Hikvision AX Hybrid Security Control Panel User Manual
Hikvision AX Hybrid Security Control Panel User Manual
User Manual
Hybrid Security Control Panel User Manual
Legal Information
User Manual
©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision
Digital Technology Co., Ltd. ("Hikvision") reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, partially or wholly, by any means, without the
prior written permission of Hikvision.
Please use this user manual under the guidance of professionals.
Trademarks
and other Hikvision marks are the property of Hikvision and are
registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates.
Other trademarks mentioned in this manual are the properties of their respective owners. No right
of license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL.
HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE
USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION
CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE
WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY
AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL
OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER
ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL
PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS
THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED
WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.
i
Hybrid Security Control Panel User Manual
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazardous situation which, if not avoided, will or could
Danger result in death or serious injury.
ii
Hybrid Security Control Panel User Manual
Contents
Chapter 1 System Description ..................................................................................................... 1
Chapter 2 Specifications ............................................................................................................. 2
Chapter 3 Activation ................................................................................................................... 5
3.1 Activate Device via Web Browser .......................................................................................... 5
3.2 Activate Device via iVMS-4200 .............................................................................................. 5
3.3 Activate via SADP ................................................................................................................... 6
Chapter 4 Configuration ............................................................................................................. 8
4.1 Use the Client Software ......................................................................................................... 8
4.2 Use the Web Client ................................................................................................................ 8
4.2.1 Communication Settings ............................................................................................... 9
4.2.2 Device Management ................................................................................................... 21
4.2.3 Partition Settings ......................................................................................................... 26
4.2.4 Video Management .................................................................................................... 30
4.2.5 Permission Management ............................................................................................ 33
4.2.6 Maintenance ............................................................................................................... 35
4.2.7 System Settings ........................................................................................................... 37
4.2.8 Check Status ................................................................................................................ 43
4.3 Use Mobile Client ................................................................................................................. 43
4.3.1 Download and Login the Mobile Client ....................................................................... 43
4.3.2 Add Control Panel to the Mobile Client ...................................................................... 43
4.3.3 Add Peripheral to the Control Panel ........................................................................... 45
4.3.4 Add a Camera to the Zone .......................................................................................... 46
4.3.5 Set Zone ...................................................................................................................... 46
4.3.6 Arm/Disarm the Zone ................................................................................................. 47
4.3.7 Set Arming/Disarming Schedule ................................................................................. 48
4.3.8 Bypass Zone ................................................................................................................ 48
iii
Hybrid Security Control Panel User Manual
iv
Hybrid Security Control Panel User Manual
v
Hybrid Security Control Panel User Manual
1
Hybrid Security Control Panel User Manual
Chapter 2 Specifications
2
Hybrid Security Control Panel User Manual
3
Hybrid Security Control Panel User Manual
4
Hybrid Security Control Panel User Manual
Chapter 3 Activation
In order to protect personal security and privacy and improve the network security level, you
should activate the device the first time you connect the device to a network.
Note
If you connect the device with the PC directly, you need to change the IP address of your PC to
the same subnet as the device. The default IP address of the device is 192.0.0.64.
2. Create and confirm the admin password.
Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
3. Click OK to complete activation.
4. Edit IP address of the device.
1) Enter IP address modification page.
2) Change IP address.
3) Save the settings.
5
Hybrid Security Control Panel User Manual
Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
6. Click OK to start activation.
Device status will change to Active after successful activation.
7. Edit IP address of the device.
1) Select a device and click Modify Netinfo at Online Device.
2) Change the device IP address to the same subnet with your computer by either modifying
the IP address manually or checking DHCP.
3) Input the admin password of the device and click OK to complete modification.
6
Hybrid Security Control Panel User Manual
Caution
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
4. Click Activate to start activation.
7
Hybrid Security Control Panel User Manual
Chapter 4 Configuration
Configure the security control panel in the web client or the remote configuration page in client
software.
Note
Set the device port No. as 80.
Note
The user name and password when adding device are the activation user name and password.
