Home > Bosch > Home Security System > Bosch 7412 G User Manual

Bosch 7412 G User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Bosch 7412 G User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 101 Bosch manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							D9412G/D7412G | Program Entry Guide | 2.0 9000MAINEN | 71
    Bosch Security Systems | 1/04 | 47775E
    0101
    0101
    0101Programming Tip #4:
    Fire Trouble Resound was added to
    firmware versions 6.20 and later. This
    feature, when enabled, resounds the Fire
    Trouble condition at 12:00 PM or 12:00
    AM if the Fire Trouble condition still exists.
    It does not, however, retransmit the Fire
    Trouble condition at the specified time.
    The Fire Trouble Event is only sent, if
    programmed to do so, at the time it
    occurs.
    • To disable the Fire Trouble Resound
    feature, program a 0 in Area 6’s Silent
    Alarm Relay entry.
    • To enable the Fire Trouble Resound
    feature at 12:00 PM, program a 61 in
    Area 6’s Silent Alarm Relay entry.
    • To enable the Fire Trouble Resound
    feature at 12:00 AM, program a 62 in
    Area 6’s Silent Alarm Relay entry.
    Note:
    Programming a value other than 0, 61, or 62
    enables the Fire Trouble Resound feature at
    12:00 AM.
    Beginning in Firmware version 6.30 and
    higher, a Fire Trouble Resound prompt
    was added to Section 6.7 Miscellaneous.
    This prompt operates as described.
    0101
    0101
    0101Programming Tip #5:
    Perimeter Armed Relay was added to
    firmware versions 6.20 and later. This
    feature, when enabled, turns the Fail to
    Close Relay function into a Perimeter
    Armed Relay function.
    To switch the Fail to Close Relay into a
    Perimeter Armed Relay function, program
    a 63 in Area 7’s Silent Alarm Relay entry.
    Then, program a relay number into the
    appropriate area you wish to activate when
    the area becomes Perimeter Armed
    (COMMAND 2, COMMAND 3, or
    COMMAND 8). See Programming Tip #2
    for additional information.
    2.13.2 Panel-Wide Relays
    The following eleven relay options activate when
    they occur anywhere in the control panel. They are
    not restricted by area boundaries.
    AC Failure
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when the control panel responds to an AC
    power failure as programmed in 
    AC Fail Time in
    Section 2.5 Power Supervision. This relay automatically
    resets when AC power is restored.
    Use this relay as an option to create
    audible annunciation using the command
    centers for all applications excluding
    commercial fire systems.
    Battery Trouble
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when battery voltage falls below 85% of
    capacity (12.1 VDC) for a fully charged (13.8 VDC)
    battery, or when the battery is in a missing
    condition. This relay automatically resets when
    battery power is restored.
    Use this relay as an option to create
    audible annunciation using the command
    centers for all applications excluding
    commercial fire systems.
    Phone Fail
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when a telephone line failure occurs. A
    time must be entered in Ph Supv Time (see Section
    2.2 Phone Parameters) for this relay to activate. This
    relay automatically resets upon restoral of the phone
    line(s). 
    						
    							D9412G/D7412G | Program Entry Guide | 2.0 9000MAINEN | 72
    Bosch Security Systems | 1/04 | 47775E
    Comm Fail
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    This relay activates when a control panel is unable
    to communicate a report after making ten attempts
    to each routing destination. At the same time, COMM
    FAIL RT ## displays at the command center. This
    relay automatically resets when a report is sent
    successfully.
    Use this relay to report primary digital
    report failure to an alternate
    communication device.
    Log % Full
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Enter the number of the relay that activates when
    the log reaches the programmed percentage of its
    capacity as programmed in RAM Parameters
    program item Log % Full. This relay provides a
    steady output until a Get Log and Set Pointer is
    performed from the RPS.
    Summary Fire
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Enter the number of the relay that activates when
    any Fire point in the system (
    P## Type 0, P## Fire
    Yes) goes into alarm. This relay provides a steady
    output until all Fire points in the system are returned
    to normal.
    Summary Alarm
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Enter the relay’s number that activates when a Non-
    fire point goes into alarm. This relay provides a
    steady output until the alarm is acknowledged by a
    valid passcode then cleared from alarm memory
    with an acknowledgment at the command center.
    This relay does not activate for silent
    alarms.
    Summary Fire Tbl
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    This relay activates when any Fire point in the
    control panel is in trouble, or if a Fire Supervision
    point is missing. This relay provides a steady output
    until all Fire points restore to a normal condition.
    Summary SupFire
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when any Fire Supervisory point in the
    control panel is in a supervisory condition (off
    normal). This relay provides a steady output until all
    Fire Supervisory points are restored to a normal
    condition.
    Summary Trouble
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when any Non-fire point in the control
    panel is in a trouble condition. This relay provides a
    steady output until the user at the command center
    acknowledges the trouble.
    Summary SupBurg
    Default:Blank
    Selection:Blank, 1 to 128 (1 to 64 for D7412G),
    A, B, or C
    Activates when any Non-fire Supervisory point in
    the control panel is in a supervisory condition, or if a
    Supervisory Burg point is missing. This relay
    provides a steady output until it is acknowledged at
    the command center. 
    						
