ii
Table of Contents
INTRODUCTION
...........................................................................................................................
1
General Information
.................................................................................................................
1
Type of Telephone Required
....................................................................................................
1
Phone Access Code
...................................................................................................................
1
OPERATING INSTRUCTIONS
.....................................................................................................
2
Introduction
..............................................................................................................................
2
Summary
...................................................................................................................................
2
Operating Overview From An On-Premises Phone
......................................................................
3
Accessing The Security System Using An On-Premises Phone
...................................................
4
Operating Overview From An Off-Premises Phone
.....................................................................
5
Accessing The Security System Using an Off-Premises Phone
..................................................
6
Telephone Systems Equipped with Answering Machines
.....................................................
7
Executing System Commands Via The Phone
..............................................................................
8
Telephone Keypad Command Functions
.......................................................................................
9
System Commands That May be Executed Via the Phone
....................................................
9
Typical System Command Entries
..............................................................................................
10
Confirmation of Successful System Command Entries
..............................................................
11
Example of a Call-in From Outside
.............................................................................................
12
On-Premises Phone Access Restrictions
......................................................................................
13
Off-Premises Phone Access Restrictions
.....................................................................................
14
System Status Reports
.................................................................................................................
15
System Status Reports Not Annunciated
....................................................................................
18
Conditions That Terminate a Phone Access Session
..................................................................
19
Protection Against Outside Tampering
.......................................................................................
20
What to do in Case of Repeated Tamper Messages
..............................................................
20
Turning Remote Phone Access On or Off
....................................................................................
21
Using the Relay Command Mode
................................................................................................
22
Using the Phone Panic Feature
...................................................................................................
23
Using the Novice Voice Menu
......................................................................................................
24
Programming Speaker Output Mode
..........................................................................................
25
About the Speaker Output
.....................................................................................................
25
Voice Menu for Programming Speaker Output Mode
..........................................................
25