Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
How to use strategic and structural design principles to apply the MITRE Cyber Resiliency Engineering Framework (CREF) to improve the cybersecurity, resiliency, and therefore business continuity and survivability of your company.
Este documento presenta soluciones para el proceso de aseguramiento de servidores Windows 2019. Se discuten los estándares CIS y la importancia del cumplimiento, así como el proceso manual de aseguramiento y sus desafíos. También se introduce la automatización de aseguramiento de Calcom para superar estos desafíos mediante la simulación del impacto de políticas, la aplicación de políticas granulares y el monitoreo continuo del cumplimiento.
Este documento presenta un resumen de la historia y los conceptos fundamentales de la criptografía. Se divide en ocho capítulos que cubren temas como la historia de la criptografía desde la antigüedad hasta la era moderna, los diferentes tipos de cifrado simétrico y asimétrico, el criptoanálisis, y el software de encriptación. El documento proporciona una introducción general a los principios básicos y aplicaciones de la criptografía a lo largo del tiempo.
Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It contains tools like Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, and NetworkMiner. It allows full packet capture, network and host intrusion detection, and log collection and management. Security Onion can be deployed in standalone, server-sensor, or hybrid configurations.
Este documento proporciona una introducción a los honeypots, que son sistemas de seguridad diseñados para atraer atacantes mediante la emulación de servicios y sistemas vulnerables. Explica que existen diferentes tipos de honeypots según su nivel de interacción y ubicación, y analiza ventajas como la detección de amenazas y desventajas como el riesgo potencial que suponen. Finalmente, menciona ejemplos de honeypots comerciales, de código abierto y la plataforma Modern Honey Network para gestionar
How to use strategic and structural design principles to apply the MITRE Cyber Resiliency Engineering Framework (CREF) to improve the cybersecurity, resiliency, and therefore business continuity and survivability of your company.
Este documento presenta soluciones para el proceso de aseguramiento de servidores Windows 2019. Se discuten los estándares CIS y la importancia del cumplimiento, así como el proceso manual de aseguramiento y sus desafíos. También se introduce la automatización de aseguramiento de Calcom para superar estos desafíos mediante la simulación del impacto de políticas, la aplicación de políticas granulares y el monitoreo continuo del cumplimiento.
Este documento presenta un resumen de la historia y los conceptos fundamentales de la criptografía. Se divide en ocho capítulos que cubren temas como la historia de la criptografía desde la antigüedad hasta la era moderna, los diferentes tipos de cifrado simétrico y asimétrico, el criptoanálisis, y el software de encriptación. El documento proporciona una introducción general a los principios básicos y aplicaciones de la criptografía a lo largo del tiempo.
Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It contains tools like Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, and NetworkMiner. It allows full packet capture, network and host intrusion detection, and log collection and management. Security Onion can be deployed in standalone, server-sensor, or hybrid configurations.
Este documento proporciona una introducción a los honeypots, que son sistemas de seguridad diseñados para atraer atacantes mediante la emulación de servicios y sistemas vulnerables. Explica que existen diferentes tipos de honeypots según su nivel de interacción y ubicación, y analiza ventajas como la detección de amenazas y desventajas como el riesgo potencial que suponen. Finalmente, menciona ejemplos de honeypots comerciales, de código abierto y la plataforma Modern Honey Network para gestionar
Snort Intrusion Detection / Prevention System on PFSense FirewallHuda Seyam
This project is devoted to presenting a solution to protect web pages that acquire passwords and user names against HTML brute force.
By performing a brute force password auditing against web servers that are using HTTP authentication with Nmap and detect this attack using snort IDS/IPS on PFSense Firewall.
VPS hosting is a type of hosting that partitions a physical server into multiple virtual servers. Each virtual server has its own operating system and software, providing more control than shared hosting. VPS hosting offers advantages like being cheaper than dedicated hosting while providing better features and control than shared hosting. It allows for custom administration, isolation of websites, backup capabilities, and migration between physical servers. However, VPS hosting also has some disadvantages like potential hardware limitations from resource sharing, full responsibility for software and security updates, and possible risks of sites being grouped on the same IP address.
The document discusses demilitarized zones (DMZs) in computer networks. A DMZ is a small subnetwork located between a company's private network and the outside public network. It contains devices like web, FTP, and email servers that are accessible to internet traffic but isolated from the internal network. DMZs provide enhanced security by separating internal and external networks, and only allowing specific services that need to be accessed from the outside. The document outlines common DMZ architectures, security considerations, and the types of servers and services typically located in a DMZ.
Son servidores de información falsos, que son posicionados estratégicamente en una red de prueba y alimentados de información disfrazada como archivos de naturaleza confidencial.
Son herramientas de seguridad informática diseñadas para atraer atacantes y analizar el comportamientos de los ataques que realizan estos atacantes, para utilizar esto como referencia para diferentes propósitos, que pueden ser:
Estadísticas
Descubrimiento de nuevas vulnerabilidades y herramientas.
Análisis de ataques, para su posterior estudio.
Evitar que los principales sistemas de información sean atacados.
This document provides an overview of intrusion detection systems (IDS) and Snort, an open source network-based IDS. It discusses the basic requirements, types (network-based, host-based, distributed), and approaches of IDS. It then focuses on Snort, describing its modes of operation, packet sniffing capabilities, and network intrusion detection. Key terms related to IDS are also defined. The document aims to introduce readers to IDS and Snort for monitoring network traffic and detecting intrusions and threats.
This document discusses computer viruses including their similarities to biological viruses, how they work and spread, types of viruses, virus detection methods, and prevention. It notes that computer viruses can replicate and spread like biological viruses, infecting host systems and slowing them down. The main types discussed are macro, boot sector, worm, Trojan horse, and logic bomb viruses. Virus detection methods covered include signature-based, behavior-based, and heuristic-based detection. Prevention methods recommended are using antivirus software, not sharing drives without passwords, deleting email attachments, backing up files, and using secure operating systems.
The cyber kill chain describes cyber attacks from an attacker's perspective through distinct phases: (1) reconnaissance, (2) weaponization, (3) delivery, (4) exploitation, (5) installation, (6) command and control, and (7) actions on objectives. Each phase of the kill chain can be mapped to defensive tools and actions to prevent attacks. Understanding the kill chain stages gives analysts insight into what is being attempted and how to respond appropriately. The kill chain was developed by Lockheed Martin as a method to describe intrusions and prevent advanced persistent threats by highly trained adversaries targeting sensitive information.
El documento describe varios sistemas distribuidos de denegación de servicio como Trinoo, Tribal Flood Network, TFN2K, Stacheldraht y Shaft. Estos sistemas permiten a un atacante controlar numerosos ordenadores comprometidos de forma remota para lanzar ataques coordinados de denegación de servicio contra víctimas objetivo. El documento explica las características técnicas clave de cada sistema, incluyendo los puertos y protocolos de comunicación utilizados entre el atacante, los controladores y los agentes.
The document discusses the Mirai botnet attacks of 2016 and subsequent variants. It provides details on:
1) The 2016 Mirai attack that took down major websites by exploiting vulnerabilities in IoT devices like IP cameras and routers.
2) How Mirai and other botnets work by compromising internet-connected devices into a botnet that can be used to launch DDoS attacks.
3) Updates on the evolution of Mirai variants that target new devices and architectures, incorporating more sophisticated techniques.
InfoSec analysts are all somewhat familiar with Honeypots. When they are given the proper attention, care and feeding, they produce invaluable information and can be a critical asset when it comes to defending the network. This intel has been primarily used by security researchers and organizations with advanced defensive capabilities to study their adversaries and learn from their actions. But what about the rest of us? Honeypots are a lot of work to configure, maintain, and monitor, right? Not exactly; when deployed and monitored properly, Honeypots and Honey Tokens are a simple way to alert on anomalous activity inside the network. But how can an organization that is not focused on research gain valuable threat intelligence using Honeypots and actively defend their network using indicators generated from an internal Honeynet?
The answer is Honeypots for Active Defense. There are currently many open source security tool distributions that come pre-loaded with Honeypots among other useful tools, however the Honeypot software is often not deployed in an effective manner. This session will discuss techniques to leverage Honeypots in ways that will not overburden the security team with massive logs to sift through and focuses efforts on correlating active threat data observed in the Honeypots with the production environment. When deploying Honeypots effectively, this can give security analysts one additional mechanism to tip them off to nefarious activity within their network before they become the next headline.
Network Access Protection (NAP) is a Windows Server 2008 feature that allows network administrators to control client access to network resources based on the client's compliance with health policies. NAP validates clients, enforces compliance through limited network access if needed, and facilitates automatic remediation to help clients meet policy requirements. NAP components work together to validate client health, restrict non-compliant clients, and provide updates to remedy issues and maintain ongoing compliance.
The document discusses network security and intrusion detection. It states that security must use a layered "defense in depth" strategy, as no single measure is sufficient on its own. While firewalls are common, simply allowing all web traffic enables malicious activity. Intrusion detection systems (IDS) monitor traffic for attack signatures. IDS gather information from systems and networks to identify breaches from outside or within an organization. Knowledge-based IDS apply information about known vulnerabilities and attacks to detect exploitation attempts.
Charla impartida por Carlos Alberto Escolá, del Centro de Innovación en Movilidad de Microsot, en el Curso de Seguidad Informatica de la Universidad de Salamana 2009.
