AES 7788 Series RF Subscriber Unit ─ Installation and Operation Manual
AES Corporation 29 40-7788, Rev 6, August 30, 2016
4.2 Program ID # and System Cipher Code
HandHeld Programmer: <Ctrl> + <F1> PC Terminal: <f>
This function programs the unit ID# and the system Cipher code which can only be
changed using a directly attached programmer to the J1 Modular Programmer jack.
Remote programming of these parameters is never possible.
NOTE: Entering new data overwrites (erases) any previously stored ID number and
Cipher Code. Pushing the <ENTER> key without entering other new data preserves
the previously stored information. The programmer should be connected and the
power should be on.
To start, press programmer keys <CTRL>+<F1>.
The following message appears:
SETUP UNIT-OLD: NEW (Existing stored "old" data.)
ENTER ID#-1234:.... (New data shown here.)
To keep previously stored ID#, simply push <ENTER>. To change the ID, enter the
4 digit identification number for this unit using any of the 16 hex numerals (0-9, A-
F), and then press <ENTER>. The ID must be unique; different from all other
ID’s in your system. After successfully entering the ID, the following message
appears:
CPHR CODE-XXXX:.... (Existing data is not shown.)
Enter the 4-digit cipher as assigned by the system administrator, and then press
<ENTER>. The code must match that of the central station receiver or IP-Link it is
expected to communicate through. If the wrong code is used, the unit cannot log on
and will not communicate. After entering the cipher code, or pressing <ENTER>
alone the following message appears:
OK
If the programming in this function is not completed within 65 seconds the function
will time-out. The Programmer will beep and the following message will be
displayed:
TIMEOUT
4.3 Timing Parameters
HandHeld Programmer: <Ctrl> + <F2> PC Terminal: <g>
This programming function is used to set the various timing parameters of the 7788F.
The factory defaults are set to 24 Hour Check-In, 10 second reporting Delay and
Random (RM) AC Fail reporting delay. If these are appropriate you can skip to the
next section.
Use shorter check-in times for highest security applications only.
00 hours, 00 minutes is an illegal entry and will not be accepted.
Set Check-In as required for UL Listed installation. Configure automation
software accordingly, to annunciate a failure to receive a Check-In message.