Saferhome HB-G100 Series User manual

HB-G100
HB-G100
HB-G100
HB-G100 Series
Series
Series
Series
User
User
User
User Manual
Manual
Manual
Manual for
for
for
for Intelligent
Intelligent
Intelligent
Intelligent
Burglar
Burglar
Burglar
Burglar Alarm
Alarm
Alarm
Alarm Host
Host
Host
Host
Ningbo
Ningbo
Ningbo
Ningbo Saferhome
Saferhome
Saferhome
Saferhome Electronics
Electronics
Electronics
Electronics Co.,
Co.,
Co.,
Co., Ltd.
Ltd.
Ltd.
Ltd.
We
We
We
We are
are
are
are honoured
honoured
honoured
honoured that
that
that
that you
you
you
you have
have
have
have chosen
chosen
chosen
chosen our
our
our
our security
security
security
security products.
products.
products.
products.
Thanks
Thanks
Thanks
Thanks for
for
for
for your
your
your
your wise
wise
wise
wise selection.
selection.
selection.
selection.
To
To
To
To
make
make
make
make full
full
full
full use
use
use
use of
of
of
of its
its
its
its performance
performance
performance
performance
and
and
and
and ensure
ensure
ensure
ensure stable
stable
stable
stable operation
operation
operation
operation of
of
of
of the
the
the
the host,
host,
host,
host, please
please
please
please carefully
carefully
carefully
carefully read
read
read
read this
this
this
this
User
User
User
User Manual
Manual
Manual
Manual before
before
before
before operating
operating
operating
operating the
the
the
the host.
host.
host.
host. For
For
For
For any
any
any
any questions,
questions,
questions,
questions, please
please
please
please
don
don
don
don ’
’
’
’ t
t
t
t hesitate
hesitate
hesitate
hesitate to
to
to
to consult
consult
consult
consult our
our
our
our Customer
Customer
Customer
Customer Service
Service
Service
Service Department
Department
Department
Department or
or
or
or
agents.
agents.
agents.
agents.

1
Table
Table
Table
Table of
of
of
of Contents
Contents
Contents
Contents
I. Definition............................................................................ 2
II. Operating Precautions..........................................................4
III. Main Characteristics and Functions...................................4
IV.
Name and Usage of Main Components.............................. 6
V.
System Installation.............................................................1 1
VI. Operating Instructions......................................................1 2
VII. How to Program Alarm Host.............................................1 8
VIII. Add/Delete Detectors and Remote Controllers................2 7
IX. Main Technical Specifications......................................... 30
X. Standard Configuration List.............................................. 31
XI. Lists of Optional Parts.................................................... 31
XII. Failure Troubleshooting..................................................... 32
XIII. Programming Set-up and Other Operating Commands.... 33

2
Introduction
Introduction
Introduction
Introduction
HB-G100 Series Intelligent Burglar Alarm Host is an intelligent long-range
wireless transmission alarm system. This system adopts advanced microprocessor as
control core and has voice prompts, easy to install and operate. It can learn codes of
5 remote controllers and 120 HB-T001 Series solar-powered wireless active infrared
detectors,
all
of which constitute
a
complete long-range wireless alarm service
system. Defense zones 1-8 are mixed wired/wireless defense zones, and defense
zone 1 (numbered 000) is
a
tamper zone intended for the host. When
a
transmitting
detector is triggered in certain zone, it will transmit alarm information immediately
to the alarm host via wireless technology. After receiving alarm information, the host
will give out an alarm sound, and display defense zone number and
dial
pre-set
telephone numbers. Besides, this system can also perform remote control over the
host via phone to arm/disarm the host. This system requires no wires and covers
a
large defense area, which is widely applied in workshops, enterprises and business
units, schools and other large and medium-scale places.
I.
I.
I.
I. Definition
Definition
Definition
Definition
Arm
Arm
Arm
Arm It refers to the state (also called alert state) in which the system can receive
any alarm signal.
Disarm
Disarm
Disarm
Disarm It refers to the state (alert deactivation state) in which the system can not
receive any common alarm signal.
Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone It refers to the zone which is guarded by
a
detector which generates
an alarm input signal that can trigger the alarm system. This signal can be wired or
wireless.
Emergency
Emergency
Emergency
Emergency Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone It refers to the zone in which the system can receive an
alarm input signal in any state. It is also called 24-hour defense zone.
Doorbell
Doorbell
Doorbell
Doorbell Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone It refers to the zone in which the host only gives out
doorbell “ Ding- Dong
”
for 5 seconds and then stops giving out sounds, and the
indicator lamp works in the same way in arm/disarm state.
Shielded
Shielded
Shielded
Shielded Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone It refers to the zone (not including emergency defense

