Bosch 7412 G User Manual
Have a look at the manual Bosch 7412 G User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 101 Bosch manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
D9412G/D7412G | Program Entry Guide | 2.0 9000MAINEN | 71 Bosch Security Systems | 1/04 | 47775E 0101 0101 0101Programming Tip #4: Fire Trouble Resound was added to firmware versions 6.20 and later. This feature, when enabled, resounds the Fire Trouble condition at 12:00 PM or 12:00 AM if the Fire Trouble condition still exists. It does not, however, retransmit the Fire Trouble condition at the specified time. The Fire Trouble Event is only sent, if programmed to do so, at the time it occurs. • To disable the Fire Trouble Resound feature, program a 0 in Area 6’s Silent Alarm Relay entry. • To enable the Fire Trouble Resound feature at 12:00 PM, program a 61 in Area 6’s Silent Alarm Relay entry. • To enable the Fire Trouble Resound feature at 12:00 AM, program a 62 in Area 6’s Silent Alarm Relay entry. Note: Programming a value other than 0, 61, or 62 enables the Fire Trouble Resound feature at 12:00 AM. Beginning in Firmware version 6.30 and higher, a Fire Trouble Resound prompt was added to Section 6.7 Miscellaneous. This prompt operates as described. 0101 0101 0101Programming Tip #5: Perimeter Armed Relay was added to firmware versions 6.20 and later. This feature, when enabled, turns the Fail to Close Relay function into a Perimeter Armed Relay function. To switch the Fail to Close Relay into a Perimeter Armed Relay function, program a 63 in Area 7’s Silent Alarm Relay entry. Then, program a relay number into the appropriate area you wish to activate when the area becomes Perimeter Armed (COMMAND 2, COMMAND 3, or COMMAND 8). See Programming Tip #2 for additional information. 2.13.2 Panel-Wide Relays The following eleven relay options activate when they occur anywhere in the control panel. They are not restricted by area boundaries. AC Failure Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when the control panel responds to an AC power failure as programmed in AC Fail Time in Section 2.5 Power Supervision. This relay automatically resets when AC power is restored. Use this relay as an option to create audible annunciation using the command centers for all applications excluding commercial fire systems. Battery Trouble Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when battery voltage falls below 85% of capacity (12.1 VDC) for a fully charged (13.8 VDC) battery, or when the battery is in a missing condition. This relay automatically resets when battery power is restored. Use this relay as an option to create audible annunciation using the command centers for all applications excluding commercial fire systems. Phone Fail Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when a telephone line failure occurs. A time must be entered in Ph Supv Time (see Section 2.2 Phone Parameters) for this relay to activate. This relay automatically resets upon restoral of the phone line(s).
D9412G/D7412G | Program Entry Guide | 2.0 9000MAINEN | 72 Bosch Security Systems | 1/04 | 47775E Comm Fail Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C This relay activates when a control panel is unable to communicate a report after making ten attempts to each routing destination. At the same time, COMM FAIL RT ## displays at the command center. This relay automatically resets when a report is sent successfully. Use this relay to report primary digital report failure to an alternate communication device. Log % Full Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Enter the number of the relay that activates when the log reaches the programmed percentage of its capacity as programmed in RAM Parameters program item Log % Full. This relay provides a steady output until a Get Log and Set Pointer is performed from the RPS. Summary Fire Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Enter the number of the relay that activates when any Fire point in the system ( P## Type 0, P## Fire Yes) goes into alarm. This relay provides a steady output until all Fire points in the system are returned to normal. Summary Alarm Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Enter the relay’s number that activates when a Non- fire point goes into alarm. This relay provides a steady output until the alarm is acknowledged by a valid passcode then cleared from alarm memory with an acknowledgment at the command center. This relay does not activate for silent alarms. Summary Fire Tbl Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C This relay activates when any Fire point in the control panel is in trouble, or if a Fire Supervision point is missing. This relay provides a steady output until all Fire points restore to a normal condition. Summary SupFire Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when any Fire Supervisory point in the control panel is in a supervisory condition (off normal). This relay provides a steady output until all Fire Supervisory points are restored to a normal condition. Summary Trouble Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when any Non-fire point in the control panel is in a trouble condition. This relay provides a steady output until the user at the command center acknowledges the trouble. Summary SupBurg Default:Blank Selection:Blank, 1 to 128 (1 to 64 for D7412G), A, B, or C Activates when any Non-fire Supervisory point in the control panel is in a supervisory condition, or if a Supervisory Burg point is missing. This relay provides a steady output until it is acknowledged at the command center.
