Risco Agility User manual

User Manual

Agility User Manual
Page 2
Important Notice
This guide is delivered subject to the following conditions and restrictions:
This guide contains proprietary information belonging to RISCO Group. Such
information is supplied solely for the purpose of assisting e plicitly and properly
authorized users of the system.
No part of its contents may be used for any other purpose, disclosed to any person
or fi rm , or re pro duced by any me an s , ele c t roni c or me chani c al , wi thout th e e pr ess
prior written permission of RISCO Group.
The information contained herein is for the purpose of illustration and reference
only.
Information in this document is subject to change without notice.
Corpo ra t e and indiv idual name s an d da t a used in e am pl e s here in belong to th eir
respective owners.
All rights reserved.
©
2008 RISCO Group August 2008

Agility User Manual
Page 3
Table of Contents
Chapter 1 Introduction ......................................................................................... 5
NKN=j~áå=cÉ~íìêÉë
....................................................................................................................................... 5
NKO=^Öáäáíó=^êÅÜáíÉÅíìêÉ
................................................................................................................................6
NKP=rëÉê=léÉê~íáåÖ=qççäë
........................................................................................................................... 7
NKQ=pí~íìë=fåÇáÅ~íáçåë
................................................................................................................................. 8
iba=fåÇáÅ~íçêë
.................................................................................................................................... 8
pí~íìë=_ìííçå=L=pÉêîáÅÉ=`~ää=EiáëíÉå=C=q~äâF
................................................................................ 8
sçáÅÉ=jÉëë~ÖáåÖ
............................................................................................................................... 9
pjp=jÉëë~ÖáåÖ
................................................................................................................................. 9
bã~áä=jÉëë~ÖáåÖ
............................................................................................................................... 9
pçìåÇ=fåÇáÅ~íáçåë
............................................................................................................................10
Chapter 2 Local System Operation.................................................................... 11
OKN=^êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNN
=
^ï~ó=EcìääF=~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NN
=
pí~ó=EeçãÉF=~êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNO
=
m~êíáíáçå=~êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNO
=
cçêÅÉ=^êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NP
=
^êãáåÖ=ïáíÜ=íêçìÄäÉë=áå=íÜÉ=póëíÉãKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNP
=
OKO=aáë~êãáåÖ=óçìê=ëóëíÉã KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNQ
=
póëíÉã=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNQ
=
m~êíáíáçå=Çáë~êãáåÖW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNR
=
aìêÉëë=Çáë~êãáåÖWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NR
=
aáë~êãáåÖ=~ÑíÉê=~å=^ä~êãWKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNR
=
oÉëÉííáåÖ=~ÑíÉê=~å=~ä~êãW KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNS
=
^åíá=`çÇÉ=oÉëÉíKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKNS
=
fåëí~ääÉê=oÉëÉí KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK NS
=
OKP=pÉåÇáåÖ=~=m~åáÅ=^ä~êã
......................................................................................................................
NT
Chapter 3 Remote System Operation................................................................. 18
PKN=oÉãçíÉ=mÜçåÉ=léÉê~íáçå
.................................................................................................................18
oÉãçíÉäó=^ÅÅÉëëáåÖ=íÜÉ=póëíÉã
.................................................................................................18
sçáÅÉ=léÉê~íáçåë=jÉåì
..................................................................................................................18
oÉÅÉáîáåÖ=`~ääë=Ñêçã=íÜÉ=póëíÉã
.................................................................................................19
^ÅâåçïäÉÇÖÉ=jÉåì
.........................................................................................................................20
_áJÇáêÉÅíáçå~ä=`çããìåáÅ~íáçå
.......................................................................................................20
PKO=pjp=léÉê~íáçå
....................................................................................................................................21
pjp=oÉãçíÉ=`çåíêçä
......................................................................................................................21
pjp=`çåÑáêã~íáçå=jÉëë~ÖÉ
.........................................................................................................22
Chapter 4 User Functions and Settings............................................................. 23
QKN=rëÉê=`çÇÉë
..........................................................................................................................................23
QKO=mêçñáãáíó=q~Öë
.....................................................................................................................................25
QKP=aÉÑáåáåÖ=cçääçï=jÉ=aÉëíáå~íáçåë
.....................................................................................................26
QKQ=pÅÜÉÇìäÉê
.............................................................................................................................................28
QKR=`çãéäÉíÉ=jÉåì=çÑ=rëÉê=cìåÅíáçåë
.................................................................................................29
Chapter 5 System Specifications....................................................................... 32
Chapter 6 EN 50131 Compliance........................................................................ 33

