Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2K views86 pages

Hikvision AX Hybrid Security Control Panel User Manual

Uploaded by

dkalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views86 pages

Hikvision AX Hybrid Security Control Panel User Manual

Uploaded by

dkalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Hybrid Security Control Panel

User Manual
Hybrid Security Control Panel User Manual

Legal Information

User Manual
©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision
Digital Technology Co., Ltd. ("Hikvision") reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, partially or wholly, by any means, without the
prior written permission of Hikvision.
Please use this user manual under the guidance of professionals.
Trademarks
and other Hikvision marks are the property of Hikvision and are
registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates.
Other trademarks mentioned in this manual are the properties of their respective owners. No right
of license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL.
HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE
USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION
CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE
WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY
AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL
OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER
ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL
PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS
THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED
WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.

i
Hybrid Security Control Panel User Manual

Symbol Conventions
The symbols that may be found in this document are defined as follows.

Symbol Description
Indicates a hazardous situation which, if not avoided, will or could
Danger result in death or serious injury.

Indicates a potentially hazardous situation which, if not avoided, could


Caution result in equipment damage, data loss, performance degradation, or
unexpected results.
Provides additional information to emphasize or supplement
Note
important points of the main text.

ii
Hybrid Security Control Panel User Manual

Contents
Chapter 1 System Description ..................................................................................................... 1
Chapter 2 Specifications ............................................................................................................. 2
Chapter 3 Activation ................................................................................................................... 5
3.1 Activate Device via Web Browser .......................................................................................... 5
3.2 Activate Device via iVMS-4200 .............................................................................................. 5
3.3 Activate via SADP ................................................................................................................... 6
Chapter 4 Configuration ............................................................................................................. 8
4.1 Use the Client Software ......................................................................................................... 8
4.2 Use the Web Client ................................................................................................................ 8
4.2.1 Communication Settings ............................................................................................... 9
4.2.2 Device Management ................................................................................................... 21
4.2.3 Partition Settings ......................................................................................................... 26
4.2.4 Video Management .................................................................................................... 30
4.2.5 Permission Management ............................................................................................ 33
4.2.6 Maintenance ............................................................................................................... 35
4.2.7 System Settings ........................................................................................................... 37
4.2.8 Check Status ................................................................................................................ 43
4.3 Use Mobile Client ................................................................................................................. 43
4.3.1 Download and Login the Mobile Client ....................................................................... 43
4.3.2 Add Control Panel to the Mobile Client ...................................................................... 43
4.3.3 Add Peripheral to the Control Panel ........................................................................... 45
4.3.4 Add a Camera to the Zone .......................................................................................... 46
4.3.5 Set Zone ...................................................................................................................... 46
4.3.6 Arm/Disarm the Zone ................................................................................................. 47
4.3.7 Set Arming/Disarming Schedule ................................................................................. 48
4.3.8 Bypass Zone ................................................................................................................ 48

iii
Hybrid Security Control Panel User Manual

4.3.9 Add Card ..................................................................................................................... 49


4.3.10 Add Keyfob ................................................................................................................ 50
4.3.11 Check System Status (Zone Status/Communication Status) ..................................... 50
4.3.12 Check Alarm Notification .......................................................................................... 51
Chapter 5 Operations ............................................................................................................... 53
5.1 Arming ................................................................................................................................. 53
5.2 Disarming ............................................................................................................................. 54
5.3 Use the Keyfob ..................................................................................................................... 54
5.4 Use the Card ........................................................................................................................ 57
5.5 Use the Client Software ....................................................................................................... 57
5.5.1 Accessing the Operation Page ..................................................................................... 58
5.5.2 Partition Operation ..................................................................................................... 58
5.5.3 Zone Operating ........................................................................................................... 59
5.6 Use the Web Client .............................................................................................................. 60
5.6.1 Add/Edit/Delete Tag (Card) ......................................................................................... 60
5.6.2 Add/Edit/Delete Keyfob .............................................................................................. 61
5.6.3 Add/Edit/Delete User .................................................................................................. 61
5.6.4 Check Status ................................................................................................................ 62
Appendix A. Trouble Shooting .................................................................................................. 64
A.1 Communication Fault .......................................................................................................... 64
A.1.1 IP Conflict .................................................................................................................... 64
A.1.2 Web Page is Not Accessible ........................................................................................ 64
A.1.3 Hik-Connect is Offline ................................................................................................. 64
A.1.4 Network Camera Drops off Frequently ....................................................................... 64
A.1.5 Failed to Add Device on APP ....................................................................................... 64
A.1.6 Alarm Information is Not Reported to APP/4200/Alarm Center ................................. 65
A.2 Mutual Exclusion of Functions ............................................................................................. 65
A.2.1 Unable to Enter Registration Mode ............................................................................ 65

iv
Hybrid Security Control Panel User Manual

A.2.2 Unable to Enter RF Signal Query Mode ...................................................................... 65


A.3 Zone Fault ............................................................................................................................ 65
A.3.1 Zone is Offline ............................................................................................................. 65
A.3.2 Zone Tamper-proof ..................................................................................................... 66
A.3.3 Zone Triggered/Fault .................................................................................................. 66
A.4 Problems While Arming ....................................................................................................... 66
A.4.1 Failure in Arming (When the Arming Process is Not Started) ..................................... 66
A.5 Operational Failure .............................................................................................................. 66
A.5.1 Failed to Enter the Test Mode ..................................................................................... 66
A.5.2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm Clearing
Report .................................................................................................................................. 67
A.6 Mail Delivery Failure ............................................................................................................ 67
A.6.1 Failed to Send Test Mail .............................................................................................. 67
A.6.2 Failed to Send Mail during Use ................................................................................... 67
A.6.3 Failed to Send Mails to Gmail ..................................................................................... 67
A.6.4 Failed to Send Mails to QQ or Foxmail ........................................................................ 68
A.6.5 Failed to Send Mails to Yahoo ..................................................................................... 68
A.6.6 Mail Configuration ...................................................................................................... 68
Appendix B. Input Types ........................................................................................................... 70
Appendix C. Output Types ........................................................................................................ 72
Appendix D. Event Types .......................................................................................................... 73
Appendix E. Access Levels ......................................................................................................... 74
Appendix F. SIA and CID Code ................................................................................................... 76

v
Hybrid Security Control Panel User Manual

Chapter 1 System Description


Hybrid security control panel, containing onboard zones, supports wired/wireless alarm inputs and
outputs expanding. It works with Wi-Fi, LAN, GPRS, and 3G/ 4G communication methods, as well
as ISAPI, Ehome 5.0, and DC09 protocol. It is applicable to the scenarios of market, store, house,
factory, warehouse, office, etc.
• Dual path communication of alarm events and other signals over LAN, PSTN, Wi-Fi (-W model),
GPRS and 3G/4G utilizing a main and backup channel with configurable priority
• 4/8 on-board wired zones, and expandable with up to 20/64 wired zones
• Up to 20/64 wireless inputs, 20/64 wireless outputs, 8 keyfobs, 1 wired siren and 2 wireless
sirens
• Camera accessing (only supported by DS-PHAXX-W2/4M)
• Pre-alarm (5 s/2 s) and post-alarm (2 s/5 s) recording for video verification to the alarm receiving
email or mobile client
• Uploads alarm events to alarm receiving center or platform
• Supports arming/disarming via keypad, mobile client, iVMS-4200, SMS, and tag
• Configuration via web client, Hik-Connect, or iVMS-4200
• Pushes alarm notification via messages and email
• AES-128-bit data encryption
• LED indicator for indicating system status
• Expandable PSTN, 3G/4G, and GPRS interface
• Supports RS-485 input and output expander
• Supports lithium battery (-P model) or storage battery (-M model)
• 1 manufacturer, 1 installer, 1 administrator, and 13 users (DS-PHA20)/45 users (DS-PHA64)

1
Hybrid Security Control Panel User Manual

Chapter 2 Specifications

Model DS-PHA20-P DS-PHA20-W2M


DS-PHA20-M DS-PHA20-W2P
DS-PHA64-M DS-PHA64-W4M
Device connection Wireless Detector Up to 16/56
Wireless Output Up to 8
expander
Siren 1 wired siren (on-board connection)
2 wireless sirens
Keyfob 8
Alarm input Partition 4 (DS-PHA20)
8 (DS-PHA64)
Zone 4 on-board zones , and 16 wired/wireless zones
expadable (DS-PHA20)
8 on-board zones, and 56 wired/wireless zones
expadable (DS-PHA64)
Alarm output Alarm output 2 on-board outputs, and 18 wired/wireless
outputs expadable (DS-PHA20)
4 on-board outputs, and 60 wired/wireless
outputs expadable (DS-PHA64)
Function Scheduled output Supported
control
Scheduled arming/ Supported
disarming
SMS notification Supports up to 8 mobile phone numbers
(with 3G/4G/GPRS
module)
Network camera N/A 2 (DS-PHA20)
accessing 4 (DS-PHA64)
Application & Protocol Application iVMS-4200 (client software)
Hik-Connect (mobile client)
Protocol ISAPI: Supports client software and web client