    							D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 73
    Bosch Security Systems | 1/04 | 47775E
    3.0 RADXUSR1/RADXUSR2
    3.1 Passcode/Token Worksheet
    These programming items assign user groups 001 to
    249 a passcode, area assignment by authority level,
    and a User Group Window.
    0101
    0101
    0101Two handlers in the D5200 Programmer are
    used to program the users. RADXUSR1
    Handler programs users 000 to 124.
    RADXUSR2 programs users 125 to 249
    (D9412G only).
    3.1.1 User Groups
    For the D9412G, there are 249 groups (99 groups for
    the D7412G) consisting of one user with a passcode
    and token, (master) and three users with
    tokens/cards but not a passcode (sub-user). All users
    in the group share the same authority level as the
    master user.
    3.1.2 Passcodes
    Only the master user is assigned a passcode. The
    passcode can be three to six digits. Entering three
    digits in 
    User ### chooses the master user.
    Programming the 
    U### Passcode assigns a
    passcode to the master user. Sub-users cannot use
    the passcode. While the system allows tokens/cards
    to be added to USER 0 (service passcode), the
    tokens/cards do not function because the service
    passcode uses Authority Level 15.
    3.1.3 User Group Window
    Use 
    U### User Group to enable/disable the
    U### Passcode for up to eight different time
    periods throughout the day. Assign the number (1 to
    8) programmed in 
    U### User Group to a User
    Windows #
    .  If the user is outside a window,
    COMMAND DISABLED appears on the command
    center after the user enters the passcode and presses
    [ENTER].
    This window does not affect tokens/cards, it
    only affects the passcode of the master
    user.
    3.1.4 Authority Level by Area
    A user group is assigned an authority level of 1
    through 14 for each area using the 
    U### Area #
    Auth
     prompt. The authority level can be different
    for each area. Not programming an authority level
    for an area is indicated by the NOT AUTHORIZED
    display on the command center.
    When using the Add/Change User function
    at the command center, the authority levels
    and the changes made affect the master
    user’s passcode and the entire group’s
    token/cards.
    When using the ACCESS CTL LVL function
    at the command center, the whole group is
    affected by whether the level is on or off for
    access control functions only.
    When using the DELETE USER? function,
    the whole group is deleted. There is no
    means to delete each user within the group
    individually. It is recommended that you use
    the ADD/CHG USER? function to change a
    user token/card instead of deleting the
    whole group.
    3.1.5 User Name
    Each user group can be assigned one 
    U### Name.
    This name is logged and reported to the central
    station for all the users in the group. The user ID is
    used to differentiate which user’s token/card was
    executed.
    Beginning with v6.30, when using a D1260
    Command Center, User 249 text is used
    for contact information text (such as
    telephone numbers). If a D1260 is installed
    on the system, do not use User 249 for
    user ID information.
    3.1.6 Tokens/Cards
    The master user assigned the passcode can also be
    assigned a token/card. This is done by programming
    the 
    U### Mstr Site and U### Mstr C/D.
    Three more token/cards are assigned to the user
    group for sub-users using the 
    U### SU# Site and
    U### SU# C/D.
    3.1.7 Reporting and Logging
    Modem Format must be Yes for the following
    reports to the central station. Regardless of the
    reporting format, they log and print at the local
    printer as shown. Each sub-user is identified by the
    master user’s three-digit number plus an extension of
    0, 1, 2, or 3. These numbers are called Sub-user ID
    Codes.
    Figure 3 shows all the users for User Group 122 as
    they would appear. 
    						
