User manual

User Manual INTEGRA 50
The installer may define a list of rights to be instantly assigned to the new user. The
other rights, available but not included in the list, will have to be assigned individually by
the person entering the new user.
Keypads – assignment of proximity card arm/disarm devices, partition keypads, code locks,
and expanders of proximity cards/DALLAS chips readers which the user will be authorized
to use.
Proximity cards and DALLAS chips – if there is a proximity card reader (or device provided
with such a reader) or DALLAS chip reader in the system, a card or chip to be used for
access control may be assigned to each code.
Keyfobs – in case of the INTEGRA 128-WRL as well as any other control panel to which the
ACU-100 (firmware version 2.00 or later) or INT-RX module is connected, a keyfob can be
assigned to the user.
Buttons – a zone which will be violated on pressing the button / combination of buttons can
be assigned to the keyfob button / combination of buttons. The assigned zone should not
physically exist. The functions are available, if a keyfob has been assigned to the user.
Events (keyfobs) – if a keyfob has been assigned to the user, it is possible to determine
whether pressing the suitable keyfob button will save the event informing about keyfob use
to the control panel.
ABAX confirmation – if an ABAX system keyfob has been assigned to the user, it is
possible to determine the status of which outputs will be presented on the keyfob LEDs on
pressing any button.
Note: Removal of the keyfob will not reset the button settings: after a new keyfob has been
added to the user, the buttons will control exactly the same zones as the buttons of the
removed keyfob.
Name – user's name which appears on selection lists, printouts, and when viewing event
logs.
Life time/bypass time – parameter to be only programmed for codes with a specified time of
validity or activity (see Type = 3, 4, 11 or 8).
Zone bypasses
The user can bypass / unbypass the security alarm system zones in partitions which are not
armed. Information on violating the bypassed zones will be ignored by the control panel.
Bypassing the zones is particularly useful in case of damage or failure of the detector
connected to the zone, which results in malfunctioning of the alarm system (e.g. triggering
false alarms).
Notes:
Zone bypassing reduces the level of protection. Prior to arming, make sure that there are
no accidentally bypassed zones in the partition, which might allow an intruder to get
access to the protected area despite arming.
If a zone is bypassed because of its malfunctioning, call in the service technician
immediately to repair the defect.
For security considerations, the installer may reduce the number of zones that the user
will be allowed to bypass.
Inhibit
The zones can be inhibited by the users having the Z
ONE BYPASSING right. The inhibited zone
will be bypassed until the partition to which the zone belongs is disarmed, or until the zone is
unbypassed by the user. After starting the INHIBIT function, a list of system zones that can be