The document provides an overview of the Wazuh open source host-based intrusion detection system (HIDS). It describes how Wazuh uses agents installed on endpoints that collect and transmit security data to a central server for analysis. The server analyzes the data, triggers alerts for threats or anomalies, and stores the information in Elasticsearch for visualization and exploration through the Wazuh dashboard user interface. Key components of the Wazuh architecture include the agents, server, indexer cluster for data storage, and dashboard for monitoring, analysis and management.
Bonnes pratiques pour sécuriser un serveur LinuxKiwi Backup
Nous vous proposons de partager notre expertise sur le durcissement (procédés de sécurisation) des serveurs Linux :
- Principaux axes d'attaques possibles d'un serveur Linux
- Défenses profondes à mettre en place
- Arbitrage entre la sécurisation et la fluidité de fonctionnement des applicatifs
- Quelques outils indispensables
This document discusses how to configure VLANs on a Cyberoam appliance to logically segment a network. It explains that VLANs use tagging to simulate multiple LANs on a single physical LAN. To configure a VLAN, you define a virtual subinterface on the Cyberoam appliance, assigning it a VLAN ID and zone. You then restart management services to apply the configuration. This allows the Cyberoam to recognize VLAN IDs and apply security policies between network domains.
This document provides an overview of intrusion detection systems (IDS). It begins with an introduction that defines intrusion, intrusion detection, and IDS. It then discusses the history and typical scenarios of intrusions. The document outlines different types of attacks and what an IDS is supposed to do in detecting them. It classifies IDS based on detection approach and protected system, covering network/host-based detection. The advantages and disadvantages of different IDS types are presented. Commonly used open source and commercial IDS are listed, with Snort discussed in more detail. References for further information are provided at the end.
Honeywell Vista 15P Honeywell Vista 20P Programming GuideAlarm Grid
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Honeywell Vista 15P Honeywell Vista-20P User GuideAlarm Grid
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Snort Intrusion Detection / Prevention System on PFSense FirewallHuda Seyam
This project is devoted to presenting a solution to protect web pages that acquire passwords and user names against HTML brute force.
By performing a brute force password auditing against web servers that are using HTTP authentication with Nmap and detect this attack using snort IDS/IPS on PFSense Firewall.
VPS hosting is a type of hosting that partitions a physical server into multiple virtual servers. Each virtual server has its own operating system and software, providing more control than shared hosting. VPS hosting offers advantages like being cheaper than dedicated hosting while providing better features and control than shared hosting. It allows for custom administration, isolation of websites, backup capabilities, and migration between physical servers. However, VPS hosting also has some disadvantages like potential hardware limitations from resource sharing, full responsibility for software and security updates, and possible risks of sites being grouped on the same IP address.
The document discusses demilitarized zones (DMZs) in computer networks. A DMZ is a small subnetwork located between a company's private network and the outside public network. It contains devices like web, FTP, and email servers that are accessible to internet traffic but isolated from the internal network. DMZs provide enhanced security by separating internal and external networks, and only allowing specific services that need to be accessed from the outside. The document outlines common DMZ architectures, security considerations, and the types of servers and services typically located in a DMZ.
Son servidores de información falsos, que son posicionados estratégicamente en una red de prueba y alimentados de información disfrazada como archivos de naturaleza confidencial.
Son herramientas de seguridad informática diseñadas para atraer atacantes y analizar el comportamientos de los ataques que realizan estos atacantes, para utilizar esto como referencia para diferentes propósitos, que pueden ser:
Estadísticas
Descubrimiento de nuevas vulnerabilidades y herramientas.
Análisis de ataques, para su posterior estudio.
Evitar que los principales sistemas de información sean atacados.
This document provides an overview of intrusion detection systems (IDS) and Snort, an open source network-based IDS. It discusses the basic requirements, types (network-based, host-based, distributed), and approaches of IDS. It then focuses on Snort, describing its modes of operation, packet sniffing capabilities, and network intrusion detection. Key terms related to IDS are also defined. The document aims to introduce readers to IDS and Snort for monitoring network traffic and detecting intrusions and threats.
This document discusses computer viruses including their similarities to biological viruses, how they work and spread, types of viruses, virus detection methods, and prevention. It notes that computer viruses can replicate and spread like biological viruses, infecting host systems and slowing them down. The main types discussed are macro, boot sector, worm, Trojan horse, and logic bomb viruses. Virus detection methods covered include signature-based, behavior-based, and heuristic-based detection. Prevention methods recommended are using antivirus software, not sharing drives without passwords, deleting email attachments, backing up files, and using secure operating systems.
The cyber kill chain describes cyber attacks from an attacker's perspective through distinct phases: (1) reconnaissance, (2) weaponization, (3) delivery, (4) exploitation, (5) installation, (6) command and control, and (7) actions on objectives. Each phase of the kill chain can be mapped to defensive tools and actions to prevent attacks. Understanding the kill chain stages gives analysts insight into what is being attempted and how to respond appropriately. The kill chain was developed by Lockheed Martin as a method to describe intrusions and prevent advanced persistent threats by highly trained adversaries targeting sensitive information.
El documento describe varios sistemas distribuidos de denegación de servicio como Trinoo, Tribal Flood Network, TFN2K, Stacheldraht y Shaft. Estos sistemas permiten a un atacante controlar numerosos ordenadores comprometidos de forma remota para lanzar ataques coordinados de denegación de servicio contra víctimas objetivo. El documento explica las características técnicas clave de cada sistema, incluyendo los puertos y protocolos de comunicación utilizados entre el atacante, los controladores y los agentes.
The document discusses the Mirai botnet attacks of 2016 and subsequent variants. It provides details on:
1) The 2016 Mirai attack that took down major websites by exploiting vulnerabilities in IoT devices like IP cameras and routers.
2) How Mirai and other botnets work by compromising internet-connected devices into a botnet that can be used to launch DDoS attacks.
3) Updates on the evolution of Mirai variants that target new devices and architectures, incorporating more sophisticated techniques.
InfoSec analysts are all somewhat familiar with Honeypots. When they are given the proper attention, care and feeding, they produce invaluable information and can be a critical asset when it comes to defending the network. This intel has been primarily used by security researchers and organizations with advanced defensive capabilities to study their adversaries and learn from their actions. But what about the rest of us? Honeypots are a lot of work to configure, maintain, and monitor, right? Not exactly; when deployed and monitored properly, Honeypots and Honey Tokens are a simple way to alert on anomalous activity inside the network. But how can an organization that is not focused on research gain valuable threat intelligence using Honeypots and actively defend their network using indicators generated from an internal Honeynet?
The answer is Honeypots for Active Defense. There are currently many open source security tool distributions that come pre-loaded with Honeypots among other useful tools, however the Honeypot software is often not deployed in an effective manner. This session will discuss techniques to leverage Honeypots in ways that will not overburden the security team with massive logs to sift through and focuses efforts on correlating active threat data observed in the Honeypots with the production environment. When deploying Honeypots effectively, this can give security analysts one additional mechanism to tip them off to nefarious activity within their network before they become the next headline.
Network Access Protection (NAP) is a Windows Server 2008 feature that allows network administrators to control client access to network resources based on the client's compliance with health policies. NAP validates clients, enforces compliance through limited network access if needed, and facilitates automatic remediation to help clients meet policy requirements. NAP components work together to validate client health, restrict non-compliant clients, and provide updates to remedy issues and maintain ongoing compliance.
The document discusses network security and intrusion detection. It states that security must use a layered "defense in depth" strategy, as no single measure is sufficient on its own. While firewalls are common, simply allowing all web traffic enables malicious activity. Intrusion detection systems (IDS) monitor traffic for attack signatures. IDS gather information from systems and networks to identify breaches from outside or within an organization. Knowledge-based IDS apply information about known vulnerabilities and attacks to detect exploitation attempts.
Charla impartida por Carlos Alberto Escolá, del Centro de Innovación en Movilidad de Microsot, en el Curso de Seguidad Informatica de la Universidad de Salamana 2009.
The document provides an overview of the Wazuh open source host-based intrusion detection system (HIDS). It describes how Wazuh uses agents installed on endpoints that collect and transmit security data to a central server for analysis. The server analyzes the data, triggers alerts for threats or anomalies, and stores the information in Elasticsearch for visualization and exploration through the Wazuh dashboard user interface. Key components of the Wazuh architecture include the agents, server, indexer cluster for data storage, and dashboard for monitoring, analysis and management.
Bonnes pratiques pour sécuriser un serveur LinuxKiwi Backup
Nous vous proposons de partager notre expertise sur le durcissement (procédés de sécurisation) des serveurs Linux :
- Principaux axes d'attaques possibles d'un serveur Linux
- Défenses profondes à mettre en place
- Arbitrage entre la sécurisation et la fluidité de fonctionnement des applicatifs
- Quelques outils indispensables
This document discusses how to configure VLANs on a Cyberoam appliance to logically segment a network. It explains that VLANs use tagging to simulate multiple LANs on a single physical LAN. To configure a VLAN, you define a virtual subinterface on the Cyberoam appliance, assigning it a VLAN ID and zone. You then restart management services to apply the configuration. This allows the Cyberoam to recognize VLAN IDs and apply security policies between network domains.