3
zone) in which the host can receive shielded signals, and can not receive any alarm
signal temporarily.
Full
Full
Full
Full Arm
Arm
Arm
Arm It refers to the state in which
all
alarm detectors in full arming zone or
part arming zone enter into alert state.
Partial
Partial
Partial
Partial Arm
Arm
Arm
Arm It refers to the state in which
all
alarm detectors in part arming zone
enter into alert state.
User
User
User
User Password
Password
Password
Password It refers to the password through which user can arm/disarm
zones.
Set-up
Set-up
Set-up
Set-up Password
Password
Password
Password It refers to the password used for user set-up.
Entry
Entry
Entry
Entry Time
Time
Time
Time After receiving alarm information, user alarm host does not alarm
immediately, and after
a
period of time, it will alarm. This period of time is called
entry time or delayed alarm time.
Leaving
Leaving
Leaving
Leaving Time
Time
Time
Time After receiving arming command, user alarm host does not enter into
arming mode immediately, and after
a
period of time, it will enter into arming mode.
This period of time is called leaving time or delayed arming time.
Ringing
Ringing
Ringing
Ringing Times
Times
Times
Times It refers to times of ringing the phone when users
dial
a
fixed
phone number or SIM card number connected to the host for remote set-up.
Dialling
Dialling
Dialling
Dialling Times
Times
Times
Times It refers to times of dialling preset user phone numbers when the
host gives out an alarm in fixed phone alarm mode or mobile phone alarm mode.
Siren
Siren
Siren
Siren Duration
Duration
Duration
Duration After triggering on-the-spot alarm, the alarm host begins to
count immediately. Once the preset period of time expires, the alarm host will stop
alarming, and terminate transmitting alarm output signal. This preset period of time
is called siren duration.
Phone
Phone
Phone
Phone Alarm
Alarm
Alarm
Alarm Mode
Mode
Mode
Mode It refers to the mode in which user alarm host can
automatically
dial
pre-set informed telephone numbers when an alarm occurs, users
can arm/disarm the host through the alarm receiving phone, and the alarm host can
automatically check whether phone
line
is cut off.
On-site
On-site
On-site
On-site Alarm
Alarm
Alarm
Alarm Mode
Mode
Mode
Mode It refers to the mode in which user alarm host can neither
automatically
dial
alarm phones nor check if phone
line
is cut off, but can alarm on
the spot.

4
II.
II.
II.
II. Operating
Operating
Operating
Operating Precautions
Precautions
Precautions
Precautions
�Please carefully read this User Manual and pay more attention to labels and
directions on the alarm host before operation. Check whether
all
wire
connections are correct and then turn the host on so as to avoid any damage to
the host.
�
The alarm host has no explosion-proof function, which cannot be directly
installed in Class I, II or III hazardous locations (i.e. locations where ignitable
concentration of flammable, explosive vapor/gas, dust or fiber exists),
otherwise, it may cause any hazard.
�Please don ’ t disassemble the alarm host at will so as not to cause accidents or
damage the apparatus.
�If failure occurs during operation, please hold the warranty card to approach
our client service centre or agents timely.
�Please periodically perform test to identify and debug failures in time so as to
avoid system failure.
III.
III.
III.
III. Main
Main
Main
Main Characteristics
Characteristics
Characteristics
Characteristics and
and
and
and Functions
Functions
Functions
Functions
�The wireless defense zone can automatically learn code with remote control.
And it is easy and fast to expand system capacity . There are 12 0 defense zones
in total, which are numbered 000-119 respectively. Each defense zone can
learn code with
a
detector. Defense zones 1-8 (numbered 000-007 )are mixed
wired/wireless defense zones, and defense zone 1 (numbered 000 )is
a
tamper
zone intended for the host.
�Using password authentication for set-up ensures stable and reliable operation.
Voice
prompt makes it
real
easy to use.
�Each detector can be used to serve fully armed zone, partially armed zone,
emergency zone, doorbell zone and shielded zone according to user
requirements.
�The system can preset 2 groups of telephone numbers for informing users of