3. Click Remote Configuration to enter the device configuration page after the device is
completely added,
Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP
mode.
Note
When connecting the network cable with computer directly, the default IP Address is 192.0.0.64
4. Use the activation user name and password to login.
Note
Refer to Activation chapter for the details.
8
Hybrid Security Control Panel User Manual
Wired Network
If the device is linked to the wired network, you can set the wired network parameters when you
want to change the device IP address and other network parameters.
Steps
Note
The function is not supported by some device models.
1. In iVMS-4200 client software, enter the Device Management page.
2. Select the device in the Device for Management list, click Remote Configuration.
3. Click Communication Parameters → Ethernet to enter the Wired Network Parameters page.
Note
By default, the HTTP port is 80.
5. Optional: Set correct DNS server address if the device needs to visit Hik-Connect server via a
domain name.
9
Hybrid Security Control Panel User Manual
6. Click Save.
Wi-Fi
You can set the Wi-Fi parameters if there are secure and credible Wi-Fi networks nearby.
Steps
1. Click Communication Parameters → Wi-Fi to enter the Wi-Fi page.
10
Hybrid Security Control Panel User Manual
Note
If enable DHCP, the device will gain the Wi-Fi parameters automatically.
5. Click Save.
Cellular Network
Set the cellular network parameters if you insert a SIM card inside the device. By using the cellular
network, the device can upload alarm notifications to the alarm center.
Before You Start
Insert a SIM card into the device SIM card slot.
Steps
1. Click Communication Parameters → Cellular Data Network to enter the Cellular Data Network
Settings page.
11
Hybrid Security Control Panel User Manual
12
Hybrid Security Control Panel User Manual
Alarm Center
You can set the alarm center's parameters and all alarms will be sent to the configured alarm
center.
Steps
1. Click Communication Parameters → Alarm Receiving Center to enter the Alarm Receiving
Center page.
Note
Only if the alarm receiver center 1 is enabled, you can set the alarm receiver center 2 as the
backup channel and edit the channel parameters.
3. Select the Protocol Type as ADM-CID, EHome, SIA-DCS, *SIA-DCS, or *ADM-CID to set
uploading mode.
- ADM-CID or SIA-DCS
You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain
name, port number, account code, timeout, re-upload times and heartbeat interval.
13
Hybrid Security Control Panel User Manual
Note
Set the heartbeat interval with the range from 10 to 3888000 seconds.
- EHome
You do not need to set the EHome protocol parameters.
- *SIA-DCS or *ADM-CID
14
Hybrid Security Control Panel User Manual
You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain
name, port number, account code, retry timeout period , attempts, heartbeat interval,
encryption arithmetic, password length and secret key.
Note
Set the heartbeat interval with the range from 10 to 3888000 seconds.
For encryption arithmetic: The panel support encryption format for information security
according to DC-09, AES-128, AES-192 and AES-256 are supported when you configure the
alarm center.
For the secret key: When you use an encrypted format of DC-09, a key should be set when
you configure the ARC. The key would be issued offline by ARC , which would be used to
encrypt the message for substitution security.
4. Click Save.
Notification Push
When an alarm is triggered, if you want to send the alarm notification to the client, alarm center,
cloud or mobile phone, you can set the notification push parameters.
Steps
1. Click Communication Parameters → Event Communication .
15
Hybrid Security Control Panel User Manual
Note
If you want to send the alarm notifications to the mobile client, you should also set the Mobile
Phone Index, Mobile Phone Number , and check the Notification Type.
Note
For message notification in alarm receiving center, select the center index before settings.
3. Click Save.
Result
16
Hybrid Security Control Panel User Manual
Option Notification
Mobile Phone Number
Notification Type SMS & Voice Call Check Box
Alarms and Tampers
Life Safety Alarms
Maintenance and Faults
Operation Events
Note
You can arm/disarm/clear alarm via sending SMS. The number of the SIM card installed in the
control panel is the receiver number.
The control massage is Command + Operation Type + Target , and the details are show below.
