User Manual For quick installation information please refer to the iConnect Quick Start Installation Guide provided on our website: www.electronics-line.
Quick Reference Guide Function Press… Additional Information If One-Key Arming is disabled on the Control System, enter your user code when arming. ARM OR FULL INSTANT ARM DISARM OR PART PERIMETER Hold down this key until “Instant Arming OK?” is displayed. Then Press ¥. [USER CODE] The default Master code is 1234. Instant arming cancels the entry delay after Part or Perimeter arming. This feature can be enabled by your installer.
Function PLAY MESSAGE Press… Additional Information then The Message Center is an optional feature that is included with certain versions of iConnect Control System.
Table of Contents Quick Reference Guide ..................................................................................................................... 2 Table of Contents .............................................................................................................................. 4 1. Introduction and Overview ...................................................................................................... 6 1.1. Documentation Conventions .......................................
7.5. 8. Simplex Mode .................................................................................................................. 47 Advanced System Operation ................................................................................................. 48 8.1. Cancel Report .................................................................................................................. 49 8.2. Zone Bypassing/Unbypassing ...........................................................................
1. Introduction and Overview This user manual explains all you need to know about your iConnect security system and provides step-by-step instructions for all the system’s user functions. In addition to the explanation you will receive from your installer, we urge you to read this manual so that you can take full advantage of your system’s features. Keep this manual in an accessible location for future reference. system has many features in order to suit a wide range of applications.
1.2. Security System Components Your security system is made up of a Control System, various detectors and a number of optional peripheral devices. This section explains the role of each component in your system. Control System The Control System is the brain of the system. It communicates with all the devices connected to the system. For example, in the event of a burglary, a detector sends a signal to the Control System indicating that it has sensed motion on the premises.
1.3. System Monitoring When an event occurs within the system, the Control System sends a message to your monitoring service describing the exact nature of the event. This enables the monitoring service to take the required action. System monitoring can implement either regular telephone or cellular communication. A detector detects. The Control System is alerted. An alarm is generated and the monitoring service is notified. Remember that no security system can prevent emergencies.
SMS Control Using your cellular phone, you can also send commands to the appliances controlled by the Home Automation feature using SMS and receive confirmation when the command is received. 1.7. Vocal Message Annunciation Vocal message annunciation is an optional feature that, if enabled in programming, causes the system to play short messages that indicate system status. 1.8.
2. The User Interface There are several methods you can use to operate the system. Apart from the keypad on the front panel, your system may include a number of peripheral devices such as keypads and keyfobs. This chapter provides a brief introduction to each of the devices you can use to operate the system. It is important that you familiarize yourself with these devices before reading the following chapters that shall describe system operation in further detail.
Service Call Button The Service Call button enables you to contact the monitoring service and talk to an operator. To initiate a service call, press seconds. and hold down the Service Call key for a few Vocal Message Recording and Playback LCD front panel allows you to record a short message that may be played back later by another user -- see Service Menu, Message Center.
System Trouble Indication In the event that the system detects a trouble condition, “System Trouble” appears on the display. To identify the problem, scroll through the trouble list by pressing . Scrolling the trouble list also silences system trouble tones that may be sounded if enabled in programming. When the trouble condition is restored, it is removed from the system trouble list. For detailed information on system messages, see Arm Status Indication. 2.2.
n Speaker o LCD Display p Arming Keys q Keypad r Microphone (optional) s System Status LEDs Wireless Keypad (EL-4727) Numeric Keypad The numeric keypad allows you to arm or disarm the system by entering a user code. Arming Keys Three arming keys (Full, Part and Perimeter) allow you to arm the system using one of the three arming methods – see Arming and Disarming. One-key Arming is an option that is programmed by your installer. If this option is disabled, you must also enter a user code when arming.
LEDs Two status LEDs (OK and If the OK LED is… ) indicate arming and power status of the system: It means… Off The system is disconnected from all power sources. On - Green The keypad is powered by AC and the battery is not low. Flashing Yellow (slow) Local backup battery low. Flashing Yellow (fast) Wireless Keypad AC loss. If the LED is… It means… Off The system is disarmed. On - Green The system is armed. Flashing Red An alarm has occurred.
3. Arming and Disarming Arming can be defined as activating the system. When the system is armed, it monitors the zones that are protected by the detectors. If a detector detects an intrusion, the system generates an alarm. 3.1. Arming Modes Three arming modes are available: Full, Part and Perimeter. These modes enable you to arm your system accordingly to suit different circumstances. Full Arming Part Arming Perimeter Arming Full arming activates the entire system.
Arming with the Keyfob To arm the system using the keyfob: x Press the relevant button on your keyfob (see Keyfobs); the exit delay begins to count down. At the end of the exit delay, the system is armed. Arming with the Key Switch To arm the system using a key switch: x Open/close the key switch accordingly. Forced Arming Forced arming enables you to arm when the system is not ready.
3.3. Disarming the System When you enter the premises, the entry delay begins to count down. You must disarm the system within the entry delay time to prevent the system from triggering an alarm. To disarm the system using a keypad: x Enter your user code. To disarm the system using a keyfob: x Press the disarm button – see Keyfobs To disarm the system using a key switch: x Open/close the key switch accordingly.
In addition to arm status, the system displays further status messages on the front panel’s display. The following table explains common status indication messages that may prevent you from arming your system. Status Means… ZONES IN ALARM Zones have been violated. TAMPER ALARM The system has been tampered with. SYSTEM NOT READY The system is not ready to arm, check that all doors and windows are closed.
Status Tones Description System Trouble 4 rapid tones sounded once per minute. A trouble condition has been detected, press for further details. For Fire Trouble Tones, there is a programmable option to repeat the tones every 3½ hours until the problem has been taken care of. Note: System trouble tones are not sounded from 10:00pm to 7:00am 3.6.
SMS Confirmation Message After an SMS command is executed by the system, if programmed by your installer, a confirmation message may be returned to your mobile phone. The following example shows the confirmation message you receive for the sample command from the previous section. D I S A R M E D Remote Arming/Disarming via the Telephone Using the Telecontrol feature, you can “Full” arm and disarm the system via the telephone. For further information on the Telecontrol features, see Telecontrol.
4. Web User Application The Web User Application - MyELAS provides a full interface to your system from a local or remote PC. Via the Web you can perform a wide range of tasks such as arm/disarm, zone bypass, user code management and home automation control. The Smartphone Application - MyELAS provides access to the Web User Application from your Smartphone (iPhone or Android). 4.1.
3. Enter the following registration details into the Self Registration page: First/Last Name Enter your First and Last Name Email (Login Name) Enter your chosen Login Name (i.e.
When using the Smartphone application service, the Login page may look similar to the following examples: Figure 4: Login Page (iPhone) 4.3. Figure 5: Login Page (Android) The Main Page After logging in, your system’s home page is displayed. The following diagram shows the Main page and explains the main elements of the Web application’s interface.
Menu Bar The Menu Bar includes the Main Menu options and the Log Off button. The Main Menu offers links to various pages in the Web Application. Use the Logoff button on the right side menu to properly close the session. The following options are available from the Main Menu: x x x x x x x Home – pressing the Home tab allows the user to return to the Main page at any time Arm/Disarm – provides access to the System Operation Area page.
Workspace The workspace offers additional links to the following pages of the application: System Operation, Settings, History, Video and Automation. When you choose a page, either from the Main Menu, or from the workspace, the page is displayed in the workspace. For example, if you choose Arm/Disarm from the Main Menu, System Operation area and System Status area are displayed in the workspace (see the example below).
4.4. Arming and Disarming Figure 9: System Operation Area Page Three arming modes are available: Away, Part and Perimeter. These modes enable you to arm your system accordingly to suit different circumstances. Full Arming Full Arming activates the entire system. This arming method is used when you intend to leave your home, leaving the premises empty. Part Arming Part Arming enables you to arm a section of your home while remaining on a different part of the premises.
4.5. Web Application Settings The Web Application Settings area offers various options including System/Web user codes, contact and password management, user interface appearance and descriptors, event log viewing and zone bypass capabilities. System Users and Codes The System Users and Codes page enables you to manage your system's users. The page displays a table of the system's current users and enables you add, edit and delete users as required.
To display the System Users and Codes page: On the Menu Bar, click Settings. 1. 2. Click System Users and Codes. The System Users and Codes page is displayed. Figure 10: System Users and Codes Page To add a new system user: 1. Click Add New User at the bottom of the table; the Add New System User page opens. 2. 3. 4. 5. 6. 7. Figure 11: Add New System User Page Enter the user's name in the field provided (16 characters max.). Choose the user type from the available options.
To edit an existing system user: Click Edit for the user you want to modify; the Edit User page opens. 1. 2. Edit the user's name in the field provided (16 characters max.). When editing an existing user, you cannot change the user type. 3. 4. 5. 6. Enter the user's 4-digit passcode. 2. Click Yes to confirm. Enter the user's passcode again for confirmation. Enter your Master code. Click Update. To delete a system user: 1.
Web Interface Users and Codes The Web Interface Users and Codes page enables you to manage your Web's users. The page displays a table of the system's current users and enables you add, edit and delete users as required. You can even issue temporary (limited) codes to guests that will automatically expire after 24 hours. 1. On the Menu Bar, click Settings. 2. Click Web Interface Users and Codes. The Web Interface Users and Codes page is displayed.
To edit an existing Web user: Click Edit for the user you want to modify; the Edit User page opens. 1. 2. 3. 4. 5. 6. 7. 8. Edit the user's name in the field provided (16 characters max.). Enter the user's password. Enter the user's password again for confirmation. Enter the Owner User password. Edit the First Name, Middle Name and Last Name of the user in the fields provided. Edit the Phone and Email details of the user into the fields provided. Click Update.
Zone Bypass A bypassed zone is ignored by the system and does not generate an alarm when triggered. To "unbypass" a zone is to restore the zone, effectively instructing the system to monitor activity from that zone. All bypassed zones are automatically unbypassed when the system is disarmed. The Zone Bypass page displays a list of the zones (i.e. detectors) in your system and allows you to bypass or unbypass them as required. To bypass a zone: 1. On the Menu Bar, click Settings. 2. Click Zone Bypass.
3. Figure 16: Change Appearance Page Click "Set" underneath the required color scheme or "Set Default" to restore the default color scheme. Alerts The Alerts feature allows those people included in your contact list to be notified by email or SMS when certain events occur. The page displays a table of the system's alert contacts and enables you add, edit, test and delete contacts as required. To display the Alerts page: 1. On the Menu Bar, click Settings. 2. Click Alerts. The Alerts page is displayed.
To add new alert contact: Click Add New at the bottom of the table; the Add New Alert Contact page opens. 1. 2. 3. 4. 5. 6. 7. Figure 18: Add New Alert Contact Page Enter the contact's name in the field provided. Enter the new contact's email address. Enter the new contact's mobile phone number Select the alert language from the available list. Choose the event and message type from the available options (Email, SMS). Click Update.
Descriptors The Descriptors page allows you to edit descriptors of registered devices for the selected control panel. To display the Descriptors page: 1. On the Menu Bar, click Settings. 2. Click Descriptors. The Descriptors page is displayed. Figure 19: Descriptors Page To edit a descriptor: Click Edit for the descriptor you want to modify; the Edit Descriptor page opens. 1. 2. 3. Edit the descriptor as required. Click Update.
4.6. Event Log History The Event Log History page displays a log of events that have occurred within your system. For each event you can view the date and time that the event occurred, a description of the event, the user or device that caused the event and whether or not the event was reported to your monitoring service. In addition to viewing the event log, you can also save the log to a pre-formatted file or simply print the log.
4.7. Home Automation The Web Application allows you to control and schedule automated lights and appliances in your home. The application offers a comprehensive interface that enables you to view the settings for all of your automated devices at once. Additionally, you can add, edit or delete devices from the comfort of your PC. Discuss this capability with your security service provider to determine if it is applicable to your system.
4.8. Video Verification Using the 2-way wireless PIR Camera detectors installed in your home, the Web Application enables you to view still video images over the Web in order to check your home and family while you are away. To view the Video Verification page: On the Menu Bar, click Video, the Video Verification Page is displayed: Figure 23: Video Verification Page The Video Verification page displays a list of your installed PIR camera detectors and each device's descriptor (see Descriptors).
Stored Image Events The Web application provides the capability to view the stored image events. The Stored Image Events page displays a log of image events that have occurred within your system. For each event you can view the date and time that the event occurred and the user or device that caused the event.
Settings The Web application provides the capability to modify the PIR camera detectors parameter settings according to your needs To view the video verification settings page: From the Video Menu Bar, click Settings; the Video Verifications Settings Page is displayed: Figure 27: Video Verification Settings Page To modify the PIR camera detectors parameter settings: 1.