5
security threats and 2 groups of telephone numbers of the alarm receiving
centre. The telephone numbers of the alarm receiving centre must be fixed
telephone numbers, which can be dialled preferably when an alarm is triggered
under telephone alarm mode.
�Alarm or failure information can be displayed on the digital display.
�The dialling times can be set.
�
External 12V backup battery input.
�
Call
Pickup: Whether or not telephones connected with the alarm are busy, the
alarm host will take up the
line
and send alarm information to users in an
accurate and timely way.
�C ompatible with dual- tone multi - frequency signaling , it can
dial
14-digit
telephone numbers.
�It can get access to any pre-set telephone number and can set monitoring,
arming, disarming and on-the-spot-alarm by entering user password.
�The alarm information of any detector can be memorized, and the alarm
information stored in the host can be erased once the relevant defense zone is
rearmed or the host is reset.
�It can prerecord
a
3-second voice message, so automatic voice responds to the
alarm when an alarm occurs.
�Entry
time,
leaving time and alarm sound duration can be set.
�There is sound prompt or LED indication when telephone
line
is cut-off, alarm
host or detector is under low power, the system is subject to strong light
interference.
�DC 12V/0.5A alarm output is provided to connect the siren or control other
devices.
�All settings can be stored in
a
memory unit, so they can not be lost when power
failure occurs.

6
IV.
IV.
IV.
IV.
Name
Name
Name
Name and
and
and
and Usage
Usage
Usage
Usage of
of
of
of Main
Main
Main
Main Components
Components
Components
Components
Keyboard
Keyboard
Keyboard
Keyboard Panel
Panel
Panel
Panel
1
1
1
1 、
、
、
、Keyboard
Keyboard
Keyboard
Keyboard
1) “ RUN
”
Indicator: “ RUN
”
Indicator blinks when the keyboard is connected to the
host, which means the keyboard is well connected with the host.
2)
“
SET
”
Indicator: When “ SET
”
Indicator lights up, that means the host is getting into
set-up mode. A correct password is required for entering into set-up mode. In this
mode, users can modify alarm mode and alarm time, and set alarm informed
telephone numbers etc.
3) “ SIGNAL
”
Indicator: When “ SIGNAL
”
Indicator lights up, that means the host is
getting into learning mode. In this mode, users can add/delete wireless detectors, or
modify attributes of defense zones, but can not receive alarm signals.
4) “ FULL ARM
”
Indicator: When “ FULL ARM
”
Indicator lights up, that means the
host gets ready for receiving alarm signals from
all
defense zones within the system
and giving out alarm.
5)
“
PART
ARM
”
Indicator: When
“
PART
ARM
”
Indicator lights up, that means the

7
host gets ready for receiving alarm signals from partially armed zones within the
system and giving out alarm.
6)
“
RECORD
”
Indicator: In set-up mode, users can prerecord
a
voice message to play
back at the time when
a
call is answered to respond to an alarm. When
a
voice
message is recorded,
“
RECORD
”
Indicator will light up.
7)
“
SHIELD
”
Indicator: When the host receives shielded signals, “ SHIELD
”
Indicator
will light up, which means the host can not receive any alarm signal in
a
short time
except alarm signals from emergency zones.
8)
“
ALARM
”
Indicator: When any detector connected to the host sends an alarm
signal, “ ALARM
”
Indicator will light up, and display defense zone No. where an
alarm is triggered.
9) “ Low
Voltage
”
Indicator: When the voltage of the built-in battery of any detector
connected to the host is too low, “ Low
Voltage
”
Indicator will light up and display
the defense zone No.
10) “ Battery Damage
”
Indicator: When the built-in battery of any detector connected
to the host is damaged, “ Battery Damage
”
Indicator will light up and display the
defense zone No.
11)
“
Invalid
”
Indicator: When any infrared detector (active wireless infrared detector)
connected to the host can not work properly due to non-calibration or damage,
“ Invalid
”
Indicator will light up.
When any detector (magnetic door detector) can not work properly due to failure to
close for
a
long time or damage, “ Invalid
”
Indicator will light up.
1 2 ) “ Light Disturbance
”
Indicator: When any detector connected to the host can not
work properly due to strong light disturbance,
“
Light Disturbance
”
Indicator will
light up.
13)
“
Telephone Alarm
”
Indicator: When “ Telephone Alarm
”
Indicator lights up, that
means the host is armed under telephone alarm mode. When an alarm occurs, the
host will
dial
alarm informed telephones.
14) “ Telephone Line Cut-off
”
Indicator: When
“
Telephone Line Cut-off
”
Indicator
lights up, that means the external telephone
line
is not well connected or cut off, and
the system will give out voice prompt “ The telephone
line
is cut off
”
once per