2
Hybrid Security Control Panel User Manual

Model DS-PHA20-P DS-PHA20-W2M


DS-PHA20-M DS-PHA20-W2P
DS-PHA64-M DS-PHA64-W4M
Cloud P2P: Supports cloud P2P privacy protocol
DC09: ARC accessible (CID/SIA)
Network Wired network 10M/100M Ethernet
Cellular Network Supports report push-​notification to ARC &
(with 3G/4G/GPRS Cloud
module)
Wi-Fi Standard N/A 802.11b/g/n
Encryption N/A 64/128-bit WEP,WPA/
WPA2,WPA-PSK/WPA2-
PSK,WPS
Configuration N/A AP Mode
Distance N/A Indoor: ≤ 50 m
Outdoor: ≤ 100 m
Interface & TAMPER Switch 1, front cover tamper-proof
Component
Network Interface 1, RJ45 10M/100M Ethernet Interface
Telephone Interface 1, PSTN expander interface
RS-485 Terminal 1, extended up to 20 inputs/outputs (with
RS-485 module), and 9 wired keypads
extendable (DS-PHA20)
1, extended up to 64 inputs/outputs (with
RS-485 module), and 9 wired keypads
extendable (DS-PHA64)
Siren Power Interface 1, 12V
Battery Interface Lithium battery (-P model)
Storage battery (-M model)
User User Installer: 1
Administrator: 1
Manufactuer:1
Operator: 13 (DS-PHA20), 45 (DS-PHA64)
Others Auxiliary Power Supply Plastic Case: 7.2W, current: 600mA
Metal Case: 13W, current: 1000mA

3
Hybrid Security Control Panel User Manual

Model DS-PHA20-P DS-PHA20-W2M


DS-PHA20-M DS-PHA20-W2P
DS-PHA64-M DS-PHA64-W4M
Siren Output Power Plastic Case: 5W, current: 400 mA
Metal Case: 8W, current: 600 mA
RS-485 Device Output Plastic Case: 7.2W, current: 600mA
Power Metal Case: 13W, current: 1000mA
Alarm Output Power 500 mA
Operation –10 °C to 55 °C (-4 °F to +122 °F)
Temperature
Operation Humidity 10% to 90% (No condensing)
Dimension (W × H × D) Plastic Case: 220 mm (8.6") × 152 mm (6.0") ×
31.5 mm(1.2")
Metal Case: 351.4 mm (13.8") × 261.4 mm
(10.3") × 93.3 mm (3.7")

4
Hybrid Security Control Panel User Manual

Chapter 3 Activation
In order to protect personal security and privacy and improve the network security level, you
should activate the device the first time you connect the device to a network.

3.1 Activate Device via Web Browser


Use web browser to activate the device. Use SADP software or PC client to search the online device
to get the IP address of the device, and activate the device on the web page.
Before You Start
Make sure your device and your PC connect to the same LAN.
Steps
1. Open a web browser and input the IP address of the device.

Note
If you connect the device with the PC directly, you need to change the IP address of your PC to
the same subnet as the device. The default IP address of the device is 192.0.0.64.
2. Create and confirm the admin password.

Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
3. Click OK to complete activation.
4. Edit IP address of the device.
1) Enter IP address modification page.
2) Change IP address.
3) Save the settings.

3.2 Activate Device via iVMS-4200


It is a PC client to manage and operate your devices. Security control panel activation is supported
by the software.

5
Hybrid Security Control Panel User Manual

Before You Start


• Get the client software from the supplied disk or the official website http://
www.hikvision.com/en/ . Install the software by following the prompts.
• The device and the PC that runs the software should be in the same subnet.
Steps
1. Run the client software.
2. Enter Device Management or Online Device.
3. Check the device status from the device list, and select an inactive device.
4. Click Activate.
5. Create and confirm the admin password of the device.

Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
6. Click OK to start activation.
Device status will change to Active after successful activation.
7. Edit IP address of the device.
1) Select a device and click Modify Netinfo at Online Device.
2) Change the device IP address to the same subnet with your computer by either modifying
the IP address manually or checking DHCP.
3) Input the admin password of the device and click OK to complete modification.

3.3 Activate via SADP


SADP is a tool to detect, activate and modify the IP address of the device over the LAN.
Before You Start
• Get the SADP software from the supplied disk or the official website http://
www.hikvision.com/en/ , and install the SADP according to the prompts.
• The device and the PC that runs the SADP tool should be within the same subnet.
The following steps show how to activate a device and modify its IP address. For batch activation
and IP addresses modification, refer to User Manual of SADP for details.
Steps
1. Run the SADP software and search the online devices.
2. Find and select your device in online device list.
3. Input new password (admin password) and confirm the password.

6
Hybrid Security Control Panel User Manual

Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
4. Click Activate to start activation.

Status of the device becomes Active after successful activation.


5. Modify IP address of the device.
1) Select the device.
2) Change the device IP address to the same subnet as your computer by either modifying the
IP address manually or checking Enable DHCP.
3) Input the admin password and click Modify to activate your IP address modification.

7
Hybrid Security Control Panel User Manual

Chapter 4 Configuration
Configure the security control panel in the web client or the remote configuration page in client
software.

4.1 Use the Client Software


Steps
1. Download, install and register to the client software.
2. Add device in Control Panel → Device Management → Device .

Note
Set the device port No. as 80.

Note
The user name and password when adding device are the activation user name and password.
3. Click Remote Configuration to enter the device configuration page after the device is
completely added,

4.2 Use the Web Client


Steps
1. Connect the device to the Ethernet.
2. Search the device IP address via the client software and the SADP software.
3. Enter the searched IP address in the address bar.

Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP
mode.

Note
When connecting the network cable with computer directly, the default IP Address is 192.0.0.64
4. Use the activation user name and password to login.

Note
Refer to Activation chapter for the details.

8
Hybrid Security Control Panel User Manual

4.2.1 Communication Settings

Wired Network
If the device is linked to the wired network, you can set the wired network parameters when you
want to change the device IP address and other network parameters.
Steps

Note
The function is not supported by some device models.
1. In iVMS-4200 client software, enter the Device Management page.
2. Select the device in the Device for Management list, click Remote Configuration.
3. Click Communication Parameters → Ethernet to enter the Wired Network Parameters page.

Figure 4-1 Wired Network Settings Page


4. Set the parameters.
- Automatic Settings: Enable DHCP and set the HTTP port.
- Manual Settings: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS
Server Address.

Note
By default, the HTTP port is 80.
5. Optional: Set correct DNS server address if the device needs to visit Hik-Connect server via a
domain name.

9
Hybrid Security Control Panel User Manual

6. Click Save.

Wi-Fi
You can set the Wi-Fi parameters if there are secure and credible Wi-Fi networks nearby.
Steps
1. Click Communication Parameters → Wi-Fi to enter the Wi-Fi page.

Figure 4-2 Wi-Fi Settings Page


2. Connect to a Wi-Fi.
- Manually Connect: Input the SSID Wi-Fi and Wi-Fi Password, select Encryption Mode and
click Save.
- Select from Network List: Select a target Wi-Fi from the Network list. Click Connect and input
Wi-Fi password and click Connect.
3. Click WLAN to enter the WLAN page.

10
Hybrid Security Control Panel User Manual

Figure 4-3 WLAN Settings Page


4. Set IP Address, Subnet Mask, Gateway Address, and DNS Server Address.

Note
If enable DHCP, the device will gain the Wi-Fi parameters automatically.
5. Click Save.

Cellular Network
Set the cellular network parameters if you insert a SIM card inside the device. By using the cellular
network, the device can upload alarm notifications to the alarm center.
Before You Start
Insert a SIM card into the device SIM card slot.
Steps
1. Click Communication Parameters → Cellular Data Network to enter the Cellular Data Network
Settings page.

11
Hybrid Security Control Panel User Manual

Figure 4-4 Cellular Data Network Settings Page


2. Enable Wireless Dial.
3. Set the cellular data network parameters.
Access Number
Input the operator dialing number.
User Name
Ask the network carrier and input the user name.
Access Password
Ask the network carrier and input the password.
APN
Ask the network carrier to get the APN information and input the APN information.
Data Usage Limit
You can enable the function and set the data threshold every month. If data usage is more
than the configured threshold, an alarm will be triggered and uploaded to the alarm center
and mobile client.
Data Used This Month
The used data will be accumulated and displayed in this text box.
4. Click Save.

12
Hybrid Security Control Panel User Manual

Alarm Center
You can set the alarm center's parameters and all alarms will be sent to the configured alarm
center.
Steps
1. Click Communication Parameters → Alarm Receiving Center to enter the Alarm Receiving
Center page.

Figure 4-5 Alarm Receiving Center Parameters


2. Select the Alarm Receiver Center as 1 or 2 for configuration , and slide the slider to enable the
selected alarm receiver center.

Note
Only if the alarm receiver center 1 is enabled, you can set the alarm receiver center 2 as the
backup channel and edit the channel parameters.
3. Select the Protocol Type as ADM-CID, EHome, SIA-DCS, *SIA-DCS, or *ADM-CID to set
uploading mode.
- ADM-CID or SIA-DCS
You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain
name, port number, account code, timeout, re-upload times and heartbeat interval.

13
Hybrid Security Control Panel User Manual

Note
Set the heartbeat interval with the range from 10 to 3888000 seconds.
- EHome
You do not need to set the EHome protocol parameters.

- *SIA-DCS or *ADM-CID

14
Hybrid Security Control Panel User Manual

You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain
name, port number, account code, retry timeout period , attempts, heartbeat interval,
encryption arithmetic, password length and secret key.

Note
Set the heartbeat interval with the range from 10 to 3888000 seconds.
For encryption arithmetic: The panel support encryption format for information security
according to DC-09, AES-128, AES-192 and AES-256 are supported when you configure the
alarm center.
For the secret key: When you use an encrypted format of DC-09, a key should be set when
you configure the ARC. The key would be issued offline by ARC , which would be used to
encrypt the message for substitution security.
4. Click Save.

Notification Push
When an alarm is triggered, if you want to send the alarm notification to the client, alarm center,
cloud or mobile phone, you can set the notification push parameters.
Steps
1. Click Communication Parameters → Event Communication .

15
Hybrid Security Control Panel User Manual

2. Enable the target notification.


Alarms and Tampers
The device will push notifications when the zone alarm is triggered or the device tamper
alarm is triggered or restored.
Life Safety Alarms
The device will push notifications when fire alarm, gas alarm, or medical alarm is triggered.
Maintenance and Faults
The device will push notifications when any status in the system is changed.
Panel Management Notification
The device will push notifications when the user operate the device.