    							D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 74
    Bosch Security Systems | 1/04 | 47775E
    Figure 3: User Group 122 Example
    Master User:
    ID 122.
    ♦CRD ID 122-0
    ♦Sub User -1:   ID 122-1
    CRD ID 122-1
    ♦Sub User -2:   ID 122-2.
    CRD ID 122-2
    ♦Sub User -3:   ID 122-3.
    CRD ID 122-3
    2
    1
    1 - User passcode
    2 - User token/card
    0101
    0101
    0101In reporting systems using modem format, all three digits of the User ID Code are transmitted to the
    central station with appropriate reports. Central station automation computer systems may only accept
    Zonex and COMEX style User Ids. See Point/User Flag in Section 2.1 Phone.
    In BFSK, only one number is transmitted. This number represents a group of ten users as shown in Table 28.
    Users 100 through 249 do not report in BFSK format.
    Table 28: BSFK User Code Report
    User Code
    000 to 009User Code
    010 to 019User Code
    020 to 029User Code
    030 to 039User Code
    040 to 049User Code
    050 to 059User Code
    060 to 069User Code
    070 to 079User Code
    080 to 089User Code
    090 to 099
    BFSKReport0
    BFSKReport1
    BFSKReport2
    BFSKReport3
    BFSKReport4
    BFSKReport5
    BFSKReport6
    BFSKReport7
    BFSKReport8
    BFSKReport9
    User ###
    Default:001
    Selection:000 or 001 to 249 (001 to 099 for the
    D7412G)
    Enter the User number you are programming.
    0101
    0101
    0101User 000 is the Service Authority Level
    (Level 15). You cannot change the
    programming for user 000.
    Only the Service Authority Level (User
    000) can delete User 000. When a user
    other than User 000 tries to delete the
    passcode for User 000, the command
    center displays NOT IN USE.
    User 000 cannot be added/changed at the
    command center whether it exists or not.
    U### Passcode
    Default:See Program Record Sheet
    Selection:Three to six digits ( 0 to 9)
    Enter three to six digits to enable a passcode for the
    master user in this group.
    0101
    0101
    0101User I.D.000 is the Service Passcode. The
    default Service Passcode is 123.
    The programmer does not allow you to
    enter any passcode number that could
    conflict with a duress passcode. If Duress
    Type is a 1, passcodes within a range of 1
    for existing passcodes cannot be entered.
    This rule applies even if duress is disabled.
    For example, once a passcode of 654321
    is entered, 654322, 654323, 654320,
    and 654329 cannot be entered. 
    						