This document provides an overview of intrusion detection systems (IDS). It begins with an introduction that defines intrusion, intrusion detection, and IDS. It then discusses the history and typical scenarios of intrusions. The document outlines different types of attacks and what an IDS is supposed to do in detecting them. It classifies IDS based on detection approach and protected system, covering network/host-based detection. The advantages and disadvantages of different IDS types are presented. Commonly used open source and commercial IDS are listed, with Snort discussed in more detail. References for further information are provided at the end.
Honeywell Vista 15P Honeywell Vista 20P Programming GuideAlarm Grid
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Honeywell Vista 15P Honeywell Vista-20P User GuideAlarm Grid
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
Alarm Grid Home Security http://www.alarmgrid.com/ has provided this pdf with the permission and courtesy of Honeywell.
Alarm Grid is a home security product and alarm monitoring company that loves its customers. We have a strong appreciation of the DIY community, and want to make sure that we not only provide the best products and services out there but we also want to make sure that resources like these Honeywell product pdfs are easily accessible so that or curious customers can find what they need when they need it.
This document provides information about a Zipato smoke sensor, including:
- It uses Z-Wave 500 series technology for wireless communication and includes a smoke detector, sound alarm, and tamper switch.
- It has a range of 30 meters indoors, 70 meters outdoors, and can connect to other Z-Wave devices as a repeater.
- It requires a CR123A lithium battery and includes instructions for installation, setup, testing and configuration through a Z-Wave controller.
Protecting Electrical Cabinets With Firetracenjgrant
Firetrace systems provide effective fire protection for machinery control cabinets and electrical cabinets. They quickly detect fires using detection tubing located near potential ignition sources. This allows the extinguishing agent to be discharged directly onto the fire. Installation is simple as no additional piping or structural changes are needed. Firetrace systems can be integrated with fire alarms and help prevent costly damage from electrical cabinet fires.
This document discusses fire detection and alarm systems. It covers the design requirements based on building standards, planning the system based on building type and size, selecting the type of coverage needed, configuring zones within the premises, guidelines for zone configuration, types of alarm detection systems including conventional and addressable, and addressing techniques for detectors. The overall purpose is to provide early warning of fires and allow firefighting actions before situations get out of control.
This document discusses simplex fire alarm systems and their components. It describes how fire alarm systems can identify fires through manual or automatic detection, alert occupants to evacuate, and transmit alarm signals. The key components discussed include the network display unit for monitoring the system, various types of detectors like smoke, heat, duct and modules, manual call points, notification devices, and the fire alarm control panel for operating the system. Reasons for regular inspection, testing and maintenance of life safety systems are also provided.
This document provides important limitations and installation precautions for an Expandable Emergency Evacuation System. It summarizes that while fire alarm systems can detect fires early, they do not ensure protection from fire damage or guarantee warning. Smoke and fire can spread in ways detectors cannot sense. Additionally, the system requires proper installation and maintenance to function correctly.
This document provides instructions and information for installing and operating a smoke alarm, including:
- Recommended locations for installing smoke alarms in homes, including near bedrooms and stairways.
- Locations to avoid such as kitchens, garages, and areas subject to temperature extremes.
- Instructions for installing the smoke alarm on ceilings or walls and testing it weekly.
- Information on nuisance alarms from cooking smoke and how to temporarily silence the alarm.
- Maintenance instructions including replacing batteries annually and cleaning the alarm yearly.
Central stations that receive monitoring signals from multiple alarm companies can spread costs across companies, keeping monitoring costs lower than if serving a single company. Upon receiving an alarm, the central station dispatches authorities according to written instructions for that account. Fire alarm signals take priority and must be processed within 90 seconds of receipt. Central stations can obtain certifications for monitoring fire and burglar alarm systems up to high security grades. Backup systems and power are required to ensure no loss of signal.
Kidde smoke alarm 0916,44037502,21006655 english,spanish 8200898 bToy Hut
This document provides installation and operation instructions for a 9 volt battery operated smoke alarm with a "HUSH" control feature. It includes recommendations for optimal smoke alarm placement in homes and mobile homes. Instructions are provided for installing the smoke alarm, inserting the battery, testing the alarm, and using the "HUSH" control to temporarily silence nuisance alarms.
This document provides instructions for installing and operating a smoke alarm, including recommended locations for installation, how to test the alarm, replace batteries, and clean the alarm. It notes that smoke alarms have limitations and may not detect all fires, so both ionization and photoelectric alarms are recommended for maximum protection. It also emphasizes the importance of regular testing and maintenance to ensure proper operation.
Manuel Détecteur de fumée Everspring SF812Techologis
The document provides information about including or excluding a smoke detector from a Z-Wave network. It describes:
1) Inside the detector is a link key used for inclusion, exclusion, association, and reset. When first powered, it flashes to indicate it has no node ID.
2) The detector can be included in any Z-Wave network and act as a repeater. Inclusion allows remote operation when the detector is triggered.
3) The basic Z-Wave functions like inclusion, exclusion, association, and reset are described along with the actions and LED indicators for each function.
The InnovairFlex D2 2-wire photoelectric duct smoke detector has a pivoting housing that fits both square and rectangular ducts. It senses airflow from 100-4,000 feet per minute and has improved resistance to false alarms. The detector's modular design simplifies installation and maintenance in harsh duct environments. Accessories include remote test stations and annunciators for flexible system integration.
Basics of fire alarm systems and bildge alarm systems in sri lanka navy crafts. Also included spares what are using and construction of photoelectric smoke detector.
The document discusses fire alarm sensing circuits and components. It states that fire alarm circuits must be installed according to NFPA 72 and also adhere to the NEC. It also notes that an EOL module is typically required after the last sensor to provide power supervision. Smoke detectors are required in bedrooms, hallways, and each level of a residence near stairwells. The document also discusses the two basic types of fire alarm sensors - waterflow and electrical - providing details on components like waterflow switches, air pressure switches, and heat detectors.
The 5809 wireless heat detector from Honeywell offers expanded fire detection through both rate-of-rise and fixed temperature sensing. It can detect a rapid rise in temperature of 15 degrees F or more per minute or a temperature rising above 135 degrees F. The detector is powered by a lithium battery and transmits alarm, supervisory and low battery messages wirelessly to the control panel. It is ideal for hard to wire locations and requires no wiring for fast and easy installation.
Why are fire detection & alarm system is required in buildings?Shubham .
Why are fire detection and alarm systems required?
Detect fire in the areas.
Notify building occupants to take evasive action to escape the dangers of a hostile fire.
Summon organized assistance to initiate or assist in fire control activities.
Initiate automatic fire control & suppression systems & to sound alarm.
Supervise fire control & suppression systems to assure operational status is maintained Initiate auxiliary functions involving environmental, utility & process controls
The document discusses fire detection and alarm systems. It provides details on:
1) The purposes of fire detection systems which are to detect fires, notify occupants, summon assistance and initiate suppression systems.
2) The basic components of systems including input devices like manual pull stations and detectors, and output devices like alarms and controls.
3) Different types of detectors like heat, smoke and gas detectors and their functions.
4) Factors to consider for detector placement like area size and layout.
5) Conventional and addressable microprocessor-based systems and their advantages.
6) Approvals and standards required for fire detection systems.
SenseTek Bandweaver Road Tunnels Linear Heat Detection-dtsHans Bronkhorst
with the FireLaser DTS Distributed Temperature Sensing Technology you have the solution for high reliability and effective fire detection in road tunnel infrastructure. SenseTek is a specialized partner for Bandweaver in the Netherlands and can offer full support on the fiber optic thermal detection. email to sensetek@senstek.nl
Similar to Honeywell Vista 15p Honeywell Vista 20P Install Guide (20)
Vizia rf + system programming and controlAlarm Grid
The document describes the Vizia RF+ home automation system, including its programming and control features. Key points:
- Vizia RF+ allows wireless control of lighting and appliances through remote controllers and programming devices.
- Programming requires a handheld remote controller or ThinkEssentials software to set up schedules, scenes, and network configuration.
- The system provides benefits like energy savings, multi-room lighting control, and integration of household devices.
The document provides product specifications for Leviton's ViziaRF+ plug-in modules for wireless home control systems. It describes three modules - a plug-in lamp dimming module, plug-in appliance module, and plug-in serial interface module. The lamp and appliance modules allow remote control of connected devices, including dimming and on/off switching. The serial interface module integrates the system with other home automation controllers.
Leviton vrs15 1 lz installation manual and setup guideAlarm Grid
This document provides installation instructions and warnings for a Vizia RF + electronic scene capable switch. It can be installed in single pole or 3-way wiring configurations. The switch communicates via radio frequency and must be included in a Z-Wave network to operate. The instructions describe preparing the wires, connecting them correctly, testing and operating the switch, and include troubleshooting tips. Safety warnings are provided to avoid shock and ensure proper installation.
Leviton vrs05 1 lz installation manual and setup guideAlarm Grid
This document provides installation instructions for a Scene Capable Incandescent Switch. It contains warnings to turn off power before installation and identifies tools needed. It describes identifying wiring applications and preparing/connecting wires for single pole, 3-way, or 3-way with remote switches. Instructions are provided on mounting the switch, restoring power, including the switch in a Z-Wave network, troubleshooting, programming features, and warranty information.
This document provides product specifications for the Vizia RF + Scene Capable Receptacle, which replaces a regular wall receptacle to allow for wireless ON/OFF control of electrical devices plugged into the receptacle. It can be controlled remotely using Vizia RF + Controllers or other Z-Wave controllers. The receptacle provides features such as scene control of multiple lights with one button, wireless mesh networking, a tamper-resistant design, transient surge protection, and compatibility with home automation systems. It is designed for residential use in applications up to 7,500 square feet with 128 devices or less.