Note
If you want to send the alarm notifications to the mobile client, you should also set the Mobile
Phone Index, Mobile Phone Number , and check the Notification Type.

Note
For message notification in alarm receiving center, select the center index before settings.
3. Click Save.
Result

Table 4-1 Options of Notifications


Option Notification
iVMS-4200 Alarms and Tampers
Life Safety Alarms
Maintenance and Faults
Panel Management Notification
Alarm Receiver Center Alarm Receiver Center 1&2
Alarms and Tampers
Life Safety Alarms
Maintenance and Faults
Panel Management Notification
Cloud Alarms and Tampers
Life Safety Alarms
Maintenance and Faults
Panel Management Notification
Mobile Phone Mobile Phone Index 1 to 8

16
Hybrid Security Control Panel User Manual

Option Notification
Mobile Phone Number
Notification Type SMS & Voice Call Check Box
Alarms and Tampers
Life Safety Alarms
Maintenance and Faults
Operation Events

Note
You can arm/disarm/clear alarm via sending SMS. The number of the SIM card installed in the
control panel is the receiver number.
The control massage is Command + Operation Type + Target , and the details are show below.
For examples, command 00+1+1 indicates partition 1 disarming, and command 00+1+1 indicates
partition 1 away arming.
Command Operation Type Target
2 Digits 1 Digit No more than 3 Digits
00: Disarming 1: Partition Operation 0: All partition arming/
01: Away Arming disarming/clearing Alarm
02: Stay Arming 1: Partition 1 arming/
03: Alarm Clearing disarming/clearing Alarm
...
13: Partition 13 arming/
disarming/clearing Alarm
...

Hik-Connect
If you want to register the device to the Hik-Connect mobile client for remote configuration, you
should set the Hik-Connect registration parameters.
Before You Start
• Connect the device to the network via wired connection, dial-up connection, or Wi-Fi
connection.
• Set the device IP address, subnet mask, gateway and DNS server in the LAN.
Steps
1. Click Communication Parameters → Hik-Connect Registration to enter the Hik-Connect
Registration Settings page.

17
Hybrid Security Control Panel User Manual

Figure 4-6 Hik-Connect Registration Settings Page


2. Check Register to Hik-Connect.

Note
By default, the device Hik-Connect service is enabled.
You can view the device status in the Hik-Connect server (www.hik-connect.com).
3. Enable Custom Server Address.
The server address is already displayed in the Server Address text box.
4. Select a communication mode from the drop-down list according to the actual device
communication method.
Auto
The system will select the communication mode automatically according to the sequence of,
wired network, Wi-Fi network, and cellular data network. Only when the current network is
disconnected, will the device connect to other network.
Wired Network Priority
The wired network has the highest priority.

Note
When the device supports cellular data network connection and the wired network is
disconnected, it will connect to the cellular data network. When the wired network is

18
Hybrid Security Control Panel User Manual

restored, only if the cellular data network is disconnected, does the device connect to the
wired network.
Wired &Wi-Fi
The system will select wired network first. If no wired network detected, it will select Wi-Fi
network.
Cellular Data Network
The system will select cellular data network only.
5. Optional: Change the authentication password.

Note
• By default, the authentication password is displayed in the text box.
• The authentication password should contain 6 to 12 letters or digits. For security reasons, an
8-character password is suggested, which containing two or more of the following character
types: uppercases, lowercases, and digits.

6. Click Save.

EHome
In this section, you can create an EHome account, and edit the IP address/domain name, port
number.
Steps
1. Click Communication Parameters → Ehome Registration to enter the Ehome Registration
Settings page.

Figure 4-7 EHome Registration


2. Slide the slider to enable EHome protocol.

19
Hybrid Security Control Panel User Manual

3. Select the Alarm Receiver Type as IP or Domain Name.


4. Input IP address or domain name according to the alarm receiver type.
5. Input the port number for the protocol.

Note
By default, the port number for EHome is 7660.
6. Set an account, including the Device ID and Ehome Login Password.
7. Click Save.

NAT
Universal Plug and Play (UPnP™) is a networking architecture that provides compatibility among
networking equipment, software and other hardware devices. The UPnP protocol allows devices to
connect seamlessly and to simplify the implementation of networks in the home and corporate
environments.
Enable the UPnP function, and you don’t need to configure the port mapping for each port, and
the device is connected to the Wide Area Network via the router.
Steps
1. Click Communication Parameters → NAT to enter the page.

Figure 4-8 NAT Settings


2. Check the checkbox to enable UPnP.
3. Optional: Select the mapping type as Manual
4. Set the HTTP port and the service port.
5. Click Save to complete the settings
What to do next
Enter the tasks the user should do after finishing this task (optional).

20
Hybrid Security Control Panel User Manual

Set FTP to Save Video


You can configure the FTP server to save alarm video.
Steps
1. Click Communication Parameters → FTP to enter the page.
2. Configure the FTP parameters
FTP Protocol
Uploads files via FTP.
Server Address and Port
The FTP server address and corresponding port.
User Name and Password
The FTP user should have the permission to upload pictures. If the FTP server supports
picture uploading by anonymous users, you can check Anonymous to hide your device
information during uploading.
Directory Structure
The saving path of snapshots in the FTP server.

What to do next
Enter the tasks the user should do after finishing this task (optional).

4.2.2 Device Management

Zone
You can set the zone parameters on the zone page.
Steps
1. Click Device Management → Zone to enter the Zone page.

21
Hybrid Security Control Panel User Manual

Figure 4-10 Zone Settings


2. Select a zone and click to enter the Zone Settings page.
3. Edit the zone name.
4. Select a zone type.
Instant Zone
This Zone type will immediately trigger an alarm event when armed.
Delayed Zone
Exit Delay: Exit Delay provides you time to leave through the defense area without alarm.
Entry Delay: Entry Delay provides you time to enter the defense area to disarm the system
without alarm.
The system gives Entry/Exit delay time when it is armed or reentered. It is usually used in
entrance/exit route (e.g. front door/main entrance), which is a key route to arm/disarm via
operating keyboard for users.

Note
You can set 2 different time durations in Partition Management → Schedule & Timer .
Follow Zone
The zone acts as delayed zone when it detects triggering event during system Entry Delay,
while it acts as instant zone otherwise.
Perimeter Zone
The system will immediately alarm when it detects a triggering event after the system is
armed. There is a configurable interval timer between the alarm activation and siren output
"Siren Delay Time (Perimeter Alarm) 0 to 600 Seconds". This option allows you to check the
alarm and cancel the siren output during the interval time in case of false alarm.
When the zone is armed, you can set the peripheral alarm delayed time in Partition
Management → Schedule & Timer . You can also mute the siren in the delayed time.

22
Hybrid Security Control Panel User Manual

24H Silent Zone


This zone type is active 24hrs, it is used for Panic or HUD (Hold Up Devices) not smoke
sensors or break glass detectors.
Panic Zone
The zone activates all the time. It is usually used in the sites equipped with panic button,
smoke detector and glass-break detector.
Fire Zone
The zone activates all the time with sound/siren output when alarm occurs. It is usually used
in fire hazardous areas equipped with smoke detectors and temperature sensors.
Gas Zone
The zone activates all the time with sound/siren output when alarm occurs. It is usually used
in areas equipped with gas detectors (e.g., the kitchen).
Medical Zone
The zone activates all the time with beep confirmation when alarm occurs. It is usually used
in places equipped with medical emergency buttons.
Timeout Zone
The zone activates all the time. The zone type is used to monitor and report the "ACTIVE"
status of a zone, but it will only report and alarm this status after the programmed time has
expired. (1 to 599) Seconds. It can be used in places equipped with magnetic contacts that
require access but for only a short period (e.g., fire hydrant box's door or another external
security box door)
Shield Zone
Alarms will not be activated when the zone is triggered or tampered. It is usually used to
disable faulty detectors .
5. Set the zone sensitivity and zone resistor.

Note
The resistor wired on the on-board zone should be the same as the resistor configured on this
page.
6. Select a detector type.
7. Enable Stay Arming Bypass, or Silent Alarm according to your actual needs.

Note
Some zones do not support the function. Refer to the actual zone to set the function.
8. Select the panel video channel No. and zone tampering wiring mode.
9. Click OK.

23
Hybrid Security Control Panel User Manual

Note
After setting the zone, you can enter Status → Zone to view the zone status.

What to do next
Click Zone → Zone Module , you can see the zone module information including module status,
module addresss, module channel No., and module type.

Relay
If you want to the link the device with a relay output to output the alarm, set the output
parameters.
Steps
1. Click Device Management → Relay to enter the Output page.

Figure 4-11 Wireless Output Module Settings


2. Click and the Relay Settings window will pop up.
3. Edit the relay name, select a link event, and set the output delay time duration.
4. Click OK.

Note
After the relay is configured, you can click Status → Relay to view the output status.

Siren
The siren is enrolled to the control panel via the wireless receiver module, and the 868 Mhz
wireless siren can be enrolled to the hybrid control panel via the wireless receiver that is at the
address of 9.

24
Hybrid Security Control Panel User Manual

Steps
1. Click Device Management → Siren to enter the Siren page.

Figure 4-12 Siren Page


2. Click to enter the Siren Settings page.
3. Set the siren name and the linked event.
4. Click OK.

Note
After the siren is configured, you can click Status → Siren to view the siren status.

Keypad
The keypad is connected to the control panel via RS-485 wiring. You can refer to Hybrid Control
Panel Quick Start Guide for wiring details.
Steps
1. Click Control Device → Keypad to enter the page.
2. Click to enter the Keypad Settings page.
3. Set the keypad name.
4. Select the keypad linked partition.
5. Click OK.

