12.07.2015 Views

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12Intrusion ZonesThis chapter includes conceptual information about apC and iSTAR intrusionzones and also describes the procedures you use to create them.In this chapter Intrusion Zones .............................................................................................................. 12-2 Intrusion Zone Modes ................................................................................................... 12-3 Factors that Impact Intrusion Zones Modes .............................................................. 12-7 apC and iSTAR Intrusion Zones.................................................................................. 12-9 Hardware and <strong>Software</strong> Requirements .................................................................... 12-10 <strong>Configuration</strong> Overview............................................................................................. 12-11 Configuring Arm and Disarm (apC Zones) ............................................................. 12-13 Configuring Arm and Disarm (iSTAR Zones)......................................................... 12-14 Configuring Intrusion Zone Doors............................................................................ 12-19 Configuring Intrusion Zone Inputs........................................................................... 12-21 Protection Inputs.......................................................................................................... 12-24 Configuring Status Links ............................................................................................ 12-29 Configuring Readers.................................................................................................... 12-30 Configuring Intrusion Zones with Antipassback.................................................... 12-31C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong> 12–1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!