For examples, command 00+1+1 indicates partition 1 disarming, and command 00+1+1 indicates
partition 1 away arming.
Command Operation Type Target
2 Digits 1 Digit No more than 3 Digits
00: Disarming 1: Partition Operation 0: All partition arming/
01: Away Arming disarming/clearing Alarm
02: Stay Arming 1: Partition 1 arming/
03: Alarm Clearing disarming/clearing Alarm
...
13: Partition 13 arming/
disarming/clearing Alarm
...
Hik-Connect
If you want to register the device to the Hik-Connect mobile client for remote configuration, you
should set the Hik-Connect registration parameters.
Before You Start
• Connect the device to the network via wired connection, dial-up connection, or Wi-Fi
connection.
• Set the device IP address, subnet mask, gateway and DNS server in the LAN.
Steps
1. Click Communication Parameters → Hik-Connect Registration to enter the Hik-Connect
Registration Settings page.
17
Hybrid Security Control Panel User Manual
Note
By default, the device Hik-Connect service is enabled.
You can view the device status in the Hik-Connect server (www.hik-connect.com).
3. Enable Custom Server Address.
The server address is already displayed in the Server Address text box.
4. Select a communication mode from the drop-down list according to the actual device
communication method.
Auto
The system will select the communication mode automatically according to the sequence of,
wired network, Wi-Fi network, and cellular data network. Only when the current network is
disconnected, will the device connect to other network.
Wired Network Priority
The wired network has the highest priority.
Note
When the device supports cellular data network connection and the wired network is
disconnected, it will connect to the cellular data network. When the wired network is
18
Hybrid Security Control Panel User Manual
restored, only if the cellular data network is disconnected, does the device connect to the
wired network.
Wired &Wi-Fi
The system will select wired network first. If no wired network detected, it will select Wi-Fi
network.
Cellular Data Network
The system will select cellular data network only.
5. Optional: Change the authentication password.
Note
• By default, the authentication password is displayed in the text box.
• The authentication password should contain 6 to 12 letters or digits. For security reasons, an
8-character password is suggested, which containing two or more of the following character
types: uppercases, lowercases, and digits.
6. Click Save.
EHome
In this section, you can create an EHome account, and edit the IP address/domain name, port
number.
Steps
1. Click Communication Parameters → Ehome Registration to enter the Ehome Registration
Settings page.
19
Hybrid Security Control Panel User Manual
Note
By default, the port number for EHome is 7660.
6. Set an account, including the Device ID and Ehome Login Password.
7. Click Save.
NAT
Universal Plug and Play (UPnP™) is a networking architecture that provides compatibility among
networking equipment, software and other hardware devices. The UPnP protocol allows devices to
connect seamlessly and to simplify the implementation of networks in the home and corporate
environments.
Enable the UPnP function, and you don’t need to configure the port mapping for each port, and
the device is connected to the Wide Area Network via the router.
Steps
1. Click Communication Parameters → NAT to enter the page.
20
Hybrid Security Control Panel User Manual
What to do next
Enter the tasks the user should do after finishing this task (optional).
Zone
You can set the zone parameters on the zone page.
Steps
1. Click Device Management → Zone to enter the Zone page.
21
Hybrid Security Control Panel User Manual
Note
You can set 2 different time durations in Partition Management → Schedule & Timer .
Follow Zone
The zone acts as delayed zone when it detects triggering event during system Entry Delay,
while it acts as instant zone otherwise.
Perimeter Zone
The system will immediately alarm when it detects a triggering event after the system is
armed. There is a configurable interval timer between the alarm activation and siren output
"Siren Delay Time (Perimeter Alarm) 0 to 600 Seconds". This option allows you to check the
alarm and cancel the siren output during the interval time in case of false alarm.
When the zone is armed, you can set the peripheral alarm delayed time in Partition
Management → Schedule & Timer . You can also mute the siren in the delayed time.
22
Hybrid Security Control Panel User Manual
Note
The resistor wired on the on-board zone should be the same as the resistor configured on this
page.