Agility User Manual
Page 4

Agility User Manual
Page 5
Chapter 1 - Introduction
Congratulations on your purchase of
Agility
- RISCO Group's Flexible Wireless Security
System. The
Agility
has been specifically esigne to meet a wi e range of security, safety
an home automation nee s for many resi ential an commercial applications.
Agility
is esigne to recognize abnormal con itions an inform the system of the status
of any protecte oor, win ow, hallway, room, or area. Status information is presente
visually or verbally. It supports the capabilities of communicating with a Central
Monitoring Station or to your mobile phone using frien ly an easy to un erstan verbal
messages as well as SMS or E-mail messages.
This manual escribes how to operate your system. It will gui e you through
programming instructions for main system features as well as basic arming an isarming
comman s for the system.
1.1 Main Features
Up to 32 wireless zones (1 way or 2 way
wireless etectors) + 4 optional wire
zones (only with I/O expan er)
32 User co es + Gran Master co e
4 fixe authority levels for user
Proximity tag for each user
3 partitions
3 wireless keypa s (1 way or 2 way)
3 wireless sirens (internal or external)
8 Remote controls (1 way or 2 way)
250 Events Log
16 Follow Me estinations
4 output s ( I/ O e x p an er )
X-10 support

Agility User Manual
Page 6
1.2 Agility Architecture
Your
Agility
controls and monitors a variety of sensors, detectors, and contacts placed
throughout the premises, which provide external, perimeter and internal burglary
protection. The system is supervised, meaning that the panel checks the sta tus of ea ch
sensor to detect problems. If the panel detects trouble it will notify you with beeps and
indicator lights on the panel itself.
The following diagram shows the components that make up the system:

Agility User Manual
Page 7
1.3 User Operating Tools
The
Agility
system can be operated using several devices, some of which have been
designed as bi-directional. If you have purchased a bi-directional device your system is
capable of sending a return reply status indication from the panel to the device for each
command that is sent to it.
Depending on your purchase you can operate your system via the following:
2-Way 8 Button Remote Control:
Using the bi-directional 8 button remote control you can arm, disarm,
send a panic alarm, activate outputs and m ore. Bein g bi-directional
the rem ote control receives a reply status in dication, v ia its 3 colored
LEDs and internal buzzer siren, from the panel for each command
that it has sent to the panel. or higher security, co mman ds can be
defined to be activated with a 4 digit PIN code.
Agility 2-Way Wireless Keypad:
Using the bi-directional wireless keypad you can program and
operate your s ystem according to yo ur needs. Bein g bi-directional the
keypa d receives a reply status indication from the panel for each
command that it has sent to the panel. To use functions of the
keypa d you can use a code or a proximity tag .
4 Button Key fob:
Using the 4 button key fob you can arm, disarm, send a panic alarm
and activate outputs.
Remote P one Operation:
Using any remo te, touch-tone phone you can perform rem ote
operations suc h as arming, disarming, listening in and talking to the
premises and more. The system can also pro vide audible informatio n
such as event occurrences a nd the status of your system
.
SMS:
If your sy stem is equipped wit h a GSM/GPRS module it can provide
information about the system such as event occurrences b y SMS. You
can also operate the system using SMS c ommand s for arming and
disarming the system and more
.
Configuration Software:
RISCO Group's C onfigura tion So ftware enables the installer to
program the system and operate the system locally or rem otely
.
Web Browser:
Using the web you can perform a variety of operations on your
system such as arming, disarming, output activatio n, receive status
information and viewing e vent lo gs
.