8
minute.
15) “ Emergency Zone
”
Indicator:
“
Emergency Zone
”
Indicator will light up only when
set-up is performed for an emergency zone. Once emergency zone set-up is
completed, the indicator is not turned on even when an alarm occurs.
16)
“
Doorbell Zone
”
Indicator: “ Doorbell Zone
”
Indicator will light up when set-up is
performed for
a
doorbell zone. Once doorbell zone set-up is completed, the indicator
is not turned on even when an alarm occurs.
17) 0~9 Number Key: 0~9 Number Key is used to enter parameters and password
when the alarm host is under set-up mode or signal learning mode.
18) #
#
#
#:“#
#
#
#”key acts as “ ENTER
”
key or is used for confirmation.
19) *
*
*
* :
:
:
:Set attribute of defense zone
20) F1 Key: F1 key acts as
“
Partial Arm
”
key. Press F1 key to enter into
“
Partial Arm
”
mode. Note: If the host is under “Full Arm ”mode, disarm the host and then press F1
key to enter into “Partial Arm ”mode.
21) F2 Key: F2 key acts as “Full Arm ”key. Press F2 key to enter into “Full Arm ”mode.
22) F3 Key: F3 key acts as “ Disarm
”
key. Press F3 key, and then the host will give the
prompt “ P lease enter user password
”
. Enter correct user password and then enter
“
#
”
key to enter into disarm mode.
23) F4 Key :
:
:
:F4 key acts as “ Emergency Alarm
”
key. Press F4 key to trigger an alarm.
24) A, B, C Key: The functions of A and C keys are not defined temporarily. B key is
used for set-up of linkage module manufactured by our support company.
2
2
2
2、Installation
Installation
Installation
Installation &
&
&
& Wiring
Wiring
Wiring
Wiring Diagram
Diagram
Diagram
Diagram of
of
of
of Engineering
Engineering
Engineering
Engineering Host
Host
Host
Host (See
(See
(See
(See
the
the
the
the Diagram
Diagram
Diagram
Diagram Below)
Below)
Below)
Below)

9
Installation
Installation
Installation
Installation &
&
&
& Wiring
Wiring
Wiring
Wiring Diagram
Diagram
Diagram
Diagram of
of
of
of Engineering
Engineering
Engineering
Engineering Host
Host
Host
Host

10
①Mains Supply Input: The alarm host adopts AC 220V ± 10% 50Hz input, and the
input terminal is connected in series with
a
0.5A fusion tube.
②External Backup Battery Input: The host adopts DC12V7Ah external backup
battery input.
③External Siren Output: A DC 12V siren (current: <0.6A) can be connected to
the alarm host.
④
Local
Call
Phone Line Socket: It is used to connect with
local
call phone
line
(also called outside line). The local call phone
line
connected with this socket is not
allowed to connect with phone or other communication device in parallel.
⑤User Phone Socket: User phones shall be connected with user phone socket by
a
double-ended phone line. To take up phone line, user phones must be led out from
user phone socket of the alarm host.
⑥RS485: The keyboard, wireless receiver and network module adopt RS485
communication. The head and end of
line
must have 120 ohm resistor to achieve
reliable communication. Note: Some of our products are equipped with 120 ohm
resistor.
⑦
Wired Defense Zone Input: Z1~Z8 represents input of defense zone 1-8, which
respectively corresponds to defense zone number 000~007. Defense zone 000 is
a
tamper zone intended for the host, which is applicable to connect emergency alarm
buttons. When there is any wired zone in alarm host system, defense zones 000~007
are not allowed to learn code with wireless detectors.
⑧
Several Connection Methods of Wired Detectors: Z terminal is the positive
terminal of alarm signal return from wired defense zone. GND is the negative
terminal of alarm signal return. Wired defense zones can be used together with wired
detectors to achieve short circuit/cut-off alarm functions. If
a
wired detector is
operating under open circuit conditions, its loop shall be connected in parallel with
a
2.7K Ω resistor. If
a
wired detector is operating under short circuit conditions, its
loop shall be connected in series with
a
2.7K Ω resistor. If the defense zone loop is
not used, it shall be connected in parallel with
a
2.7K Ω EOL ( End of Line) resistor .
If several wired detectors are required, they can be connected in series, in parallel, or
combination of both.

