Honeywell Smoke Alarm Benutzerhandbuch

Seite von 15
 
 
5/19/2008 
 
13 of 15 
secondary port will use the backup phone line for 24 hour test signals or when 
the network may go down.  See your panel’s manual for correct programming. 
Do not forget to program the panels 24 hour test parameters. 
 
  
ONBOARD 
DACT 
 
 
ENABLED = YES 
 
 
PRIMARY PHONE LINE = TOUCHTONE 
 
 
SECONDARY PHONE LINE = TOUCHTONE 
 
  
CENTRAL 
STATION 
 
 
 
REPORTING - ENABLED 
PRIMARY ACCOUNT CODE - (assigned by CENTRAL STATION) 
 
 
PHONE NUMBER –   
(Enter valid CS phone number required as if the panel was connected to an 
outgoing phone line) 
SECONDARY ACCOUNT CODE - (assigned by CENTRAL 
STATION) 
 
 
PHONE NUMBER – (valid CS phone number required) 
(Enter valid CS phone number as if the panel was connected to an outgoing 
phone line) 
 
•  Test your system’s ability to communicate with the Central Station 
Receiver.  Insure that the backup phone line is communicating with the 
central station. This can be done by disconnecting the primary IP 
connection and observing that the panel dials out the backup phone line.  
Confirm that the central station received the communication lost signals. 
 
DHCP Theory of Operation: 
 
The following information is not required for configuration but is included for 
further understanding of DHCP 
 
DHCP is used in private networks to auto-configure not only the IP addresses 
and masks of the network hosts (PC’s, IPDACT’s, etc), but also their default 
gateways. As example, consider your DSL router at home, which typically 
supports a DHCP server.  This means you don’t need to fix any IP parameter in 
your home PC (you just set it to obtain the IP parameters automatically).  You 
could connect an IPDACT to your home router and activate its DHCP so it can 
also take the IP address, mask and gateway from your home router internal 
DHCP server.  In other words, DHCP (Dynamic Host Control Protocol) simply 
selects an unused network address and supplies all network information, IP 
address and mask automatically so that there will be no conflicts.  This can be a 
permanent “lease” or set to expire after a period of time.  After a set time, the 
lease can be reacquired and a new IP address obtained.