱] to select.
3. Use t e rig t arrow (>) key to scroll to t e to “Select (2) Edit User
Name” and press [✱].
4. T e display will indicate t e current name. Press [✱].
5. T e display will read “Select (0) Clear Display.” Press [✱]. T e access
code name will be erased.
6. Follow t e instructions outlined in Section 2.1 to program a new
label, or press [#] until you ave exited access code programming.
2.6 Special Codes
T e following are special codes. Selecting t e corresponding user option
will program eac code (see Section 2.3 “C ange User Code Options”).
System Master Codes
System Master codes ave access to all partitions on t e system. T ese
codes can be used to program ot er access codes, except for ot er System
Master codes. For a list of t e ot er user options t at are enabled for t is
code, see Table 2-1.

18
Supervisor Codes
T e supervisor code can be used to program ot er access codes t at are
only to be active on t e supervisor’s partition. Users wit Supervisor codes
cannot program ot er Supervisor codes, or System Master codes. For a list
of t e ot er user options t at are enabled for t is code, see Table 2-1.
Duress Codes
If t e “Duress” user option is enabled, t e code will become a Duress
code. W en t is code is entered, t e system will send a duress signal to
t e monitoring station. Make sure t at t e Arm and Disarm user options
are also enabled for t is code.
One-time Use Codes
If t e “One-time Use” option is enabled, t e code will become a One-time
Use code. T e code can be used to disarm assigned partitions. W en a
user arms t e system using a One-Time Use code, t e panel will erase t e
code once t e Exit Delay expires; after t is time, t e code cannot be used
again. Make sure t at t e Arm and Disarm user options are also enabled
for t is code.
Log Only Codes
A “Log Only” code will only create an entry in t e event buffer w en
entered at a keypad. Example: a log-only code may be used by a guard to
record t e time t at t ey c ecked eac area of t e premises.
To create a log-only code, disable all t e access code options for t e code.
Temporary Codes
A “Temporary code” is an access code t at can be turned on or off by
partition using t e “T-Code” function key. Any code wit t e temporary
code attribute enabled will work t is way.
To turn temporary codes on for a partition, press and old t e “T-Code”
function key at a keypad assigned to t e partition. You may need to enter
an access code after pressing t e “T-Code” key.
If enabled for your access code, you can also turn temporary codes on
and off for any partition by entering [✱][6][access code][0][3].
2.7 Installer Programmed Codes
T ese are access codes t at are programmed by your installer. Talk to your
installer for more information regarding t ese codes.
• Second Master Code: T is code as t e same properties as t e System
Grand Master code. Only your installer can program t is code.
• Walk Test Code: T e Walk Test code is used to access t e walk test
mode. See Section 5.1 “Walk Test” for instructions on performing a
walk test.
• Guard Code: T is code is only valid w en a partition is disarmed
and for a programmed amount of time after a partition is armed
using t e Guard code. Only your installer can program t e Guard
code.
Table of contents
Other DSC Security System manuals

DSC
DSC 3G2055 User manual

DSC
DSC PC5008 User manual

DSC
DSC PowerSeries PC1404 User manual

DSC
DSC Power832 User manual

DSC
DSC PC1510 User manual

DSC
DSC PC2525 User manual

DSC
DSC Envoy NT9010 v1.0 Owner's manual

DSC
DSC Impassa WT4911 User manual

DSC
DSC POWER 608 User manual

DSC
DSC SYSTEM MASTER PC4000 User manual
Popular Security System manuals by other brands

Cooper
Cooper Scantronic HOMELINK EXTRA Installation & programming guide

Federal Signal Corporation
Federal Signal Corporation Fireball FB2LEDX Series Installation and maintenance instructions

Gemini
Gemini 931T Installation and use manual

First Alert
First Alert FA142C installation instructions

D2D
D2D 3102 Quick reference install guide

Commax
Commax CDS-2AG user manual