Leviton vrp15 z Installation Instructions and Setup GuideAlarm Grid
The Scene Capable Plug-In Appliance Module is a Z-Wave enabled device that can be used to remotely control electrical loads plugged into it via a Z-Wave wireless network. It allows loads to be switched on or off and can be programmed to respond to scenes. The module plugs into a standard wall receptacle and loads plug into the module. It provides reliable wireless communication through a mesh network topology and is easy to install without new wiring. The document provides instructions on including the module in a Z-Wave network and troubleshooting tips.
Leviton vrp03 z product manual and setup guideAlarm Grid
This document provides installation instructions for a Scene Capable Plug-In Lamp Dimming Module rated for 120VAC, 60Hz. It can control incandescent loads between 300W and 14W. The summary includes instructions to install the module by attaching the lamp to be controlled, attaching the module to a wall receptacle, and including the module in a Z-Wave wireless network using a programmer/remote. It also describes operating and troubleshooting the module.
Leviton vri10 1 lz product manual and setup guideAlarm Grid
The document provides installation instructions for a single pole or 3-way scene capable incandescent dimmer, including warnings to consult an electrician if unsure, only using the dimmer for incandescent or halogen fixtures, and that it is not compatible with standard 3-way switches. It details identifying the wiring configuration and connecting wires according to diagrams for single pole or 3-way installations. The instructions also cover including the dimmer in a Z-Wave network and testing operation before mounting in the wall box.
Leviton vri06 1 lz product manual and setup guideAlarm Grid
This document provides installation instructions for a single pole or 3-way scene capable incandescent dimmer. It contains warnings to only be installed according to electrical codes and by a qualified electrician. It also warns not to use the dimmer to control certain devices like fluorescent lights or motors. The instructions summarize identifying the wiring configuration, preparing the wires, and connecting the wires according to whether it is a single pole, 3-way with coordinating remote, or 3-way with matching remote installation. Diagrams illustrate the various wiring options and connection points on the dimmer and remote.
Leviton vrf01 1 lz product manual and setup guideAlarm Grid
This document provides installation instructions for a Leviton Vizia RF+ single pole or 3-way quiet fan speed control. It includes warnings, an introduction to Z-Wave technology, and step-by-step instructions for wiring the fan speed control in single pole or 3-way applications. The instructions also cover including the device in a Z-Wave network and advanced programming features for preset fan speeds and LED options.
This document provides installation instructions for a single pole or 3-way electronic low voltage dimmer. It includes wiring diagrams and steps for identifying the wiring type and preparing/connecting the wires for either a single pole, 3-way with coordinating remote, or 3-way with matching remote installation. The summary also describes features of the dimmer such as compatibility with other Z-Wave enabled devices and ease of installation without new wiring.
Leviton vrcz4 mr, vrcs4-mr, and vrc52-mr product specificationsAlarm Grid
The document provides product specifications for Leviton's ViziaRF+ combination devices, which allow for wireless control of lighting and home automation. The three devices summarized are: 1) A 4-button zone controller that controls up to four zones of lighting; 2) A 4-button scene controller that controls up to four lighting scenes; and 3) A 2-button scene controller that controls two lighting loads and scenes. All devices operate using Z-Wave wireless technology and allow integration of lighting control into homes.
The document provides product specifications for the ViziaRF+ line of wireless home control system controllers from Leviton Manufacturing Co. It includes:
- Descriptions of 6 controller models for remote control of lighting scenes and zones without wiring
- Details on setup and programming options using Z-Wave wireless technology
- Specifications on operating temperature and humidity ranges
- Diagrams of the controller models and wiring installations
- Information on ordering replacement faceplates and remote control accessories
Leviton vrcz1 installation manual and setup guideAlarm Grid
- The document provides instructions for including a 1-zone controller into a Z-Wave network using a Leviton Z-Wave programmer/remote. It involves placing the controller into programming mode, then selecting "include node" on the programmer/remote while standing close to the controller.
- After inclusion, the programmer/remote will assign a home ID, node ID and name for the controller. The document then provides instructions for updating the controller after all other devices have been included.
- The document outlines features of the 1-zone controller such as providing 3-way or 4-way control of lighting loads without traveler wires and two-way communication with dimming and brightness level LEDs.
The document provides installation instructions for a 1-scene controller. It outlines the steps to include the controller in a Z-Wave network using a programmer/remote, which includes putting the controller into programming mode, including it in the network while close to it, and updating the controller after inclusion. It also describes how to exclude the controller from the network and reset it to factory defaults if needed.
Leviton vp00 r 10z, vp00r-1lz, vp0sr-10z, vp0sr-1lz installation manual and s...Alarm Grid
This document provides installation instructions for Lutron 3-way or multi-location remote control devices. It includes warnings, tool requirements, wiring diagrams and step-by-step instructions for installing coordinating or matching remote devices in various 3-way, 4-way and multi-location circuit configurations. Maximum wire lengths and terminal identification is also provided.
Leviton dimmers, switches and fan speed controllersAlarm Grid
The document provides product specifications for Leviton's ViziaRF+ wireless lighting and home control system. It describes the system's wireless technology that creates a mesh network allowing command and control of lights, scenes and zones. Devices include dimmers, switches and a fan speed control that fit into standard wall boxes and provide local and remote control of various lighting loads. The system reduces energy usage and provides elegant lighting scenes and zones with one-button control.
Fluorescent dimmer for hi lume or eco-10 ballastsAlarm Grid
The document provides information about fluorescent dimmers from Leviton that are designed for use with Hi-lume or Eco-10 ballasts. It explains that when an energy saving lamp is used, the dimmer may not turn the lamp on due to the lamp not meeting the minimum wattage required by the ballast. It recommends ensuring the lamp type and wattage are compatible with the ballast in order for the dimmer to provide full on/off and dimming control.
Controlling z wave door locks with the vrc0 pAlarm Grid
This document provides recommendations for reliably controlling Z-Wave door locks with a VRC0P controller. It discusses challenges with battery-operated secure devices and outlines two key steps to ensure reliable communication: 1) Performing a rediscovery at -6dB or lower power level after inclusion, and 2) Completing RSS232 setup, reverse associations, and updating routes using installer tools. It also recommends incorporating a triggered delay when controlling multiple door locks simultaneously to avoid status updates colliding with control commands.
The document provides information on Leviton's Vizia+ collection of lighting controls and home automation products. It includes dimmers, switches, timers, and accessories that allow lighting and appliances to be controlled wirelessly. The Vizia+ products offer advanced lighting control features at a moderate cost and incorporate Z-Wave technology to enable wireless home automation functionality through scenes and zones. The document lists the various Vizia+ models and their specifications and features.
Understanding of Self - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
You may be stressed about revealing your cancer diagnosis to your child or children.
Children love stories and these often provide parents with a means of broaching tricky subjects and so the ‘The Secret Warrior’ book was especially written for CANSA TLC, by creative writer and social worker, Sally Ann Carter.
Find out more:
https://cansa.org.za/resources-to-help-share-a-parent-or-loved-ones-cancer-diagnosis-with-a-child/
As we navigate through the ebbs and flows of life, it is natural to experience moments of low motivation and dwindling passion for our goals.
However, it is important to remember that this is a common hurdle that can be overcome with the right strategies in place.
In this guide, we will explore ways to rekindle the fire within you and stay motivated towards your aspirations.
Procrastination is a common challenge that many individuals face when it comes to completing tasks and achieving goals. It can hinder productivity and lead to feelings of stress and frustration.
However, with the right strategies and mindset, it is possible to overcome procrastination and increase productivity.
In this article, we will explore the causes of procrastination, how to recognize the signs of procrastination in oneself, and effective strategies for overcoming procrastination and boosting productivity.
Inspire: Igniting the Spark of Human Potentialgauravingole9
Inspire: Igniting the Spark of Human Potential
Inspiration is the force that propels individuals from ordinary to extraordinary. It transforms ideas into innovations, dreams into realities, and individuals into icons. This article delves into the multifaceted nature of inspiration, exploring its sources such as nature, art, personal experiences, and the achievements of others, and its profound impact on personal growth, societal progress, and cultural evolution. Through the lens of historical figures and timeless quotes, we uncover how inspiration fuels creativity, drives societal change, and ignites the spark of human potential.
Honeywell Vista 15p Honeywell Vista 20P Install Guide
1. ADEMCO VISTA SERIES
VISTA-20P / VISTA-20PSIA
VISTA-15P / VISTA-15PSIA
Security Systems
Installation and Operation Guide
K5305-1V9 2/11 Rev. B
2. RECOMMENDATIONS FOR PROPER PROTECTION
The Following Recommendations for the Location of Fire and Burglary Detection
Devices Help Provide Proper Coverage for the Protected Premises.
Recommendations For Smoke And Heat Detectors
With regard to the number and placement of smoke/heat detectors, we subscribe to the
recommendations contained in the National Fire Protection Association's (NFPA) Standard #72 noted
below.
Early warning fire detection is best achieved by the installation of fire detection equipment in all rooms
and areas of the household as follows: For minimum protection a smoke detector should be installed
outside of each separate sleeping area, and on each additional floor of a multi-floor family living unit,
including basements. The installation of smoke detectors in kitchens, attics (finished or unfinished), or
in garages is not normally recommended.
