Home > ADT Security Services > Home Security > ADT Security Services iCenter 8132 User Manual

ADT Security Services iCenter 8132 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ADT Security Services iCenter 8132 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 68 ADT Security Services manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Fire Alarm System Operation (Contd) 
    31 
     
    • Install a smoke detector at both ends of a hallway if the hallway is more than 40 
    feet (12 meters) long. 
    • Install smoke detectors in any room where an alarm control is located, or in any 
    room where alarm control connections to an AC source or phone lines are made. 
    If detectors are not so located, a fire within the room could prevent the control 
    from reporting a fire or an intrusion. 
    Recommendations For Proper Intrusion Protection 
    For proper intrusion coverage, sensors should be located at every possible point of 
    entry to a home or commercial premises. This would include any skylights that may 
    be present, and the upper windows in a multi-level building. 
    In addition, we recommend that radio backup be used in a security system so that 
    alarm signals can still be sent to the alarm monitoring station in the event that the 
    telephone lines are out of order (alarm signals are normally sent over the phone 
    lines, if connected to an alarm monitoring station). 
    Recommendations for Evacuation 
    Establish and regularly practice a plan of escape in the event of fire. The National 
    Fire Protection Association recommends the following steps: 
    1.  Position your detector or your interior and/or exterior sounders so that all 
    occupants can hear them. 
    2.  Determine two means of escape from each room. One path of escape should lead 
    to the door that permits normal exit from the building. The other may be a window, 
    should your path be impassable. Station an escape ladder at such windows if there 
    is a long drop to the ground. 
    3.  Sketch a floor plan of the building. Show windows, doors, stairs and rooftops that 
    can be used to escape. Indicate escape routes for each room. Keep these routes free 
    from obstruction and post copies of the escape routes in every room. 
    4.  Assure that all bedroom doors are shut while you are asleep. This will prevent 
    deadly smoke from entering while you escape. 
    5.  Try the door. If the door is hot, check your alternate escape route. If the door is 
    cool, open it cautiously. Be prepared to slam the door if smoke or heat rushes in. 
    6.  Where smoke is present, crawl on the ground; do not walk upright. Smoke rises 
    and may overcome you. Clearer air is near the floor. 
    7.  Escape quickly; dont panic.  
    						
    							Fire Alarm System Operation (contd) 
    32 
     
    8.  Establish a common meeting place outdoors, away from your house, where 
    everyone can meet and then take steps to contact the authorities and account for 
    those missing. Choose someone to assure that nobody returns to the house — many 
    die going back. 
     
     
      
    						
    							 
    33 
     
    User Code Setup 
     
    Introduction to User Code Setup 
    Each user must be assigned a name with a corresponding 4-digit user code in order 
    to gain access to various features and functions. Through iCenter/iCenter-i, you may 
    program users to access any and all of the following systems: 
    • Fire/Burglary 
    • Internet 
    Users for the systems are programmed in a central user setup location that provides 
    the specific questions for the user pertaining to each system.  You may want these 
    users to be the same, but there are situations in which you may want a user to have 
    access to one system (e.g., Internet) without having access to another (e.g., the 
    Fire/Burglary system).  
    How to Access User Setup  
    Access User Setup as follows: 
    SCREEN   ACTION 
     1.  From the Home screen, press the 
    SECURITY button.  The Arming screen is 
    displayed. 
     
     2.  Press the MORE CHOICES button.  The 
    More Choices screen is displayed. 
      
    						
    							User Code Setup (contd) 
    34 
     SCREEN   ACTION 
     3.  Press the SETUP button on the More 
    Choices screen.  The Setup screen is 
    displayed. 
     
     
     4.  Press the USER SETUP button on the 
    “Setup” screen.  The User Setup screen is 
    displayed. 
     
      
    						
    							User Code Setup (Contd) 
    35 
     
    How to Add a User 
    Add a user as follows: 
    SCREEN   ACTION 
     NOTE:  Three selections are available: add a 
    user, edit a user, or delete a user. 
    1.  To add a use, press the ADD USER button.  
    The User Authorization screen is displayed 
    with the instructions Enter Authorized Code. 
     
     2.  Enter your “Master” code.  The “User 
    Options” screen is displayed. 
     3.  Press the box next to Enter User Name.  
    The Enter Data keyboard screen is displayed. 
     4.  Type in the user name and press the OK 
    button.  The “User Options” screen is displayed 
    with Enter User Code… displayed.   
      
    						
    							User Code Setup (contd) 
    36 
     SCREEN   ACTION 
     5.  Touch the box next to with Enter User 
    Code…  The User Authorization screen is 
    displayed with the instructions Enter 4 Digits. 
     
     6.  Enter the 4-digit code for this user.  The 
    “User Options” screen is displayed with the 
    user’s name and code displayed.   
     
     
     7.  Select the partitions and access level for 
    this user.  
    NOTE:  If this user is to have Internet access, 
    continue to step 8.  If this user is to have 
    security access only, press the SAVE button at 
    this time. 
     
     8.  Press the WEB tab on the “User Options” 
    screen.  The “WEB access” screen is 
    displayed.  
    						
    							User Code Setup (Contd) 
    37 
     SCREEN   ACTION 
     
     9.  To provide this user with Internet access 
    press the box next to Enable User for Web 
    Access until a check appears.  You may also 
    select the Auto Switch to WEB on Disarm 
    option at this time. 
     
     10.  Press the SAVE button.  The system will 
    save the configuration.  W hen the save is 
    complete, the User Setup screen is displayed 
    with the new user’s name shown. 
     
     
     
      
    						
    							User Code Setup (contd) 
    38 
     
    How to Delete a User 
    Delete a User as follows: 
    SCREEN ACTION 
     1.  From the User Setup screen, touch the 
    circle next to the user to be deleted and press 
    the DELETE USER button.  The User 
    Authorization screen is displayed with the 
    instructions Enter Authorized Code:. 
     2.  Enter your “Master” code.  The Confirm 
    Delete screen is displayed. 
     3.  Press the appropriate button.  The User 
    Setup screen is displayed. 
      
      
    						
    							User Code Setup (Contd) 
    39 
     
    How to Edit a User 
    Edit a user as follows: 
    SCREEN   ACTION 
     1.  From the User Setup screen, touch the 
    circle next to the user to be edited and press 
    the EDIT USER button.  The User 
    Authorization screen is displayed with the 
    instructions Enter Authorized Code:. 
     2.  Enter your “Master” code.  The “User 
    Options” screen is displayed. 
     
     3.  Select whatever options you wish to select 
    for this user and press the SAVE button.  The 
    configuration changes are saved and you are 
    returned to the User Setup screen. 
      
    						
    All ADT Security Services manuals Comments (1)

    Related Manuals for ADT Security Services iCenter 8132 User Manual