6. Select a detector type.
7. Enable Stay Arming Bypass, or Silent Alarm according to your actual needs.
Note
Some zones do not support the function. Refer to the actual zone to set the function.
8. Select the panel video channel No. and zone tampering wiring mode.
9. Click OK.
23
Hybrid Security Control Panel User Manual
Note
After setting the zone, you can enter Status → Zone to view the zone status.
What to do next
Click Zone → Zone Module , you can see the zone module information including module status,
module addresss, module channel No., and module type.
Relay
If you want to the link the device with a relay output to output the alarm, set the output
parameters.
Steps
1. Click Device Management → Relay to enter the Output page.
Note
After the relay is configured, you can click Status → Relay to view the output status.
Siren
The siren is enrolled to the control panel via the wireless receiver module, and the 868 Mhz
wireless siren can be enrolled to the hybrid control panel via the wireless receiver that is at the
address of 9.
24
Hybrid Security Control Panel User Manual
Steps
1. Click Device Management → Siren to enter the Siren page.
Note
After the siren is configured, you can click Status → Siren to view the siren status.
Keypad
The keypad is connected to the control panel via RS-485 wiring. You can refer to Hybrid Control
Panel Quick Start Guide for wiring details.
Steps
1. Click Control Device → Keypad to enter the page.
2. Click to enter the Keypad Settings page.
3. Set the keypad name.
4. Select the keypad linked partition.
5. Click OK.
Module
The wired module is connected to the control panel via RS-485 wiring. You can refer to the Hybrid
Control Panel Quick Start Guide for details.
Steps
1. Click Device Management → Module Information to enter the page.
2. Click to enter the module settings page.
3. Set the module name.
4. Click OK.
25
Hybrid Security Control Panel User Manual
Basic Settings
You can link zones to the selected partition.
Steps
1. Click Partition Management → Basic Settings to enter the page.
26
Hybrid Security Control Panel User Manual
Note
the default public partition is partition 1
3. Select partition(s) to link to the public partition in the list.
Note
It is required to select at least a partition to link to the public paritition.
4. Click Save to set the partition as public partition.
27
Hybrid Security Control Panel User Manual
Note
The available time duration range is from 5s to 600s.
Exit Delay
If you want to exit the zone without triggering the alarm, you can set the exit delay duration.
Note
The available time duration range is from 5 s to 600 s.
4. Optional: Set the following parameters according to actual needs.
Enable Auto Arming
28
Hybrid Security Control Panel User Manual
Enable the function and set the arming start time. The zone will be armed according to the
configured time.
Note
The auto arming time and the auto disarming time cannot be the same.
Note
The buzzer beeps slowly 2 minutes before the auto arming starts, and beeps rapidly 1 minute
before the auto arming starts.
Note
You can select to enable forced arming on the System Options page. While the function is
enabled, the system will be armed regardless of the fault.
Note
If the public partition is enabled, the partition 1 dose not support auto arming.
Enable Auto Disarming
Enable the function and set the disarming start time. The zone will be disarmed according to
the configured time.
Note
The auto arming time and the auto disarming time cannot be the same.
Note
If the public partition is enabled, the partition 1 dose not support auto disarming.
Late to Disarm
Enable the function and set the time. If the alarm is triggered after the configured time, the
person will be considered as late.
Note
You should enable the Panel Management Notification function in Communication
Parameters → Event Communication before enabling the Late to Disarm function.
Weekend Exception
Enable the function and the zone will not be armed in the weekend.
Siren Delay Time (Perimeter Alarm)
If you have set the perimeter zone, you can set the delayed time for the zone.
29
Hybrid Security Control Panel User Manual
Note
The available time duration range is from 0 s to 600 s.
Alarm Duration
Set the time duration of the alarm.
Note
The available time duration range is from 1 s to 900 s.
5. Click Save.
30
Hybrid Security Control Panel User Manual
31
Hybrid Security Control Panel User Manual
32
Hybrid Security Control Panel User Manual
Add/Edit/Delete User
Administrator can add user to the security control panel, edit the user information, or delete the
user from the security control panel. You can also assign different permissions to the new user.
