FDX Spider ALARM SYSTEM SHORT FORM USER GUIDE V1.6. SyxthSense Ltd

Size: px
Start display at page:

Download "FDX Spider ALARM SYSTEM SHORT FORM USER GUIDE V1.6. SyxthSense Ltd www.syxthsense.com"

Transcription

1 FDX Spider ALARM SYSTEM SHORT FORM USER GUIDE V1.6 SyxthSense Ltd 1

2 1. ARMING THE SYSTEM 1.1 General The SyxthSense Spider alarm system can be armed using a card (RFID tag) reader, display panel s user interface, according to a predefined schedule or a with a combination of these methods. For example outside business hours a combination of RFID tag and user PIN could be required for identification. 1.2 Arming with card reader The card reader is used by placing the RFID tag a few centimeters away from the reader. The reader flashes an orange light as a sign of successful identification. Reading the RFID-tag 2

3 PIN code is entered pressing one number key at a time with your finger (do not use a pencil, key or nails). The reader confirms each key press with a short tone. After entering the PIN code press the * key. Successful identification starts the exit delay and the light starts to flash red and green to indicate this. Light indications Constant green System state: armed. Constant red System state: normal. Flashing green Waiting for a PIN-code. Flashing red and a signal tone while entering the PIN-code Flashing red and a signal tone during RFID-tag reading Flashing red and a continuous signal tone during entry Invalid PIN-code. Invalid tag. Entry delay active. Flashing red and a discontinuous signal tone Entry delay active, alarms detected. Flashing orange and a signal tone while attempting to arm the system Short signal tone while arming the system. At least one loop is alarming. System state change not possible. Bypassed loops detected. Red and green flashing. Exit delay active. Red and green flashing and a signal tone System arming according to schedule. 3

4 1.3 Arming with graphical user interface (GUI) Arming the system can also be done via the graphical user interface by clicking the state button or state text of. Note that only PIN codes can be entered via the GUI. RFID tags must be read with a card reader. Clicking either of the state buttons opens up a window for entering a PIN code. Changing the system state via the GUI. 4

5 1.4 Arming with schedule The system can be set to arm itself according to a predefined schedule. For more information on creating a schedule refer to the FDX Spider programming manual. When the system arms itself according to a schedule the signal light on the card reader flashes red and green and the buzzer on both the card reader and display unit sounds a signal tone. After the signal tone the system activates exit delay. The exit delay can be interrupted with a succesful identification (PIN code and/or RFIDtag). The PIN code can be entered either with the card reader or via the GUI. Note! When the system activates according to a schedule there will be no warning about any alarming loops. If any loops are in alarming state after state change, these alarms are processed normally. 1.5 Troubleshooting If the system cannot change its state to fully armed the most common reasons are: Alarm detected (not applicable to state change with a schedule). The system state cannot be changed to fully active if any of the loops is in alarming state. Check all doors and windows. Alarming loop is expressed with a signal tone and an orange signal light. If necessary, the alarming loop can be checked from the GUI ( Active alarms ). If a detector is suspected to be broken and giving false alarms the loop can be disconnected from the system (see Bypassing alarm loops ). This way the system can be fully armed despite of the faulty detector. Timeout during identification. If both identification methods (PIN code and RFID tag) are in use the PINcode must be entered inside a predefined time window after the reading of RFID tag. After a succesful RFIDtag read the light on the reader flashes green meaning that the system waits for a PIN code. If the PIN code is not entered inside the predefined time window the identification fails. RFID tag not recognized. If the RFID tag is not programmed to the system it is expressed with a signal tone and flashing red light on the card reader. PIN code not recognized. Faulty PIN code (input failure, not programmed to system) is expressed with a signal tone and flashing red light on the card reader. 5

6 2. DISARMING THE SYSTEM 2.1 General The SyxthSense Spider alarm system can be disarmed using a card (RFID tag) reader, display panel s user interface, according to a predefined schedule or a with a combination of these methods. For example outside business hours a combination of RFID tag and user PIN could be required for identification. 2.2 Disarming with card reader The card reader is used by placing the RFID tag a few centimeters away from the reader. The reader flashes an orange light as a sign of successful identification. When the premises is entered through an entrance with an entry delay set the reader gives a signal tone and the light flashes red. After a succesful identification the light on the reader turns to green. Reading the RFID-tag. 6

