Guardian Technologies Ademco VISTA-40 User Manual

Page 85

Advertising
background image

Р 85 Р

What Can Be Done Once

Panel Is "On-Line"?

¥ Arm the System in the Away Mode; Disarm the System

¥ Bypass a Zone

¥ Force the System to Accept a New Program Download

¥ Shut Down Communication (dialer) Functions (non-payment of monitoring fees

in an owned system)

¥ Shut Down all Security System Functions (non-payment for a leased system)

¥ Inhibit Local Keypad Programming (prevents takeover of your accounts)

¥ Leave a message for customer (alpha keypads ONLY)

¥ Command the System to Upload a Copy of its Resident Program to the office

¥ Read: Arming Status, AC Power Status, List of Faulted Zones, List of Bypassed

Zones, 100 Event Log, List of Zones Currently in Alarm, List of Zones Currently
in Trouble, List of RF sensors with low battery conditions

¥ Set the Real-Time clock.

How Secure Is
Downloading?

Accessing the Control from a remote location is protected against compromise by
the use of 4 levels of protection:

1. Security Code Handshake: The subscriber's account number as well as an 8-

digit ID number (known only to the office) must be matched between the
Control and computer.

2. Hang-Up and Call-Back: The Control panel will "hang-up" and call the

computer back at the pre-programmed number only if the security codes
match.

3. Data Encryption: All data that is exchanged between the computer and Control

is encrypted to reduce the possibility of anyone "tapping" the line and
corrupting data.

4. Operator Access Levels: Up to 15 operators can have access to the

DOWNLOADER, each having their own log-on code. However, each
operator can be assigned one of three levels of access in both FILE and
COMMAND functions, as follows:

File Access:

Read Only:

able only to look at the database; cannot change any information, and

cannot see the customer's access codes.

Part Read/Write:

able to look at and change all information. except the customer's

access codes.

Full Read/Write:

able to look at and change any and all information in the

database.

Control/Comm Access:

Read Only:

able only to Upload and arm the system. Not able to DISARM,

BYPASS, or change any information.

Part Read/Write:

able to ARM, BYPASS, UPLOAD, DOWNLOAD but cannot

shutdown the system.

Full Read/Write:

able to perform all control and status commands, as well as

shutdown all or part of the system.

N O T E S :

1. Each time the Control panel is accessed (whether successful or

unsuccessful), a PROGRAM TAMPER report (*40) is sent to central station, if
programmed.

2. When downloading, the keypad will display "MODEM COMM".

3. Whenever a download or a save is performed, an automatic time stamp is

done in the downloading software, indicating the date and time of the last
download (or save) and the operator ID number.

4. The average time for a complete download, including initial call-up, hang-up

and call-back is under 4 minutes.

5. A complete hard copy of each individual account can be obtained by

connecting a printer to the computer. Refer to your computer owner's manual
or contact your dealer for printer recommendations.

Advertising
This manual is related to the following products: