- HAI OmniPro II Owner's Manual
Table Of Contents
- INTRODUCTION
- OVERALL DESCRIPTION
- SECURITY SYSTEM OPERATION
- Disarming the Security System and Silencing Alarms
- Arming the Security System
- Using Shortcut Keys
- Quick Arm
- Bypassing Zones
- Restoring Zones
- What To Do When You Come Home
- What Happens When the Alarm is Activated
- Emergency Keys
- Duress Code Entered or Duress Alarm Activated
- Alarm Reset
- Alarm Cancel
- Trouble Indications
- Codes
- Duress Code
- Panic Switches
- Area Arming
- GOTO Area
- Testing Your System
- CONTROL
- Control Commands
- About UPB
- HAI Lighting Control (HLC) Format
- About CentraLite
- About Lutron RadioRA
- About ALC
- About X-10
- House Codes
- Unit Numbers
- Scrolling Through Names
- Controlling Units
- Timed Commands
- Status of a Unit
- Internal Flags
- Controlling Outputs
- All On / Off
- Leviton Scene Control
- Buttons
- Temperature Control
- HAI RC-Series Thermostats
- Programmable Energy Saver Modules (PESMs)
- Temperature Alarms
- Humidity
- Status
- Event Log
- Messages
- TELEPHONE CONTROL
- Telephone Interface
- In-House Phones
- Remote Phones
- Phone Access Denied - Remote Lockout
- Alternate Method
- Main Menu
- 1 - Control
- 2 - Security
- 3 - Button
- 4 - All
- 5 - Temperature
- 6 - Status
- 7 - Events
- 8 - Message
- 9 - Good-Bye
- Panic Button over the Phone (# # # # # #)
- Emergency Dial-Out
- Digital Dialer
- Voice Dialer
- PC Access
- Built-In Ethernet Port
- Controller IP Address, Port Number, and Encryption Key
- OmniPro II Ethernet Connections
- Connecting to Network via PC Access
- Dynamic DNS
- SETUP
- UNDERWRITER'S LABORATORIES REQUIREMENTS
- FEDERAL COMMUNICATION COMMISSION NOTICE:
- CANADIAN INDUSTRY CANADA NOTICE
- APPENDIX A - DIAL OUT PLANNER
- APPENDIX B - TEXT DESCRIPTION CHARACTER CODES
- APPENDIX C - VOICE DESCRIPTION CODES
Event Log
The Event Log records the 250 most recent significant security system Events (happenings) and trouble conditions in the system.
When a new event occurs, the oldest one is lost.
The following Events, along with the time and date of their occurrence are recorded in the Event Log when they occur:
• All Security system Armings and disarmings (Off, Day, Night, Away, and Vacation), and user name.
• All zones bypassed or restored by the user, and user name.
• Any zone automatically bypassed by the system.
• Any zone tripped while the security system is armed.
• Any trouble condition (zone, battery, fuse, AC power, or phone).
• The restoration of any trouble condition (the trouble condition ceased to occur).
• Any Remote Telephone Access, Remote Access Denied, or Remote PC Access.
Show Events
To view your event log, from the top-level display or from the main menu, press the 7 key, then enter your code. The arrow keys
may be used to scroll through the event log, starting with the most recent event.
Each event log entry displays the time and date on the top line and a description of the event on the bottom line:
7:15 PM 5/8
USER NAME AWAY
For trouble conditions, the event log will show the zone name or specific trouble condition and "TROUBLE":
10:59 AM 5/8
BATTERY TROUBLE
For trouble restorations, the event log will show the zone name or specific trouble condition and "TRBL RST":
11:57 AM 5/8
BATTERY TRBL RST
The system records each remote access. A remote phone access is when someone calls into the system from an outside phone
line. Remote phone access is also recorded if the system phones out in response to an alarm and the called party enters a code.
The event log displays the code used to access the system and "REM ACCESS":
12:05 PM 5/8
USER NAME REM ACCESS
An event is logged after three unsuccessful attempts are made to log into the system from a remote phone, the OmniPro II will
lock out remote telephone access for 1 hour to discourage any further attempts to access the system - See Telephone Control.
Local access of the system using an in-house telephone is not recorded.
The event log will also record each time the PC Access software is used to access the system. The event log displays the code
used to access the system and "PC ACCESS".
Page 40