Module
The wired module is connected to the control panel via RS-485 wiring. You can refer to the Hybrid
Control Panel Quick Start Guide for details.
Steps
1. Click Device Management → Module Information to enter the page.
2. Click to enter the module settings page.
3. Set the module name.
4. Click OK.

25
Hybrid Security Control Panel User Manual

4.2.3 Partition Settings

Basic Settings
You can link zones to the selected partition.
Steps
1. Click Partition Management → Basic Settings to enter the page.

Figure 4-13 Partition Basic Information Management Page


2. Select a partition.
3. Check the Enable One-Push Arming to enable the One-Push Arming key on the keypad.
4. Check the check box in front of the zone to select zones for the partition.
5. Click Save to complete the settings.

Public Partition Settings


Definition Public partition is considered a special one which can be shared to other partitions. It is
usually applied to manage or control the public area related with other areas controlled by other
partitions in one building.
Steps
1. Click Partition Management → Public Partition to enter the page.

26
Hybrid Security Control Panel User Manual

Figure 4-14 Public Partition Settings


2. Check the checkbox to enable the public partition function.

Note
the default public partition is partition 1
3. Select partition(s) to link to the public partition in the list.

Note
It is required to select at least a partition to link to the public paritition.
4. Click Save to set the partition as public partition.

Schedule and Timer Settings


You can set the Entry Delay 1 & Entry Delay 2 time duration for the delayed zone type and the Exit
Delay delayed time to exit the zone. You can also set the alarm schedule. The zone will be armed/
disarmed according to the configured time schedule.
Steps
1. Click Partition Management → Schedule & Timer to enter the Schedule & Timer page.

27
Hybrid Security Control Panel User Manual

Figure 4-15 Schedule & Timer Settings


2. Select a partition.
3. Set time duration of Delay 1, Delay 2, or Exit Delay respectively.
Delay 1/Delay 2
If you have set the delayed zone, you can set the delayed time duration here.

Note
The available time duration range is from 5s to 600s.
Exit Delay
If you want to exit the zone without triggering the alarm, you can set the exit delay duration.

Note
The available time duration range is from 5 s to 600 s.
4. Optional: Set the following parameters according to actual needs.
Enable Auto Arming

28
Hybrid Security Control Panel User Manual

Enable the function and set the arming start time. The zone will be armed according to the
configured time.

Note
The auto arming time and the auto disarming time cannot be the same.

Note
The buzzer beeps slowly 2 minutes before the auto arming starts, and beeps rapidly 1 minute
before the auto arming starts.

Note
You can select to enable forced arming on the System Options page. While the function is
enabled, the system will be armed regardless of the fault.

Note
If the public partition is enabled, the partition 1 dose not support auto arming.
Enable Auto Disarming
Enable the function and set the disarming start time. The zone will be disarmed according to
the configured time.

Note
The auto arming time and the auto disarming time cannot be the same.

Note
If the public partition is enabled, the partition 1 dose not support auto disarming.
Late to Disarm
Enable the function and set the time. If the alarm is triggered after the configured time, the
person will be considered as late.

Note
You should enable the Panel Management Notification function in Communication
Parameters → Event Communication before enabling the Late to Disarm function.
Weekend Exception
Enable the function and the zone will not be armed in the weekend.
Siren Delay Time (Perimeter Alarm)
If you have set the perimeter zone, you can set the delayed time for the zone.

29
Hybrid Security Control Panel User Manual

Note
The available time duration range is from 0 s to 600 s.
Alarm Duration
Set the time duration of the alarm.

Note
The available time duration range is from 1 s to 900 s.
5. Click Save.

4.2.4 Video Management


You can add two network cameras to the security control panel, and link the camera with the
selected zone for video monitoring. You can also receive and view the event video via client and
Email.

Add Cameras to the Security Control Panel


Steps
1. Click Device Management → Channel to enter the network camera management page.

Figure 4-16 Network Camera Management


2. ClickAdd , and enter the basic information of the camera, such as IP address and port No., and
select the protocol type.
3. Enter the user name and password of the camera.
4. Click OK .

30
Hybrid Security Control Panel User Manual

5. Optional: Click Edit or Delete to edit or delete the selected camera.

Link a Camera with the Zone


Steps
1. Click Device Management → Zone to enter the configuration page.
2. Select a zone that you wish to include video monitoring, and click the Settings icon.
3. Select the Panel Video Channel No..
4. Click OK.

Set Email to Receive Alarm Video


You can send the alarm video or event to the configured email.
Steps
1. Click Communication Parameters → Video Verification Events to enter the page.

Figure 4-17 Set Email to Receive Alarm Video


2. Click the block to enable the function.
3. Enter the sender's information.
4. Enter the receiver's information.
5. Click Receiver Address Test and make sure the address is correct.
6. Click Save.

31
Hybrid Security Control Panel User Manual

Set Video Parameters


Steps
1. Click Video & Audio → Event Video Parameters to enter the page.

Figure 4-18 Video Settings


2. Select a camera and set the video parameters.
Stream Type
Main Stream: Being used in recording and HD preview, it has a high resolution, code rate and
picture quality..
Sub-Stream: It is used to transmit network and preview pictures as a video streaming with
features of lower resolution, bit rate and picture quality.
Bitrate Type
Select the Bitrate type as constant or variable.
Resolution
Select the resolution of the video output
Video Bitrate
The higher value corresponds to the higher video quality, but the better bandwidth is
required.

32
Hybrid Security Control Panel User Manual

4.2.5 Permission Management

Add/Edit/Delete User
Administrator can add user to the security control panel, edit the user information, or delete the
user from the security control panel. You can also assign different permissions to the new user.
Steps
1. Click User Management → User to enter the User Management page.
2. To compliant the EN requirement, slide the block to enable the setter and manufacturer .

Note
The default password of the setter is setter12345, and the default password of the
manufacturer is hik12345. These codes will have to be changed when first connected.
3. Click Add.
4. Set the new user's information in the pop-up window, including the user type, the user name,
and the password.

Figure 4-19 Add User Page


5. Set the keypad password (numeric, 4~8 characters).
6. Check the check boxes to set the user permission.
The user can only operate the assigned permissions.
7. Click OK.
8. Optional: Enable the user in the Enable User column to allow the enabled user operating the
device.
9. Optional: Select an user and click Edit and you can edit the user's information and permission.
10. Optional: Delete a single user or check multiple users and click Delete to delete users in batch.

33
Hybrid Security Control Panel User Manual

Note
The admin and the setter cannot be deleted.

Add/Edit/Delete Keyfob
You can add keyfob to the security control panel and you can control the security control panel via
the keyfob. You can also edit the keyfob information or delete the keyfob from the security control
panel.
Steps
1. Click User Management → Keyfob to enter the Keyfob Management page.

Figure 4-20 Keyfob Management


2. Click Add and press any key on the keyfob.
3. Set the keyfob linked device type and linked device No..
4. Click OK.
5. Optional: Click to edit the keyfob information.
6. Optional: Delete a single keyfob or check multiple keyfobs and click Delete to delete the keyfobs
in batch.

Add/Edit/Delete Tag (Card)


You can add tag to the security control panel and you can use the tag(card) to arm/disarm the
zone. You can also edit the tag information or delete the tag from the security control panel.
Steps
1. Click User Management → Card to enter the management page.

34
Hybrid Security Control Panel User Manual

Figure 4-21 Tag Management


2. Click Add to enter the adding page.
3. Select the linked keypad.
4. Click OK and the tag information will be displayed in the list.

Note
The tag supports at least 20-thousand serial numbers.
5. Optional: Click and you can change the tag(card) name.
6. Optional: Delete a single tag(card) or check multiple tags(cards) and click Delete to delete cards
in batch.

4.2.6 Maintenance

Test
The security control panel supports walk test function.
Steps
1. Enter Maintenance → Test → to enable the function.

2. Check the Test check box to start walk test.

35
Hybrid Security Control Panel User Manual

3. Click Save to complete the settings.


4. Trigger the detector in each zone.
5. Check the test result.

Diagnosis
The control panel supports diagnosis of system, alarm, wireless device, Wi-Fi, and cloud platform
Steps
1. Enter Maintenance → Diagnosis .

2. Select system, alarm, wireless device, Wi-Fi, or cloud platform as the diagnosis module. Or you
can select Custom, and enter the custom command (1~64) characters.
3. Click Diagnosis to start the operation.
4. View the diagnosis result in the information box.

Export File
You can export debugging file to the PC.
Steps
1. Click Maintenance → Export File to enter the page.

Figure 4-22 Export File Page

36
Hybrid Security Control Panel User Manual

2. Check the check box to enable the function.


3. Click Export to save the debugging file in the PC.

4.2.7 System Settings

Authority Management
Set the authority options.
Click System → System Options to enter the Option Management page.
Forced Arming
If the option is enabled and there are active faults in a zone, the zone will be bypassed
automatically.

Note
You should disable the arming function in the Advanced Settings page. Or the forced arming
function cannot be valid.
System Faults
If the option is enabled, the device will upload the system fault report automatically.

Authority Advanced Settings


Set advanced authority parameters.
Click System → System Options → Advanced Settings to enter the Advanced Settings page.
You can set the following parameters:
Enable Arming
When you enable the function, during the device arming procedure, the system will check the
configured fault checklist. When there is fault occurred during the arming procedure, the
procedure will be stopped.
Fault Checklist
The system will check if the device has the faults in the checklist during the arming procedure.
Enable Arming with Fault
Check the faults in the Enable Arming with Fault list, and the device will not stop the arming
procedure when faults occurred.
Arming Indicator Keeps Light
If the device applies EN standard, by default, the function is disabled. In this case, if the device is
armed, the indicator will be solid blue for 5 s. And if the device is disarmed, the indicator will
flash 5 times.

