Senstar Corporation LM100 User Manual

Page of 74
Senstar LM100 calibration
Page 60
Senstar LM100 Product Guide
Intrusion simulations
Conduct simulations for both cut and climb intrusions to test the Senstar LM100 system. The 
easiest method for simulating a cut intrusion is to firmly tap the fence with the blade of a medium 
sized screwdriver. Hold the screwdriver by the handle, and flip your wrist to bring the blade into 
contact with the fence. The metal on metal contact generates an impulse that is similar to the 
cutting of a fence wire. 
Weaving a length of fence wire into the fence fabric and then cutting the inserted wire can also 
simulate a cut intrusion. Both methods generate a signal that is similar to the response of an actual 
cut intrusion. An actual fence cut also creates a significant amount of secondary fence noise as 
the cut section of wire pulls apart. 
For a simulated climb intrusion, the best method is to actually climb the fence. It is not necessary 
to climb over the fence. The tester simply needs to climb on the fence for a period that exceeds the 
Event Window time setting X the Event Count setting (e.g., 1 second X 3 Events = 3 seconds). If 
climbing on the fence is not possible, dragging a screwdriver across the surface of the fence can 
be used as a climb simulation. Place the blade of a screwdriver against the fence fabric and drag 
the screwdriver back and forth across the fence panel while applying light pressure. Continue this 
for the Event Window time setting X the Event Count setting.
Start a UCM magnitude response plot and then thoroughly test the detection along the full length 
of the protected fence, while running the plot. Adjust the detection parameters if any of the test 
intrusions fails to report an alarm simulation. Next, run a long term UCM magnitude response plot 
to monitor the system for nuisance alarms, especially during periods of inclement weather. Adjust 
the detection parameters if bad weather causes an unacceptable nuisance alarm rate. Once the 
system is detecting all intrusion simulations and the NAR is at an acceptable rate, the system is 
properly calibrated for the site. Save a UCM file that includes the gateway’s current settings.