    							D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 75
    Bosch Security Systems | 1/04 | 47775E
    A silence bell authority is built into all
    authority levels, even if they are the default
    and none of the available programmable
    functions are enabled. A user passcode
    can silence a Fire/Burg bell as long as any
    authority level is assigned to the area
    where the bell can be silenced.
    U### User Group
    Default:Blank
    Selection:Blank, 1 to 8
    Use this parameter to create a group of up to 249
    users (99 for the D7412G) whose combinations can
    be enabled/disabled using an automatic user
    window. This is the number entered into the 
    W#
    User Group
     for any active W# User Window.
    Multiple windows can be programmed for one user
    group (up to eight) within one 24-hour period. For
    example, if User Group 1 has a window running
    from 8:00 AM (start time) to 4:00 PM (stop time),
    the users for that group may use their passcodes only
    between that time. Between 4:00 PM that day and
    8:00 AM the next day, the users may not use their
    passcodes.
    0101
    0101
    0101
    To enable this user’s passcode at all times,
    leave U### User Group blank.
    User Group Window times cannot be changed from
    the command center. Once a window is assigned to
    a user group, the users in that group rely on the
    window to be active (within the start and stop times)
    for their passcodes to function. The only way to
    disable the window is by reprogramming the control
    panel from the D5200 or RAM.
    U### Area 1 [through Area 8] Auth
    Default:See Program Record Sheet
    Selection:1 to 14 or Blank
    Assign an authority level to the user for this area.
    Blank means the user has no authority in this area.
    U### Name
    Default:See Program Record Sheet
    Selection:Sixteen alphanumeric characters
    Enter Alphabetic-characters A to Z in capital letters
    Period (.), comma (,), percent (%), parentheses [()],
    equal (=), greater/less than (), exclamation (!),
    braces ({}), apostrophe (’), carat (^), grave accent (`),
    tilde (~), semi-colon (;), and colon (:) are not
    allowed.
    Enter up to sixteen characters of text for this user
    group.
    Programming this group with a
    departmental, team, or function name
    identifies all the users in this group in a
    function related manner, such as
    ENGINEERING.
    Card Data Format
    The D9412G/D7412G and D9210B Controller
    comply with the 26-BIT Wiegand card data format.
    In essence, the format consists of 26 bits (3.2 bytes)
    of data. The first bit is used for the even parity. The
    next 8 bits (first byte) is used for the 
    U### Site
    Code
    . The next 16 bits (second and third byte) are
    used for the 
    U### Card Data. The last bit is used
    for the odd parity.
    As long as the reader and tokens/cards you are using
    are 26-BIT Wiegand compatible, they function with
    this system.
    Use only the readers identified as being compatible
    with the D9210B door control module. Information
    on these readers can be found in the D9210B O/I
    Manual.
    For more information, see the Security Industry
    Association (SIA) Access Control 26-BIT Wiegand
    Reader Interface Standard.
    U### Mstr Site
    Default:Blank
    Selection:000 = (0) to 254 or Blank (255)
    Master User ### Site Data
    Enter the first three decimal numbers on the back of
    the token/card. This is the first byte (bits 2 through
    9) of data for a 26-bit Wiegand card. This is called
    the site number. Tokens/cards with a site code of
    255 are not compatible with the D9412G/D7412G
    Control Panels. 
    						
    							D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 76
    Bosch Security Systems | 1/04 | 47775E
    0101
    0101
    0101Converting hexadecimal to decimal: If
    your card label contains letters as well as
    numbers, the number is hexadecimal.*
    Convert the hexadecimal number to
    decimal using your calculator. If you cannot
    convert in this way, use the reader and the
    Add/Chg User? Function to add the
    tokens/cards.
    Perform the following test to confirm you
    can convert properly:
    Use 319EB0 as the hexadecimal number.
    On your calculator, press [HEX]. Enter all
    the hexadecimal characters into the
    calculator. Press [DEC] and your
    hexadecimal characters convert to the
    following eight digits: 03251888. The site
    number is 032.  Enter it in U### Mstr
    Site. Your card data is 51888. Enter it into
    U### Mstr C/D.
    *  A hexadecimal number can contain all
    numerals. If the code does not work try
    converting the number from
    hexadecimal to decimal.
    Always tag your tokens before adding
    them to the system so you do not mix them
    up. Use the CRD ID ###-# number to
    index them.
    U### Mstr C/D
    Default:Blank
    Selection:00000 = (0) to 65534 or Blank (65535)
    Master User ### Card Data
    Enter the remaining five decimal numbers on the
    back of the token/card. This is the second and third
    byte (bits 10 through 25) of data for a 26-bit
    Wiegand card. This is called the card data.
    You must program 
    U### Mstr Site before
    programming this prompt.
    U### SU1 through SU3 Site
    Default:Blank
    Selection:000 = (0) to 254 or Blank (255)
    Sub-users one through three Site Data.
    U### SU1 through SU3 C/D
    Default:Blank
    Selection:00000 = (0) to 655354 or Blank
    (65535)
    Sub-users one through three card data. 
    						