Steps
1. Click User Management → User to enter the User Management page.
2. To compliant the EN requirement, slide the block to enable the setter and manufacturer .
Note
The default password of the setter is setter12345, and the default password of the
manufacturer is hik12345. These codes will have to be changed when first connected.
3. Click Add.
4. Set the new user's information in the pop-up window, including the user type, the user name,
and the password.
33
Hybrid Security Control Panel User Manual
Note
The admin and the setter cannot be deleted.
Add/Edit/Delete Keyfob
You can add keyfob to the security control panel and you can control the security control panel via
the keyfob. You can also edit the keyfob information or delete the keyfob from the security control
panel.
Steps
1. Click User Management → Keyfob to enter the Keyfob Management page.
34
Hybrid Security Control Panel User Manual
Note
The tag supports at least 20-thousand serial numbers.
5. Optional: Click and you can change the tag(card) name.
6. Optional: Delete a single tag(card) or check multiple tags(cards) and click Delete to delete cards
in batch.
4.2.6 Maintenance
Test
The security control panel supports walk test function.
Steps
1. Enter Maintenance → Test → to enable the function.
35
Hybrid Security Control Panel User Manual
Diagnosis
The control panel supports diagnosis of system, alarm, wireless device, Wi-Fi, and cloud platform
Steps
1. Enter Maintenance → Diagnosis .
2. Select system, alarm, wireless device, Wi-Fi, or cloud platform as the diagnosis module. Or you
can select Custom, and enter the custom command (1~64) characters.
3. Click Diagnosis to start the operation.
4. View the diagnosis result in the information box.
Export File
You can export debugging file to the PC.
Steps
1. Click Maintenance → Export File to enter the page.
36
Hybrid Security Control Panel User Manual
Authority Management
Set the authority options.
Click System → System Options to enter the Option Management page.
Forced Arming
If the option is enabled and there are active faults in a zone, the zone will be bypassed
automatically.
Note
You should disable the arming function in the Advanced Settings page. Or the forced arming
function cannot be valid.
System Faults
If the option is enabled, the device will upload the system fault report automatically.
37
Hybrid Security Control Panel User Manual
When the function is enabled, if the device is armed, the indicator will be on all the time. And if
the device is disarmed, the indicator will be off.
Prompt Fault When Arming
If the device applies EN standard, by default, the function is disabled. In this case, the device will
not prompt faults during the arming procedure.
Enable Early Alarm
If you enable the function, when the zone is armed and the zone is triggered, the alarm will be
triggered after the delay time.
Note
The early alarm will be taken effect only after the delayed zone is triggered.
Delay
When the early alarm function is enabled, you should set the delay time. The alarm will be
triggered after the configured delay time.
Fault Check
The system determines whether to check the faults listed on the page. The system will only check
the fault that is selected.
Detect Network Camera Disconnection
If the option is enabled, when the linked network camera is disconnected, an alarm will be
triggered.
Battery Supervision
If the option is enabled, when battery is disconnected or out of charge, the device will not
upload events.
Wired Network Fault Check
If the option is enabled, when the wired network is disconnected or with other faults, the alarm
will be triggered.
Wi-Fi Fault Check
If the option is enabled, when the Wi-Fi is disconnected or with other faults, the alarm will be
triggered.
Cellular Network Fault Check
If the option is enabled, when the cellular data network is disconnected or with other faults, the
alarm will be triggered.
SIM Card Fault Check
If the option is enabled, the alarm will be triggered for faults of the SIM card.
AC Power Down Check Time
38
Hybrid Security Control Panel User Manual
The system checks the fault after the configured time duration after AC power down.
Enrollment Method
Steps
1. Click System → System Options → Adding Through to enter the enrollment method page.
Time Settings
You can set the device time zone, synchronize device time, and set the DST time. The device
supports time synchronization via Hik-Connect server.
Time Management
Click System → Date and Time to enter the Time Management page.
You can select a time zone from the drop-down list.
