Honeywell Honeywell Security | Protect What Matters Most Betriebsanweisung
– 7 –
The following table lists the four different arming modes and the results of
each.
each.
Features For Each Arming Mode
Arming
Mode
Mode
Exit
Delay
Entry
Delay
Perimeter
Armed
Interior
Armed
AWAY Yes
Yes
Yes Yes
STAY Yes
Yes
Yes No
INSTANT Yes No
Yes
No
MAXIMUM Yes
No
Yes
Yes
Alarms
When an alarm occurs, both the keypad and external sounders will sound,
and the keypad will display the zone(s) causing the alarm. If your system is
connected to a central monitoring station, an alarm message will also be sent.
To stop the alarm sounding, simply disarm the system.
and the keypad will display the zone(s) causing the alarm. If your system is
connected to a central monitoring station, an alarm message will also be sent.
To stop the alarm sounding, simply disarm the system.
Memory of Alarm
When an alarm condition occurs, the keypad displays the number(s) of the
zone(s) that caused the problem, and displays the type of alarm (ex. FIRE,
ALARM). It remains displayed until it is cleared by disarming the system
(see DISARMING THE SYSTEM section).
zone(s) that caused the problem, and displays the type of alarm (ex. FIRE,
ALARM). It remains displayed until it is cleared by disarming the system
(see DISARMING THE SYSTEM section).
Speed Key (Macros)
The system can store a string of up to 32 keystrokes, which can be activated
anytime by simply pressing the “A, B, C, or D” keys. This feature can be
used to make it easy to perform multiple functions at once (such as going to
another partition to bypass a zone), or it can be used to simplify an everyday,
repeated procedure. Refer to the SPEED KEY section for procedures for
using this feature.
anytime by simply pressing the “A, B, C, or D” keys. This feature can be
used to make it easy to perform multiple functions at once (such as going to
another partition to bypass a zone), or it can be used to simplify an everyday,
repeated procedure. Refer to the SPEED KEY section for procedures for
using this feature.
Using Schedules
Your system may have been programmed with schedules for automatically arming,
disarming and activating various devices and/or performing other system functions at
predetermined times. Users can modify some of these schedules by manually delaying a
closing time, using temporary schedules, or by programming special user schedules. Refer to
the USING SCHEDULES section at the end of this manual for scheduling related
procedures.
disarming and activating various devices and/or performing other system functions at
predetermined times. Users can modify some of these schedules by manually delaying a
closing time, using temporary schedules, or by programming special user schedules. Refer to
the USING SCHEDULES section at the end of this manual for scheduling related
procedures.