11
Connection Principle: The normally open detector shall be connected in parallel with
a
2.7K Ω resistor, while the normally closed detector shall be connected in series
with
a
2.7K Ω resistor.
Mixed connection of normally open detectors and normally closed detectors
V.
V.
V.
V.
System
System
System
System Installation
Installation
Installation
Installation
1.
1.
1.
1. Basic
Basic
Basic
Basic Requirements
Requirements
Requirements
Requirements of
of
of
of System
System
System
System Installation
Installation
Installation
Installation Design
Design
Design
Design
①During installation, suitable types and models of detectors should be adopted
according to user
’
s requirements for defense areas.
②The installation location, angle and height of detectors shall be determined
according to the effective defense zone of detectors and site conditions. The
detectors shall be installed in hidden locations as much as possible which must be in
compliance with defense requirements and installation specifications.
③The wire shall be hidden from normal view as much as possible to prevent trace
wire from being damaged. Open wire shall be fed into
a
wire duct to prevent wire
Detector 1 Detector2 Detector 3
B
C 2.7k
Connection
of
several norm ally open detec tors
Detector 1 Detector2 Detector 3
B
C 2.7k
Connection
of
several norm ally closed detectors

12
from damaged by mouse or other rodents.
④
The type and specification of detectors and cables in each defense zone should be
labeled on construction drawings (The usage of each wire within
a
cable shall be
marked).
⑤All construction drawings should be archived for facilitating maintenance of the
host system.
2.
2.
2.
2. System
System
System
System Installation
Installation
Installation
Installation and
and
and
and Debugging
Debugging
Debugging
Debugging
Installation of Alarm Host
—— The alarm host shall be installed in
a
hidden position, and its external siren
shall not be covered with any materials to ensure an audible alarm sound.
—— The alarm host has no explosion-proof function, which cannot be directly
installed in Class I, II or III hazardous locations (i.e. locations where ignitable
concentration of flammable, explosive vapor/gas, dust or fiber exists), otherwise, it
may cause any hazard.
—— The alarm host shall not be close to devices with high electromagnetic radiation
such as
TV, air
conditioner, computer and microwave oven to avoid influencing
receiving effect.
—— To ensure reliable operation of the alarm host, DC12V7Ah battery is
recommended as backup po wer if power failure often occurs or power failure takes
a
long time in some areas.
—— To get good receiving effect, please fully stretch out the receiving antenna.
VI.
VI.
VI.
VI. How
How
How
How to
to
to
to Add/Delete
Add/Delete
Add/Delete
Add/Delete Remote
Remote
Remote
Remote Controllers
Controllers
Controllers
Controllers and
and
and
and Detectors
Detectors
Detectors
Detectors
This alarm host adopts code matching technology to add detectors and remote
control. The host can learn codes with 5 remote controllers and 120 detectors. There
are 120 defense zones in total, among which defense zone 000 is
a
tamper zone

13
intended for the host, and defense zones 000-007 are mixed wired/wireless defense
zones in which it is not recommended to install wireless detectors.
(I)
(I)
(I)
(I) Add/Delete
Add/Delete
Add/Delete
Add/Delete Remote
Remote
Remote
Remote Controllers
Controllers
Controllers
Controllers
The host can learn codes with 5 remote controllers, which are numbered 10 ,
11 ,12 ,13 ,14 respectively.
To add/delete remote controllers, please follow the following procedures:
1.
1.
1.
1. Add
Add
Add
Add Remote
Remote
Remote
Remote Controller
Controller
Controller
Controller (Take
(Take
(Take
(Take Remote
Remote
Remote
Remote Controller
Controller
Controller
Controller 10
10
10
10 for
for
for
for example)
example)
example)
example)
Step 1: Enter “ # # #
”
, and then the alarm host gives out
a
voice prompt that
“ Please enter
a
pre-set password
”
.
Step 2: Enter password “ 112233
”
and “ #
”
after password , and then the alarm host
gives out
a
voice prompt that “The alarm host is entering into adjustment mode
”
( “ 112233
”
is
a
factory default password for the host and can be modified. ).
Step 3: Set the host when the “ SET
”
indicator of the host lights up.
Step 4: Enter
“
12*48
”
and
“
#
”
after password , and then the alarm host gives out
a
voice prompt
“
The alarm host is entering into code learning mode
”
(Note: The
host interface will display “ b
”
when you enter “ *
”
. ).
Step 5: Enter “ 10
”
(remote controller No.) and “ #
”
after 10, and then the host gives
out
a
voice prompt “ Press remote controller “ ARM
”
key
”
.
Step 6: Press remote controller “ Full Arm
”
key, and then the host gives
a
voice
prompt “ Ding
”
, which means the host have successfully learnt code with the
remote controller.
“ Full Arm
”
Key: Press “ Full Arm
”
key to enter into
“
Full Arm
”
mode. The
function of “ Full Arm
”
key is the same as that of F2 shortcut key on the keyboard