5. Panic Alarms Panic alarms enable you to send a message to the monitoring service in the event of an emergency. There are various types of panic alarm and several methods you can use to generate them. 5.1. Keypad Alarms To activate an SOS Panic alarm from the front panel or wireless LDC keypad: x Press and hold down the Home Automation On and Off keys simultaneously To activate a Fire alarm from the front panel keypad or wireless LCD keypad: x Press and hold down keys 1 and 3 simultaneously.
6. Home Automation and PGM Home Automation is an optional feature that requires an add-on expansion module. Home Automation enables you to control up to 16 individual lights and appliances around the home, in this section; we shall refer to these lights and appliances as HA units and PGM output. The PGM is a programmable output that is triggered according to specific system status conditions, or by remote command sent via PSTN, GSM, Ethernet, keyfob, keypad, or Remote Programmer.
6.2. Keyfob Control You can control two separate HA units, using the four-button keyfob. This option can be programmed by the installer. For further information on keyfob button assignments refer to Keyfobs. 6.3. Telephone Control Using the Telecontrol feature, you can control HA units and PGM output remotely via the telephone. For further information on the Telecontrol features, see Telecontrol. 6.4.
6.5. Scheduling (not relevant to PGM) The Scheduling feature allows you to set an On and Off time for each HA unit. At these times the system automatically switches the HA unit on and off. You can also choose the days of the week that the schedule is active. On Time To edit an HA unit’s “On” Time: 1. From the main menu, select HA Schedules [8]. 2. Select an HA unit. 3. From the HA unit’s sub-menu, select On Time. 4. Enter a time (HH:MM). 5. Press dž when the desired setting is displayed.
7. Telecontrol The iConnect Control System offers a range of Telecontrol features that provide remote access via the telephone. These features include Two-Way Audio, remote arming/disarming and siren cancel. Two-Way Audio You may use the Two-Way Audio features to check your home in the event of an alarm or as an alternative means of communicating with members of your family. For example, you may wish to call an elderly person who has difficulty reaching the phone.
Call Procedure To prevent unauthorized attempts to call your Control System, you must enter a user code when calling your home – see User Codes, Code 29. To call your home: 1. Call the Control System either using the double call method or directly (see above); when the Control System picks up, two tones are sounded. 2. Enter the Telecontrol code (Code 29) on your telephone within 15 seconds. Do not enter your user code until you hear the two tones.
7.2. Service Call The Service Call feature enables you to call the monitoring service by pressing one key. To make a Service Call: x Press and hold down the Service Call key for a few seconds. If using Simplex mode, the call is connected in Listen mode – see Simplex Mode. 7.3. Two-Way Audio after an Alarm In the event of Burglary, Fire and Emergency alarms, the Control System is able to report the events and then stay on the line.
8. Advanced System Operation Besides the basic functions described in the previous chapters, you can access additional functions via the menu. This chapter describes these functions and the menu navigation procedure. Menu Navigation Using the LCD keypad on the front panel, you can navigate through the menus using the menu navigation keys ( / ) and make simple yes/no decisions using the dž and ̙ keys. The availability of menu items depends on the user code that you used to enter Menu mode.
8.1. Cancel Report The Cancel Report function enables you to prevent the system from reporting in the event of a false alarm. To cancel report: x 8.2. From the main menu, select Cancel Report [1]; all pending messages to the monitoring service are canceled. Zone Bypassing/Unbypassing When a zone is bypassed, its detector is ignored by the system and does not generate an alarm when triggered. To bypass or unbypass a zone: 1. From the Bypass Zones menu, select Bypass/Unbyp. [21]. 2.
8.3. User Codes The iConnect supports a variety of individual user codes. Each of these codes is four digits long. Most system functions require you to enter a valid user code. The ability to perform a function is defined by your user code’s authorization level. These authorization levels are pre-defined for each code as explained below. Code 1: Master Code The Master code is the highest user authorization level. With the Master code, you can edit all other user codes.
Editing User Codes User code editing is a feature that is available exclusively to the Master code. To maintain a high level of security, keep all user codes confidential. To edit a user code: 1. From the main menu select, User Codes [4]. 2. Select the code you want to edit; 3. From the code’s sub-menu, select Edit Code; the 4-digit code is displayed with the cursor flashing on the first digit. 4. Edit the code. 5. Press dž; the new code is stored in the memory.
5. 8.4. Press dž when you have finished editing. Follow-Me The Follow-Me feature is designed to notify the user that certain events have occurred. The events that are sent to the Follow-Me telephone number are those events that the user is authorized to view in the event log; events that can be viewed only by the installer are not sent to the Follow-Me number – see Two-Way Audio Follow-Me. If using the TWA Follow-Me feature, the audio channel is opened after alarm events only.
