12.07.2015 Views

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Intrusion Zone ModesYou can force arm an intrusion zone with a normal event action, a localkeypad command action, or a mouse (manual) action from the monitoringapplication. A force arm is necessary when one or more intrusion zone inputsare active, causing a not ready to arm state. You can also force arm anintrusion zone, to intentionally disregard an active monitoring point.Dial-Up ConsiderationsIf the apC or iSTAR communicates with the C•CURE <strong>800</strong>/<strong>800</strong>0 via dial-up,the system dials the server when an intrusion zone changes mode.Exit ConsiderationsThe C•CURE <strong>800</strong>/<strong>800</strong>0 uses input from the DSM to initiate door locking andallow personnel to exit during arm and disarm procedures.• To disarm a zone from the outside, personnel outside the zone initiate adisarm command or activity. The iSTAR or apC unlocks the door, anddisarms the zone after DSM (door open and close) activity.• To arm a zone from the inside, personnel inside the zone initiate an armcommand or activity. The iSTAR or apC waits for DSM (door open andclose) before arming, thereby allowing personnel to exit.12–6 C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!