
2 | D9412GV2 Control Panel
Area Configurations
Area programming offers a wide selection of different
system configurations. Assign an account number to
each area to define annunciation, control, and reporting
functions. Link multiple areas to an automatically
controlled shared area, such as a hallway or lobby. Area
arming can be conditional on other areas (master and
associate).
Two Man Rule
Two Man Rule requires two unique passcodes on the
same keypad to disarm an area. Without the second
passcode, the system denies entry. Two Man Rule
requires the presence of two people at opening,
providing added security.
Early Ambush
Early Ambush requires two passcode entries on the
same keypad. Enter the same passcode twice or have
two unique passcodes, depending on the configuration.
The first entry disarms the area and the second entry
stops a timer programmed to send a duress event. If the
second entry does not occur within the programmed
time, the system generates a duress event. Early Ambush
allows users to inspect the premises and use the system
to confirm that the area is safe to enter, providing added
security.
Easy Exit Control
The D9412GV2 Control Panel changes from one armed
state to another armed state without disarming. For
example, if you change the state from Master Arm to
Perimeter Arm, the control panel complies and reports
the change. Easy Exit Control reduces the number of
keystrokes, simplifying system operation.
Programmable Passcode-controlled Menu List
The system prompts users to enter a passcode prior to
viewing the keypad menu. The keypad display shows the
user the menu options allowed according to the user’s
authority level. Passcode-controlled menus provide
users only with the options and information pertinent to
them, simplifying system operation.
Passcode Follows Scope
Use Passcode Follows Scope to restrict passcode
arming and disarming only to the keypad's immediate
local area, even if the keypad can report events from
other areas. Passcode Follows Scope simplifies the
arming and disarming procedure without limiting any
other keypad capabilities.
Invisible Walk Test
A menu item allows the user to test invisible 24-hour
points within the scope of the keypad without sending
a report to the central station.
Door Activated Custom Function
A custom function activates when user credentials are
presented to a D9210B door controller's reader. The
custom function behaves as though the user performed
a function at the keypad associated with the door
controller.
Passcodes
User passcodes contain three to six digits. Assign each
user one of fourteen customized authority levels in each
area. Restrict passcodes to operate only during certain
times.
The Two Man Rule and Early Ambush options require
two passcodes, providing additional security in financial
establishments such as banks.
Communications
The D9412GV2 Control Panel prioritizes and sends
reports in BFSK or Modem IIIa
2
communications formats
to four route groups. Each group has a programmable
primary and backup destination.
The D9412GV2 works with the D6600 Communications
Receiver/Gateway System using a DX4020 Network
Interface Module. It has programmable anti-replay anti-
substitution features when using a DX4020.
The Modem IIIa
2
Communications Format, available with
Bosch receivers, adds reporting capabilities such as:
•
Individual point numbers and text
•
Opening or closing reports by area number
•
Remote programming attempts
•
Diagnostic reports
•
Sends user names to the central station
Security and Fire Detection
The D9412GV2 Control Panel provides eight on-board
points, and up to 238 additional off-board points
(depending on model and expansion interfaces). You
can program individual points to monitor all types of
burglar alarms, fire alarms, and supervision devices.
Event Log
The event log stores up to 1,000 local and transmitted
events. The event log includes time, date, event, area,
point, and user number. View the event log from select
keypads or remotely retrieve event information using
RPS. RPS operators can retrieve events periodically
using one phone call, rather than receiving several calls
each day. When the event log reaches a programmed
Komentarze do niniejszej Instrukcji