37
Hybrid Security Control Panel User Manual

When the function is enabled, if the device is armed, the indicator will be on all the time. And if
the device is disarmed, the indicator will be off.
Prompt Fault When Arming
If the device applies EN standard, by default, the function is disabled. In this case, the device will
not prompt faults during the arming procedure.
Enable Early Alarm
If you enable the function, when the zone is armed and the zone is triggered, the alarm will be
triggered after the delay time.

Note
The early alarm will be taken effect only after the delayed zone is triggered.
Delay
When the early alarm function is enabled, you should set the delay time. The alarm will be
triggered after the configured delay time.

Fault Check
The system determines whether to check the faults listed on the page. The system will only check
the fault that is selected.
Detect Network Camera Disconnection
If the option is enabled, when the linked network camera is disconnected, an alarm will be
triggered.
Battery Supervision
If the option is enabled, when battery is disconnected or out of charge, the device will not
upload events.
Wired Network Fault Check
If the option is enabled, when the wired network is disconnected or with other faults, the alarm
will be triggered.
Wi-Fi Fault Check
If the option is enabled, when the Wi-Fi is disconnected or with other faults, the alarm will be
triggered.
Cellular Network Fault Check
If the option is enabled, when the cellular data network is disconnected or with other faults, the
alarm will be triggered.
SIM Card Fault Check
If the option is enabled, the alarm will be triggered for faults of the SIM card.
AC Power Down Check Time

38
Hybrid Security Control Panel User Manual

The system checks the fault after the configured time duration after AC power down.

Enrollment Method
Steps
1. Click System → System Options → Adding Through to enter the enrollment method page.

Figure 4-23 Enrollment Method


2. ClickEnter the Enrollment Mode.
3. In the pop-up window, Select a RS-485 wireless receiver.
4. Select the wireless device type.
5. Click OK to finish the enrollment settings.

Time Settings
You can set the device time zone, synchronize device time, and set the DST time. The device
supports time synchronization via Hik-Connect server.

Time Management
Click System → Date and Time to enter the Time Management page.
You can select a time zone from the drop-down list.
You can synchronize the device time manually with NTP. Check the check box of NTP Time Sync.,
enter the server address and port No., and set the synchronization interval.
You can synchronize the device time manually. Or check Sync. with Computer Time to synchronize
the device time with the computer time.
DST Management
Click System → Date and Time → DST Management to enter the Time Management page.

39
Hybrid Security Control Panel User Manual

Figure 4-25 DST Management


You can enable the DST and set the DST bias, DST start time, and DST end time.

Security Settings

SSH Settings
Enable or disable SSH (Secure Shell) according to your actual needs.
Click System → Security → SSH Settings to enter the SSH Settings page and you can enable or
disable the SSH function.

Locking User Settings


Set user locking. You can view the locked user or unlock a user and set the user locked duration.
Steps
1. Click System → Security → Locking User Settings to enter the Locking User Settings page.
2. Set the following parameters.
Max. Failure Attempts
If the user continuously input the incorrect password for more than the configured times, the
account will be locked.

Note
The administrator has two more attempts than the configured value.
Locked Duration
Set the locking duration when the account is locked.

Note
The available locking duration is 5s to 1800s.

40
Hybrid Security Control Panel User Manual

3. Click to unlock the account or click Unlock All to unlock all locked users in the list.
4. Click Save.

Module Lock Settings


Set the module locking parameters, including the Max Failure Attempts, and locked duration. The
module will be locked for the programmed time duration, once the module authentication has
failed for the amount of configured times.
Steps
1. Click System → Security → Module Lock Settings to enter the Module Lock Settings page.
2. Select a module from the list, and click the Operation icon.
3. Set the following parameters of the selected module.
Max. Failure Attempts
If a user continuously tries to authentication a card for more than the configured attempts
permitted, the card reader will be locked for the programmed duration.
Locked Duration
Set the locking duration when the card reader is locked. After the configured duration, the
card reader will be unlocked.
4. Click OK.
5. Optional: Click the Lock icon to unlock the locked module.

System Maintenance
You can reboot the device, restore default settings, import/export configuration file, or upgrade
the device remotely.
Select the device and click Remote Configuration in the client software, or enter the device IP
address in the address bar of the web browser. Click System → System Maintenance to enter the
Upgrade and Maintenance page.
Reboot

41
Hybrid Security Control Panel User Manual

Click Reboot to reboot the device.


Restore Default Settings
Click Partly Restore to restore all parameters except for admin user information, wired network,
Wi-Fi network, detector information, and peripheral information to default ones.
Click Restore All to restore all parameters to the factory settings.
Import Configuration File
Click View to select configuration file from the PC and click Import Configuration File to import
configuration parameters to the device.
Export Parameters
Click Export Configuration File to export the device configuration parameters to the PC.
Upgrade File
Click View to select an upgrade file from the PC and click Upgrade to upgrade the device
remotely.

Note
Do not power off when the device is upgrading.

Local Log Search


You can search the log on the device.
Click System → Log to enter the Local Log Search page.

Figure 4-27 Local Log Search Page


Select a major type and a minor type from the drop-down list, set the log start time and end time
and click Filter. All filtered log information will be displayed in the list.
You can also click Reset to reset all search conditions.

42
Hybrid Security Control Panel User Manual

4.2.8 Check Status


After setting the zone, repeater, and other parameters, you can view their status.
Click Status. You can view the status of zone, relay, siren, battery, communication, and repeater.
• Zone: You can view the zone status, alarm status, detector battery capacity, and signal strength.
• Siren: You can view siren status, battery status, and signal strength.
• Relay: You can view relay status, battery status, and signal strength.
• Battery: You can view the battery charge.
• Communication: You can view the wired network "STATUS", Wi-Fi status, Wi-Fi signal strength,
cellular network status, used data, and cloud connection status.

4.3 Use Mobile Client

4.3.1 Download and Login the Mobile Client


Download the Hik-Connect mobile client from Google Play (for Android) or App store (for iOS) and
login the client before operating the security control panel.
Steps
1. Search and download Hik-Connect mobile client from Google Play (for Android) or App Store
(for iOS).
2. Optional: Register a new account if it is the first time you use the Hik-Connect mobile client.

Note
For details, see User Manual of Hik-Connect Mobile Client.
3. Run and login the client.

4.3.2 Add Control Panel to the Mobile Client


Add a control panel to the mobile client before other operations.
Steps
1. Power on the control panel.
2. Select adding type.
- Tap → Scan QR Code to enter the Scan QR code page. Scan the QR code on the control
panel.

Note
Normally, the QR code is printed on the label stuck on the back cover of the control panel.
- Tap → Manual Adding to enter the Add Device page. Input the device serial No. with the
Hik-Connect Domain adding type.

43
Hybrid Security Control Panel User Manual

3. Connect to a network.
1) Tap Connect to a Network.

Figure 4-28 Connect to a Network Page


2) Tap Wireless Connect on the Select Connection Type page.
3) Follow the instructions on the Turn on Hotspot page and change the control panel to the AP
mode. Tap Next.

Note
You need to remove the rear panel of the device and the AP/STA switch is on the back of the
device.
4) Select a stable Wi-Fi for the device to connect and tap Next.

Note
Make sure the device and the mobile phone are connect to the same Wi-Fi.
4. Follow the instructions on the Device's Wi-Fi page and connect the mobile phone with the
control panel via wireless connection.

Note
Select HAP-Device Serial No. as the hotspot and enter the hotspot password. By default, the
password is AP + Device Verification Code. The verification code is normally printed on the
device label.
5. Return to the mobile client and create a device password for device activation.

Note
We highly recommend you to create a strong password of your own choosing (using a minimum
of 8 characters, including at least three kinds of following categories: upper case letters, lower
case letters, numbers, and special characters) in order to increase the security of your product.
And we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
6. Optional: If you add the control panel by entering its serial No., you should enter the device
verification code and tap OK.

44
Hybrid Security Control Panel User Manual

Note
By default, the verification code is printed on the device label.
7. Follow the instructions and change the control panel to the Station mode. Tap Next.

Note
You need to remove the rear panel of the device and the AP/STA switch is on the back of the
device.
8. When the control panel adding is completed, tap Finish.
The control panel is listed on the Hik-Connect page.

4.3.3 Add Peripheral to the Control Panel


It is required to enter the activation name and the password login the control panel after it being
added. The tampering alarm will not be detected within 5 minutes after you login the device as a
setter and does not operate the device.
Before You Start
Make sure the control panel is disarmed.
Steps

Note
Some control panel models do not support add zones or wireless devices remotely. You should add
them to the control panel directly. For details, see the user manual of the wireless device.
1. Tap to enter the Scan QR Code page.
2. Scan the peripheral's QR code to add the peripheral.
3. Select a peripheral type, and create a name for the peripheral.

Note
• When the adding peripheral is a detector, the detector will be linked to the zone. You can
view the detector information in the Zone tab.
• Up to 32 detectors can be linked to the zone.

The added peripheral will be listed in the Zone tab or the Wireless Device tab.

Note
One of the most important factors for a reliable wireless installation is the signal
strength between a wireless device and the panel. If a device is out of range it will not be able
to send events to the control panel therefore it is recommended that a signal strength test is
performed before fixing devices into place. The control panel has advanced signal strength

45
Hybrid Security Control Panel User Manual

mechanism that operates by monitoring all inputs/bells on the web browser. The page will need
to be re-freshed every time for a new test. See also Appearance-Function Button.
When performing a signal strength test it is recommended that the system is tested in the
‘worst case scenario’ for example with all doors and windows closed.

