Control Panel VIDEOFIED® VISIO TECHNICAL SPECIFICATIO NS Configuration/ProgrammingCompatibility The VISIO works with all the following VIDEOFIED® wireless devices: Complete system configuration/programming can be done As additional events occur, the control panel automatically onsite using an alphanumeric keypad. Easy to understand text deletes the oldest event. This ensures the most recent events on a 2-line, 16-characters liquid-crystal (LCD) display guides reside in the log. you through programming, prompting you for simple yes/no or The history/event log can be viewed using an alphanumeric data entry responses. Complete punctuation symbols allow for keypad or downloaded at the central station. accurate website/IP address entries and device location naming. Features Off-site programming is accomplished by using Frontel remote control Software. A phone connection between the > S2View® - Spread Spectrum, VIDEOFIED®, Interactive control panel and a computer with Frontel Downloader AES Encrypted Wireless technology provides optimum Software allows trained operators to configure/program signal integrity and security. system settings/parameters. > Compatibility - works with all VIDEOFIED® wireless devices. Communication > Supervision - every 8 minutes (all devices except Keyfobs).Indoor MotionViewer TM Door Contacts - detect door Keyfobs - allow limited Alphanumeric Keypads - allow The VISIO reports alarms and other system events using the system operation and panic > Tamper detection - 24-hour dual-tamper function providescameras - detect intruder complete system operation and and window open/close activity. following methods and formats: Frontel, SURTEC, Contact ID, alarm capability in a portable, detection for both cover and wall removal. Control panelmovement/motion and activate on-site configuration/programming. An external input allows a wired Voice, and Email. convenient package. also monitors all system device tamper switches.a built-in camera for video connection from standardverification of intrusion alarms. security switches and outputs > Frontel - provides complete system reporting information > Zones - 25 maximum.Models with and without pet- from other detection devices. and video verification to a central monitoring station set > Areas - 4 maximum. Area 1 predefined from factoryimmunity are available. up with Frontel Monitoring Software. for entry/exit delay. Areas 2, 3, and 4 can be configured > Contact ID (CID) - provides standard CID system as needed. reporting codes to central monitoring stations with > Access codes - 19 maximum, 4 - 6 digits; one installer CID compatible receiving equipment and software. access code for on-site programming only. > SURTEC - provides standard SURTEC system > Configuration/Programming - on-site using alphanumeric reporting codes to central monitoring stations with keypads or off-site using Frontel remote control Software. SURTEC compatible receiving equipment and software. > Communication - reports to central monitoring stations > Voice - reports alarms by digital voice to one, two, using Frontel, SURTEC and/or CID formats. Can also report or three customer-designated phone numbers (office, alarms to customer via digital voice phone calls or Email. home, cellular, etc.). > Video Verification - video resolution of 320 x 240 pixels, 0.2 lux sensitivity, 5-frames per second for about 10 seconds Interior Sirens - provide status Exterior Sirens/Strobes - The Badge Reader - consists Outdoor MotionViewerTM beeps and alarm sounds throughout provide alarm sounds and Video Verification total recording time. 220K MPEG file. for status information, a built in cameras - detect intruder the premises where needed. visual identification of alarm sounder, interactive, encrypted movement/motion and activate Incorporating MotionViewerTM cameras into the security system > History/Event Log - maximum 4,000 events stored in flash site for responding authorities. wireless circuitry for secure a built-in camera for video allows for video verification of intrusion alarms (only when the memory that cannot be cleared or erased. two-way communication with verification of intrusion alarms. Frontel reporting format is selected). When the system is armed the control panel. and a motion-activated camera is activated by an intruder, the Applications camera captures a 10-second digital video clip which is sent to > Residential and small commercial security the central monitoring station by the control panel. Customers system installations. Capacities can also receive video clips through Email. Each VISIO system can manage up to 25 individual devices There are 19 individual access codes that can be four to six digits > Temporary and portable video verification for: (camera, motion detector, keypad, siren, etc.). Each device is long. Each access code can be assigned to one of three security History/Event Log • Property assigned to one of four protection areas. Area 1 is predefined levels for specific operating authority. Levels 1 and 3 provide The VISIO records and stores all system activities or events • Construction sites from the factory for delayed entry/exit. The other three areas various system operation limits. One installer code allows (armings, disarmings, alarms, access codes entered, • Assets can be configured/programmed as required for the installation. access to Level 4 which provides the installer/dealer full access systemprogramming changes, etc.) in flash memory, that • V.I.P. protection For example, Area 2 could be configured for devices on the for configuration/programming. The installer code is restricted cannot be cleared or erased. The log accumulates a maximum main level, Area 3 for devices on the upper level, and Area 4 for from system arming and disarming. 4,000 events. devices in the basement.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.