Honeywell 4286 User Guide - Page 3

Table of Contents - security

Page 3 highlights

Table of Contents INTRODUCTION ...1 General Information...1 Type of Telephone Required ...1 Phone Access Code ...1 OPERATING INSTRUCTIONS...2 Introduction ...2 Summary...2 Operating Overview From An On-Premises Phone 3 Accessing The Security System Using An On-Premises Phone 4 Operating Overview From An Off-Premises Phone 5 Accessing The Security System Using an Off-Premises Phone 6 Telephone Systems Equipped with Answering Machines 7 Executing System Commands Via The Phone 8 Telephone Keypad Command Functions 9 System Commands That May be Executed Via the Phone 9 Typical System Command Entries 10 Confirmation of Successful System Command Entries 11 Example of a Call-in From Outside 12 On-Premises Phone Access Restrictions 13 Off-Premises Phone Access Restrictions 14 System Status Reports ...15 System Status Reports Not Annunciated 18 Conditions That Terminate a Phone Access Session 19 Protection Against Outside Tampering 20 What to do in Case of Repeated Tamper Messages 20 Turning Remote Phone Access On or Off 21 Using the Relay Command Mode 22 Using the Phone Panic Feature 23 Using the Novice Voice Menu ...24 Programming Speaker Output Mode 25 About the Speaker Output ...25 Voice Menu for Programming Speaker Output Mode 25 ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36

ii
Table of Contents
INTRODUCTION
...........................................................................................................................
1
General Information
.................................................................................................................
1
Type of Telephone Required
....................................................................................................
1
Phone Access Code
...................................................................................................................
1
OPERATING INSTRUCTIONS
.....................................................................................................
2
Introduction
..............................................................................................................................
2
Summary
...................................................................................................................................
2
Operating Overview From An On-Premises Phone
......................................................................
3
Accessing The Security System Using An On-Premises Phone
...................................................
4
Operating Overview From An Off-Premises Phone
.....................................................................
5
Accessing The Security System Using an Off-Premises Phone
..................................................
6
Telephone Systems Equipped with Answering Machines
.....................................................
7
Executing System Commands Via The Phone
..............................................................................
8
Telephone Keypad Command Functions
.......................................................................................
9
System Commands That May be Executed Via the Phone
....................................................
9
Typical System Command Entries
..............................................................................................
10
Confirmation of Successful System Command Entries
..............................................................
11
Example of a Call-in From Outside
.............................................................................................
12
On-Premises Phone Access Restrictions
......................................................................................
13
Off-Premises Phone Access Restrictions
.....................................................................................
14
System Status Reports
.................................................................................................................
15
System Status Reports Not Annunciated
....................................................................................
18
Conditions That Terminate a Phone Access Session
..................................................................
19
Protection Against Outside Tampering
.......................................................................................
20
What to do in Case of Repeated Tamper Messages
..............................................................
20
Turning Remote Phone Access On or Off
....................................................................................
21
Using the Relay Command Mode
................................................................................................
22
Using the Phone Panic Feature
...................................................................................................
23
Using the Novice Voice Menu
......................................................................................................
24
Programming Speaker Output Mode
..........................................................................................
25
About the Speaker Output
.....................................................................................................
25
Voice Menu for Programming Speaker Output Mode
..........................................................
25