For additional protection the NFPA recommends that you install heat or smoke detectors in the living
room, dining room, bedroom(s), kitchen, hallway(s), attic, furnace room, utility and storage rooms,
basements and attached garages.
In addition, we recommend the following:
• Install a smoke detector inside every bedroom where a smoker sleeps.
• Install a smoke detector inside every bedroom where someone sleeps with the door partly or
completely closed. Smoke could be blocked by the closed door. Also, an alarm in the hallway outside
may not wake up the sleeper if the door is closed.
• Install a smoke detector inside bedrooms
where electrical appliances (such as
KITCHEN portable heaters, air conditioners or
BEDROOM BEDROOM TV ROOM KITCHEN DINING BDRM
DINING humidifiers) are used.
LIVING ROOM
BDRM • Install a smoke detector at both ends of a
BEDROOM
hallway if the hallway is more than 40
LIVING ROOM BEDROOM
feet (12 meters) long.
• Install smoke detectors in any room where
Smoke Detectors for Minimum Protection an alarm control is located, or in any room
Smoke Detectors for Additional Protection where alarm control connections to an AC
BEDROOM Heat-Activated Detectors source or phone lines are made. If
detectors are not so located, a fire within
TO
BEDROOM BR BEDROOM the room could prevent the control from
KTCHN
reporting a fire or an intrusion.
GARAGE
LVNG RM . CLOSED
DOOR THIS CONTROL COMPLIES WITH NFPA
BASEMENT REQUIREMENTS FOR TEMPORAL PULSE
floor_plan-001-V1 SOUNDING OF FIRE NOTIFICATION
APPLIANCES.
Recommendations For Proper Intrusion Protection
For proper intrusion coverage, sensors should be located at every possible point of entry to a home or
commercial premises. This would include any skylights that may be present, and the upper windows
in a multi-level building.
In addition, we recommend that radio backup be used in a security system so that alarm signals can
still be sent to the alarm monitoring station in the event that the telephone lines are out of order
(alarm signals are normally sent over the phone lines, if connected to an alarm monitoring station).
ii
3. Table Of Contents
Features and Installation Highlights............................................................................................................1-1
Capabilities and Functions................................................................................................................................................1-1
Compatible Devices ...........................................................................................................................................................1-2
Important Installation Highlights (Installer Please Read) .............................................................................................1-2
Mounting and Wiring the Control .................................................................................................................2-1
Installing the Control Cabinet and PC Board ..................................................................................................................2-1
Cabinet and Lock .........................................................................................................................................................2-1
Mounting the PC Board Alone (no RF Receiver) ........................................................................................................2-1
Mounting Board with RF Receiver..............................................................................................................................2-1
Auxiliary Device Current Draw Worksheet................................................................................................................2-2
AC Power, Battery, and Ground Connections ..................................................................................................................2-3
1321 Transformer.........................................................................................................................................................2-3
1361X10 Transformer ..................................................................................................................................................2-3
Battery Connections.....................................................................................................................................................2-3
Battery Saver Feature .................................................................................................................................................2-3
Earth Ground ...............................................................................................................................................................2-3
Sounder (Bell) Connections ...............................................................................................................................................2-4
Basic Connections ........................................................................................................................................................2-4
Supervised output ........................................................................................................................................................2-4
Connecting the Keypads and Other Addressable Devices ...............................................................................................2-4
Connections ..................................................................................................................................................................2-4
Supplementary Power (optional).................................................................................................................................2-4
Keypad Notes ...............................................................................................................................................................2-5
Communication Device ................................................................................................................................................2-5
(Long Range Radio) Connections.................................................................................................................................2-5
Table of Device Addresses .................................................................................................................................................2-5
Hardwire Zones and Zone Expansion ...............................................................................................................................2-6
Hardwire Zones ............................................................................................................................................................2-6
Double-Balanced Zones................................................................................................................................................2-6
Zone Doubling ..............................................................................................................................................................2-6
Smoke Detectors...........................................................................................................................................................2-6
Smoke Detector Notes..................................................................................................................................................2-7
4219/4229 Expansion Zones ........................................................................................................................................2-7
Installing the RF Receiver and Wireless Transmitter Zones ..........................................................................................2-8
Compatible Receivers...................................................................................................................................................2-8
Receiver Connections ...................................................................................................................................................2-8
RF Receiver Notes........................................................................................................................................................2-8
Installing a 5800TM Module .......................................................................................................................................2-9
Installing the Transmitters .........................................................................................................................................2-9
Transmitter Battery Life .............................................................................................................................................2-9
Installing a Keyswitch.....................................................................................................................................................2-10
Keyswitch Connections ..............................................................................................................................................2-10
Keyswitch Notes.........................................................................................................................................................2-10
Connecting Relay Modules, Powerline Carrier Devices and Output Triggers..............................................................2-11
4204/4229 Relay Modules ..........................................................................................................................................2-11
Powerline Carrier Devices .........................................................................................................................................2-11
On-Board Triggers .....................................................................................................................................................2-12
Phone Line/Phone Module, and Audio Alarm Verification (AAV) Connections............................................................2-13
Phone Line..................................................................................................................................................................2-13
4286 Phone Module....................................................................................................................................................2-13
Phone Module Problems ............................................................................................................................................2-13
Audio Alarm Verification Connections......................................................................................................................2-14
Audio Alarm Verification Connections......................................................................................................................2-15
iii
4. Table Of Contents
System Communication and Operation .......................................................................................................3-1
Panel Communication with Central Station ....................................................................................................................3-1
Report Code Formats.........................................................................................................................................................3-1
Ademco Contact ID® .........................................................................................................................................................3-3
Uploading/Downloading via the Internet .........................................................................................................................3-4
System Security Codes ......................................................................................................................................................3-5
Panic Keys..........................................................................................................................................................................3-7
Setting the Real-Time Clock .............................................................................................................................................3-7
Various System Trouble Displays .....................................................................................................................................3-8
Testing the System.............................................................................................................................................4-1
About Test Procedures.......................................................................................................................................................4-1
System Test........................................................................................................................................................................4-1
Checking Transmitter Enrollment (Sniffer Mode)...........................................................................................................4-1
Go/No Go Test Mode ..........................................................................................................................................................4-2
Dialer Communication Test and Periodic Test Reports...................................................................................................4-2
Automatic Standby Battery Tests.....................................................................................................................................4-2
Specifications & Accessories...........................................................................................................................5-1
Security Control.................................................................................................................................................................5-1
Compatible Devices ...........................................................................................................................................................5-1
Regulatory Agency Statements ......................................................................................................................6-1
Limitations and Warranty ...............................................................................................................................7-3
iv
5. S E C T I O N 1
Features and Installation Highlights
This manual applies to the following Honeywell security systems:
ADEMCO VISTA-20P/ADEMCO VISTA-20PSIA/ADEMCO VISTA-20PCN (collectively referred to as
VISTA-20P series), ADEMCO VISTA-15P/ADEMCO VISTA-15PSIA/ADEMCO VISTA-15PCN
(collectively referred to as VISTA-15P series)
Features and procedures apply to all, except where differences are noted.
SIA Installations: The VISTA-20PSIA and VISTA-15PSIA are certified SIA-compliant controls that
meet SIA specifications for False Alarm Reduction. The other controls described in this manual are
not certified as SIA compliant, but can be programmed for False Alarm Reduction. To program for
False Alarm Reduction, follow the SIA Guidelines noted in the applicable programming fields.
Capabilities and Functions
Feature/Function VISTA-20P Series VISTA-15P Series
Partitions • 2 partitions, can protect two independent VISTA-15P is not a partitioned system.
areas
• Common zone option allows either
partition to arm, while leaving a common
area (ex. lobby or foyer) disarmed for
access into the other partition.
Zones Up to 48 protection zones plus 16 keyfob Up to 32 zones plus 8 keyfob zones (zones
zones (zones 49-64) for total of 64 zones: 49-56) for total of 40 zones:
• 8 basic hardwired zones (zones 1-8) with • 6 basic hardwired zones (zone 1-6)
optional zone-doubling feature • Up to 16 additional wired zones (zones 9-
• Up to 40 additional wired zones (zones 9- 24) using up to 2 4219/4229 modules
48) using up to 5 4219/4229 modules • Up to 26 wireless transmitter zones
• Up to 40 wireless transmitter zones (5800 (5800 series; zones 9-34)
series; zones 9-48) • Up to 2 configurable zone types
• Up to 4 configurable zone types
Security Codes Up to 48 Security Codes, with separate Up to 32 Security Codes, with separate
authority levels and partition access authority levels
One-button arming Dedicated keys can arm the system. Dedicated keys can arm the system.
Schedules Up to 32; can control devices and/or auto- Up to 8; can control devices and/or auto-
arm/disarm arm/disarm
Keypad macros Up to 4; activated by wired keypads Up to 2; activated by wired keypads
Paging Up to 4 pagers; certain system conditions Up to 2 pagers; certain system conditions
can report to pagers; can use a dedicated can report to pagers; can use a dedicated
key on keypads to send a signal to a pager key on keypads to send a signal to a pager
Event Logging 100 events; display via Compass Downloader 50 events; display via Compass Downloader
software or installer/master code at Keypad software or installer/master code at Keypad
Zone descriptors Can assign for all zones (for alpha display keypads and/or 4286 Phone Module).