Agility User Manual
Page 8
1.4 Status Indications
LED Indicators
The LED indicators provide typical system indications, as discussed below. Some
indicators have additional functions, which are explained later on.
Power LED
The Power LED indicates system operation.
Condition Description
On
Power OK
Rapid flash
Indicates AC trouble
Slow flash
Indicates low battery trouble
Arm/Alarm LED (Red)
Condition Description
On
System armed
Rapid flash
Alarm
Slow flash
System in Exit delay
Stay LED
Condition Description
On
System armed at STAY
Off
System disarmed
Ready LED (Green)
Condition Description
On
System ready
Off
Open z ones
Slow Flash
System is ready to be armed while a specially
designated entry exit door remains open
Trouble LED
Condition Description
Rapid Flash
Trouble
Off
N o tro uble
Note:
When all LEDs flash one after another in sequence the system is in Installation mode.

Agility User Manual
Page 9
Status Button / Service Call (Listen & Talk)
The button on the main unit can be defined as a system status indicator or as a S.O .S
button. Once pressed, a service call will be established to the monitoring sta tion,
which then enables 2-way communication with the premises.
Voice Messaging
Three types of spoken messages are heard when using the
Agility,
locally in the premises
or remotely to your mobile:
Event messages:
Upon selected event oc currence , the
Agility
initiates a call to a
remote ollow Me ( M) telephone number, informing you of a security situation by
playing a pre-record ed Even t announcemen t message.
Status messages:
Upon remote access of the system by initiating a call from a
remote telephone or receiving a call from the system, the
Agility
announces the
current system sta tus by pla ying a p re -re corde d Status message.
Local Announcement messages:
Upon event occurrence or user’s keypad
operations, the
Agility
can announce various local messages to residents.
SMS Messaging
Using the GSM/GPRS M odule the sy stem can send prede fined SMS event messages to a
remote ollow Me ( M) telephone number, informing you of the status of the security
system and certain events that occurred in the system.
or example:
Email Messaging
Using the Agility IP Module the system can send event messages by Email to predefined e-
mail addresses informing you of the status of the security system and certain events that
occurred in the system.
or example:
Subject: Alarm Security Message: Intruder Alarm
System Name: John's Residence
Event: Fire Alarm, one 5, Entrance door
Time: 01 April 2008; 16:12
Partition: Partition 1, First floor
Service Contact: Monitoring Station 01, 03-5676778

Agility User Manual
Page 10
Sound Indications
In addition to the visual indications provided by the
Agility’s
LEDs, your system produces
audible notification after certain events.
Condition Description
Intrusion alarm
Continues ra pid beepin g
Fire alarm
Staggered rapid beepin g
Exit delay
Slow buzzer beeps until the Exit Delay time period expires
Entry delay
Slow buzzer bee ps until the E ntry Delay time period ex pires.
Confirm operation
A one-second tone
Reject operation
Three rapid error beeps
Arm/Disarm squawk
1 siren chirp: System armed
siren chirps: System is disarmed
4 siren chirps: System disarmed after an alarm

Agility User Manual
Page 11
Chapter 2 - Local System Operation
2.1 Arming your system
Arming your system causes the intrusion detectors to trigger an alarm when violated. The
arming operation will be followed by a local message announcement (if defined).
Before arming the system check the Ready LE and make sure that the sys tem is ready
to be armed. If the system is NOT ready to be armed secure or bypa ss the violated zone(s),
and then proceed.
Failing to arm the system will be indica ted by the sy stem
Your
Agility
offers the following kinds of arming:
Note
: If you are unable to arm the system, press the status key to view system messages.
Away (Full) arming:
Away arming prepares all of the system's intrusion detectors to activate an alarm if
violated, and is used when leaving the premises. The system will arm after the
designated countdown time (Exit delay) and a local message will sound. Once you have
armed the system, exit via the designated final exit door.
To arm using
=
Away (Full) arming
=
procedure
=
Quick mode:
=
=
High security mode: Press + code
Quick mode:
High security mode
:
+ code or proximity tag
=
Press
Send SMS : [Code][A], exam ple,
1234A