D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 73 Bosch Security Systems | 1/04 | 47775E 3.0 RADXUSR1/RADXUSR2 3.1 Passcode/Token Worksheet These programming items assign user groups 001 to 249 a passcode, area assignment by authority level, and a User Group Window. 0101 0101 0101Two handlers in the D5200 Programmer are used to program the users. RADXUSR1 Handler programs users 000 to 124. RADXUSR2 programs users 125 to 249 (D9412G only). 3.1.1 User Groups For the D9412G, there are 249 groups (99 groups for the D7412G) consisting of one user with a passcode and token, (master) and three users with tokens/cards but not a passcode (sub-user). All users in the group share the same authority level as the master user. 3.1.2 Passcodes Only the master user is assigned a passcode. The passcode can be three to six digits. Entering three digits in User ### chooses the master user. Programming the U### Passcode assigns a passcode to the master user. Sub-users cannot use the passcode. While the system allows tokens/cards to be added to USER 0 (service passcode), the tokens/cards do not function because the service passcode uses Authority Level 15. 3.1.3 User Group Window Use U### User Group to enable/disable the U### Passcode for up to eight different time periods throughout the day. Assign the number (1 to 8) programmed in U### User Group to a User Windows # . If the user is outside a window, COMMAND DISABLED appears on the command center after the user enters the passcode and presses [ENTER]. This window does not affect tokens/cards, it only affects the passcode of the master user. 3.1.4 Authority Level by Area A user group is assigned an authority level of 1 through 14 for each area using the U### Area # Auth prompt. The authority level can be different for each area. Not programming an authority level for an area is indicated by the NOT AUTHORIZED display on the command center. When using the Add/Change User function at the command center, the authority levels and the changes made affect the master user’s passcode and the entire group’s token/cards. When using the ACCESS CTL LVL function at the command center, the whole group is affected by whether the level is on or off for access control functions only. When using the DELETE USER? function, the whole group is deleted. There is no means to delete each user within the group individually. It is recommended that you use the ADD/CHG USER? function to change a user token/card instead of deleting the whole group. 3.1.5 User Name Each user group can be assigned one U### Name. This name is logged and reported to the central station for all the users in the group. The user ID is used to differentiate which user’s token/card was executed. Beginning with v6.30, when using a D1260 Command Center, User 249 text is used for contact information text (such as telephone numbers). If a D1260 is installed on the system, do not use User 249 for user ID information. 3.1.6 Tokens/Cards The master user assigned the passcode can also be assigned a token/card. This is done by programming the U### Mstr Site and U### Mstr C/D. Three more token/cards are assigned to the user group for sub-users using the U### SU# Site and U### SU# C/D. 3.1.7 Reporting and Logging Modem Format must be Yes for the following reports to the central station. Regardless of the reporting format, they log and print at the local printer as shown. Each sub-user is identified by the master user’s three-digit number plus an extension of 0, 1, 2, or 3. These numbers are called Sub-user ID Codes. Figure 3 shows all the users for User Group 122 as they would appear.
D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 74 Bosch Security Systems | 1/04 | 47775E Figure 3: User Group 122 Example Master User: ID 122. ♦CRD ID 122-0 ♦Sub User -1: ID 122-1 CRD ID 122-1 ♦Sub User -2: ID 122-2. CRD ID 122-2 ♦Sub User -3: ID 122-3. CRD ID 122-3 2 1 1 - User passcode 2 - User token/card 0101 0101 0101In reporting systems using modem format, all three digits of the User ID Code are transmitted to the central station with appropriate reports. Central station automation computer systems may only accept Zonex and COMEX style User Ids. See Point/User Flag in Section 2.1 Phone. In BFSK, only one number is transmitted. This number represents a group of ten users as shown in Table 28. Users 100 through 249 do not report in BFSK format. Table 28: BSFK User Code Report User Code 000 to 009User Code 010 to 019User Code 020 to 029User Code 030 to 039User Code 040 to 049User Code 050 to 059User Code 060 to 069User Code 070 to 079User Code 080 to 089User Code 090 to 099 BFSKReport0 BFSKReport1 BFSKReport2 BFSKReport3 BFSKReport4 BFSKReport5 BFSKReport6 BFSKReport7 BFSKReport8 BFSKReport9 User ### Default:001 Selection:000 or 001 to 249 (001 to 099 for the D7412G) Enter the User number you are programming. 0101 0101 0101User 000 is the Service Authority Level (Level 15). You cannot change the programming for user 000. Only the Service Authority Level (User 000) can delete User 000. When a user other than User 000 tries to delete the passcode for User 000, the command center displays NOT IN USE. User 000 cannot be added/changed at the command center whether it exists or not. U### Passcode Default:See Program Record Sheet Selection:Three to six digits ( 0 to 9) Enter three to six digits to enable a passcode for the master user in this group. 0101 0101 0101User I.D.000 is the Service Passcode. The default Service Passcode is 123. The programmer does not allow you to enter any passcode number that could conflict with a duress passcode. If Duress Type is a 1, passcodes within a range of 1 for existing passcodes cannot be entered. This rule applies even if duress is disabled. For example, once a passcode of 654321 is entered, 654322, 654323, 654320, and 654329 cannot be entered.