You can synchronize the device time manually with NTP. Check the check box of NTP Time Sync.,
enter the server address and port No., and set the synchronization interval.
You can synchronize the device time manually. Or check Sync. with Computer Time to synchronize
the device time with the computer time.
DST Management
Click System → Date and Time → DST Management to enter the Time Management page.
39
Hybrid Security Control Panel User Manual
Security Settings
SSH Settings
Enable or disable SSH (Secure Shell) according to your actual needs.
Click System → Security → SSH Settings to enter the SSH Settings page and you can enable or
disable the SSH function.
Note
The administrator has two more attempts than the configured value.
Locked Duration
Set the locking duration when the account is locked.
Note
The available locking duration is 5s to 1800s.
40
Hybrid Security Control Panel User Manual
3. Click to unlock the account or click Unlock All to unlock all locked users in the list.
4. Click Save.
System Maintenance
You can reboot the device, restore default settings, import/export configuration file, or upgrade
the device remotely.
Select the device and click Remote Configuration in the client software, or enter the device IP
address in the address bar of the web browser. Click System → System Maintenance to enter the
Upgrade and Maintenance page.
Reboot
41
Hybrid Security Control Panel User Manual
Note
Do not power off when the device is upgrading.
42
Hybrid Security Control Panel User Manual
Note
For details, see User Manual of Hik-Connect Mobile Client.
3. Run and login the client.
Note
Normally, the QR code is printed on the label stuck on the back cover of the control panel.
- Tap → Manual Adding to enter the Add Device page. Input the device serial No. with the
Hik-Connect Domain adding type.
43
Hybrid Security Control Panel User Manual
3. Connect to a network.
1) Tap Connect to a Network.
Note
You need to remove the rear panel of the device and the AP/STA switch is on the back of the
device.
4) Select a stable Wi-Fi for the device to connect and tap Next.
Note
Make sure the device and the mobile phone are connect to the same Wi-Fi.
4. Follow the instructions on the Device's Wi-Fi page and connect the mobile phone with the
control panel via wireless connection.
Note
Select HAP-Device Serial No. as the hotspot and enter the hotspot password. By default, the
password is AP + Device Verification Code. The verification code is normally printed on the
device label.
5. Return to the mobile client and create a device password for device activation.
Note
We highly recommend you to create a strong password of your own choosing (using a minimum
of 8 characters, including at least three kinds of following categories: upper case letters, lower
case letters, numbers, and special characters) in order to increase the security of your product.
And we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
6. Optional: If you add the control panel by entering its serial No., you should enter the device
verification code and tap OK.
44
Hybrid Security Control Panel User Manual
Note
By default, the verification code is printed on the device label.
7. Follow the instructions and change the control panel to the Station mode. Tap Next.
Note
You need to remove the rear panel of the device and the AP/STA switch is on the back of the
device.
8. When the control panel adding is completed, tap Finish.
The control panel is listed on the Hik-Connect page.
Note
Some control panel models do not support add zones or wireless devices remotely. You should add
them to the control panel directly. For details, see the user manual of the wireless device.
1. Tap to enter the Scan QR Code page.
2. Scan the peripheral's QR code to add the peripheral.
3. Select a peripheral type, and create a name for the peripheral.
Note
• When the adding peripheral is a detector, the detector will be linked to the zone. You can
view the detector information in the Zone tab.
• Up to 32 detectors can be linked to the zone.
The added peripheral will be listed in the Zone tab or the Wireless Device tab.
Note
One of the most important factors for a reliable wireless installation is the signal
strength between a wireless device and the panel. If a device is out of range it will not be able
to send events to the control panel therefore it is recommended that a signal strength test is
performed before fixing devices into place. The control panel has advanced signal strength
45
Hybrid Security Control Panel User Manual
mechanism that operates by monitoring all inputs/bells on the web browser. The page will need
to be re-freshed every time for a new test. See also Appearance-Function Button.
When performing a signal strength test it is recommended that the system is tested in the
‘worst case scenario’ for example with all doors and windows closed.