Agility User Manual
Page 12
Stay (Home) arming:
Stay arming activates only perimeter detectors (as defined by your installer),
enabling individuals to remain inside and move about the premises while the
system is partially armed.
To arm using
=
Stay (Home) arming
=
procedure
=
Quick mode:
High security mode: + code
Quick mode:
High security mode
:
+ code or pro imity tag
=
Press
button or button 4 (if defined. Advise with your installer)
Partition arming:
One of the
Agility
's advantages is its ability to divide the system in up to 3
partitions. Each partition may be managed as a separate security system, each of
which can be armed and disarmed individually regardless of the condition of the
other.
Partitions can be armed or disarmed one at a time, or all at once, and each
partition can be armed at Stay or Away. Only users that have been defined to
operate multiple partitions can operate more than one partition and arm/disarm
all partitions at once
To arm using
=
Partition arming (Away or Stay)
=
procedure
=
Quick mode:
=L= =L= =
[=
/
=
High security mode:
=L= =L= =
[=
/ + code
Quick mode:
L L =[==
/
High security mode
:
L L =[=
/ + code or pro imity tag
=
Press
button or button 4 (if defined. Advise with your installer)
Send SMS:
[Code][A or S] [Partition 1,2 or 3]
. E ample 1234A1. Fore more
information refer to page 21.

Agility User Manual
Page 13
Force Arming:
Force arming arms the system regardless of open zones. Your installer must
enable this option.
Note
: Force arming the system results in leaving part of the system unsecured.
Arming with troubles in the System
If required, and defined by your installer, all troubles in the system should be
confirmed to enable the arming operation while performing arming from the
wireless keypad.
When trying to arm the system with troubles, the display will show a "System
roubles" message. Press the key to view the troubles in the system. Scroll
down the troubles list to view all troubles in the system.
o enable one time arming from the keypad:
1.
Press and enter your user code to access the user menu.
2.
Go to Activities > Bypass rouble
3.
he following question will appear: "
Bypass troubles. Are you sure? N?"
.
Using the key change to Y and press to confirm.
4.
Press to return to main disp lay and perform the arming
operation again.

Agility User Manual
Page 14
2.2 Disarming your system
Disarming your system causes the detectors not to trigger an alarm when violated. When
you enter the premises, the Entry Delay begins to count down. You must disarm the
system within the Entry Delay time to prevent the system from tr iggering an alarm. The
disarming operation will be followed by a local message announcement (if defined).
Note
: If an alarm occurred in the system, it is recommended to leave the premises. Only after police
investigation should you consider that the burglar is no longer on your premises and you can re-enter. In
special cases (if programmed by your installer) arming the system after an alarm might require a technician
code. For more inform ation refer to your installer
Your
Agility
offers the following kinds of disarming
System disarming:
Disarming deactivates the partitions assigned to the specified user code
To disarm using
=
Procedure for Disarm ing
=
Quick mode . All partitions assigned to the button will be
disarmed
High security mode > Code
Press followed by code or proximity tag.
Press the
button. All partitions assigned to the button will be
disarmed.
Send SMS
[Code][D], example 1234D

Agility User Manual
Page 15
Partition disarming:
Partition disarming enables you to disarm individual partitions within an armed
system
To disarm using
=
Procedure for Partition Disarm ing
=
Quick mode:
=
L= =L= =[=
High security mode:
=L= =L= =[=
> Code
L L
=
[=
> code
or
proximity tag.
Press the
button. All partitions assigned to the button will be
disarmed.
Send S S:
[Code][D] [Partition 1,2 or 3]
. Example 1234D1. Fore more
information refer to page 21.
Duress disarming:
If you are ever coerced into di sar m ing your sys te m, you can co mply with the
intruder's wishes while sending a silent duress alarm to the Central Station. To do
so, you must use a special duress code, which when used, will disarm the system in
the regular manner, while simultaneously transmitting the duress alarm. Confer
with your installer which of the user's codes is defined as a duress code.
Note:
Under no circumstances must the duress code be used haphazardly or with out reason.
Central Stations, along with Police Departments, treat duress codes very seriously and take
immediate action.
Disarming after an Alarm:
When silencing an alarm the system goes into a disarm state. After the system is
disarmed the sirens will sound
4 siren chirps
indicated that an alarm occurred in
the system.
If an "
Entry door
" is opened prior to disarming the system, the following voice
announcement mess age will be heard: "
Alarm occurred in the system
". Press the
key will indicate the cause of the alarm.