7 PIN code is entered by pressing one number key at a time with your finger (do not use a pencil, key or nails). The reader confirms each key press with a short tone. After entering the PIN code press the * key. Successful identification starts the exit delay and the light starts to flash red and green to indicate this. When entering the monitored premises through a door with an entry delay the card reader starts to flash a red light and sound a signal tone. Entry delay can be configured to each loop separately. When the system is succesfully disarmed the light on the reader turns green. Light indications Constant green System state: armed. Constant red System state: normal. Flashing green Waiting for a PIN-code. Flashing red and a signal tone while entering the PIN-code Flashing red and a signal tone during RFID-tag reading Flashing red and a continuous signal tone during entry Invalid PIN-code. Invalid tag. Entry delay active. Flashing red and a discontinuous signal tone Entry delay active, alarms detected. Flashing orange and a signal tone while attempting to arm the system Short signal tone while arming the system. At least one loop is alarming. System state change not possible. Bypassed loops detected. Red and green flashing. Exit delay active. Red and green flashing and a signal tone System arming according to schedule. 7

8 2.3 Disarming with graphical user interface (GUI) Disarming the system can also be done via the graphical user interface by clicking the state button or state text of intrusion alarm. Note that only PIN codes can be entered via the GUI. RFID tags must be read with a card reader. Clicking either of the state buttons opens up a window for entering a PIN code. Changing the system state via the GUI. 2.4 Disarming with schedule The system can be set to disarm itself according to a predefined schedule. For more information on creating a schedule refer to the FDX Spider programming manual. 8

9 10

10 3. BYPASSING ALARM LOOPS MANUALLY 3.1 General The system cannot be armed if any alarm loop other than specified as a part of an exit route is in alarming state. Most typical reason for this is a door that is left open but in some cases it can be due to a malfunctioning detector or a bad connection. Malfunctioning alarm loops can be manually bypassed to be able to arm the system. All alarm loops specified as part of the exit route can be in alarming state during arming the system. They are not actively monitored until the exit delay has passed. Note! When the system activates according to a schedule there will be no warning about any alarming loops. If any loops are in alarming state after state change, these alarms are processed normally. 3.2 Bypass procedure Bypassing alarm loops is done via the graphical user interface. The alarming loop can be seen in the active alarms listing. Open the alarm list by pressing Alarms and select Active alarms. Find the malfunctioning alarm loop and set it to normal state. (see picture below). Malfunctioning detectors should be repaired as quickly as possible. Bypassing is a temporary means of getting the system armed. When the system is armed after the bypass process it sounds a signal tone as a reminder of bypassed alarm loops. Note! Bypassing alarm loops requires sufficient user security level identification. All users are not necessarily entitled to bypass alarm loops. 11

11 Alarming points are shown in the Active alarms list. Click the alarming point and select Manual command from the list. 12

12 Set the point s state to 0-Normal and press Change. The bypassed alarm point disappears from the active alarms list. 13

13 4. WHEN AN ALARM IS DETECTED 4.1 General The FDX Spider system can have different types of alarming devices. Typical local alarming devices include sirens and signal lights. Alarms can also be forwarded by controlling an external relay, SMS, or Alerta message. Alarm events are saved into a log for later examination. The alarming devices also have their own logs. Logs can be viewed by selecting Alarms > Logs. Configuring the alarm devices is thoroughly presented in the programming manual. 4.2 Normal alarm Most alarm loops are configured as normal alarm loops. The normal alarm loops are under active surveilance when the system is armed. When the system is disarmed these alarm loops do not cause an alarm. Tampering and fault indications are however active. 4.3 Silent alarm Aarms can be configured as silent alarms. Silent alarm works like a normal alarm but the alarm is processed only through forwarding (no local alarm devices, such as sirens, are activated). Silent alarms are typically used with personal safety buttons. 4.4 Alarm from a 24/7 alarm loop Alarm loops can be configured as 24/7 type of loops. These alarm loops are active whether the system is armed or disarmed. Typical 24/7 alarm loops include tamper switches and fire detectors. A 24/7 alarm loop can also be configured to work in silent mode. 14

14 4.5 Tampering or fault detection All alarm loops connected with a LTR (line terminating resistor) connection are able to detect faults. All alarm loops with three resistor connection are also able to detect tampering. Tampering and fault detection are active whether the system is armed or disarmed. The system can also have special sabotage detector loops connected (such as tamper switches on DU 10 door unit). 4.6 Alarm acknowledgement Alarms can be acknowledged via the graphical user interface. Open the list for unacknowledged alarms by selecting Alarms. Unacknowledged alarms can be viewed from "kuittaamattomat hälytykset" list. Note! All alarms are automatically acknowledged when the system is armed or disarmed. Manual acknowledgement of alarms requires sufficient user security level identification. All users are not necessarily entitled to acknowledge alarms. Unacknowledged alarm can be viewed at the Unacknowledged alarms list. 15

15 Click the alarming point and select Alarm acknowledge from the list. The acknowledged alarm disappears from the unacknowledged alarms list. 16

16 4.7 Alarm log Alarm events can be later explored from the alarm log. The log can be viewed by selecting "Security > Alarm log". Note! Viewing the alarm log requires sufficient user security level identification. All users are not necessarily entitled to view the alarm log. Alarm log. 17