59
Section 4: Downloading
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
General Information
Downloading allows the operator to remotely access, program, and control the security system over normal telephone
lines, IP, or GSM Communicators. Anything that can be done directly from the keypad can be done remotely, using
Honeywell’s COMPASS downloading software. To communicate with the control panel, the following is required.
System Attributes Minimum Recommended
Processor Intel, Pentium II – 256 MB RAM, Vista – 1GB RAM Intel, Pentium, IV, 512 MB RAM (or above)
Disk Space (free) 1.5 GB 1.75 GB
Monitor Resolution 800 x 600 1024 x 768
Application Version
Operating System Windows XP Professional (SP2 and SP3)
Windows Vista 32-bit (Home, Ultimate & Business)
Compatible with the latest version of Windows 7
Database Application MS SQL Server
Microsoft Internet Explorer 5.5 and above
Phone Line Up Load/ Downloading
1. One of the following modems:
• ADEMCO CIA
• Hayes Smartmodem 1200 (external: level 1.2 or higher; internal: level 1.1 or higher)
• Hayes Optima 24 + Fax 96 external
• Hayes Optima 336
• BizComp Intellimodem 1200 w/volume
• BizComp Intellimodem 2400
Other brands are not compatible, even if claimed to be 100% compatible.
Internal modems must have a 4-position DIP switch. Modems with a 6-position DIP switch will not work.
1. Compass revision 2.0.xx or above.
IP/GSM Downloading
Panels can be downloaded via the ECP bus over the following Communicators:
• 7845i-ent
• IPGSM-DP
• IPGSM-DPC
• iGSMV-CN
• iGSMHS
• iGSMV
• 7847i
Access Security
The following four levels of protection guard the control against compromise while it is being accessed from a remote
location:
1. Security code handshake: The subscriber’s account number as well as an 8-digit ID number (known only to the
office) must be matched between the control and computer.
2. Hang-up and callback: The control panel “hangs up” and calls the computer back at the pre-programmed number
only if the security codes match.
3. Data encryption: All data that is exchanged between the computer and control is encrypted to reduce the possibility
of anyone “tapping” the line and corrupting data.