D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 75 Bosch Security Systems | 1/04 | 47775E A silence bell authority is built into all authority levels, even if they are the default and none of the available programmable functions are enabled. A user passcode can silence a Fire/Burg bell as long as any authority level is assigned to the area where the bell can be silenced. U### User Group Default:Blank Selection:Blank, 1 to 8 Use this parameter to create a group of up to 249 users (99 for the D7412G) whose combinations can be enabled/disabled using an automatic user window. This is the number entered into the W# User Group for any active W# User Window. Multiple windows can be programmed for one user group (up to eight) within one 24-hour period. For example, if User Group 1 has a window running from 8:00 AM (start time) to 4:00 PM (stop time), the users for that group may use their passcodes only between that time. Between 4:00 PM that day and 8:00 AM the next day, the users may not use their passcodes. 0101 0101 0101 To enable this user’s passcode at all times, leave U### User Group blank. User Group Window times cannot be changed from the command center. Once a window is assigned to a user group, the users in that group rely on the window to be active (within the start and stop times) for their passcodes to function. The only way to disable the window is by reprogramming the control panel from the D5200 or RAM. U### Area 1 [through Area 8] Auth Default:See Program Record Sheet Selection:1 to 14 or Blank Assign an authority level to the user for this area. Blank means the user has no authority in this area. U### Name Default:See Program Record Sheet Selection:Sixteen alphanumeric characters Enter Alphabetic-characters A to Z in capital letters Period (.), comma (,), percent (%), parentheses [()], equal (=), greater/less than (), exclamation (!), braces ({}), apostrophe (’), carat (^), grave accent (`), tilde (~), semi-colon (;), and colon (:) are not allowed. Enter up to sixteen characters of text for this user group. Programming this group with a departmental, team, or function name identifies all the users in this group in a function related manner, such as ENGINEERING. Card Data Format The D9412G/D7412G and D9210B Controller comply with the 26-BIT Wiegand card data format. In essence, the format consists of 26 bits (3.2 bytes) of data. The first bit is used for the even parity. The next 8 bits (first byte) is used for the U### Site Code . The next 16 bits (second and third byte) are used for the U### Card Data. The last bit is used for the odd parity. As long as the reader and tokens/cards you are using are 26-BIT Wiegand compatible, they function with this system. Use only the readers identified as being compatible with the D9210B door control module. Information on these readers can be found in the D9210B O/I Manual. For more information, see the Security Industry Association (SIA) Access Control 26-BIT Wiegand Reader Interface Standard. U### Mstr Site Default:Blank Selection:000 = (0) to 254 or Blank (255) Master User ### Site Data Enter the first three decimal numbers on the back of the token/card. This is the first byte (bits 2 through 9) of data for a 26-bit Wiegand card. This is called the site number. Tokens/cards with a site code of 255 are not compatible with the D9412G/D7412G Control Panels.
D9412G/D7412G | Program Entry Guide | 3.0 RADXUSR1/RADXUSR2EN | 76 Bosch Security Systems | 1/04 | 47775E 0101 0101 0101Converting hexadecimal to decimal: If your card label contains letters as well as numbers, the number is hexadecimal.* Convert the hexadecimal number to decimal using your calculator. If you cannot convert in this way, use the reader and the Add/Chg User? Function to add the tokens/cards. Perform the following test to confirm you can convert properly: Use 319EB0 as the hexadecimal number. On your calculator, press [HEX]. Enter all the hexadecimal characters into the calculator. Press [DEC] and your hexadecimal characters convert to the following eight digits: 03251888. The site number is 032. Enter it in U### Mstr Site. Your card data is 51888. Enter it into U### Mstr C/D. * A hexadecimal number can contain all numerals. If the code does not work try converting the number from hexadecimal to decimal. Always tag your tokens before adding them to the system so you do not mix them up. Use the CRD ID ###-# number to index them. U### Mstr C/D Default:Blank Selection:00000 = (0) to 65534 or Blank (65535) Master User ### Card Data Enter the remaining five decimal numbers on the back of the token/card. This is the second and third byte (bits 10 through 25) of data for a 26-bit Wiegand card. This is called the card data. You must program U### Mstr Site before programming this prompt. U### SU1 through SU3 Site Default:Blank Selection:000 = (0) to 254 or Blank (255) Sub-users one through three Site Data. U### SU1 through SU3 C/D Default:Blank Selection:00000 = (0) to 655354 or Blank (65535) Sub-users one through three card data.