Bell supervision Optional, detects external sounder wiring short (when in alarm) or open (when bell is off);
causes a trouble condition, keypad display, and sends a report to the central monitoring
station, if enabled (field ∗91, option 1).
RF jam detection Optional, for wireless systems detects a condition that may impede proper RF reception
(i.e., jamming or other RF interference); causes keypad display, and sends a report to the
central monitoring station (if trouble reporting is enabled).
Telephone Line Built-in option can monitor the telephone line voltage and can cause a local display, or a
Monitoring display and trouble/alarm sound.
Downloading via • Via Standard Phone Line: Use an IBM compatible computer, Compass downloading
Phone Line or software, and a compatible HAYES or CIA modem specified by Honeywell.
Internet • Via Internet: supports Upload/Download via the Internet/Intranet when used with an
appropriate communications device (ex. 7845i-GSM) and Compass downloading software.
This allows site maintenance independent of central station monitoring, and modification
to sites globally via the Internet.
UL NOTE: Uploading/Downloading via the Internet has not been evaluated by UL.
1-1
6. Installation and Setup Guide
Compatible Devices
Device VISTA-20P VISTA-15P Notes
Addressable Keypads 8 8 6150 Fixed-Word Keypad, 6160 Alpha Keypad, 6150V
Fixed-Word Display Voice Keypad, 6160V Alpha
Display Voice Keypad, 6150RF Keypad/Transceiver
Touch Screen (AUI) 4 2 Touch Screen (AUI) devices are in addition to the 8
Devices addressable keypads. E.g., Symphony, 6270
4219, 4229 Zone Up to 5 for Up to 2 for Zone numbers are predefined according to the device
Expander Modules up to 40 up to 16 addresses used. See Expander Module Addresses table
exp. zones exp. zones in Wiring section and set addresses accordingly.
5800 Series Wireless Up to 40 RF Up to 26 RF Uses 5881/5883 Series Receivers/Transceivers.
zones zones
Output relays and/or Up to 16 Up to 8 Use any combination of 4204, 4229 and or Powerline
Powerline Carrier Carrier Devices.
Devices (X-10 type) Map output devices via *79 Menu mode.
On-Board Triggers 2 2 Can be used to reset 4-wire smoke detectors.
Output functions Up to 48 Up to 24 Program output functions via *80 Menu mode.
4286 Phone Module Partition 1 yes Provides access to the system via on premises or off-
only premises phones for arming, disarming, etc., plus
control of relay outputs and Powerline Carrier devices.
Audio Alarm Using AAV Using AAV Use Honeywell AVS or Eagle Model 1250 in
Verification module module conjunction with an output trigger to permit voice
dialog between an operator at the central station and
a person at the premises. The AVS system can be used
to provide AAV via phone line or AlarmNet IP/GSM
(using a GSMV module).
Alarm output 12VDC, 2 12VDC, 2 Can drive the compatible sounders; steady output for
AMP output AMP output burglary/panic, or temporal pulse (3 pulses – pause –
3 pulses – pause – 3 pulses. . .) for fire. Uses current
limiting circuitry for protection.
Auxiliary Power Output See note. See note 12VDC, 600 mA maximum; uses circuit protection.
Backup Battery See note. See note. Rechargeable (sealed lead-acid type) 12VDC, 4AH
minimum.
Communication Device See note. See note. Primary telephone number messages can be reported
(Long Range Radio) via ECP connection to various communication devices
(check compatibility/availability of specific models)
AC Power Supply See note. See note. Plug-in 120VAC transformer, 1321 (1321CN in
Canada) or, if using Powerline Carrier devices,
1361X10 Transformer Module
NOTE: All devices and accessories used in a Canadian installation must be Listed for use in Canada.
Important Installation Highlights (Installer Please Read)
• This system uses addressable keypads and Zone Expander Modules (see Table of Addresses in
Section 2. Mounting and Wiring – Connecting the Keypads and Other Addressable
Devices).
• Keypads must be set for addresses 16-23 (first keypad is address 16, which is different from
previous controls) and programmed in data fields *190-*196.
• Zone Expander Modules must be set for specific addresses (07-11), based on the zone numbers used.
• 4204 Relay Modules must be set for specific addresses (12-15).
• This control will not power-up unless AC power is connected (will not power-up on battery alone).
However, once the system is powered up, it will operate on battery power in the event of AC loss.
• Relays have two programming menu modes: Use *79 Menu mode to map module addresses and
device (output) numbers. Use *80 Menu mode to define the output functions.
• This system supports programmable function keys. Use *57 Menu mode to define the function
keys.
1-2
7. S E C T I O N 2
Mounting and Wiring the Control
Installing the Control Cabinet and PC Board
Cabinet and Lock 1. Remove the cabinet door. Remove
the cabinet knockouts needed for
wiring entry.
2. Mount the control cabinet to a
sturdy wall in a clean, dry area,
which is not readily accessible to
the general public, using fasteners SECURE
WITH
or anchors (not supplied) with the SCREWS
(2)
four cabinet mounting holes.
3. When installation and wiring is
completed, install the cabinet door cab_6-V0
and secure by using 2 screws
(supplied) through the door's edge. PUSH
ON LOCK
CHECK UNTIL IT
OPTIONAL KEY LOCK: If desired,
SNAP IS SEATED
POSITION TAB SECURELY
a key lock can be installed (K4445, LOCKED
PUSH
not supplied). Remove the lock
ADEMCO
ADEMCO
knockout from the door. Insert the
key into the lock. Position the lock in SNAP
cab_lock_snap-001-V0
TAB
the hole, making certain that the
UNLOCKED
latch will make contact with the latch CABINET DOOR
BOTTOM STEP 1 STEP 2
bracket when the door is closed. When
correctly positioned, push the lock Figure 1. Installing the Door and Cabinet Lock
until the snap tabs hold it securely.
Mounting the PC Board Before installing the cabinet's contents, remove the metal cabinet knockouts required for
Alone (no RF Receiver) wiring entry. Do not remove the knockouts after the circuit board has been installed.
1. Hang two short mounting clips (provided) on the raised cabinet tabs (see Detail B).
2. a. Insert the top of the circuit board into the slots at the top of the cabinet. Make sure
that the board rests on the correct row (see Detail A).
b. Swing the base of the board into the mounting clips and secure the board to the
cabinet with the accompanying screws (see Detail B).
CIRCUIT
BOARD CABINET
CIRCUIT
BOARD
+ +
CABINET DETAIL B
SIDE VIEW
DETAIL A OF MOUNTING
SIDE VIEW CLIPS
OF BOARD
SUPPORTING
SLOTS
MOUNTING-001-V0
Figure 2. Mounting the PC Board
Mounting Board with RF • Do not mount the cabinet on or near metal objects. This will decrease RF range and/or
Receiver block RF transmissions from wireless transmitters.
• Do not locate the cabinet in an area of high RF interference (revealed by frequent or
prolonged lighting of the LED in the receiver (random flicker is OK)
1. a. Remove the receiver board from its case, then insert the top of the board into the
slots at the top of the cabinet, as shown in Detail A in Figure 3 on the next page.
Make sure that the board rests on the correct row of tabs.
b. Swing the base of the board into the mounting clips and secure it to the cabinet
with the accompanying screws.
c. Insert the top of the control's board into the slot in the clips and position two clips
at the lower edge of the board.
d. Swing this board into place and secure it with two additional screws.
2-1
8. Installation and Setup Guide
Mounting Board with RF 2. Insert grounding lugs (supplied with the receiver) through the top of the cabinet into
Receiver (continued) the left-hand terminals of the antenna blocks (at the upper edge of the receiver board)
and secure them to the cabinet top with the screws provided (see Detail B).
3. Insert the receiver's antennas through the top of the cabinet, into the blocks' right-
hand terminals, and tighten the screws.
CABINET A B
CABINET
BOARD
RECEIVER CIRCUIT BOARD SUPPORTING
SLOTS
+ +
CIRCUIT
BOARD
MOUNTING
CLIP
CONTROL
CIRCUIT
BOARD
DETAIL A
MOUNTING SIDE VIEW
CLIP OF BOARD -
SUPPORTING SLOTS
INSTALLATION WITH RECEIVER CIRCUIT BOARD
ANTENNA
(2)
SCREW
(2)
GROUNDING
LUG
(2)
WHITE BLACK RED
MOUNTING MOUNTING MOUNTING
CLIP CLIP CLIP
NOTE
A COMBINATION OF THESE MOUNTING CLIPS HAS BEEN ANTENNA
INCLUDED IN YOUR INSTALLATION KIT. MOUNT
(2 PLACES)
USE THE APPROPRIATE CLIPS FOR MOUNTING.
IF NO RF RECEIVER IS USED, MOUNT THE PC BOARD USING DETAIL B
EITHER THE WHITE OR BLACK CLIPS, WHICHEVER ARE ANTENNA AND GROUNDING
INCLUDED IN THE CONTROL PANEL'S HARDWARE KIT. LUG INSTALLATION
pc_mount-001-V1
Figure 3. Mounting the PC Board and RF Receiver
Auxiliary Device Current Draw Worksheet
DEVICE CURRENT No. UNITS TOTAL CURRENT
6150 Fixed-Word Keypad 40mA/70mA**
6160 Alpha Keypad 40mA/150mA**
6150V Fixed-Word Display Voice Keypad 60mA/160mA**
6160V Alpha Display Voice Keypad 60mA/190mA**
8132/8142 Series AUI (Symphony) 150mA/400mA**
6270 Touch Screen Keypad 180mA/280mA**
5881/5882 RF Receiver 60mA
5883 Transceiver 80mA
4219 Zone Expander 30mA
4204 Relay Unit 15/180mA‡
4229 Zone Expander/Relay Unit 30/100mA‡
4286 Phone Module 300mA
(Current available from Aux. terminals = 600 mA max.)† TOTAL =
*If using hardwire devices such as PIRs, refer to the specifications for that particular unit's current draw.
