ADT Security Services Simon XT User Manual
Have a look at the manual ADT Security Services Simon XT User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 68 ADT Security Services manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
CopyrightCopyright © 2007 GE Security. All rights reserved. This document may not be copied in whole or in part or otherwise reproduced without prior written consent from GE Security except where specif ically permitted under US and international copyright law. Document number/ 466-2266B (March 2007). DisclaimerThe information in this document is subject to change without notice. GE Security , Inc. (“GE Security”) assumes no responsibility for inaccuracies or omissions and specif ically disclaims any liabilities, losses, or risks, personal or otherwise, incurred as a consequence, directly or indirectly, of the use or application of any of the contents of this document . For the latest documentation, contact your local supplier or visit us online at www.gesecurity.com. This publication may contain examples of screen captures and reports used in daily operations. Examples may include f ictitious names of individuals and companies. Any similarity to names and addresses of actual businesses or persons is entirely coincidental. Trademarks and patentsGE and the GE monogram are registered trademarks of General Electric Company. Simon XT product and logo are registered trademarks of GE Security. Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products. This product and the use of this product may be covered by one or more of the following patents: 5,805,063, 5,872,512, 5,942,981, 5,686,896, 5,686,885, 4,855,713. Except expressly provided herein, the purchase of this product shall not constitute a license or otherwise provide a right to practice a method covered by any of the identif ied patents. GE Security hereby grants the purchaser of this product a limited, nonexclusive license to practice the methods patented in the identif ied patents solely with products manufactured, sold or licensed by GE Security. This license grant does not extend to the use of unlicensed, third party products with this product . Software license agreement Important: This end-user license agreement (“Agreement”) is a legal agreement between GE SECURITY and You. Read the following terms and conditions carefully before installing or using this Software. This agreement provides a license from GE SECURITY to use the Software. It also contains warranty information, disclaimers, and liability limitations. Installing and/or using the Software conf irms Your agreement to be bound by these terms and conditions. If You do not agree with these terms and conditions, do not install or use the Software or, if already installed, immediately cease all use of the Software and promptly uninstall all components of the Software. 1. Def initions. The following def initions apply to this document: a. “GE SECURITY”, with respect to title to or warranty of the Software, means GE Security Inc., a Delaware corporation. b. “Software” means the executable software or f irmware programs and accompanying documentation installed on the GE SECURITY products, plus any upgrades, modif ied versions, updates, additions, and copies of the software furnished to Customer during the term of the license granted herein. c. “Documentation” means all associated media, printed materials, and electronic docu -mentation accompanying the Software. d. “Licensed Product” means the Software and Documentation. e. “Customer ” means the person or organization, or parent or subsidiary thereof, who uses the Software for its intended purposes, and excludes distributors, authorized resellers, value-added resellers and original equipment manufacturers. Customer may be referred to as You or Your, whether an individual or a business entity of any kind. f. “Machine” means the computer, workstation, terminal, or other hardware product on which the Software is installed.
