57
Section 4: Downloading
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
General Information
Dow n l oadi ng al l ow s t h e oper at or t o r em ot el y access, pr ogr am, an d con t r ol t h e secu r i t y syst em over n or m al t el eph on e
lines, IP, or GSM Communicators. Anything that can be done direct l y f r om t h e k eypad can be don e r em ot el y , u si ng
H oneyw el l ’s COM PA SS dow n l oadi ng sof t w ar e. To com m u n i cat e wi t h t h e con t r ol panel , t h e f ol l ow i n g i s r equ i r ed.
Intel, Pentium II – 256 MB RAM, Vista – 1GB RAM
Intel, Pentium, IV, 512 MB RAM (or above)
Operating System Windows XP Professional (SP2 and SP3)
Windows Vista 32-bit (Home, Ultimate & Business)
Compatible with the latest version of Windows 7
Microsoft Internet Explorer
Phone Line Up Load/ Downloading
1. One of the following modems:
• ADEMCO CIA
• Hayes Smartmodem 1200 (external: level 1.2 or higher; internal: level 1.1 or higher)
• Hayes Optima 24 + Fax 96 external
• Hayes Optima 336
• BizComp Intellimodem 1200 w/volume
• BizComp Intellimodem 2400
Other brands are not compatible, even if claimed to be 100% compatible.
Internal modems must have a 4-position DIP switch. Modems with a 6-position DIP switch will not work.
1. Compass revision 2.0.xx or above.
IP/GSM Downloading
Panels can be downloaded via the ECP bus over the following Communicators:
• 7845i-ent
• IPGSM-DP
• IPGSM-DPC
• iGSMV-CN
• iGSMHS
• iGSMV
• 7847i
Access Security
The following four levels of protection guard the control against compromise while it is being accessed from a remote
location:
1. Security code handshake: The subscriber’s account number as well as an 8-digit ID number (known only to the
office) must be matched between the control and computer.
2. Hang-up and callback: The control panel “hangs up” and calls the computer back at the pre-programmed number
only if the security codes match.
3. Data encryption: All data that is exchanged between the computer and control is encrypted to reduce the possibility
of anyone “tapping” the line and corrupting data.