** Values are for standby/alarm; alarm for keypads means armed with backlighting on and sounder on
†In UL installations, maximum current draw from the Auxiliary Output and the Alarm Output combined must not exceed 600 mA (500 mA max from Aux. Output).
‡Values are for relays OFF/relays ON.
CALIFORNIA STATE FIRE MARSHALL (CSFM) AND UL RESIDENTIAL FIRE
24-HOUR BATTERY BACKUP REQUIREMENTS
The California State Fire Marshal and UL have regulations which require that all residential fire alarm control panels must be
provided with a backup battery which has sufficient capacity to operate the panel and its attached peripheral devices for 24 hours in the
intended standby condition, followed by at least 4 minutes in the intended fire alarm signaling condition. This control panel can meet
these requirements without using a supplementary power supply, provided that the panel’s auxiliary power and bell output currents
are limited as indicated below.
OUTPUT LIMITATIONS AND CORRESPONDING REQUIRED BATTERIES
OUTPUT CURRENT LIMITATIONS BATTERY INFORMATION
Output Current Total Maximum Auxiliary Current Battery Capacity Recommended Battery
To Use (Amp/Hrs) (Yuasa Model No.)
600mA maximum total of 45mA 4AH NP4-12 (or ADEMCO 467)
auxiliary power plus bell 160mA 7AH NP7-12
output currents 200mA 8AH NP4-12 (two) ‡
425mA 14AH NP7-12 (two) ‡
500mA 17.2AH NPG18-12
‡ NOTE: Use two batteries, connected in parallel. Obtain an Ademco Battery Harness Kit SA5140-1. (Both batteries will fit inside the cabinet.)
2-2
9. Mounting and Wiring the Control
AC Power, Battery, and Ground Connections
1321 Transformer Connect the 1321 Transformer (1321CN in Wire Run Chart
Canada) to terminals 1 and 2 on the Distance from control Wire Size
control board. See Wire Run Chart for Up to 50 feet # 20
wire size to use. 50–100 feet # 18
• Use caution when wiring the
100-250 feet # 16
transformer to the control to guard
1
against blowing the transformer fuse
2 (the fuse is non-replaceable).
1321X10-001-V0
TO
TERMINALS
1 AND 2
• Wiring to the AC transformer must not exceed 250 feet using 16 gauge wire. The
voltage reading between terminals 1 and 2 of the control must not fall below 16.5VAC
or an “AC LOSS” message will be displayed.
• Do not plug the transformer into the AC outlet until all wiring connections to the
control are complete. As a safety precaution, always power down the control when
making such connections.
1361X10 Transformer 1. Splice one end of a 3-conductor cable 8-PIN TRIGGER CONNECTOR
1 3 4 5 6 7 8
(required if using
KEY
to the wire ends of the SA4120XM-1
Powerline Carrier devices) Cable.
2. Connect the SA4120XM-1 cable plug
(YELLOW)
OUTPUT 18 (GREEN)
(ORANGE)
(PURPLE)
(BLACK)
1361X10 TRANSFORMER
(BLUE)
(RED)
to the 8-pin connector on the control
(see the Summary of Connections AC AC SYNC COM DATA
OUTPUT 17
1 2 3 4 5
+12 AUX.
diagram for location of the 8-pin
GND (-)
AC
SYNC
AC
COM
DATA
Sy
Outnc
TO
connector).
put Sign
Com al
mon X1
8-PIN
Dat0
a
CONNECTOR SA412OXM
3. Connect the other end of the CABLE
1 3-conductor cable to the 1361X10 1 2
2
Transformer, as shown in Figure 4. CONTROL
BOARD
TERMS.
Canadian Installations: See
1361X10-001-V0
TO
TERMINALS Powerline Carrier Device section for
1 AND 2
connections to the PSC04 X-10 Interface Figure 4. 1361X10 Transformer Connections
and trigger pins.
Battery Connections 1. Place the 12-volt backup battery in the cabinet.
2. After all connections to the control are completed and AC power has been applied,
connect the red and black flying leads on the control board to the battery. Do not
BLACK
attach these leads to the battery terminals until all connections are completed.
RED
UL For UL installations and Residential fire installations, refer to the chart on page 2-2
at left for the correct battery size required to meet the mandatory standby time.
batt_conn-001-V0
CONNECT
FLYING LEADS
AFTER AC POWER
IS APPLIED
Battery Saver Feature The battery will disconnect from the system after its voltage decreases below 9VDC.
This assists the control panel in recharging the battery when AC is restored.
IMPORTANT: The panel will not power up initially on battery power only. You must
plug the transformer in first, and then connect the battery.
Earth Ground • This product has been designed and laboratory-tested to ensure its resistance to
damage from generally expected levels of lightning and electrical discharge, and does
not normally require an earth ground.
CONNECT • If an earth ground is desired for additional protection in areas of severe electrical
R D
OL
B OA PROPER
EARTH
activity, terminal 25 on the control board, or the cabinet, may be used as the ground
NTR GROUND
connection point. The following are examples of good earth grounds available at most
CO IF
25
DESIRED installations.
Metal Cold Water Pipe: Use a non-corrosive metal strap (copper is recommended) firmly
secured to the pipe to which the ground lead is electrically connected and secured.
earth_gnd-001-V0
AC Power Outlet Ground: Available from 3-prong, 120VAC power outlets only. To test
the integrity of the ground terminal, use a 3-wire circuit tester with neon lamp
indicators, such as the UL Listed Ideal Model 61-035, or equivalent, available at most
electrical supply stores.
2-3
10. Installation and Setup Guide
Sounder (Bell) Connections
Basic Connections Make sounder connections to alarm output terminals 3 (+) and 4 (–).
• The 12VDC sounder output activates when an alarm occurs.
3
4 • Total current drawn from this output cannot exceed 2 amps (going beyond 2 amps will
overload the power supply, or may cause the electronic circuit protecting the sounder
output to trip).
• You must install a battery, since the battery supplies this current.
ALARM OUTPUT Supervised output
10.5 - 13.5 VDC
2A MAX. spkr_conn-001-V0 1. Connect the supplied 820 ohm Bell Supervision EOL resistor across the terminals of the
last sounder. See Figure 5.
NOTE: The value of the Bell Supervision EOL Resistor is 820 ohms. This resistor is
required ONLY if Bell Supervision is enabled.
2. Set field ∗91 Option Selection for Bell Supervision (option 1).
This control complies with NFPA requirements for temporal pulse sounding of fire notification
appliances. Temporal pulse sounding for a fire alarm consists of: 3 pulses – pause – 3 pulses –
pause – 3 pulses–etc.
UL
TERMINALS ON EXTERNAL ALARM
CONTROL BOARD SOUNDER
• Use only UL Listed sounding devices for
UL installations.
4
• Bell supervision is required for fire alarm 820
ALARM
installations. OUTPUT
OBSERVE
POLARITY
OHM
EOL
• The total current drawn from the alarm TERMINALS + RESISTOR
output and the auxiliary power output, 3
combined, cannot exceed 600mA. In
addition, the sounding device must be a
UL Listed audible signal appliance rated 2
IF BELL SUPERVISION IS ENABLED
to operate in a 10.2-13.8VDC voltage ( 91 ENABLED)
CONNECT AN 820 OHM RESISTOR ACROSS
range, and must be mounted indoors. THE EXTERNAL SOUNDER AS SHOWN BY
sounder-001-V2
THE DOTTED LINE.
DO NOT CONNECT THE RESISTOR DIRECTLY
TO THE ALARM OUTPUT TERMINALS!
Figure 5. Sounder Wiring (Supervised)
Connecting the Keypads and Other Addressable Devices
Connections Connect keypads and other addressable devices (4204, 4219, 4229, 4286, 5881, GSMV,
etc.) to the control’s keypad terminals as shown on the Summary of Connections
4_
5+
6 IN
diagram. The system supports up to 8 keypads, which can be assigned to partitions in
7 OUT
any combination (see program fields *190-*196).
BLACK
RED
GREEN
Use the Table of Device Addresses to determine the appropriate address for each device.
YELLOW
AR
MED
RE
AD
Y
Determine wire size using the Wire Run Chart on the following page. For single 4-wire
runs, determine the current drawn by all units, then refer to the Wiring Run chart to
determine the maximum length that can be safely used for each wire size.
conn-001-V0
Supplementary Power Use supplementary power if the SUPPLEMENTARY
(optional) control’s aux. power load for all POWER SUPPLY
CONTROL TERMINAL STRIP
+ –
devices exceeds 600mA (suggested AUX. AUX. DATA DATA
– + IN OUT
UL Use a UL Listed, power supply: AD12612). Connect 4 5 6 7
battery-backed supply for as shown in Figure 6. Be sure to
UL installations. The battery connect the negative (–) terminal
supplies power to these on the power supply unit to
keypads in case of AC
terminal 4 (AUX –) on the control.
power loss.