iii 2. License. All rights to and in the Licensed Product , including, but not limited to, copyrights, patents, trademarks, and trade secrets, belong to GE SECURITY, and GE SECURITY retains title to each copy of the Software. You agree that GE SECURITY at any time, upon reasonable notice, may audit Your use of the Software for compliance with the terms and conditions of this Agreement . Subject to the terms and conditions of this Agreement , GE SECURITY grants You a nonexclusive license to use the Software, but only in the country where acquired, provided that You agree to the following: You may: a. install and use the Software on a single Machine at one time, unless You have purchased additional copies of the Software, in which case You may install the software on the number of Machines for which You have purchased copies of the Software; b. use the original copy of the Software provided to You for backup purposes. You may not: a. transfer or distribute the Licensed Product to others, in electronic format or otherwise, and this Agreement shall automatically terminate in the event of such a transfer or distribution; b. use the Software over a computer network; c. sell, rent , lease, or sublicense the Software; d. copy or modify the Licensed Product for any purpose, including for backup purposes. 3. Term. This Agreement is effective until terminated. You may terminate this Agreement by uninstalling all components of the Software from all Machines and returning the Software to GE SECURITY. GE SECURITY may terminate this Agreement if You breach any of these terms and conditions. Upon termination of this Agreement for any reason, You agree to uninstall all components of the Software and return the Licensed Product to GE SECURITY. All provisions of this Agreement relating to (i) disclaimer of warranties; (ii) limitations on liability, remedies, and damages; and (iii) GE SECURITY’s proprietary rights, shall survive termination of this Agreement . 4. Object code. The Software is delivered in object code only. You may not alter, merge, modify, adapt , or translate the Software, nor decompile, disassemble, reverse-engineer, or otherwise reduce the Software to a human-perceivable form, nor create derivative works or programs based on the Software. 5. Limited warranty. GE SECURITY warrants that for one (1) year from the date of delivery of the Licensed Product (Software Warranty Period), the functions contained in the Software will be f it for their intended purpose as described in the applicable Documentation from GE SECURITY, and will conform in all material respects to the specif ications stated in such Documentation. GE SECURITY does not warrant that the operation of the Software will be uninterrupted or error-free. GE SECURITY does warrant that the media on which the Software is furnished will be free from defects in materials and workmanship under normal use for a period of thirty (30) days from the date of delivery (Media Warranty Period). Except as specif ically provided therein, any other software and any hardware furnished with or accompanying the Software is not warranted by GE SECURITY. Your exclusive remedy under this limited warranty for nonconforming Software shall be repair or replacement of the Software, at the sole discretion of GE SECURITY. To obtain a repair or replacement of nonconforming Software, contact GE SECURITY Customer Service toll-free at 888-GESECURity or online at www.gesecurity.com during the Software Warranty Period. Except as expressly provided above, the licensed product is provided “as is” without warranty of any kind, either expressed or implied, including, but not limited to, implied warranties of merchantability or f itness for a particular purpose and, except as expressly provided above, You assume the entire risk as to the quality and performance of the licensed product .
Simon XT User Manual iv 6. Limitation of liability. GE SECURITY’s sole obligation or liability under this agreement is the repair or replacement of nonconforming software and/or defective media according to the limited warranty above. In no event will GE SECURITY be liable for damages, whether consequential, incidental, or indirect , nor for loss of data, loss of profits, or lost savings, arising from use or inability to use the software or documentation (or any hardware furnished with the software), even if GE SECURITY has been advised of the possibility of such damages, nor for any claim by any third party. 7. General. Any materials provided to You by GE SECURITY shall not be exported or reexported in violation of any export provisions of the USA or any other applicable jurisdiction. Any attempt to sublicense, assign, or transfer any of the rights, duties, or obligations hereunder shall be void. This Agreement shall be governed by and interpreted under the laws of the State of New York, United States of America, without regard to conflicts of law provisions. You hereby consent to the exclusive jurisdiction of the state and federal courts located in Multnomah County, Oregon, to resolve any disputes arising under or in connection with this Agreement , with venue in Portland, Oregon. 8. Restricted rights legend. The Licensed Product is provided with RESTRICTED RIGHTS. In the event the United States Government or an agency thereof is granted a license, the following additional terms apply: Restricted Computer Software, as def ined in the Commercial Computer Software–Restricted Rights clause at Federal Acquisition Regulations 52.227-19, and the restrictions as provided in subparagraphs (c)(1) and (c)(2) thereof; and as applicable, the Government’s rights to use, modify, reproduce, release, perform, display, or disclose the Software also are restricted as provided by paragraphs (b)(2) and (b)(3) of the Rights in Noncommercial Technical Data and Computer Software–Small Business Innovative Research (SBIR) Program clause at DFARS 252.227-7018. 9. Acknowledgment . You acknowledge that You have read and understand this agreement and agree to be bound by its terms. You further agree that this agreement is the complete and exclusive statement of the agreement between You and GE SECURITY, and supersedes any proposal or prior agreement , oral or written, and any other communication relating to the subject matter of this agreement . Intended useUse this product only for the purpose it was designed for; refer to the data sheet and user documentation. For the latest product information, contact your local supplier or visit us online at www.gesecurity.com. FCC complianceChanges or modif ications not expressly approved by GE Security can void the user ’s authority to operate the equipment . FCC Part 15 Class B This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the affected equipment and the panel receiver to separate outlets, on different branch circuits. Consult the dealer or an experienced radio/TV technician for help.
