INTRODUCTION
4
D-307503 PowerMaster 360 User's Guide
1. Introduction
Preface
The PowerMaster-360 is a highly advanced wireless alarm control system produced by Visonic Ltd.
Note:
Make sure that you have the name and telephone number of the monitoring station your system will report
to. When calling the monitoring station to ask questions, you should have access to your
ACCOUNT NUMBER
to identify your alarm system. The account number is provided to you by the installation engineer; ensure that you
store the number in a secure location.
Overview
The PowerMaster-360 is a wireless alarm system for detecting and alerting in case of burglary, fire, and a
variety of other security and safety hazards. In addition, it can be used to monitor the activity of disabled or
elderly people left at home. System status information is presented visually.
The system includes an optional partition feature (for a description of this feature, refer to Appendix B).
The PowerMaster-360 is governed by a control panel that is designed to collect data from various sensors that
are strategically located within and along the perimeter of the protected site.
The alarm system can be armed or disarmed by a variety of keyfobs and keypads using special codes.
In the
disarmed state
, the system provides you with visual status information, and initiates an alarm if smoke is
detected or upon disturbance in a 24-hour zone (a zone which is active 24-hours a day).
In the
armed state
, the system initiates an alarm upon detection of disturbance in any one of the armed zones.
Proximity tags enable authorized people to enter restricted areas.
The system identifies a wide range of events – alarms, attempts to tamper with sensors and several types of
trouble. Events are automatically reported via Broadband or GPRS communication to monitoring stations (in IP
form) and to private telephones (SMS messages) or emails (via the server). The person receiving such a
message is expected to investigate the event and act accordingly.
IMPORTANT!
All you need to know to secure your premises can be found in Chapter 2 of this manual.
If you are not familiar with some of the terms used here, refer to Appendix C at the end of this guide.
Note:
This system must be checked by a qualified technician at least once a year.
System features
Your PowerMaster-360 offers a large number of unique features:
Master / User Settings:
Two user levels allow different access types (see Chapter 4. Menus and , section
B.4 Programming User Codes).
64 detector zones:
Each detector zone is identified by zone number and name (location).
Multiple arming modes:
AWAY, HOME, AWAY-INSTANT, HOME-INSTANT, LATCHKEY, and BYPASS.
Virtual Keypad:
Status information and prompts are displayed on the Virtual Keypad.
Real-time clock:
The present time is visible on the Virtual Keypad display. This feature is also used for the
log file by providing the date and time of each event.
Various reporting destinations:
Events can be reported automatically to monitoring stations, private
telephones and mobile phones of your choice. Events can be reported by SMS if GSM is installed. See
Chapter 4. Menus and ).
Selective reporting:
Your installer can determine what type of events will be reported to which destination.
Latchkey mode:
An automatic
Latchkey
message is sent to chosen telephones if the system is disarmed by
a
latchkey user
for example a junior family member. See Chapter 2 for details.
Access from remote telephones:
You may access the PowerMaster-360 from a remote telephone and
Arm/Disarm it or receive system status information. See Chapter 5 for details.
Numerical keys serve as function keys:
When the system is disarmed, the numerical keys are used also to
control various system functions. A simple icon on each key identifies the task of that key.
Data retrieval:
You can obtain status information, trouble information and review memorized alarm events
visually (see Chapter 3).
Event log:
System events are memorized in an event log that stores the most recent events, each tagged
with the time and date of the event. You can access this log and review the past events if required. See
Chapter 8. Maintenance for details.
Looking after elderly and infirm individuals:
The system can be programmed to monitor people activity