User's Manual
Table Of Contents
User’s Manual
IV
Table of Contents
Foreword ............................................................................................................................................................................................ I
Important Safeguards and Warnings ................................................................................................................................ III
1 Introduction ................................................................................................................................................................................ 1
1.1 Overview ............................................................................................................................................................................. 1
1.2 Technical Specifications .............................................................................................................................................. 1
2 Checklist ........................................................................................................................................................................................ 3
3 Appearance .................................................................................................................................................................................. 4
4 Adding the Keypad to the Hub ......................................................................................................................................... 3
5 Installation ................................................................................................................................................................................... 4
6 Configuration.............................................................................................................................................................................. 7
6.1 Viewing Status ................................................................................................................................................................. 7
6.2 Configuring the keypad .............................................................................................................................................. 8
7 User Management .................................................................................................................................................................. 11
7.1 Adding Users .................................................................................................................................................................. 11
7.2 Adding Card .................................................................................................................................................................... 12
7.2.1 Adding Card on the User Manager ........................................................................................................... 12
7.2.2 Adding Card in the Accessory List ............................................................................................................. 12
8 Operations .................................................................................................................................................................................. 14
8.1 Frequently Used Commands ................................................................................................................................... 14
8.2 Waking Up the Keypad ............................................................................................................................................. 14
8.3 Arming ............................................................................................................................................................................... 14
8.4 Disarming ......................................................................................................................................................................... 15
8.5 Searching for the Room Status ............................................................................................................................. 16
Appendix 1 Cybersecurity Recommendations ............................................................................................................ 17