46
Hybrid Security Control Panel User Manual
47
Hybrid Security Control Panel User Manual
48
Hybrid Security Control Panel User Manual
49
Hybrid Security Control Panel User Manual
Note
The alias should contain 1 to 32 characters.
The card is displayed in the Card/Tag Management page.
Note
Make sure the keyfob's frequency is the same as the control panel's.
1. Tap to enter the Add Keyfob page.
2. Follow the instruction on the page and press any key on the keyfob to add.
3. Create a name for the keyfob and tap Finish.
The keyfob is listed in the Wireless Device page.
4. Optional: You can view the keyfob's serial No. and you can also delete it.
50
Hybrid Security Control Panel User Manual
51
Hybrid Security Control Panel User Manual
52
Hybrid Security Control Panel User Manual
Chapter 5 Operations
You can use the client keyfob, card, client software, or mobile client to do arming, disarming,
bypass, and zone disabling.
5.1 Arming
You can use keyfob, card, client software, mobile client to arm your system.
After the arming command is sending to control panel, the sytem will check the detector status. If
the detector is in fault, you will need to choose whether to arm the system with fault.
While the system is armed, the control panel will prompt the result in 5s, and upload the arming
report.
53
Hybrid Security Control Panel User Manual
5.2 Disarming
You can disarm the system with keyfob, card, client software, or mobile client.
Disarming Indication
The arming/disarming indicator flashes 30s while the user successfully disarm the system through
the entry/exit route.
The system will report the disarming result after the operation completed.
Entry Delay Duration
Set the entry delay duration within 45s to compliant the EN requirement.
Early Alarm
If either the intrusion or tampering alarm occurs on the enter/exit route when the control panel is
in the status of entry delay, the control panel then enters the early alarm mode.
The early alarm duration can be set (> 30s).
The control panel will reports the alarm only if the alarm event lasts over the duration of early
alarm with the addition of entry delay.
54
Hybrid Security Control Panel User Manual
55
Hybrid Security Control Panel User Manual
Custom Combination Functions (except Arming +Ⅱ and Disarming +Ⅰ) : Away Arming, Stay
Arming, Disarming, Panic Alarm, Clearing Alarm, Fault Inspection, and Arming Status Check.
The following table shows the keyfob operation and responded indications.
Table 5-3 Type Ⅱ Keyfob Operations and Indications
Keyfob Operation Result Voice Prompt Indication
Armed Away/Stay Arming Red LED Flashes Once
Arming Failed Arming failed. Green LED Flashes Once
Arming Beep in the first 5 seconds. Green LED Flashes 9 Times
Fault prompt after the beep for
fault occurring
No Arming Permission Operation failed. The keyfob Yellow LED Flashes 4 Times
has no arming permission.
Fault Checking Finished No Voice Prompt Yellow LED Flashes 4 Times
Alarm Cleared Alarm cleared Green LED Flashes Once
No Permission for Clearing Operation failed. The keyfob Yellow LED Flashes 4 Times
Alarm has no arming permission.
Disarmed Disarmed Green LED Flashes Once
56
Hybrid Security Control Panel User Manual
Note
Set the device port No. as 80.
57
Hybrid Security Control Panel User Manual
Note
The user name and password when adding device are the activation user name and password.
3. Click Remote Configuration to enter the device configuration page after the device is
completely added,
Note
If there is no Security Control Panel displayed on the Control Panel page, click Selecting Modules,
and select Security Control Panel
.
58
Hybrid Security Control Panel User Manual
59
Hybrid Security Control Panel User Manual
Note
When using mobile browser, the default IP Address is 192.168.8.1. The device must be in the AP
mode.
Note
When connecting the network cable with computer directly, the default IP Address is 192.0.0.64
4. Use the activation user name and password to login.
Note
Refer to Activation chapter for the details.
60
Hybrid Security Control Panel User Manual
Note
The tag supports at least 20-thousand serial numbers.
5. Optional: Click and you can change the tag(card) name.
6. Optional: Delete a single tag(card) or check multiple tags(cards) and click Delete to delete cards
in batch.