8.6. Service Menu The Service menu includes various functions that enable you to test your system effectively. You can gain access to the Service menu using the Master code. Set Time & Date To set the time: 1. From the Service menu, select Set Time/Date, Set Time [7011]. 2. Enter the current time. 3. Press dž; the time is modified. To set the date: 1. From the Service menu, select Set Time/Date, Set Date [7012]. 2. Enter the current date. 3. Press dž; the date is modified.
Siren Tests To test the external wireless siren: x From the Service menu, select Test and then WL Siren Test [7031]; the wireless siren is sounded briefly. To test the built-in siren: x From the Service menu, select Test and then Siren Test [7032]; the built-in siren is sounded briefly. Interface Test The Interface test enables you to check if the speaker, LEDs and LCD are functioning correctly.
Transmitters The Transmitters menu offers a number of testing utilities, TX List, TX Test, RF Link and ENV. RSSI. The TX List comprises all registered transmitters and their last reported status. To view the TX list: 1. From the Service menu, select Transmitters, TX List [7041]; the first transmitter on the list is displayed. 2. Using the arrow buttons, scroll through the transmitter list. 3. When you have finished viewing, press ̙ to exit the list.
The second utility, TX Test enables you to identify transmitters. In TX Test mode, each time a transmission is received, a chime is sounded and the activated transmitter is displayed. To initiate TX Test mode: 1. From the Service menu, select Transmitters, TX Test [7042]. 2. Activate a transmitter; the transmitter’s details are displayed. 3. When you have finished, press ̙ to exit TX Test mode.
Audio Volume To adjust the sensitivity of the microphone and the volume of the speaker: 1. Establish a two-way audio connection. 2. From the Service menu, select Audio Volume [705]. 3. Adjust the setting according to the following table. 4. Reading Meaning 1 Increase microphone sensitivity 4 Reduce microphone sensitivity 3 Increase speaker volume 6 Reduce speaker volume Press dž; the new settings are stored in the memory. GSM Signal Strength You can measure the GSM signal strength.
Global Chime Each detector can be programmed by your installer to cause the system to chime when activated. This feature is active only when the system is disarmed. For example, the system can be programmed to sound a chime each time the front door is opened or closed. The Global Chime option enables you to turn this feature on and off. To enable or disable Global Chime: 1. From the Service menu, select Global Chime [709]. 2. Select either Enable or Disable. 3. Press dž when the desired setting is displayed.
Appendix A: Menu Structure -59-
Appendix B: Glossary 24hr Zone A detector which is always active regardless of whether the system is armed or disarmed. Armed The state during which the security system is activated. In most cases, when the system is armed, triggering a detector generates an alarm. Arming Keys The three keys on the front panel or keypad that activates one of the system’s arming options. Bypassed Zone A detector which is ignored by the system.
F Follow-me A feature that enables users to receive notification to their telephone that an event has occurred in the system. Forced Arming Arming before the system is ready. If the system is not secured by the time that the exit delay expires, an alarm is generated. Front Panel The main interface located on the front of the Control System consisting of an LCD keypad. Full Arming An arming method that activates the entire system when the premises are vacated.
N Non-Controlled Code A user code that does not cause the system to notify the monitoring service when used to arm or disarm. The system only reports if the code is used to disarm after an alarm. O One-Key Arming Arming the system without the need for a valid user code. P Panic Alarm A user initiated event that alerts the monitoring service in the event of an emergency. Part Arming An arming method that is designed to activate a certain section of the premises.
T Telecontrol Tones Trouble Tones TWA TX A feature that provides remote access via the telephone including remote arming/disarming, siren cancel and Two-Way audio. Chimes sounded by the Control System’s internal or external siren. Tones sounded by the system to indicate a trouble condition. Two-Way Audio (abbr.) Transmitter (abbr.) TX List A service feature that lists all the system’s registered transmitters, their last recorded status and signal strength.
Electronics Line 3000 Ltd. Limited Warranty EL and its subsidiaries and affiliates ("Seller") warrants its products to be free from defects in materials and workmanship under normal use for 24 months from the date of production. Because Seller does not install or connect the product and because the product may be used in conjunction with products not manufactured by the Seller, Seller cannot guarantee the performance of the security system which uses this product.