Agility User Manual
Page 16
Note:
If an alarm occurred in the system, it is recommended to leave the premises. Only after
police investigation should you consider that the burglar is no longer on your premises an d
you can re-enter. In special cases (if programmed by your installer) arming the system after an
alarm might require a technician code. For more information refer to your installer
.
=
Your installer can define the number of times (0- 5) that an alarm will be sent from the same
detector during one arming period. This is usually used to prevent an alarm from a
malfunction detector, an environmental problem or incorrect installation
Resetting after an alarm:
Your installation company can define that the reset of the system to a Normal
Operation mode will require the intervention of your monitoring station or
installer. In this case, after an alarm condition the system will be regarded as Not
Ready and while requesting for system status ( )indication you will get a
trouble message Technician Reset.
Anti Code Reset
1.
Press .
Enter user code
Go to Activities > Anti Code option.
2.
Call your monitoring station (MS) or installer and quote the “
RANDOM
CODE
” displayed on your keypad. The MS or installer will give you a return
Anti-Code.
3.
Enter this Anti code followed by and the system will reset.
Installer Reset
Your monitoring station (MS) or installer can re set your system remotely or locally
from the keypad.
To enable local reset by your installer you may need to authorize him using the master
code after the installer enters his code. A one hour time window is opened for the
installer to program user functions and be able to reset your system locally

Agility User Manual
Page 17
2.3 Sending a Panic Alarm
Panic alarms enable you to send a message to the monitoring station in the event of an
emergency, send a message to a follow me number, announce a local message or activate a
local alarm. Panic alarms can be set to be silent (Refer to your installer for more
information).
To send a Panic
Alarm using
=
Procedure
=
=
Press both and keys simultaneously
Press both and keys simultaneously
Note
: Your installer should define these keys to be set as panic keys. These keys
can be either disabled or used to establish a service call to your
Monitoring Station.
If defined by your installer pressing
=
simultaneously for 2
seconds will send a fire alarm and pressing simultaneously
for 2 seconds will send a special emergency or medical alarm.
Press the small blank button (if defined)
Note:
Your installer can define the small blank button to be used for sending a
panic alarm.
Note:
For full capabilities of the 2 way remote control, the bi directional keypad and 4 button key fob,
refer to the instructions supplied with each product.
=
Press both keys simultaneously
=
Press the panic button

Agility User Manual
Page 18
Chapter 3 - Remote System Operation
3.1 Remote Phone Operation
The
Agility
enables you to operate the system from a remote touch-tone phone by
initiating a telephone call to or from the system and interacting with voice menus that
guide you through your required remote operation.
Remotely Accessing the System
Remotely accessing the system involves initiating a call to the sy stem, and entering your
remote access code and the user code you usually enter in the system keypad.
To remotely access the system:
1.
From a remote touch-tone telephone, dial the number of the premises where
Agility
is installed.
2.
If your system is connected to a land telephone line and an answering
machine is in use at the premises
let the line ring once, then hang up and call
again.
If an answering machine is not in use at the premises
wait until the system
picks up. fter the system picks up a short tone is heard.
Note:
When the system picks up, all phones on the same line are effectively disconnected and
cannot be used.
3.
Enter your 2 digit remote access code within 10 seconds (Default code = 00).
The following message is announced:
"
Hello, Please Enter Your User Code,
Followed By
[#]
".
Enter your user code followed by [#]. (Default code=1234)
4.
fter your code is accepted a system status message is announced, followed by
the
Operations
menu. You can now perform the required remote operations.
Voice Operations Menu
The
Voice Operations
menu announces options and instructions on how to use the system
functions. The options in the Operations menu vary according to system status and your
access rights.
Following is a list of the remote operations options:
Operation Quick Key Combination
rming all partitions Press
[1 [1
rming a selected partition Press
[1 [9
followed by the partition number
Disarming all partitions Press
[2 [2
Disarming a selected partition Press
[2 [9
followed by the partition number