TO KEYPAD GRN WIRE
TO KEYPAD RED WIRE
TO KEYPAD GRN WIRE
TO KEYPAD RED WIRE
IMPORTANT:
TO KEYPAD BLK WIRE
TO KEYPAD YEL WIRE
TO KEYPAD BLK WIRE
TO KEYPAD YEL WIRE
The battery-backed power IMPORTANT: Keypads MAKE THESE
supply should have enough
powered from supplies that do CONNECTIONS
power to supply the DIRECTLY TO
keypads with the UL not have a backup battery will SCREW
required minimum standby not function if AC power is lost.
supp_pwr_supply-V0
TERMINALS AS
power time. SHOWN.
Make sure to power at least one
keypad in each partition from
the control’s auxiliary power
output. Figure 6. Using a Supplementary Power Supply
2-4
11. Mounting and Wiring the Control
Keypad Notes Set device addresses. Refer to the instructions included with the devices and set each
address according to the Table of Device Addresses.
See data fields *190-*196 in the Programming Guide for details on enabling keypad
AR
ME
D
addresses, assigning keypad partitions, and selecting keypad sounding options.
RE
AD
IMPORTANT: Each keypad must be assigned a unique, predefined address, from 16 to
Y
1 OF
F
2
4 AW
AY
23. The first keypad is address 16 (default = partition 1, all sounds enabled).
MA
X
3
5 STA
7 INST
TES
T
Y
ANT
6
8 CO
BYP
ASS
DE
REA
DY
9
0 CH
IME
#
TOUCH SCREEN KEYPAD (AUI) NOTES:
• Use of AUI devices (e.g., 6270, Symphony) is independent from standard keypads and
does not affect the number of standard keypads the system can support.
• AUI devices must be set for address 1, 2, 5**, or 6** depending on which unit is
enabled in field *189. ** VISTA-20P series
• To ensure proper AUI device operation, use AUI devices with the following rev levels:
6270 series use version 1.0.9 or higher; 8132/8142 (Symphony) series use version
1.1.175 or higher.
Communication Device Connect the data in/data out terminals and voltage input terminals of the
(Long Range Radio) communication device to the control's keypad connection points.
Connections Set the device’s address to “03” following the instructions provided with the device.
• Use a compatible communication device (e.g., 7845GSM, 7845i-GSM).
Wire Run Chart For Devices* Drawing Aux Power From The Control (12V+ & 12V–)
Wire TOTAL CURRENT DRAWN BY ALL DEVICES CONNECTED TO A SINGLE WIRE RUN
Size 50 mA or less 100 mA 300 mA 500 mA 600 mA
#22 900 ft (274m) 450 ft (137m) 150 ft (46m) 90 ft (27m) 75 ft (23m)
#20 1400 ft (427m) 700 ft (213m) 240 ft (73m) 140 ft (43m) 120 ft (37m)
#18 1500 ft (457m) 1100 ft (335m) 350 ft (107m) 220 ft (67m) 170 ft (52m)
#16 1500 ft (457m) 1500 ft (457m) 550 ft (168m) 350 ft (107m) 270 ft (82m)
* Includes Keypads, RF Receivers, Zone Expander/Relay Units, 4286 Phone Module, and Communication Device.
Maximum wire lengths for any device that is homerun to the control can also be determined from the Wiring Run Chart, based on the
current draw of that device alone.
The length of all wire runs for both partitions combined must not exceed 1500 feet (457m) when unshielded quad conductor cable is used
(750 feet if shielded cable is used). This restriction is due to the capacitive effect on the data lines when quad cable is used.
Table of Device Addresses
This Device Uses Address Reports as†† Enabled By…
RF Receiver 00 100 *56 zone programming: input device type entry
AUI 1 01 automatic if AUI enable field *189 enabled for AUI 1
AUI 2 02 automatic if AUI enable field *189 enabled for AUI 2
AUI 3 (VISTA-20P series) 05 automatic if AUI enable field *189 enabled for AUI 3
AUI 4 (VISTA-20P series) 06 automatic if AUI enable field *189 enabled for AUI 4
Communication Device (LRR) 03 103 automatic if communication device is enabled in field *29
4286 Voice Module 04 104 automatic if phone module access code field *28 enabled
Zone Expanders (4219/4229): *56 zone programming: input device type, entry 2, then:
module 1 (for zones 09 - 16) 07** 107 automatic if zone no. 9-16 set as AW type or relay assigned
module 2 (for zones 17 - 24) 08 108 automatic if zone no. 17-24 set as AW type or relay assigned
module 3 (for zones 25 - 32) 09† 109 automatic if zone no. 25-32 set as AW type or relay assigned
module 4 zones 33 - 40 10† 110 automatic if zone no. 33-40 set as AW type or relay assigned
module 5 zones 41 - 48 11† 111 automatic if zone no. 41-48 set as AW type or relay assigned
Relay Modules (4204): *79 output device programming: device address prompt:
module 1 12 112 entered at device address prompt
module 2 13 113 entered at device address prompt
module 3 14† 114 entered at device address prompt
module 4 15† 115 entered at device address prompt
Keypads: data field programming as listed below:
keypad 1 16 n/a always enabled for partition 1, all sounds enabled.
keypad 2 17 n/a data field *190
keypad 3 18 n/a data field *191
keypad 4 19 n/a data field *192
keypad 5 20 n/a data field *193
keypad 6 21 n/a data field *194
keypad 7 22 n/a data field *195
keypad 8 23 n/a data field *196
RIS Communication 25 n/a automatic
5800TM Module 28 n/a automatic
** address 07 not available if zone-doubling enabled
† 4219/4229 addresses 9-11 and 4204 addresses 14-15 apply to the VISTA-20P.
†† Addressable devices are identified by “1” plus the device address when reporting. Enter report code for zone 91 to enable addressable
device reporting (default = reports enabled). See field *199 for addressable device 3-digit/2-digit identification keypad display options.
2-5
12. Installation and Setup Guide
Hardwire Zones and Zone Expansion
Hardwire Zones Normally Open Zones/ N.O. EOLR Zones
1. Connect open circuit devices in parallel across the loop; for EOLR zones, connect the
EOLR across the loop wires at the last device.
2. Enable normally open/EOLR zones using Zone Programming mode, “Hardwire Type”
prompt.
Normally Closed Zones/ N.C. EOLR Zones
1. Connect closed circuit devices in series in the high (+) side of the loop; for EOLR
zones, connect the EOLR in series following the last device.
HI
LO 2. Enable normally closed/EOLR zones using Zone Programming mode, “Hardwire
Type” prompt.
zones-001-V0
End of Line Resistor (EOLR) Notes
• If the EOLR is not at the end of the loop, the zone is not properly supervised and the
system may not respond to an “open” on the zone.
• Zone 1 is intended for EOLR only.
UL For UL commercial burglar alarm installations, use EOLR zones.
Double-Balanced Zones Connect as shown below (resistor provided
(V20P only) for one device). 12 13 14
IMPORTANT: Double-balanced zones TAMPER
2k 2k
provide zone tamper protection, and should
CONTACTS
be used as burglary zones only.
Do not use double-balanced zones as fire
TAMPER
2k
zones. 2k CONTACTS
zone-002-V0
2k 2k
ZONE 3 ZONE 4
Fig. 7. Typical Double Balanced Zones
Zone Doubling This feature provides two hardwired
(V20P only) normally closed zones for each standard 10 11
hardwired zone connected to the control’s
ZONE 2
terminals (but does not increase the total
3k
number of zones supported by the control). If
enabled (Zone Programming mode, ZONE 10
zone-004-V0
“Hardwire Type” prompt, option “3”), 6.2k
hardwire zones are automatically paired as Fig. 8. Typical Zone Doubling Wiring
shown in the table. Connect as shown
Zone Doubling Table
(resistors not supplied; use 3k and 6.2k 5%, Zone Paired with zone
1/4W or bigger resistors). 2 10
• Do not use zone doubling for fire 3 11
zones. 4 12
5 13
NOTE: A short across the EOL (i.e., at 6 14
terminal) on either zone of a zone-doubled 7 15
pair or on a double-balanced zone causes a 8 16
tamper condition (displayed as CHECK plus NOTE: Zone numbers used for zone doubling
cannot be used for anything else (ex. cannot
zone numbers). be used for 4219 zones)
Smoke Detectors 1. Connect up to 16 (10, if “clean me” option used) 2-wire smoke detectors across zone 1
terminals 8 (+) and 9 (-) as shown in the Summary of Connections diagram at the
TO ZONE 1 back this manual. Observe proper polarity when connecting the detectors.
TERMINALS
2. Connect an EOL resistor across the loop wires at the last detector.
3. Connect 4-wire smoke detectors (number of detectors depend on detector current
draw) to any zone from 2-8 as shown in Figures 9a and 9b (on next page).
2-WIRE
SMOKE
8
9
Power Reset: This control does not automatically reset power to 4-wire smoke
DETECTOR
detector zones, so you must use a relay (e.g., 4204, 4229), or on-board trigger to reset
5806-001-V0
HI
LO
ZONE 1 power (also required for fire verification). Do this by programming the designated
relay/trigger as zone type 54 (fire zone reset); see On-Board Trigger section for
other information.
NOTE: Maximum current on trigger 17 is 100mA.
2-6