Bolid S2000-2 Manuel d'utilisateur Page 15

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 100
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 14
S2000-2 Operating
15 www.bolid.com
¾ The time periods when arming/disarming alarm loops of the S2000-2 are allowed (see Time
Schedules Section below)
The following access rights and restrictions are set individually for each access key involved in an
access group:
¾ The type of the key (is this key intended to be used as User, Locking, Unlocking or Master)
¾ The key lockout (a key be locked if necessary, e.g. if the key is lost or stolen)
¾ The additional code for the key or permission to use only main code in case of two-factor au-
thentication (see Two Factor Authentication Section below)
¾ The validity period of the key
The access key can be preprogrammed either by hardware or software ways see Key Program-
ming Section of this Manual.
Moreover, access control based on five different key patterns can be implemented through the access
point. In such a case the codes of presented keys are stored neither in the S2000-2 memory nor in
ARM Orion database, but instead to gain access they must meet on of the controller key pattern (see
Key Pattern Based Access Control Section below).
Vue de la page 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 99 100

Commentaires sur ces manuels

Pas de commentaire