Agility User Manual
Page 19
Operation Quick Key Combination
Changing Zone Bypass status Press
[3]
followed by the zone number and then
[#][9]
Operating Utility Outputs Press
[4]
followed by the output number
Changing Follow Me(FM)
numbers
Press
[5]
followed by the FM number and
[#][2]
.
nter the new phone number and press
[#][1]
.
Listen in to the premises Press
[6][1]
Talking to the premises Press
[6][2]
Listen and Talk to the premises Press
[6][3]
Recording an opening message Press
[7][1]
Recording messages that are not
included in the message bank (5
messages)
Press
[7][2]
xiting the System Press
[0]
To return to the previous menu Press
[*]
To repeat the menu options Press
[#]
Receiving Calls from the System
Upon event occurrence, such as alarm activation, the system i nforms you of security
situations, for example, intrusion or fire, by calling you and announcing a pre-recorded
event announcement message, followed by the Acknowledge menu. The system can call
up to 16 Follow Me numbers, enabling you, a relative or neighbor to be informed of the
security situation. You can then take the appropriate action, w hether this is to inform the
authorities or acknowledge the event and remotely operate the system.
Notes:
Follow Me messages are performed only after reporting to the Monitoring Station.
Follow Me numbers are assigned certain events for which they receive calls.
The system must be programmed to call a FM number after a specific event occurs in order for that
event to trigger the call.
To receive an event ca ll
1.
Pick up the phone.
2.
Say "
Hello
" or press [
#
]. The vent Announcement message is made, informing
you of a security situation in your system, for example:
“
24 Oaklands Street, Intruder alarm, Ground Floor, kitchen
”
Notes:
If no voice is detected, the event message will start playing 5 seconds after phone pick up. Press
#
] to
begin playback of the event message from the beginning.
To repeat the Event Announcement message press
#
].
To bypass the Event Announcement message and go directly to the Acknowledge menu, press
*
].
3.
Acknowledge the event. (See
Acknowledge Menu
)

Agility User Manual
Page 20
Acknowledge Menu
After the Event Announcement message is made, the following list of options i s
announced:
Operation Digit
Acknowledge Message
Acknowledging an event means that you have received a message from
the security alarm system about a relevant event in the system and
want to confirm this. After you acknowledge an event, the system calls
the next FM number.
Press
[1]
Acknowledge and stop all dialing
his option acknowledges the event and stops the system from calling
the next FM numbers to report the event.
Press
[2]
followed by
the code
Acknowledge and access the Operations menu
he
Operations
menu lists the available options for remotely operating
your system.
Press
[3]
followed by
the code
Listen In and Talk
his option enables you to perform bi-directional communication.
Press
[ ]
followed by
the code
Repeat the event message
Press
[#]
Repeat the Acknowledge menu
Press
[*]
Note:
If an invalid code is entered 3 consecutive times, the system hangs up and this FM number is locked
for 15 minutes and no calls are initiated to the FM number.
If a valid user code is not entered within 10 seconds, the system hangs up.
Bi-directional Communication
he Listen In and alk options enable you to remotely and silently listen in to your
premises in order to verify the cause of an event occurrence, through the microphone or
remotely talk to your premises via the
Agility
loudspeaker, for example, to guide someone
in distress.
To listen in or talk:
1.
From the Operations/Acknowledge menu, press
[ ]
. he following messages are
announced:
“ o Listen In press 1, o alk press
[2]
, o Listen and alk (Open channel) press
[3],
o return to the previous menu, Press
[
]
.”
2.
Select the desired option.
3.
Press
[
]
to end listening in and talking communication and return to the
Operations menu.
Other manuals for Agility
8
Table of contents
Popular Home Automation manuals by other brands

Inovelli
Inovelli Show Home ZW37 manual

Energeeks
Energeeks EG-BW003MC Quick installation guide

SOMFY
SOMFY sonesse 30 rts installation instructions

Cooper Lighting
Cooper Lighting Greengate NeoSwitch ONW-D-1001-MV-W installation instructions

Intesis Software
Intesis Software IntesisHome TO-RC-WIFI-1 installation guide

AJAX
AJAX WallSwitch user manual