14
panel of the host.
“ Disarm
”
Key: Press “ Disarm
”
key to disarm the host (except for shielded zone,
doorbell zone and emergency zone). The function of
“
Disarm
”
key is the same as
that of F3 shortcut key on the keyboard panel of the host.
Emergency Key: Press Emergency Key to activate emergency alarm whether the
host is in Arm mode or Disarm mode. The function of Emergency Key is the same
as that of F4 shortcut key on the keyboard panel of the host.
“ Partial Arm
”
Key: Press “ Partial Arm
”
key to enter into “ Partial Arm
”
mode.
The function of “ Partial Arm
”
key is the same as that of F 1 shortcut key on the
keyboard panel of the host.
【
Note
】
a. Remote controllers shall be added in accordance with the same
procedure.
b. To let the host learn codes of remote controllers continuously, enter 11
and # after 11 when the host completes learning the code of the first remote
controller, and then press “ Arm
”
key to let the host learn the code of the next remote
controller until the host completes learning codes of
all
remote controllers.
2.
2.
2.
2. Delete
Delete
Delete
Delete Remote
Remote
Remote
Remote Controllers
Controllers
Controllers
Controllers (Take
(Take
(Take
(Take Remote
Remote
Remote
Remote Controller
Controller
Controller
Controller 10
10
10
10 for
for
for
for example
example
example
example )
)
)
)
The first five steps of deleting
a
remote controller are the same as those of adding
a
remote controller.
Step 6: Press “ #
”
key again, and the host gives out
a
voice prompt “ Ding
”
,
which means
a
remote controller is successfully deleted.
【Note 】a. Remote controllers which have been added can be deleted in accordance
with the same procedure.
b. To let the host delete codes of remote controllers continuously, enter 11 and
# after 11 when the host deletes the code of the first remote controller, and then press
“ #
”
key to let the host delete the code of the next remote controller until the host
deletes codes of
all
remote controllers.
c
. To delete
all
remote controllers in
a
shortcut way, please follow the
following steps:

15
The first four steps of deleting
a
remote controller are the same as those of
adding
a
remote controller.
Step 5: Enter 19 and # after 19, and then the host gives out
a
voice prompt
“ Delete
all
remote controllers
”
.
Step 6: Press “ #
”
key again, and then the host gives out
a
voice prompt
“ Ding
”
, which means
a
remote controller is successfully deleted.
(I)
(I)
(I)
(I)
Add/Delete
Add/Delete
Add/Delete
Add/Delete Detectors
Detectors
Detectors
Detectors
The host can learn codes with 120 detectors. There are 120 defense zones
(numbered 000-119), among which defense zone 000 is
a
tamper zone intended for
the host, and defense zones 000-007 are mixed wired/wireless defense zones in
which it is not recommended to install wireless detectors.
To add/delete detectors and modify attributes of defense zones with detectors,
please follow the following procedures:
1. Add
Add
Add
Add Detectors
Detectors
Detectors
Detectors (Take
(Take
(Take
(Take Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone 010
010
010
010 for
for
for
for example)
example)
example)
example)
Step 1: Enter “ # # #
”
, and then the host gives out
a
voice prompt “ Please enter
a
pre-set password
”
.
Step 2: Enter password “ 112233
”
and “ #
”
after password , and then the alarm host
gives out
a
voice prompt “The alarm host is entering into adjustment mode ”
( “ 112233
”
is
a
factory default password for the host and can be modified. ).
Step 3: Set the host when
“
SET
”
indicator of the host lights up.
Step 4: Enter
“
12*48
”
and
“
#
”
after password , and then the alarm host gives out
a
voice prompt
“
The alarm host is entering into code learning mode
”
(Note: The
host interface will display “ b
”
when you enter “ *
”
. ).
Step 5: Enter “ 010
”
(defense zone No.) and “ #
”
after 010, and then the host gives
out
a
voice prompt “ Now, the host is serving
a
fully armed zone. Please activate
a
detector
”
(After
a
voice prompt, the detector will be activated, and then the
host will give out
a
voice prompt “ Ding
”
, which means the detector is
successfully added) .
To continue to add
a
detector, for example
a
detector for defense zone 011 ,
please enter “ 011
”
and “ #
”
after 011.