    							D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 77
    Bosch Security Systems | 1/04 | 47775E
    4.0 RADXPNTS
    4.1 Point Index
    Use this programming module to construct
    personality types for points used in the system. The
    Index numbers are used in Point Assignments. Each
    unique point index number determines the control
    panel’s responses to specific conditions occurring on
    the Protective points.The NEW RECORD program contains default
    entries and descriptions that match RPS defaults for
    point indexes. See the D9412G/D7412G Program
    Record Sheet for defaults.Point Index
    Default:1
    Selection:1 to 31
    The number of the point personality you are
    programming. You can define up to 31 individual
    personalities.
    P## Type
    Default:See Program Record Sheet
    Selection:0 to 9
    P ##
    TypeDescription
    0
    24-hour: A 24-hour point is not turned on and off from a command center. 24-hour points are
    armed all the time, and can be used for fire protection (see the 
    P ## Fire Point prompt in Section
    4.1.1 Point Responses), panic, medical, and police alerts.
    24-hour points can be programmed as bypassable. Consider the application carefully before using
    the bypassable option. Bypassable 24-hour points should be programmed to Buzz on Fault.
    When a 24-hour point is bypassed, send the report as it occurs. If the area contains all 24-hour
    points, the area is never armed or disarmed. A Deferred Bypass Report is not sent.
    24-hour protection for fire doors, roof hatches, and so on. Instead of programming this type of
    protection as a 24-hour point, consider using a Perimeter point type with a Point Response of 9 to E.
    24-hour points do not show faults when an arming function is entered, but Perimeter points do.
    When programming this type of protection, consider also using the Buzz on Fault and Local While
    Disarmed options.
    1
    Perimeter: Perimeter points are armed with all Arming functions. Points programmed as perimeter
    can also be armed as a group (using Perimeter-Arming functions) separately from points
    programmed as interior. This lets the user partially arm the system to establish Perimeter protection
    while occupying the interior of the protected premises.
    Perimeter points can be programmed to initiate entry delay time. If the point initiates entry delay, it
    can also initiate an entry tone.
    When a Perimeter point is programmed for entry delay, entry delay time is always provided. If the
    area is in entry delay when a second Perimeter point trips, the control panel compares the remaining
    entry delay time to the time programmed for the second Perimeter point. If the second Perimeter
    point’s entry delay time is less than the remaining time, it shortens the entry delay time.
    Perimeter points programmed for an instant point response, generate an alarm immediately when
    tripped, even during entry or exit delay. 
    						
    							D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 78
    Bosch Security Systems | 1/04 | 47775E
    P ##
    Type
    SelectionDescription
    2
    Interior: Interior points are armed only by master arming the area. They are NOT armed when
    using Perimeter Arming functions. These points are typically used to monitor interior detection
    devices such as interior doors, motion detectors, photoelectric beams, and carpet mats.
    Instant Interior Points: Interior points are usually programmed for an instant alarm (see Section
    4.1.1 Point Responses). Points programmed for instant alarms generate alarms immediately, even
    during entry or exit delay.
    Delayed Interior Points: Interior points can be programmed for a delayed point response. A
    delayed response means that if the point is tripped while the area is armed, it initiates entry delay. It
    does not generate an alarm until entry delay expires.
    When an Interior point is programmed for entry delay, entry delay time is always provided. If the
    area is in entry delay when the Interior point trips, the control panel compares the remaining entry
    delay time to the time programmed for the Interior point. If the Interior point’s entry delay time is
    less than the remaining time, it shortens the entry delay time.
    Delayed points can also initiate an entry tone at the command center (see the 
    P## Ent Tone Off
    prompt in Section 4.1.1 Point Responses).
    In some cases, you may need to create an Interior point that causes an instant alarm only if entry
    delay protection is not tripped first. Use Interior Follower to create this type of protection.
    3Interior Follower: Interior Follower points are armed only by master arming the area. They are
    NOT armed when using Perimeter-Arming functions.
    An Interior Follower point does not create an alarm if it trips while the area is in entry delay. An
    Interior Follower does not change the amount of remaining entry delay time.
    If no entry delay is in effect when the Interior Follower trips, it creates an instant alarm.
    You must program a delayed Point Response (4, 5, 6, 7, or 8) for an Interior Follower point. The
    control panel ignores the entry in 
    P## Entry Delay for an Interior Follower point.
    Note:
    It may be necessary to increase the debounce count for Interior Follower points to prevent Interior Follower
    points from going into alarm before the control panel recognizes that a Perimeter Delay point was faulted.
    Program the Interior Follower’s debounce for one number higher than the debounce count on Perimeter delay 
    						
