Operation Manual

7. Advanced System Operation
ŘŚ
CommPact User Manualȱ
ȱ
7.2. Zone Bypassing/Unbypassing
ȱȱ£ȱȱ¢ǰȱȱȱȱȱ¢ȱȱ¢ȱȱȱȱȱȱ
ȱȱǯȱ
ȱ
ȱ¢ȱȱ¢ȱȱ£DZȱ
ŗǯ ȱȱ¢ȱȱǰȱȱ¢Ȧ¢ǯȱǽŘŗǾǯȱ
Řǯ ȱȱȱǰȱȱȱȱ£ȱ¢ȱȱȱ¢ȱȱ¢ǯȱ
řǯ ȱ
ȱȱȱȱ¢ȱǯȱ
Śǯ ȱ
Dzȱȱǵȱȱ¢ǯȱ
śǯ ȱ
ȱȱȱȱȱ¢ȱǯȱ
ȱ¢ȱȱ£DZȱ
ŗǯ ȱȱ¢ȱȱǰȱȱ¢ȱȱǽŘŘǾǯȱ
Řǯ ȱ
Dzȱȱ£ȱȱ¢ȱ
ȱ ¢ȱ £ȱ ȱ ȱ ¢ȱ ¢ȱ ȱ ȱ ¢ȱ ȱ
ǯȱ
ȱǰȱȱȱȱȱ£ȱȱȱ¢ǯȱ
7.3. User Codes
ȱȱȱȱ¢ȱȱȱȱǯȱȱȱȱȱȱȱ
ȱǯȱȱ¢ȱȱȱ¢ȱȱȱȱȱȱǯȱȱ
ȱ ¢ȱ ȱ ȱ ȱ ȱ ȱ ȱ ¢ȱ ¢ȱ ȱ Ȃȱ £ȱ ǯȱ
ȱ£ȱȱȱȬȱȱȱȱȱ¡ȱǯȱ
Code 1: Master Code
ȱȱȱȱȱȱȱ£ȱǯȱȱȱȱǰȱ¢ȱȱ
ȱȱȱȱǯȱ¢ǰȱȱȱȱȱȱȱȱȱǰȱ
ȱȱȱǯȱ
ȱȱȱȱȱŗŘřŚǯȱȱȱȱ¢ȱȱȱ¢ȱ
ȱȱǷȱ
Codes 2-19: Controlled Codes
ȱ¢ȱȱȱȱȱȱȱȱȱǰȱȱ¢ȱȱȱ
ȱǯȱ
Codes 20-25: Non-controlled Codes
Ȭȱ ȱ ȱ ȱ ȱ ȱ ¢ȱ ȱ ȱ Ȧȱ ȱ ȱ ȱ
ȱ ǯȱ ȱ ¢ȱ ȱ ȱ ȱ ȱ ¢ȱ ȱ ¢ȱ ȱ ȱ ȱ ȱ
ȱȱ¢ȱȱȱȱǯȱ