4 2. OPERATING THE JABLOTRON 100
+
SYSTEM
CODE
AUTHORIZATION
TYPE DESCRIPTION
Administrator
code (Main)
his code has always full access to all sections and is authorized to control all PG outputs. The Administrator
can create other Administrator and other codes with a lower level of authorization and assign them with access
to sections and PG outputs, access codes, RFID chips and cards. This code has permission to erase the alarm
memory. There can be only one main Administrator code which can’t be erased. When “Administrator-restricted
Service/ARC right” is enabled, the administrator code must be authorized to confirm access for ARC and
Service technicians.
By the factory defaults, the code is 1234. The main Administrator user is always on position 1 and
it cannot be erased.
Administrator
code (Other)
This code has access to sections selected by the main Administrator to which the other Administrator can
add new users with the same or lower level of authorization to control sections and PG outputs, assign them
with access codes, RFID tags and cards. This code has permission to erase the alarm memory in assigned
sections. When “Administrator-restricted Service/ARC right” is enabled, the administrator code must
be authorized to confirm access for ARC and Service technicians.
The number of Administrator codes (other) is limited only by remaining capacity of the control panel.
There is no code set by the factory defaults.
User code This code has access to sections and PG control rights assigned by an Administrator. Users can add/delete their
RFID tags and access cards and change their own telephone numbers. Users can change their codes provided
that the system uses Codes with prefixes. It has permission to erase the alarm memory in assigned sections.
Selected users may have their access to sections limited by a schedule.
The number of User codes is limited only by remaining capacity of the control panel. There is no code set
by the factory defaults.
Set code This code is allowed only to set a designated section and is allowed to control (ON/OFF) PG outputs which
require authorization. Users with this level of authorization are not allowed to change their code and are not
allowed to erase the alarm memory.
The number of Set codes is limited only by remaining capacity of the control panel. There is no code
set by the factory defaults.
PG only code This code allows the user to control programmable outputs with authorization only. This applies to both
switching on and off. Users with this level of authorization are not allowed to change their code and are not
allowed to erase the alarm memory.
The number of PG only codes is limited only by remaining capacity of the control panel.
There is no code set by the factory defaults.
Panic code This code is allowed only to trigger Panic alarm. A user of this code is not allowed to change it or erase
the alarm memory.
The number of Panic codes is limited only by remaining capacity of the control panel. There is no code
set by the factory defaults.
Guard code This is a code for a security agency. This level of authorization allows to set the whole system. However, the guard
code can unset the system only during alarm or after it expired as long as the alarm memory is still active.
A user of this code is not allowed to change it or erase the alarm memory.
The number of Guard codes is limited only by remaining capacity of the control panel. There is no code
set by the factory defaults.
Unblocking code This code is designated to unblock the system after System blocking by alarm. A user of this code is not
allowed to change it or erase the alarm memory.
The number of Unblocking codes is limited only by remaining capacity of the control panel.
There is no code set by the factory defaults.
The security of access codes, contactless RFID devices and remote controls:
A control panel enables each user to be assigned with one 4, 6 or 8-digit code and up to two RFID tags
for system authorization. User authorization is required during each manipulation operation via keypad,
voice menu, a computer, web or mobile apps. Code length affects number of possible combinations and
therefore code security.