beautypg.com

Chapter 2 arming and disarming, Arming your system, Before arming the system – RISCO Group LightSYS User Manual

Page 13: Chapter 2, Arming and disarming

background image

Arming and Disarming

Page 13

LightSYS User Manual

Chapter 2

Arming and Disarming

The following chapter describes how to operate your LightSYS locally from the LCD
keypad. For system operation from other accessories, refer to the instructions supplied
with the product.
As a user of your security system, you'll mostly be concerned with the keypad.
The LightSYS LCD keypad is the primary system interface. Each keypad in your system
reports its status via its LCD icons, as described below. Through its keys, you can enter
commands to arm and disarm the system, bypass intrusion zones, report emergencies, and
more, as described in the subsequent chapters of this manual. For detailed information
regarding the keypad interface, refer to the instruction supplied with the keypad.

Notes:

1. There are two types of LCD keypads, with and without proximity for non-contact

arming and disarming.

2. Each keypad in the system is assigned to a particular partition, meaning that

commands entered in a keypad are implemented only in the partition to which it is
assigned. For example, pressing the Quick Arm key on a keypad assigned to
partition 1 arms only partition 1

Arming your system

Arming your system causes the intrusion detectors to trigger an alarm when violated. You
can arm your system by code arming, in which you need to use your user code, or you can
use quick arming (without using a code).

Note:

If during code setting you enter a wrong user code, the keypad produces
three short beeps. Simply re-enter the correct sequence.

Remember, fire protection and the protection offered by the keypad's emergency keys are
always armed and always available (if authorized by your installer).

Before arming the system:

1. Verify that the

(ready) icon is lit or flashing indicating that system is READY

to be armed.

2. Make sure that the system includes no violated zones and is ready to be armed.
3. If the system is NOT ready to be armed, secure or bypass the violated zone(s) (see

page 32), and then proceed.


Notes: