What Can Be Done Once Panel Is "On-Line"?

¥Arm the System in the Away Mode; Disarm the System

¥Bypass a Zone

¥Force the System to Accept a New Program Download

¥Shut Down Communication (dialer) Functions (non-payment of monitoring fees in an owned system)

¥Shut Down all Security System Functions (non-payment for a leased system)

¥Inhibit Local Keypad Programming (prevents takeover of your accounts)

¥Leave a message for customer (alpha keypads ONLY)

 

¥

Command the System to Upload a Copy of its Resident Program to the office

 

¥

Read: Arming Status, AC Power Status, List of Faulted Zones, List of Bypassed

 

 

Zones, 100 Event Log, List of Zones Currently in Alarm, List of Zones Currently

 

 

in Trouble, List of RF sensors with low battery conditions

 

¥

Set the Real-Time clock.

How Secure Is

Accessing the Control from a remote location is protected against compromise by

Downloading?

the use of 4 levels of protection:

 

1. Security Code Handshake: The subscriber's account number as well as an 8-

 

 

digit ID number (known only to the office) must be matched between the

 

 

Control and computer.

 

2.

Hang-Up and Call-Back: The Control panel will "hang-up" and call the

 

 

computer back at the pre-programmed number only if the security codes

 

 

match.

 

3. Data Encryption: All data that is exchanged between the computer and Control

 

 

is encrypted to reduce the possibility of anyone "tapping" the line and

 

 

corrupting data.

 

4.

Operator Access Levels: Up to 15 operators can have access to the

 

 

DOWNLOADER, each having their own log-on code. However, each

 

 

operator can be assigned one of three levels of access in both FILE and

 

 

COMMAND functions, as follows:

File Access:

Read Only: able only to look at the database; cannot change any information, and cannot see the customer's access codes.

Part Read/Write: able to look at and change all information. except the customer's access codes.

Full Read/Write: able to look at and change any and all information in the database.

Control/Comm Access:

Read Only: able only to Upload and arm the system. Not able to DISARM, BYPASS, or change any information.

Part Read/Write: able to ARM, BYPASS, UPLOAD, DOWNLOAD but cannot shutdown the system.

Full Read/Write: able to perform all control and status commands, as well as shutdown all or part of the system.

NOTES: 1. Each time the Control panel is accessed (whether successful or unsuccessful), a PROGRAM TAMPER report (*40) is sent to central station, if programmed.

2.When downloading, the keypad will display "MODEM COMM".

3.Whenever a download or a save is performed, an automatic time stamp is done in the downloading software, indicating the date and time of the last download (or save) and the operator ID number.

4.The average time for a complete download, including initial call-up, hang-up and call-back is under 4 minutes.

5.A complete hard copy of each individual account can be obtained by connecting a printer to the computer. Refer to your computer owner's manual or contact your dealer for printer recommendations.

Ð 85 Ð

Page 85
Image 85
Guardian Technologies VISTA-40, N7001V2 installation instructions File Access, Control/Comm Access, 85 Ð