    							D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 79
    Bosch Security Systems | 1/04 | 47775E
    P ##
    TypeDescription
    Keyswitch Maintained: Program Point Response as 1. Do not connect initiating devices to a
    Keyswitch point.
    Normal:The area is disarmed.
    Short:When this point changes from normal to open, the area arms.
    Open:A short is a trouble when the area is disarmed. A short is an alarm when the area is
    armed. When this point changes from shorted to normal or open, it restores.
    Program Point Response as 2, the point responds as follows:
    Normal:When this point changes from open to normal, the area arms.
    Open:The area is disarmed.
    Short:A short is a trouble when the area is disarmed. A short is an alarm when the area is
    armed. When this point changes from shorted to normal or open, it restores.
    4*
    Trouble and Restoral Reports are not sent if 
    Local While Disarmed is Yes.
    Alarm and Restoral Reports are not sent if 
    Local While Armed is Yes.
    Keyswitch Momentary: Used for area arming and disarming. Point Response must be
    programmed 1. Do not connect initiating devices to a Keyswitch point.
    N→S→N:When this point momentarily changes from normal to shorted to normal, it toggles
    the armed state of the area.
    Open:An open is a trouble while the point is disarmed. An open is an alarm while the
    point is armed.
    When this point changes from open to normal, it restores.
    5*
    Trouble and Restoral Reports are not sent if 
    Local Disarmed is Yes.
    Open/Close Point: Used for point arming and disarming. Point Response must be programmed 1.
    Local bells are silenced through the command center.
    Normal:The point is armed and sends a Point Closing Report. A Point Closing Report is not
    sent if Local Armed is Yes.
    Open:An open is an alarm when the point is armed. An open is a trouble when the point
    is disarmed. Alarm and Restoral Reports are not sent if 
    Local Disarmed is Yes.
    6*
    Short:The point is disarmed and sends a Point Opening Report. A Point Opening Report
    is not sent if 
    Local Armed is Yes.
    *Keyswitch Points. Special rules apply to points used for Keyswitch functions. These special point types do not respond
    the same way to the point response entry as Point Types 1, 2, and 3. Responses for keyswitch point types are described in
    Section 4.1.1 Point Responses. 
    						
    							D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 80
    Bosch Security Systems | 1/04 | 47775E
    P ##
    Type
    SelectionDescription
    D279 (O/C Non-Priority): The D279 provides point arming and disarming independent of the area
    arm state. A non-priority D279 point arm state does not affect the area arm state. 
    Point Response
    must be programmed 1. Local bells are silenced through the command center. For bell control at the
    D279, use P## Type 8.
    Cut the W1 jumper on the D279 to send Point Opening and Point Closing Reports. If the D279’s
    W1 jumper is not cut, no Open or Close Report is sent, regardless of control panel programming.
    Normal:The point is armed and sends a Point Closing Report. Point Closing Report is not
    sent if 
    Local Armed is Yes.
    Open:The point is disarmed and sends a Point Opening Report. A Point Opening Report
    is not sent if Local Armed is Yes.
    7*
    Short:A short is an alarm when the point is armed. A short is a trouble when the point is
    disarmed. Alarm and Restoral Reports are not sent if 
    Local Disarmed is Yes.
    D279 (O/C Priority): The D279 provides point arming and disarming independent of the area arm
    state. A priority D279 point must be armed before an area can be armed. Program 
    Point Response
    as 2.
    Cut the W1 jumper on the D279 to send area Opening and Closing Reports as programmed in Area
    Parameters and to provide bell control. If the D279’s W1 jumper is NOT cut then no Area Open or
    Area Close Report is sent, and alarm bells can only be silenced from a command center, no matter
    how the control panel is programmed.
    Normal:When this point changes from open to normal, the area arms.
    Open:The area is disarmed. The alarm bell silences if an alarm occurred while the area
    was armed.
    8*
    Short:A short is a trouble while the area is disarmed. A short is an alarm while the area is
    armed. When this point changes from shorted to normal or open, it restores.
    9*
    Easikey: This point is programmed for access. Program Point Response as 1. If the system is
    Master Armed or Perimeter Armed (with or without delays), presenting a valid token to the Easikey
    reader shorts the point and disarms its assigned area. Presenting a valid token in a Disarmed state
    does not clear trouble or alarm memory or rearm the area.
    *Keyswitch Points. Special rules apply to points used for Keyswitch functions. These special point types do not respond
    the same way to the point response entry as Point Types 1, 2, and 3. Responses for keyswitch point types are described in
    Section 4.1.1 Point Responses. 
    						
    All Bosch manuals Comments (0)