Comander Perimeter Security System
Engineering and Installation Manual
Page 13 of 72
Box, which also contains a Tamper switch. The Tamper switch ensures that if the
termination box is opened, the circuit for the attached Interceptor cable goes into
Tamper mode.
(The microswitch can also be connected directly to the Interceptor cable, so that when
the box is opened the Interceptor is open-circuit, which indicates a Tamper condition.
This reduces the number of contact connections and feeder cables required, but does
not provide as much information to the operator, and is not recommended.)
Signals from both the Interceptor cable and the Junction Box Tamper switch are
connected in the Junction Box to a Feeder cable, which returns the signals to the
control room. This means that each pair of Interceptor cables uses two Interceptor
inputs and one Monitored Contact input. Each of these three inputs requires one
twisted pair in the Feeder cable.
As well as the Interceptor signals and their associated Tamper switches, the system
also has Monitored Contact inputs which are attached to switches on the perimeter
gates.
For detailed information on attaching Interceptors to perimeter fences, and using
Junction Boxes and Feeder Cables, see sections 5 and 6 below.
1.8.1.2 Relay Outputs
The 1D Relay Rack unit can be controlled automatically by the Comander unit in
response to its inputs, and the relays can be used to control sirens, floodlights, or other
alarm or monitoring devices.
1.8.1.3 Rack Unit IP Address
The simple system illustrated above provides only alarm inputs and relay outputs which
are directly controlled by the single Comander unit. Yet the Comander unit is allocated
an Ethernet IP address and subnet mask, even though no other devices are connected
to it via Ethernet.
This is simply because a computer must be connected to the Comander to configure it
– and a Comander unit cannot be configured unless it has an IP address, so that the
browser-based Configurator can be accessed. Even if the computer is removed
following the initial configuration, the Comander will retain its IP address, and can be
accessed to update the configuration as required.