4.3.4 Add a Camera to the Zone


You can link a camera to the zone to monitor the zone. You can view the alarm videos when an
alarm is triggered.
Before You Start
Make sure you have installed the camera in the target zone and the camera has connected the
same LAN as the security control panel's.
Steps
1. Tap a security control panel on the Hik-Connect page and tap Zone to enter the zone list page.
2. Select a zone to enter the zone settings page.
3. Tap Link Camera to enter the Link Camera page.

Figure 4-29 Link Camera Page


4. Select a camera in the available cameras, and tap Link.
The selected camera will be linked to the zone. The icon will be displayed on the right of the
zone in the zone list. Tap the icon to view the zone live video.

4.3.5 Set Zone


After the detector is added, you can set the zone, including the zone name, the zone type, zone
bypass, linked camera, stay/away status, the siren, and the silent zone. You can also view the
detector serial No. (only device in 433 HMz) and the detector type of the zone.
Steps
1. Tap a zone in the Partition page to enter the zone settings page.

46
Hybrid Security Control Panel User Manual

2. Set the following parameters as you desired.


Detector Type
Select a detector type of the zone from the list
Zone Type
Select a zone type from the zone type list.
Zone Bypass
Enable the function and the zone will be bypassed. No alarm will be received while the zone
is bypassed.
Link Camera
You can link the zone to cameras. When an alarm is triggered, you can monitor the zone via
the linked cameras.

4.3.6 Arm/Disarm the Zone


Arm or disarm the zone manually as you desired.
On the Hik-Connect page, tap a security control device to enter the control panel management
page. Tap Away/Stay/Disarm to control the partition's status.
You can also tap Clear Alarm to clear the alarm when an alarm is triggered.

Figure 4-30 Control Panel Management Page

47
Hybrid Security Control Panel User Manual

4.3.7 Set Arming/Disarming Schedule


Set the arming/disarming schedule to arm/disarm a particular zone automatically.
Tap a security control panel to enter the control page and tap or to enter the Settings page.
Enable the auto arm/disarm function and set the auto arm time/auto disarm time. You can also set
the late to disarm time, entry delay time, exit delay time, and siren delay time.

Figure 4-31 Arming or Disarming Schedule Page

4.3.8 Bypass Zone


When the partition is armed, you can bypass a particular zone as you desired.
Before You Start
Link a detector to the zone.
Steps
1. Select a zone in the Zone tab of the Partition page to enter the settings page.
2. Select a zone and enter the Settings page.

48
Hybrid Security Control Panel User Manual

Figure 4-32 Zone Settings Page


3. Enable Zone Bypass and the zone will be in the bypass status.
The detector in the zone does not detect anything and you will not receive any alarm from the
zone.

4.3.9 Add Card


You can add card to the control panel. Use the card to arm, disarm, or clear alarm.
Steps
1. Select a control panel on the Hik-Connect page to enter the control panel management page.

Figure 4-33 Control Panel Management Page

49
Hybrid Security Control Panel User Manual

2. Tap → Card/Tag Management to enter the Card/Tag Management page.


3. Tap .
4. When hearing the voice prompt "Swipe Card", you should present the card on the control panel
card presenting area.
When hearing a beep sound, the card is recognized.
5. Create a card alias and tap Finish.

Note
The alias should contain 1 to 32 characters.
The card is displayed in the Card/Tag Management page.

4.3.10 Add Keyfob


You can add keyfobs to the control panel and control partition arming/disarming status. You can
also clear alarm when an alarm is triggered.
Steps

Note
Make sure the keyfob's frequency is the same as the control panel's.
1. Tap to enter the Add Keyfob page.
2. Follow the instruction on the page and press any key on the keyfob to add.
3. Create a name for the keyfob and tap Finish.
The keyfob is listed in the Wireless Device page.
4. Optional: You can view the keyfob's serial No. and you can also delete it.

4.3.11 Check System Status (Zone Status/Communication Status)


You can view the zone status and the communication status via the mobile client.

View Zone Status


In the Partition page, tap Zone to enter the Zone tab. You can view the each zone's status in the
list.
Communication Mode
Tap to enter the control panel settings page. You can view the device communication status,
including the battery, Ethernet network, Wi-Fi, mobile network, and data usage.

50
Hybrid Security Control Panel User Manual

4.3.12 Check Alarm Notification


When an alarm is triggered, and you will receive an alarm notification. You can check the alarm
information from the mobile client.
Before You Start
• Make sure you have linked a zone with a detector.
• Make sure the zone is not bypassed.
• Make sure you have not enabled the silent zone function.
Steps
1. Tap Notification in the Hik-Connect page to enter the page.

Figure 4-34 Notification


All alarm notifications are listed in Message page.
2. Select an alarm and you can view the alarm details.

51
Hybrid Security Control Panel User Manual

Figure 4-35 Notification Details


3. Optional: If the zone has linked a camera, you can view the playback when the alarm is
triggered.

52
Hybrid Security Control Panel User Manual

Chapter 5 Operations
You can use the client keyfob, card, client software, or mobile client to do arming, disarming,
bypass, and zone disabling.

5.1 Arming
You can use keyfob, card, client software, mobile client to arm your system.
After the arming command is sending to control panel, the sytem will check the detector status. If
the detector is in fault, you will need to choose whether to arm the system with fault.
While the system is armed, the control panel will prompt the result in 5s, and upload the arming
report.

Figure 5-1 Arming Process

Access level of Arming


The user in level 2 or 3 has the permission to arm or partly arm the system.
Arming Indication
The arming/disaring indicator keeps solid blue for 5s.

53
Hybrid Security Control Panel User Manual

Reason of Arming Failure


• Intrusion detector triggered (excepts the detector on the exit route).
• Panic alarm device triggered.
• Tampering alarm occurred.
• Communication exception
• Mian power supply exception
• Backup battery exception
• Alarm receiving fault
• Siren fault
• Low battery of the keyfob
• Others

Arming with Fault


While the arming is stopped with fault, user in level 2 has the permission to arm the system with
fault (forced arming).
Fored arming only taks effect on the current arming operation.
The forced arming operation will be record in the event log.

5.2 Disarming
You can disarm the system with keyfob, card, client software, or mobile client.

Disarming Indication
The arming/disarming indicator flashes 30s while the user successfully disarm the system through
the entry/exit route.
The system will report the disarming result after the operation completed.
Entry Delay Duration
Set the entry delay duration within 45s to compliant the EN requirement.
Early Alarm
If either the intrusion or tampering alarm occurs on the enter/exit route when the control panel is
in the status of entry delay, the control panel then enters the early alarm mode.
The early alarm duration can be set (> 30s).
The control panel will reports the alarm only if the alarm event lasts over the duration of early
alarm with the addition of entry delay.

5.3 Use the Keyfob


The keyfod is used for away arming, stay arming, disarming, panic alarm, and clearing alarm.

54
Hybrid Security Control Panel User Manual

Figure 5-2 TypeⅠ Keyfob


Table 5-1 Type Ⅰ Keyfob Keys
No. Description
1 Indicator
Green: Successful Operation
Red: Press the Key
2 Away Arming
3 Clearing Alarm
4 Stay Arming
5 Disarming
6 Panic Alarm (Duress Alarm)
Hold the key for 2 seconds, an alarm report will be send to the alarm
center secretly without alerting.

55
Hybrid Security Control Panel User Manual

Figure 5-3 Type Ⅱ Keyfob


Table 5-2 Type Ⅱ Keyfob Keys
No. Description
1 Arming (Lock)
2 Disarming( Unlock)
3 Combo-​Function Key

Custom Combination Functions (except Arming +Ⅱ and Disarming +Ⅰ) : Away Arming, Stay
Arming, Disarming, Panic Alarm, Clearing Alarm, Fault Inspection, and Arming Status Check.
The following table shows the keyfob operation and responded indications.
Table 5-3 Type Ⅱ Keyfob Operations and Indications
Keyfob Operation Result Voice Prompt Indication
Armed Away/Stay Arming Red LED Flashes Once
Arming Failed Arming failed. Green LED Flashes Once
Arming Beep in the first 5 seconds. Green LED Flashes 9 Times
Fault prompt after the beep for
fault occurring
No Arming Permission Operation failed. The keyfob Yellow LED Flashes 4 Times
has no arming permission.
Fault Checking Finished No Voice Prompt Yellow LED Flashes 4 Times
Alarm Cleared Alarm cleared Green LED Flashes Once
No Permission for Clearing Operation failed. The keyfob Yellow LED Flashes 4 Times
Alarm has no arming permission.
Disarmed Disarmed Green LED Flashes Once

56
Hybrid Security Control Panel User Manual

Keyfob Operation Result Voice Prompt Indication


No Disarming Permission Operation failed. The keyfob Yellow LED Flashes 4 Times
has no arming permission.
Panic Alarm Uploaded Alarm Prompt Green LED Flashes Once
No Panic Alarm Permission Operation failed. The keyfob Yellow LED Flashes 4 Times
has no arming permission.

5.4 Use the Card


It is poissible to arm or disarm the system with the card.
While the system is not armed, present a valid card to the control panel to arm the system.
While the system is armed, present a valid card to the control panel to disarm the system.
The card operations and responding voice prompts are shown below.

Card Operation Result Voice Prompt


Armed with Enrolled Card Away/Stay Arming
Arming Failed with Enrolled Card Arming Failed
Start Arming with Enrolled Card Beep in the first 5 seconds. Fault promt after
the beep for fault occurring
No Arming Permission for the Enrolled Card No Voice Prompt
Fault Checking Finished with the Enrolled Card No Voice Prompt
Disarming with Enrolled Card Disarmed
No Disarming Permission for the Enrolled Card No Voice Prompt
Unenrolled Card Operation Invalid access

5.5 Use the Client Software


Steps
1. Download, install and register to the client software.
2. Add device in Control Panel → Device Management → Device .

Note
Set the device port No. as 80.

