User’s Manual
IV
Table of Contents
Foreword
........................................................................................................................................................................................................I
Important Safeguards and Warnings
............................................................................................................................................ III
1 Introduction
............................................................................................................................................................................................ 1
1.1 Overview
........................................................................................................................................................................................ 1
1.2 Technical Specifications
......................................................................................................................................................... 1
2 Checklist
.................................................................................................................................................................................................... 3
3 Appearance
............................................................................................................................................................................................. 4
4 Adding the Keypad to the Hub
...................................................................................................................................................... 2
5 Installation
............................................................................................................................................................................................... 3
6 Configuration
......................................................................................................................................................................................... 5
6.1 Viewing Status
............................................................................................................................................................................ 5
6.2 Configuring the keypad
......................................................................................................................................................... 6
7 User Management
................................................................................................................................................................................ 8
7.1 Adding Users
................................................................................................................................................................................ 8
7.2 Adding Card
.................................................................................................................................................................................. 9
7.2.1 Adding Card on the User Manager
......................................................................................................................... 9
7.2.2 Adding Card in the Accessory List
.......................................................................................................................... 9
8 Operations
............................................................................................................................................................................................. 11
8.1 Frequently Used Commands
.............................................................................................................................................. 11
8.2 Waking Up the Keypad
......................................................................................................................................................... 11
8.3 Arming
.......................................................................................................................................................................................... 11
8.4 Disarming
.................................................................................................................................................................................... 12
8.5 Searching for the Room Status
......................................................................................................................................... 12
Appendix 1 Cybersecurity Recommendations
........................................................................................................................ 14