background image

Figure 5-6 Drill holes

Step 4

Close the door detector.

Figure 5-7 Close the door detector

User’s Manual

10

Summary of Contents for ALM-D1-RSW

Page 1: ...V1 1 1 Wireless Door Detector User s Manual...

Page 2: ...e or unpredictable result Provides methods to help you solve a problem or save you time Provides additional information as the emphasis and supplement to the text Revision History Version Revision Con...

Page 3: ...written notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary documentati...

Page 4: ...door detector to the adapter before power on Strictly abide by local electrical safety standards and make sure that the voltage in the area is steady and conforms to the power requirements of the doo...

Page 5: ...ction Performance 3 2 Checklist 4 3 Design 5 3 1 Appearance 5 3 2 Dimensions 6 4 Adding the Door Detector to the Hub 7 5 Installation 8 5 1 Replacing the battery 8 5 2 Installing the Door Detector 9 6...

Page 6: ...power button Function Tamper Alarm Yes Remote Update Cloud update Search Signal strength detection Low Battery Alarm Yes Wireless Parameters Carrier Frequency DHI ARD323 W2 868S 868 0 MHz 868 6 MHz DH...

Page 7: ...Consumption Quiescent current 5 uA Max current 60 mA PS Type Type C Battery Life 5 years Power Consumption DHI ARD323 W2 868S Max 125 mW DHI ARD323 W2 S Max 70 mW Operating Environment Indoor 10 C to...

Page 8: ...an the distances shown in the table below Figure 1 1 Detection performance Table 1 2 Detection performance description Axes of Operation Event Gap between the Door Detector and Magnetic Stick mm Signa...

Page 9: ...1 Checklist Table 2 1 Checklist No Item Name Quantity No Item Name Quantity 1 Door detector 1 4 Quick start guide 1 2 Double sided tape 2 5 Legal and regulatory information 1 3 Cable 1 6 Screw packag...

Page 10: ...id green Alarm event is triggered 2 Peripheral port Connect the peripheral with the alarm cable 3 On Off switch Turn on or turn off the door detector 4 Tamper switch When the tamper button is released...

Page 11: ...3 2 Dimensions Figure 3 2 Dimensions mm inch User s Manual 6...

Page 12: ...to DMSS Make sure that the hub has a stable internet connection Make sure that the hub is disarmed Procedure Step 1 Go to the hub screen and then tap Peripheral to add the door detector Step 2 Tap to...

Page 13: ...dead you need to replace the battery Procedure Step 1 Open the back cover of the door detector Figure 5 1 Open the back cover Step 2 Replace the battery When replacing the battery make sure that the...

Page 14: ...xpansion screws when installing the door detector Make sure to align of the magnet with that of the door detector during installation otherwise normal use of the door detector might be affected Proced...

Page 15: ...Figure 5 6 Drill holes Step 4 Close the door detector Figure 5 7 Close the door detector User s Manual 10...

Page 16: ...f the DMSS app is 1 96 or later the hub is V1 001 0000000 6 R 211215 or later and the door detector is V1 000 0000001 0 R 20211203 or later Temperature The temperature of the environment Signal Streng...

Page 17: ...ption Device Configuration View door detector name type SN and device model Edit door detector name and then tap Save to save configuration Area Select the area to which the button is assigned Tempora...

Page 18: ...ne if you do not disarm the system before the delay ends an alarm will be triggered Make sure that the delay time for entering arming mode is no longer than 45 seconds in order to comply with EN50131...

Page 19: ...er reduced sensitivity mode until you select another option The reduced sensitivity mode is only available when the version of the DMSS app is 1 97 or later the hub is V1 001 0000000 6 R 211228 or lat...

Page 20: ...client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For exam...

Page 21: ...ne users regularly to see if the device is logged in without authorization Check device log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key ope...

Page 22: ...You deserve to feel safe secure protected Website www watchguardsystems com au Email sales watchguardsystems com au I Tel 02 4545 2598...

Reviews: