6HFXULW\&RGHV$XWKRULW\/HYHOV
$ERXW6HFXULW\&RGHV
Your installer assigned a master code that is used to perform all system functions. In addition, you can assign up to 15 different security codes for use by other users.
•Only the System Master can assign user codes to users.
•Users are identified by
•In addition to a security code, each user is assigned various system attributes.
•User codes can be used interchangeably when performing system functions (a system armed with one user's code can be disarmed by another user's code), with the exception of the guest code described below.
•User code programming involves these steps:
1.Choose a user number and assign a
2.Assign an authority level to that user.
3.Assign other attributes as necessary (see attributes on the next page).
NOTE: The factory settings are designed to meet most normal user situations. Therefore, the only step you usually need to do when adding users is assign a user number and a security code.
$XWKRULW\/HYHO'HILQLWLRQV
Authority levels define the system functions a particular user can/cannot perform.
Level | Title |
| Explanation | |
N/A | System Master | Reserved for user 02; Can perform all system functions and assign | ||
|
|
| codes; can change its own code as follows: | |
|
|
| Master code + [8] + 02 + new master code + new master code again |
|
|
|
|
| |
|
|
| The default System Master code is 1234. | |
0 | Standard User | Can only perform security functions. Cannot perform other system | ||
|
|
| functions. | |
1 | Arm Only | Can only arm the system. Cannot disarm or do other functions. | ||
|
|
| ||
2 | Guest | Can arm the system, but cannot disarm the system unless the | ||
|
|
| system was armed with this code. This code is typically assigned to | |
|
|
| someone (e.g., babysitter or cleaner) who has a need to arm/disarm | |
|
|
| the system only at certain times. The user of this code should not use | |
|
|
| the “Quick Arming” feature. | |
|
|
|
| |
3 | Duress Code |
| Intended for use when you are forced to disarm or arm the system | |
|
|
| under threat. When used, the system will act normally, but can | |
|
|
| silently notify the Central Monitoring Station of your situation, if that | |
|
|
| service has been provided. |
– 30 –