Access by any person; for example the general public. 
User access by an operator and administrator; for example customers 
(systems users). 
User access by an installer; for example an alarm company professional. 
 
Table E-1 Permission of the Access Level 
Bypass(zone)/Disabling/Force Arming 
Adding/Changing Verification Code 
Adding/Editing Level 2 User and 
Verification Code 
Adding/Editing Configuration Data 
Replacing software and firmware 
 
 
Note 
a
 By the condition of being accredited by user in level 2.   
b
By the condition of being accredited by user in level 2 and level 3.   
d
Users can only edit their own user code. 
 
 
● The user level 2 can assign the login permission of the controller to the user level 3 in the 
settings page. 
● The user level 2 should assign permissions to the user level 3 if the user level 3 wants to login 
the controller remotely. 
● When the controller is bypassed, the user level 3 can login the controller without the permission 
assignment of the user level 2.