D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 77 Bosch Security Systems | 1/04 | 47775E 4.0 RADXPNTS 4.1 Point Index Use this programming module to construct personality types for points used in the system. The Index numbers are used in Point Assignments. Each unique point index number determines the control panel’s responses to specific conditions occurring on the Protective points.The NEW RECORD program contains default entries and descriptions that match RPS defaults for point indexes. See the D9412G/D7412G Program Record Sheet for defaults.Point Index Default:1 Selection:1 to 31 The number of the point personality you are programming. You can define up to 31 individual personalities. P## Type Default:See Program Record Sheet Selection:0 to 9 P ## TypeDescription 0 24-hour: A 24-hour point is not turned on and off from a command center. 24-hour points are armed all the time, and can be used for fire protection (see the P ## Fire Point prompt in Section 4.1.1 Point Responses), panic, medical, and police alerts. 24-hour points can be programmed as bypassable. Consider the application carefully before using the bypassable option. Bypassable 24-hour points should be programmed to Buzz on Fault. When a 24-hour point is bypassed, send the report as it occurs. If the area contains all 24-hour points, the area is never armed or disarmed. A Deferred Bypass Report is not sent. 24-hour protection for fire doors, roof hatches, and so on. Instead of programming this type of protection as a 24-hour point, consider using a Perimeter point type with a Point Response of 9 to E. 24-hour points do not show faults when an arming function is entered, but Perimeter points do. When programming this type of protection, consider also using the Buzz on Fault and Local While Disarmed options. 1 Perimeter: Perimeter points are armed with all Arming functions. Points programmed as perimeter can also be armed as a group (using Perimeter-Arming functions) separately from points programmed as interior. This lets the user partially arm the system to establish Perimeter protection while occupying the interior of the protected premises. Perimeter points can be programmed to initiate entry delay time. If the point initiates entry delay, it can also initiate an entry tone. When a Perimeter point is programmed for entry delay, entry delay time is always provided. If the area is in entry delay when a second Perimeter point trips, the control panel compares the remaining entry delay time to the time programmed for the second Perimeter point. If the second Perimeter point’s entry delay time is less than the remaining time, it shortens the entry delay time. Perimeter points programmed for an instant point response, generate an alarm immediately when tripped, even during entry or exit delay.
D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 78 Bosch Security Systems | 1/04 | 47775E P ## Type SelectionDescription 2 Interior: Interior points are armed only by master arming the area. They are NOT armed when using Perimeter Arming functions. These points are typically used to monitor interior detection devices such as interior doors, motion detectors, photoelectric beams, and carpet mats. Instant Interior Points: Interior points are usually programmed for an instant alarm (see Section 4.1.1 Point Responses). Points programmed for instant alarms generate alarms immediately, even during entry or exit delay. Delayed Interior Points: Interior points can be programmed for a delayed point response. A delayed response means that if the point is tripped while the area is armed, it initiates entry delay. It does not generate an alarm until entry delay expires. When an Interior point is programmed for entry delay, entry delay time is always provided. If the area is in entry delay when the Interior point trips, the control panel compares the remaining entry delay time to the time programmed for the Interior point. If the Interior point’s entry delay time is less than the remaining time, it shortens the entry delay time. Delayed points can also initiate an entry tone at the command center (see the P## Ent Tone Off prompt in Section 4.1.1 Point Responses). In some cases, you may need to create an Interior point that causes an instant alarm only if entry delay protection is not tripped first. Use Interior Follower to create this type of protection. 3Interior Follower: Interior Follower points are armed only by master arming the area. They are NOT armed when using Perimeter-Arming functions. An Interior Follower point does not create an alarm if it trips while the area is in entry delay. An Interior Follower does not change the amount of remaining entry delay time. If no entry delay is in effect when the Interior Follower trips, it creates an instant alarm. You must program a delayed Point Response (4, 5, 6, 7, or 8) for an Interior Follower point. The control panel ignores the entry in P## Entry Delay for an Interior Follower point. Note: It may be necessary to increase the debounce count for Interior Follower points to prevent Interior Follower points from going into alarm before the control panel recognizes that a Perimeter Delay point was faulted. Program the Interior Follower’s debounce for one number higher than the debounce count on Perimeter delay
