CONNECTING ALARMS
The
Once configured, an alarm input can invoke many different activities, including triggering a relay device, sending an alert to a security office, changing the video recording settings, and storing
Supervised Alarms
When an alarm is configured as a supervised alarm, the
NOTE: Install the
Figure 17 illustrates the alarm and no alarm conditions of a supervised alarm input. Whether the alarm is normally closed or normally open, neither a cut nor a bypass can defeat these alarms.
NORMALLY CLOSED |
| NORMALLY OPEN | ||
NO ALARM | 1 K |
| NO ALARM | 1 K |
GND |
| +V | GND | +V |
ALARM | 1 K | +V | ALARM | 1 K |
GND |
| GND | +V | |
ALARM | 1 K |
| ALARM | 1 K |
GND |
| +V | GND | +V |
| CUT |
|
| CUT |
ALARM | 1 K | +V | ALARM | 1 K |
GND |
| GND | +V |
BYPASS
BYPASS
Figure 17. Supervised Alarm Conditions
22 |