TABLE OF CONTENTS
Guarantee ................................................................................................................... 3
1. General Information ............................................................................................. 4
1.1 Supported Wireless Devices ................................................................................ 4
1.2 Control Panel Keyboard ....................................................................................... 5
1.2.1 LED Indication ............................................................................................. 5
1.2.2 Keypad Sounder .......................................................................................... 5
1.2.3 Button Functions.......................................................................................... 6
1.2.4 LCD Display................................................................................................. 6
1.2.5 Symbols Used in Text Introducing ............................................................... 7
1.2.6 Built-in Siren ................................................................................................ 7
1.3 Language Change ................................................................................................. 7
2. ARMING and DISARMING the System ................................................................ 8
2.1 Operation with RC 102 TE Remote Control ......................................................... 8
2.1.1 Buttons Functions of RC 102 TE ................................................................ 8
2.2 Operation with the Control Panel Keyboard .......................................................... 9
2.2.1 ARMING by the Keyboard .......................................................................... 9
2.2.2 DISARMING by the Keyboard .................................................................... 10
2.2.3 Panic Buttons ............................................................................................. 10
2.3 ARMING and DISARMING by Telephone ............................................................. 11
3. System Status ........................................................................................................ 12
4. Bypassing Detectors or Detector Groups .......................................................... 14
5. Event LOG-le Review ......................................................................................... 15
6. User’s Programming ............................................................................................ 15
6.1 User Code Programming ....................................................................................... 16
6.2 Change Own Code ................................................................................................ 18
6.3 System Programming ............................................................................................ 18
APPENDIX: Description of the Events LOG ................................................................ 20