12.07.2015 Views

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Indexplacing on map 14-4 to 14-7Imaging permission 15-4inbound reader 12-31Incidentdefined 25-13Incident ID 25-14Incident ID trackingevent messages for 7-22, 7-24Incident ID, enabling in Ccure.ini 25-9information, finding more xxInput Group dialog box 25-4Inputsintrusion zones 12-21iSTAR 12-21Intrusion zonesand local actions 7-16apC doorconfiguration 12-19configuring 12-1inputs 12-21overview 12-11configuring with antipassback 12-31dialup considerations 12-6doorconfiguration 12-19exit consideration 12-6hardwarerequirements 12-10iSTAR doorconfiguration 12-19modes 12-3armed 12-3disarmed 12-3factors 12-7violated 12-4protection inputs 12-24sample 12-2softwarerequirements 12-10understanding 12-2violated event 12-24iSTARconfiguriongintrusion zones, arm, disarm 12-14doorsintrusion zone configuration 12-19inputs 12-21JJournal Replay 25-9KKeypad commandsactivate 13-4capabilities 13-2configurationrequirements 13-7configure 13-6configuring 13-12controlling access 13-16deactivate 13-4format 13-8requirements 13-8Monitoring Station 13-16sample formats 13-9sample uses 13-3Llatch event 7-14Latch statesIndex–6C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!