16
【Note 】a. Detectors (numbered 000-119) shall be added in accordance with the
same procedure.
b. To let the host learn codes of detectors continuously, enter 0 11 and # 11
after the host completes learning the first detector, and then activate the next detector
to let the host learn the code of the next detector until the host completes learning
codes of
all
detectors.
2.
2.
2.
2. Delete
Delete
Delete
Delete Detectors
Detectors
Detectors
Detectors (Take
(Take
(Take
(Take the
the
the
the Detector
Detector
Detector
Detector in
in
in
in Defense
Defense
Defense
Defense Zone
Zone
Zone
Zone 010
010
010
010 for
for
for
for example)
example)
example)
example)
The first four steps of deleting
a
detector are the same as those of adding
a
detector,
so please refer to the first four steps of the procedure for adding
a
detector.
Step 5: Enter “ 010
”
and
“
#
”
, and then the host gives out
a
voice prompt “ This
defense zone has exited
”
, which means the detector in defense zone 010 has
been deleted.
Step 6: Press “ #
”
key and then follow the voice prompt “Delete
a
detector ”to
delete the detector.
【Note 】a. Detectors (numbered 000-559) shall be added in accordance with the
same procedure.
b. To delete codes of detectors continuously, enter 0 11 and # after the code
of the first detector is deleted, and then the host will give out
a
voice prompt “This
defense zone has exited ”, and finally press
“
#
”
key to delete the detector until
all
detectors are deleted.
c. To delete
all
detectors in
a
shortcut way, please follow the following
steps:
The first four steps of deleting
a
detector are the same as those of adding
a
detector,
so please refer to the first four steps of the procedure for adding
a
detector.
Step 5: Enter “ 909
”
and “ #
”
, and then the host will give out
a
voice prompt
“ Delete
all
detectors
”
.
Step 6: Press “ #
”
key in the keyboard panel, and after about 5 seconds, the host
will give out
a
voice prompt
“
Ding
”
, which means
a
detector has been deleted.
3. Modify Attributes of Defense Zones with Detectors (Take defense zone 010 for
example)
The first four steps of modifying the attribute of
a
defense zone are the same as

17
those of adding
a
detector, so please refer to the first four steps of the procedure for
adding
a
detector.
Step 5: Enter “ 010
”
and
“
*
”
, and then the host will give out
a
voice prompt “ Now,
the host is serving
a
fully armed zone. Please enter the attribute of the defense
zone
”
(The attribute of
all
defense zones is set to “Fully Armed Zone ”as default.
To modify the attribute of defense zone 010 from doorbell zone to fully armed
zone, enter
“
010
”
and
“
*
”
, and then the host will give out
a
voice prompt “ T he
host is serving
a
doorbell zone now. Please enter the attribute of the defense
zone
”
. ).
Step 6: Enter “ 4
”
and “ #
”
, and then the host will give out
a
voice prompt “ Now,
the host is serving
a
doorbell zone
”
( 1# fully armed zone, 2# partially armed
zone, 3# emergency zone, 4# doorbell zone, 5 # shielded zone ).
【Note 】a. The attributes of other defense zones shall be modified in accordance
with the same procedure.
b. To modify the attributes of defense zones continuously, enter 011* after
theattribute of the first defense zone is modified, and then the host will give out
avoice prompt
“
The host is serving
a
fully armed zone now. Pleaseenter the attribute
of the defense zone
”
( 1# fully armed zone, 2# partially armed zone, 3# emergency
zone, 4# shielded zone, 5 # doorbell zone ).
Precautions
Precautions
Precautions
Precautions
1. Each wireless code (including remote control code and detector code) is not
learned twice by the same alarm host. For changing the first defense zone into the
second defense zone, delete the code for the first defense zone first.
2. Once the remote control or detectors transmit alarm signals, the alarm host
will give out sound prompt, which signifies code learning is successfully
completed. After code learning is successfully completed, necessary recheck shall
be performed to check if code learning is successfully completed.
3. If there is no correct operation for successive 30 minutes, the system will
automatically exit set-up mode.