v ACTA Part 68 This equipment complies with Part 68 of the FCC Rules. Located on this equipment is a label that contains, among other information, the FCC registration number and the ringer equivalence number (REN) for this equipment . If requested, this information must be provided to the telephone company. FCC Part 68 Registration No. US:B4ZAL02B55910 The REN is used to determine the maximum number of devices that may be connected to your telephone line. Excessive RENs on a telephone line may result in devices not ringing in response to an incoming call. In most areas, the sum of all device RENs should not exceed f ive (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. For products approved after July 23, 2001, the REN for this product is part of the product identif ier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). For earlier products, the REN is separately shown on the label. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements as adopted by ACTA. A compliant telephone cord and modular plug is provided with this product . It is designed to be connected to a compliant modular jack that is also compliant . See the Installation Instructions for details. Alarm dialing equipment must be able to seize the telephone line and place a call in an emergency situation. It must be able to do this even if other equipment (telephone, answering system, computer modem, etc.) already has the telephone line in use. To do so, alarm dialing equipment must be connected to a properly installed RJ31X jack that is electrically in series and ahead of all other equipment attached to the same telephone line. If you have any questions concerning these instructions, consult your local telephone company or a qualif ied installer about installing an RJ31X jack and alarm dialing equipment for you. If this equipment causes harm to the telephone network, the telephone company may temporarily disconnect your service. If possible, you will be notif ied in advance. When advance notice is not practical, you will be notif ied as soon as possible. You will also be advised of your right to f ile a complaint with the FCC. The telephone company may make changes in its facilities, equipment , operations, or procedures that could affect the operation of the equipment . You will be given advance notice in order to maintain uninterrupted service. If you experience trouble with this equipment , please contact the company that installed the equipment for service and/or repair information. The telephone company may ask you to disconnect this equipment from the network until the problem has been corrected or you are sure that the equipment is not malfunctioning. This equipment may not be used on coin service provided by the telephone company. Connection to party lines is subject to state tariffs.
vii Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Conventions used in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Safety terms and symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Security system components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Communicating with your system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Chapter 2. Using the control panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Panel controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Standard text display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Simon XT features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Things you can do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Home security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Exit/entry delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 Bypassing sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Light control (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Chimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Latchkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 System status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Using an offsite phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Using touchpads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Remote handheld touchpad. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Keyfob touchpad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Chapter 3. How your system communicates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Status beeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Alarm sirens and lamp modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Panel indicator lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Trouble beeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Chapter 4. Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 System menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Entering and exiting the system menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Code options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Menu navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Set clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Light schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Sensor lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Special chime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Simon XT User Manual viii System tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 System programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Revision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Contrast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Chapter 5. Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 Testing sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Testing communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Appendix A. Reference information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Alarm system limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Emergency planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Smoke and heat detector locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Your floorplan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Sensor and module locations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
ix Preface This is the GE Simon XT User Manual. This document includes an overview of the product and detailed instructions on how to operate the system. Read these instructions and all ancillary documentation entirely before operating this product. The most current versions of this and related documentation may be found on our online publication library. To access the library, go to our website at the following location: http://www.gesecurity.com In the Customer Support menu, select the Resource Library link. After you register and log on, you may search through our online library for the documentation you need. 1 Conventions used in this document The following conventions are used in this document: Safety terms and symbols These terms may appear in this manual: 1. Many GE documents are provided as PDFs (portable document format). To read these documents, you will need Adobe Reader, which can be downloaded free from Adobe’s website at www.adobe.com. BoldMenu items and buttons. ItalicEmphasis of an instruction or point; special terms. File names, path names, windows, panes, tabs, f ields, variables, and other GUI elements. T itles of books and various documents. Blue italic(Electronic version.) Hyperlinks to cross-references, related topics, and URL addresses. Monospace Text that displays on the computer screen. Programming or coding sequences. CAUTION: Cautions identify conditions or practices that may result in damage to the equipment or other property. WARNING: Warnings identify conditions or practices that could result in equipment damage or serious personal injury.