57
Hybrid Security Control Panel User Manual

Note
The user name and password when adding device are the activation user name and password.
3. Click Remote Configuration to enter the device configuration page after the device is
completely added,

5.5.1 Accessing the Operation Page


Control partitions and it's related zones in the Security Control Panel module.

Note
If there is no Security Control Panel displayed on the Control Panel page, click Selecting Modules,
and select Security Control Panel
.

5.5.2 Partition Operation


In the Security Control Panel module, you can control the selected partition , such as away arming,
stay arming, instant arming, disarming, clearing alarm, group bypass, and group bypass restoring.

Figure 5-4 Partition Operation


Click Edit to edit the partition name and display options.

58
Hybrid Security Control Panel User Manual

Figure 5-5 Editing Partition Information

5.5.3 Zone Operating


Click Linked Zone in the partition list of the Security Control Module. You can control the selected
partition related zones, such as arming, disarming, bypass, or bypass restoring.

Figure 5-6 Zone Operation

59
Hybrid Security Control Panel User Manual

5.6 Use the Web Client


Steps
1. Connect the device to the Ethernet.
2. Search the device IP address via the client software and the SADP software.
3. Enter the searched IP address in the address bar.

Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP
mode.

Note
When connecting the network cable with computer directly, the default IP Address is 192.0.0.64
4. Use the activation user name and password to login.

Note
Refer to Activation chapter for the details.

5.6.1 Add/Edit/Delete Tag (Card)


You can add tag to the security control panel and you can use the tag(card) to arm/disarm the
zone. You can also edit the tag information or delete the tag from the security control panel.
Steps
1. Click User Management → Card to enter the management page.

Figure 5-7 Tag Management


2. Click Add to enter the adding page.
3. Select the linked keypad.
4. Click OK and the tag information will be displayed in the list.

60
Hybrid Security Control Panel User Manual

Note
The tag supports at least 20-thousand serial numbers.
5. Optional: Click and you can change the tag(card) name.
6. Optional: Delete a single tag(card) or check multiple tags(cards) and click Delete to delete cards
in batch.

5.6.2 Add/Edit/Delete Keyfob


You can add keyfob to the security control panel and you can control the security control panel via
the keyfob. You can also edit the keyfob information or delete the keyfob from the security control
panel.
Steps
1. Click User Management → Keyfob to enter the Keyfob Management page.

Figure 5-8 Keyfob Management


2. Click Add and press any key on the keyfob.
3. Set the keyfob linked device type and linked device No..
4. Click OK.
5. Optional: Click to edit the keyfob information.
6. Optional: Delete a single keyfob or check multiple keyfobs and click Delete to delete the keyfobs
in batch.

5.6.3 Add/Edit/Delete User


Administrator can add user to the security control panel, edit the user information, or delete the
user from the security control panel. You can also assign different permissions to the new user.
Steps
1. Click User Management → User to enter the User Management page.
2. To compliant the EN requirement, slide the block to enable the setter and manufacturer .

61
Hybrid Security Control Panel User Manual

Note
The default password of the setter is setter12345, and the default password of the
manufacturer is hik12345. These codes will have to be changed when first connected.
3. Click Add.
4. Set the new user's information in the pop-up window, including the user type, the user name,
and the password.

Figure 5-9 Add User Page


5. Set the keypad password (numeric, 4~8 characters).
6. Check the check boxes to set the user permission.
The user can only operate the assigned permissions.
7. Click OK.
8. Optional: Enable the user in the Enable User column to allow the enabled user operating the
device.
9. Optional: Select an user and click Edit and you can edit the user's information and permission.
10. Optional: Delete a single user or check multiple users and click Delete to delete users in batch.

Note
The admin and the setter cannot be deleted.

5.6.4 Check Status


After setting the zone, repeater, and other parameters, you can view their status.
Click Status. You can view the status of zone, relay, siren, battery, communication, and repeater.

62
Hybrid Security Control Panel User Manual

• Zone: You can view the zone status, alarm status, detector battery capacity, and signal strength.
• Siren: You can view siren status, battery status, and signal strength.
• Relay: You can view relay status, battery status, and signal strength.
• Battery: You can view the battery charge.
• Communication: You can view the wired network "STATUS", Wi-Fi status, Wi-Fi signal strength,
cellular network status, used data, and cloud connection status.

63
Hybrid Security Control Panel User Manual

Appendix A. Trouble Shooting

A.1 Communication Fault

A.1.1 IP Conflict
Fault Description:
IP that the panel automatically acquired or set is same as other devices, resulting in IP conflicts.
Solution:
Search the current available IP through ping. Change the IP address and log in again.

A.1.2 Web Page is Not Accessible


Fault Description:
Use browser to access web pages and display Inaccessible.
Solutions:
1. Check whether the network cable is loose and the panel network is abnormal.
2. The panel port has been modified. Please add a port to the web address for further access.

A.1.3 Hik-Connect is Offline


Fault Description:
The web page shows that the Hik-Connect is offline.
Solution:
Network configuration of the panel is error, unable to access extranet.

A.1.4 Network Camera Drops off Frequently


Fault Description:
System reports multiple event logs of IPC disconnection and connection.
Solution:
Check whether the network communication or camera live view is proper.

A.1.5 Failed to Add Device on APP


Fault Description:

64
Hybrid Security Control Panel User Manual

When using APP to add devices, it is prompted that the device fails to be added, the device could
not be found, etc.
Solution:
Check the web page: whether the Hik-Connect is offline.

A.1.6 Alarm Information is Not Reported to APP/4200/Alarm Center


Fault Description:
After the alarm is triggered, the app/4200/ alarm center does not receive the alarm message.
Solution:
"Message push" - "alarm and tamper-proof notice" is not enabled. You should enable "alarm and
tamper-proof notice".

A.2 Mutual Exclusion of Functions

A.2.1 Unable to Enter Registration Mode


Fault Description:
Click the panel function key, and prompt key invalid.
Solution:
The panel is in "AP" mode. Switch the panel to "station" mode, and then try to enter the
registration mode again.

A.2.2 Unable to Enter RF Signal Query Mode


Fault Description:
Double-click the host function key, and the prompt button invalid.
Solution:
The panel is in "AP" mode. Solution: switch the panel to "station" mode, and then try to enter the
RF signal query mode again.

A.3 Zone Fault

A.3.1 Zone is Offline


Fault Description:
View status of zones which displays offline.

65
Hybrid Security Control Panel User Manual

Solution:
Check whether the detector reports undervoltage. Replace the detector battery

A.3.2 Zone Tamper-proof


Fault Description:
View status of zones which displays tamper-proof.
Solution:
Make tamper-proof button of the detector holden.

A.3.3 Zone Triggered/Fault


Fault Description:
View status of zones which displays triggered/fault.
Solution:
Reset the detector.

A.4 Problems While Arming

A.4.1 Failure in Arming (When the Arming Process is Not Started)


Fault Description:
When the panel is arming, prompt arming fails.
Solution:
The panel does not enable "forced arming", and when there is a fault in the zone, the arming will
fail. Please turn on the "forced arming" enable, or restore the zone to the normal status.

A.5 Operational Failure

A.5.1 Failed to Enter the Test Mode


Fault Description:
Failed to enable test mode, prompting "A fault in the zone".
Solution:
Zone status, alarm status or zone power is abnormal.

66
Hybrid Security Control Panel User Manual

A.5.2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm
Clearing Report
Fault Description:
The alarm clearing operation on the panel does not produce the alarm clearing report.
Solution:
In the absence of alarm, no report will be uploaded for arm clearing.

A.6 Mail Delivery Failure

A.6.1 Failed to Send Test Mail


Fault Description:
when configure the mail information, click "test inbox" and prompt test fails.
Solution:
Wrong configuration of mailbox parameters. Please edit the mailbox configuration information, as
shown in table 1/1.

A.6.2 Failed to Send Mail during Use


Fault Description:
Check the panel exception log. There is "mail sending failure".
Solution:
The mailbox server has restricted access. Please log in to the mailbox to see if the mailbox is
locked.

A.6.3 Failed to Send Mails to Gmail


Fault Description:
The receiver's mailbox is Gmail. Click "Test Inbox" and prompt test fails.
1. Google prevents users from accessing Gmail using apps/devices that do not meet their security
standards.
Solution:
Log in to the website (https://www.google.com/settings/security/lesssecureapps), and "start using
access of application not safe enough". The device can send mails normally.
2. Gmail does not remove CAPTCHA authentication.

67
Hybrid Security Control Panel User Manual

Solution: Click the link below, and then click "continue" (https://accounts.google.com/b/0/
displayunlockcaptcha).

A.6.4 Failed to Send Mails to QQ or Foxmail


Fault Description:
The receiver's mailbox is QQ or foxmail. Click "Test Inbox" and prompt test fails.
1. Wrong QQ account or password.
Solution:
the password required for QQ account login is not the password used for normal login. The specific
path is: Enter the email account → device → account → to generate the authorization code, and
use the authorization code as the login password.
2. SMTP login permission is needed to open.

A.6.5 Failed to Send Mails to Yahoo


Fault Description:
The receiver's mailbox is yahoo. Click "test inbox" and prompt test fails.
1. The security level of mailbox is too high.
Solution:
Go to your mail account and turn on "less secure sign-in".

A.6.6 Mail Configuration

Table A-1 Mail Configuration


Mail Type Mail Server SMTP Port Protocols Supported
Gmail smtp.gmail.com 587 TLS/STARTTLS (TLS)
Outlook smtp.office365.com 587 STARTTLS (TLS)
Hotmail smtp.office365.com 587 STARTTLS (TLS)
QQ smtp.qq.com 587 STARTTLS (TLSv1.2)
Yahoo smtp.mail.yahoo.com 587 STARTTLS (TLSv1.2)
126 smtp.126.com 465 SSL/TLS

68
Hybrid Security Control Panel User Manual

Mail Type Mail Server SMTP Port Protocols Supported


Sina smtp.sina.com 25/465/587 SSL/TLS/STARTTLS
(SSL/TLS)

Note
About mail configuration:
• SMTP port
Default to use port 25 without encryption, or using port 465 if SSL/TLS is used. Port 587 is
mainly used for STARTTLS protocol mode.
The STARTTLS protocol mode that is usually used by default when selecting TLS.
• User name
User name of Outlook and Hotmail require full names, and other email require a prefix before
@.