18
Reasons
Reasons
Reasons
Reasons for
for
for
for Failing
Failing
Failing
Failing to
to
to
to Learn
Learn
Learn
Learn Codes
Codes
Codes
Codes
Coding Redundancy: If the wireless code currently required to be learned by
the alarm host has exited in the alarm host, that is, this code has been learned by
the alarm host, it can not be learned again by the alarm host. If the alarm host
requires learning this code, the existing code in the alarm host shall be deleted.
Wrong type of wireless code: Any of the following cases would lead to
failure to learn code: The code of detectors is transmitted when the alarm host
learns code with remote control, or the code of remote control is transmitted
when the alarm host learns code with detectors. Besides, detectors generally can
transmit 7 types of special codes respectively related to Low V oltage, Low
Voltage
Recovery, Anti-tamper, Invalid Operation, Invalid Operation Recovery,
Light Disturbance, Light Disturbance Recovery. Before detectors transmit any
code, please confirm if codes transmitted by detectors are normal codes, because
special codes are not learned by the alarm host.
VII.
VII.
VII.
VII. How
How
How
How to
to
to
to Program
Program
Program
Program Alarm
Alarm
Alarm
Alarm Host
Host
Host
Host
1. Programming Precautions
①During programming set-up, user alarm host shall be kept under disarm
mode as much as possible to prevent alarm signals from triggering an
interrupt.
②
At every step of set-up, the alarm host will give out voice prompt.
During voice prompt, any input is invalid. Please enter
a
command after
voice prompt. During set-up, if any input is wrong, please enter “ 0#
”
to cancel
operation and return to the previous step.
2. Factory Default Settings
1) User Password: 123456
2) Set-up Password: 112233
3) Alarm Mode: On-site Alarm Mode
4) Siren Volume: Max.
5) Playing Content
:
Siren

19
6) Dialling Times: 5
7) Siren Duration: 30 minutes
8) Leaving Time: 5 seconds
9) Entry Time: 0 second
10) Ringing Times Set via Remote Control: 9 times
11) Defense Zone Attribute: Full Arm
3. Detailed Programming Operation of Alarm Host
All programming operations below
shall
be performed
in
set-up mode.
The Procedure for Entering into Set-up Mode:
Step 1: Enter
“
###
”
through the keyboard panel of the host
—— Users can hear
a
voice prompt “ Please enter the preset password
”
, and the
“
SET
”
indicator lights up.
Step 2
:
Enter
A
A
A A
A
A
# through the keyboard panel of the host
—— The format of user password is AAAAAA , and the factory default password is
“ 112233
”
. If user password is correct, users can hear
a
voice prompt “ The
alarm host is entering into adjustment mode
”
. And then users can continue with
the next step. If user password is wrong, the system will exit set-up mode, and
at the same time, the set-up indicator goes out.
Note:
Note:
Note:
Note: As mentioned above, the following programming operations shall be
performed after the host enters into set-up mode. If any error occurs during set-up,
enter 0# (the system gives out
a
voice prompt “ Back
”
) to the previous step. Once
set-up is completed, enter 0 # 0 # to exit set-up mode (the system gives out voice
prompt
“
Back-Exit Set-up
”
).
1) Select Alarm Mode
①Command Function: Telephone Alarm Mode
Command Grammar: 1 #
Function Description: This command enables the host to work under
telephone alarm mode and to cancel
all
alarm information displayed on the host.
Operating Steps: “ ###
”
(Please enter the preset password )+ “ 112233#
”
(The
host enters into adjusting mode )+
“
1#
”
(The host is fully armed,
and telephone alarm mode is activated ).
Table of contents
Popular Security System manuals by other brands

Swann
Swann SW351-WSA operating instructions

Innovative Technology
Innovative Technology ICU quick start guide

Reonix Automation
Reonix Automation R2+ quick start guide

Labkotec
Labkotec SET-2000 Oil/Sludge Installation and operating instructions

werma
werma 741 Series Instructions for use

Cisco MERAKI
Cisco MERAKI MX67 installation guide

Labkotec
Labkotec idOil-D30 Installation and operating instructions

Viking
Viking VS 2625 Operation manual

Swann
Swann DVR16-8600 Combo Specification sheet

Elektrotechnik Schabus
Elektrotechnik Schabus GX-C2 operating instructions

Eldes
Eldes EWS2 user manual

Super Circuits
Super Circuits SYRF04 Installation and setup guide