61
Hybrid Security Control Panel User Manual
Note
The default password of the setter is setter12345, and the default password of the
manufacturer is hik12345. These codes will have to be changed when first connected.
3. Click Add.
4. Set the new user's information in the pop-up window, including the user type, the user name,
and the password.
Note
The admin and the setter cannot be deleted.
62
Hybrid Security Control Panel User Manual
• Zone: You can view the zone status, alarm status, detector battery capacity, and signal strength.
• Siren: You can view siren status, battery status, and signal strength.
• Relay: You can view relay status, battery status, and signal strength.
• Battery: You can view the battery charge.
• Communication: You can view the wired network "STATUS", Wi-Fi status, Wi-Fi signal strength,
cellular network status, used data, and cloud connection status.
63
Hybrid Security Control Panel User Manual
A.1.1 IP Conflict
Fault Description:
IP that the panel automatically acquired or set is same as other devices, resulting in IP conflicts.
Solution:
Search the current available IP through ping. Change the IP address and log in again.
64
Hybrid Security Control Panel User Manual
When using APP to add devices, it is prompted that the device fails to be added, the device could
not be found, etc.
Solution:
Check the web page: whether the Hik-Connect is offline.
65
Hybrid Security Control Panel User Manual
Solution:
Check whether the detector reports undervoltage. Replace the detector battery
66
Hybrid Security Control Panel User Manual
A.5.2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm
Clearing Report
Fault Description:
The alarm clearing operation on the panel does not produce the alarm clearing report.
Solution:
In the absence of alarm, no report will be uploaded for arm clearing.
67
Hybrid Security Control Panel User Manual
Solution: Click the link below, and then click "continue" (https://accounts.google.com/b/0/
displayunlockcaptcha).
68
Hybrid Security Control Panel User Manual
Note
About mail configuration:
• SMTP port
Default to use port 25 without encryption, or using port 465 if SSL/TLS is used. Port 587 is
mainly used for STARTTLS protocol mode.
The STARTTLS protocol mode that is usually used by default when selecting TLS.
• User name
User name of Outlook and Hotmail require full names, and other email require a prefix before
@.
69
Hybrid Security Control Panel User Manual
70
Hybrid Security Control Panel User Manual
71
Hybrid Security Control Panel User Manual
72
Hybrid Security Control Panel User Manual
73
Hybrid Security Control Panel User Manual
Level Description
1 Access by any person; for example the general public.
2 User access by an operator; for example customers (systems users).
3 User access by an engineer; for example an alarm company professional.
4 User access by the manufacturer of the equipment.
Table E-1 Permission of the Access Level
Function Permission
1 2 3a 4b
Arming No Yes Yes No
Disarming No Yes Yes No
Restoring/Clearing Alarm No Yes Yes No
Entering Walk Test Mode No Yes Yes No
Bypass(zone)/Disabling/Force Arming No Yes Yes No
Adding/Changing Verification Code No Yesd Yesd Yesd
Adding/Editing Level 2 User and No Yes Yes No
Verification Code
Adding/Editing Configuration Data No No Yes No
Replacing software and firmware No No No Yes
Note
aBy the condition of being accredited by user in level 2. bBy the condition of being accredited by
user in level 2 and level 3. dUsers can only edit their own user code.
• The user level 2 can assign the login permission of the controller to the user level 3 or level 4 in
the settings page.
• The user level 2 should assign permissions to the user level 3 if the user level 3 wants to login
the controller remotely.
• When the controller is bypassed, the user level 3 can login the controller without the permission
assignment of the user level 2.
74
Hybrid Security Control Panel User Manual
• When the controller is bypassed, the user level 3 can login the controller without the permission
assignment of the user level 2.
• The user level 4 can login the controller only when the user level 2 or level 3 has assigned
permissions to the user level 4.
75
Hybrid Security Control Panel User Manual
76
Hybrid Security Control Panel User Manual
77
Hybrid Security Control Panel User Manual
78
Hybrid Security Control Panel User Manual
79
UD00000B