D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 79 Bosch Security Systems | 1/04 | 47775E P ## TypeDescription Keyswitch Maintained: Program Point Response as 1. Do not connect initiating devices to a Keyswitch point. Normal:The area is disarmed. Short:When this point changes from normal to open, the area arms. Open:A short is a trouble when the area is disarmed. A short is an alarm when the area is armed. When this point changes from shorted to normal or open, it restores. Program Point Response as 2, the point responds as follows: Normal:When this point changes from open to normal, the area arms. Open:The area is disarmed. Short:A short is a trouble when the area is disarmed. A short is an alarm when the area is armed. When this point changes from shorted to normal or open, it restores. 4* Trouble and Restoral Reports are not sent if Local While Disarmed is Yes. Alarm and Restoral Reports are not sent if Local While Armed is Yes. Keyswitch Momentary: Used for area arming and disarming. Point Response must be programmed 1. Do not connect initiating devices to a Keyswitch point. N→S→N:When this point momentarily changes from normal to shorted to normal, it toggles the armed state of the area. Open:An open is a trouble while the point is disarmed. An open is an alarm while the point is armed. When this point changes from open to normal, it restores. 5* Trouble and Restoral Reports are not sent if Local Disarmed is Yes. Open/Close Point: Used for point arming and disarming. Point Response must be programmed 1. Local bells are silenced through the command center. Normal:The point is armed and sends a Point Closing Report. A Point Closing Report is not sent if Local Armed is Yes. Open:An open is an alarm when the point is armed. An open is a trouble when the point is disarmed. Alarm and Restoral Reports are not sent if Local Disarmed is Yes. 6* Short:The point is disarmed and sends a Point Opening Report. A Point Opening Report is not sent if Local Armed is Yes. *Keyswitch Points. Special rules apply to points used for Keyswitch functions. These special point types do not respond the same way to the point response entry as Point Types 1, 2, and 3. Responses for keyswitch point types are described in Section 4.1.1 Point Responses.
D9412G/D7412G | Program Entry Guide | 4.0 RADXPNTSEN | 80 Bosch Security Systems | 1/04 | 47775E P ## Type SelectionDescription D279 (O/C Non-Priority): The D279 provides point arming and disarming independent of the area arm state. A non-priority D279 point arm state does not affect the area arm state. Point Response must be programmed 1. Local bells are silenced through the command center. For bell control at the D279, use P## Type 8. Cut the W1 jumper on the D279 to send Point Opening and Point Closing Reports. If the D279’s W1 jumper is not cut, no Open or Close Report is sent, regardless of control panel programming. Normal:The point is armed and sends a Point Closing Report. Point Closing Report is not sent if Local Armed is Yes. Open:The point is disarmed and sends a Point Opening Report. A Point Opening Report is not sent if Local Armed is Yes. 7* Short:A short is an alarm when the point is armed. A short is a trouble when the point is disarmed. Alarm and Restoral Reports are not sent if Local Disarmed is Yes. D279 (O/C Priority): The D279 provides point arming and disarming independent of the area arm state. A priority D279 point must be armed before an area can be armed. Program Point Response as 2. Cut the W1 jumper on the D279 to send area Opening and Closing Reports as programmed in Area Parameters and to provide bell control. If the D279’s W1 jumper is NOT cut then no Area Open or Area Close Report is sent, and alarm bells can only be silenced from a command center, no matter how the control panel is programmed. Normal:When this point changes from open to normal, the area arms. Open:The area is disarmed. The alarm bell silences if an alarm occurred while the area was armed. 8* Short:A short is a trouble while the area is disarmed. A short is an alarm while the area is armed. When this point changes from shorted to normal or open, it restores. 9* Easikey: This point is programmed for access. Program Point Response as 1. If the system is Master Armed or Perimeter Armed (with or without delays), presenting a valid token to the Easikey reader shorts the point and disarms its assigned area. Presenting a valid token in a Disarmed state does not clear trouble or alarm memory or rearm the area. *Keyswitch Points. Special rules apply to points used for Keyswitch functions. These special point types do not respond the same way to the point response entry as Point Types 1, 2, and 3. Responses for keyswitch point types are described in Section 4.1.1 Point Responses.