Table of contents
Overview ...............................2
Specifications:...........................4
Changing the Master Code . . . . . . . . . . . . . . . . . 5
Adding a new user:.......................6
Deleting a user:..........................8
Setting the output timers: . . . . . . . . . . . . . . . . . 10
Setting the anti-hack parameters: . . . . . . . . . . . 12
Setting the key wipeout timer:. . . . . . . . . . . . . . 14
Setting the security parameters: . . . . . . . . . . . . 16
Backing up the unit: .....................19
Restoring the unit:.......................20
Defaulting the unit: ......................21
Defaulting the Master Code: . . . . . . . . . . . . 21
Defaulting the System Parameters: . . . . . . . 21
Typical mounting instructions: . . . . . . . . . . . . . 22
Fitting the optional anti-tamper switch . . . . . . . 24
Typical connection diagram: . . . . . . . . . . . . . . . 25
Glossary...............................26
Installation Information . . . . . . . . . . . . . . . . . . . 27
1