69
Hybrid Security Control Panel User Manual

Appendix B. Input Types

Table B-1 Input Types


Input Types Operations
Instant Zone The system will immediately alarm when it detects triggering
event after system armed.
Audible Response Trigger the system sound and siren.
Voice Prompt: Zone X alarm.
Perimeter Zone The system will immediately alarm when it detects triggering
event after system armed.
Audible Response: Trigger the system sound and siren. There is a
configurable interval between alarm and siren output, which
allows you to check the alarm and cancel the siren output during
the interval.
Voice Prompt: Zone X perimeter alarm.
Delayed Zone The system provides you time to leave through or enter the
defense area without alarm.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X alarm.
Follow Zone The zone acts as delayed zone when it detects triggering event
during system Entry Delay, while it acts as instant zone
otherwise.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X follow alarm.
24H Silence Zone The zone activates all the time without any sound/siren output
when alarm occurs.
Audible Response: No system sound (voice prompt or siren).
Panic Zone The zone activates all the time.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X panic alarm.
Fire Zone The zone activates all the time with sound/siren output when
alarm occurs.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X fire alarm.

70
Hybrid Security Control Panel User Manual

Input Types Operations


Gas Zone The zone activates all the time with sound/siren output when
alarm occurs.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X gas alarm.
Medical Zone The zone activates all the time with beep confirmation when
alarm occurs.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X medical alarm.
Timeout Zone The zone activates all the time. The zone type is used to monitor
and report the "ACTIVE" status of a zone, but it will only report
and alarm this status after the programmed time has expired (1
to 599) seconds.
Disabled Zone Alarms will not be activated when the zone is triggered or
tampered.
Audible Response: No system sound (voice prompt or siren).
Virtual Zone (Keypad/Keyfob) The system will immediately alarm when it detects triggering
event after system armed.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Buzzer beeps.
Tamper Alarm The system will immediately alarm when it detects triggering
event after system armed.
Audible Response: Trigger the system sound and siren.
Voice Prompt: Zone X tampered.
Link Trigger the linked device when event occurs.
e.g. The output expander linked relays will be enabled when the
control panel is armed.
Arm When armed: Voice prompt for fault. You can handle the fault
according to the voice prompt.
• System sound for arming with card or keyfob.
• Voice prompt for fault. You can handle the fault according to
the voice prompt.
• Fault event displays on client. You can handle the fault via
client software or mobile client.
Voice Prompt: Armed/Arming failed.

71
Hybrid Security Control Panel User Manual

Appendix C. Output Types

Table C-1 Output Types


Output Types Active Restore
Arming Arm the control panel After the configured output
delay
Disarming Disarm the control panel After the configured output
delay
Alarm When alarm event occurs. The After the configured output
alarm output will be activated delay, disarm the control panel
after the configured exit/enter or clear alarm
delay.
Zone Linkage When alarm event occurs, the After the configured output
linked relay will output alarm duration
siganl.
Manual Operation Enable relays manually Over the triggering time or
disable the relays manually

72
Hybrid Security Control Panel User Manual

Appendix D. Event Types

Table D-1 Event Types


Event Types Custom Default 1 Default 2 Default 3 Default 4
(client (alarm (mobile client) (telephone)
software receiving
notification) center 1/2)
Alarm and ×/√ √ √ √ √
Tamper
Life Safety ×/√ √ √ √ √
Event
System Status ×/√ √ × × ×
Panel ×/√ √ × × ×
Management

73
Hybrid Security Control Panel User Manual

Appendix E. Access Levels

Level Description
1 Access by any person; for example the general public.
2 User access by an operator; for example customers (systems users).
3 User access by an engineer; for example an alarm company professional.
4 User access by the manufacturer of the equipment.
Table E-1 Permission of the Access Level
Function Permission
1 2 3a 4b
Arming No Yes Yes No
Disarming No Yes Yes No
Restoring/Clearing Alarm No Yes Yes No
Entering Walk Test Mode No Yes Yes No
Bypass(zone)/Disabling/Force Arming No Yes Yes No
Adding/Changing Verification Code No Yesd Yesd Yesd
Adding/​Editing Level 2 User and No Yes Yes No
Verification Code
Adding/​Editing Configuration Data No No Yes No
Replacing software and firmware No No No Yes

Note
aBy the condition of being accredited by user in level 2. bBy the condition of being accredited by
user in level 2 and level 3. dUsers can only edit their own user code.
• The user level 2 can assign the login permission of the controller to the user level 3 or level 4 in
the settings page.
• The user level 2 should assign permissions to the user level 3 if the user level 3 wants to login
the controller remotely.
• When the controller is bypassed, the user level 3 can login the controller without the permission
assignment of the user level 2.

74
Hybrid Security Control Panel User Manual

• When the controller is bypassed, the user level 3 can login the controller without the permission
assignment of the user level 2.
• The user level 4 can login the controller only when the user level 2 or level 3 has assigned
permissions to the user level 4.

75
Hybrid Security Control Panel User Manual

Appendix F. SIA and CID Code

Table F-1 SIA and CID Code


SIA Code CID Code Description
BA E130 Burglary Alarm
BH R130 Burglary Alarm Restored
HA E122 Silent Panic Alarm
HH R122 Silent Panic Alarm Restored
NA E780 Timeout Alarm
BH R780 Timeout Alarm Restored
PA E120 Panic Alarm
PH R120 Panic Alarm Restored
BA E131 Perimeter Alarm
BH R131 Perimeter Alarm Restored
BA E134 Entry/Exit Alarm
BH R134 Entry/Exit Alarm Restored
TA E137 Device Tampered
TR R137 Device Tamper Restored
TA E383 Detector Tampered
TR R383 Detector Tamper Restored
TA E321 Wireless Siren Tampered
TR R321 Wireless Siren Tamper
Restored
TA E334 Wireless Repeater Tampered
TR R334 Wireless Repeater Tamper
Restored
ES E341 Expander or Wireless Device
Tampered
EJ R341 Expanderor Wireless Device
Tamper Restored

76
Hybrid Security Control Panel User Manual

SIA Code CID Code Description


PA E120 Keypad/Keyfob Panic Alarm
MA E100 Medical Alarm
MH R100 Medical Alarm Restored
GA E151 Gas Leakage Alarm
GH R151 Gas Leakage Alarm Restored
FA E110 Fire Alarm
FH R110 Fire Alarm Restored
OP E401 Disarming
CL R401 Away Arming
OA E403 Auto Disarming
CA R403 Auto Arming
BC E406 Alarm Clearing
CL R441 Stay Arming
CD E455 Auto Arming Failed
BB E570 Zone Bypassed
BU R570 Zone Bypass Restored
CT E452 Late to Disarm
AT E301 AC Power Loss
AR R301 AC Power Restored
YT E302 Low System Battery
YR R302 Low System Battery Restored
XT E384 Low Keyfob Battery
XR R384 Low Keyfob Battery Restored
YM E311 Battery Fault
YR R311 Battery Fault Restored
DK E501 Keypad Locked
DO R501 Keypad Unlocked
TS E607 Test Mode Entered
TE R607 Test Mode Exited

77
Hybrid Security Control Panel User Manual

SIA Code CID Code Description


RN E305 Control Panel Reset
UY E321 Wireless Siren Disconnected
UJ R321 Wireless Siren Connected
UY E381 Wireless Detector
Disconnected
UJ R381 Wireless Detector Connected
XT E384 Wireless Detector Low Voltage
XR R384 Normal Wireless Detector
Voltage
ET E333 Expander or Wireless Device
Disconnected
ER R333 Expander or Wireless Device
Connected
UY E334 Wireless Repeater
Disconnected
UJ R334 Wireless Repeater Connected
NT E352 Cellular Data Network
Disconnected
NR R352 Cellular Data Network
Connected
NT E352 SIM Card Exception
NR R352 SIM Card Restored
NT E352 Network Flow Exceeded
NT E351 IP Address Conflicted
NR R351 Normal IP address
NT E351 Wired Network Exception
NR R351 Normal Wired Network
NT E351 Wi-Fi Communication Fault
NR R351 Wi-Fi Connected
XQ E344 RF Signal Exception
XH R344 Normal RF Signal

78
Hybrid Security Control Panel User Manual

SIA Code CID Code Description


/ E306 Expander Deleted
/ R306 Expander Added
/ E306 Detector Deleted
/ R306 Detector Added
/ E306 Wireless Repeater Deleted
/ R306 Wireless Repeater Added
/ E306 Wireless Siren Deleted
/ R306 Wireless Siren Added
BA E130 Burglary Alarm
BH R130 Burglary Alarm Restored
XT E338 Low Wireless Device Battery
XR R338 Low Wireless Device Battery
Restored
YC E354 Uploading Report Failed
YK R354 Report Uploading Restored
LB E627 Programming Mode Entered
LX E628 Programming Mode Exited
CI E454 Arming Failed
/ R250 Patrol
/ E306 Wireless Device Deleted
/ R306 Wireless Device Added
XT E384 Low Wireless Siren Battery
XR R384 Low Wireless Siren Battery
Restored
NT E351 Wired Network/Wi-Fi ATP
Failed
NR R351 Wired Network/Wi-Fi ATP
Restored
NT E352 Cellular Network ATP Failed
NR R352 Cellular Network ATP Restored

79
UD00000B

You might also like