Advertisement

Quick Links

User Manual

For quick installation information please refer to the iConnect
Quick Start Installation Guide provided on our website: www.electronics-line.com

Advertisement

Table of Contents
loading

Summary of Contents for EL iconnect

  • Page 1: User Manual

    User Manual For quick installation information please refer to the iConnect Quick Start Installation Guide provided on our website: www.electronics-line.com...
  • Page 2: Quick Reference Guide

    Quick Reference Guide Function Press… Additional Information If One-Key Arming is disabled on the Control System, enter your user code when arming. The default Master code is 1234. FULL PART PERIMETER INSTANT Hold down this key until Instant arming cancels the “Instant Arming OK?”...
  • Page 3 Function Press… Additional Information PLAY then The Message Center is an MESSAGE optional feature that is included with certain versions of iConnect Control System. Telecontrol Commands Function Press… Function Press… 2-WAY AUDIO DISARM FULL ARM SIREN CANCEL HA/PGM EXTEND CALL...
  • Page 4: Table Of Contents

    Table of Contents Quick Reference Guide ........................2 Table of Contents ..........................4 Introduction and Overview ...................... 6 1.1. Documentation Conventions ....................6 1.2. Security System Components .................... 7 1.3. System Monitoring ......................8 1.4. Home Automation ......................8 1.5. Self-Monitoring ........................
  • Page 5 7.5. Simplex Mode ........................47 Advanced System Operation ....................48 8.1. Cancel Report ........................49 8.2. Zone Bypassing/Unbypassing ..................49 8.3. User Codes ........................50 8.4. Follow-Me ........................52 8.5. Event Log ......................... 52 8.6. Service Menu ........................53 Appendix A: Menu Structure ......................59 Appendix B: Glossary ........................
  • Page 6: Introduction And Overview

    Introduction and Overview This user manual explains all you need to know about your iConnect security system and provides step-by-step instructions for all the system’s user functions. In addition to the explanation you will receive from your installer, we urge you to read this manual so that you can take full advantage of your system’s features.
  • Page 7: Security System Components

    1.2. Security System Components Your security system is made up of a Control System, various detectors and a number of optional peripheral devices. This section explains the role of each component in your system. Control System The Control System is the brain of the system. It communicates with all the devices connected to the system.
  • Page 8: System Monitoring

    1.6. Telephone Control DTMF Telecontrol The iConnect offers a range of “Telecontrol” features that provide remote access via the telephone. These features include remote arming/disarming, HA on/off, PGM output activation/deactivation, siren cancel and Two-Way audio via the Control System’s built- in microphone and speaker -- see Telecontrol.
  • Page 9: Vocal Message Annunciation

    SMS Control Using your cellular phone, you can also send commands to the appliances controlled by the Home Automation feature using SMS and receive confirmation when the command is received. 1.7. Vocal Message Annunciation Vocal message annunciation is an optional feature that, if enabled in programming, causes the system to play short messages that indicate system status.
  • Page 10: The User Interface

    The front panel is the main user interface that provides you with all the functions you need to control your security system. iConnect Control System is available with the LCD front panel configuration.
  • Page 11: System Status Leds

    Service Call Button The Service Call button enables you to contact the monitoring service and talk to an operator. To initiate a service call, press and hold down the Service Call key for a few seconds. Vocal Message Recording and Playback LCD front panel allows you to record a short message that may be played back later by another user -- see Service Menu, Message Center.
  • Page 12: Alarm Sounding Patterns

    EL-4711M/P 2.4. Wireless Keypads The system supports up to four Wireless Keypads. The Wireless Keypad (EL-4727) is an intelligent two-way wireless keypad with LCD display. Apart from serving as an additional arming station, the Wireless Keypad provides memo recording options, control over up to 16 home automation devices, and panic alarm function.
  • Page 13: Numeric Keypad

    Arming Keys Keypad Microphone (optional) System Status LEDs Wireless Keypad (EL-4727) Numeric Keypad The numeric keypad allows you to arm or disarm the system by entering a user code. Arming Keys Three arming keys (Full, Part and Perimeter) allow you to arm the system using one of the three arming methods –...
  • Page 14 LEDs Two status LEDs (OK and ) indicate arming and power status of the system: It means… If the LED is… The system is disconnected from all power sources. On - Green The keypad is powered by AC and the battery is not low. Flashing Yellow (slow) Local backup battery low.
  • Page 15: Arming And Disarming

    Arming and Disarming Arming can be defined as activating the system. When the system is armed, it monitors the zones that are protected by the detectors. If a detector detects an intrusion, the system generates an alarm. 3.1. Arming Modes Three arming modes are available: Full, Part and Perimeter.
  • Page 16: Forced Arming

    Arming with the Keyfob To arm the system using the keyfob: Press the relevant button on your keyfob (see Keyfobs); the exit delay begins to count down. At the end of the exit delay, the system is armed. Arming with the Key Switch To arm the system using a key switch: Open/close the key switch accordingly.
  • Page 17: Disarming The System

    3.3. Disarming the System When you enter the premises, the entry delay begins to count down. You must disarm the system within the entry delay time to prevent the system from triggering an alarm. To disarm the system using a keypad: Enter your user code.
  • Page 18: Arming And System Tones

    In addition to arm status, the system displays further status messages on the front panel’s display. The following table explains common status indication messages that may prevent you from arming your system. Status Means… ZONES IN ALARM Zones have been violated. TAMPER ALARM The system has been tampered with.
  • Page 19: Remote Arming And Disarming

    Status Tones Description System 4 rapid tones sounded once A trouble condition has been Trouble per minute. detected, press for further details. For Fire Trouble Tones, there is a Note: System trouble tones programmable option to repeat the are not sounded from tones every 3½...
  • Page 20 SMS Confirmation Message After an SMS command is executed by the system, if programmed by your installer, a confirmation message may be returned to your mobile phone. The following example shows the confirmation message you receive for the sample command from the previous section.
  • Page 21: Web User Application

    Web User Application The Web User Application - MyELAS provides a full interface to your system from a local or remote PC. Via the Web you can perform a wide range of tasks such as arm/disarm, zone bypass, user code management and home automation control. The Smartphone Application - MyELAS provides access to the Web User Application from your Smartphone (iPhone or Android).
  • Page 22: Login To Myelas

    Enter the following registration details into the Self Registration page: First/Last Name Enter your First and Last Name Email (Login Name) Enter your chosen Login Name (i.e. email address) Password/Confirm Enter your chosen Password twice (minimum of 6 characters and at least one digit) Panel ID Enter your Panel ID (supplied by your service provider or as it appears on the sticker located on the side of the panel)
  • Page 23: The Main Page

    When using the Smartphone application service, the Login page may look similar to the following examples: Figure 4: Login Page (iPhone) Figure 5: Login Page (Android) 4.3. The Main Page After logging in, your system’s home page is displayed. The following diagram shows the Main page and explains the main elements of the Web application’s interface.
  • Page 24: Menu Bar

    Menu Bar The Menu Bar includes the Main Menu options and the Log Off button. The Main Menu offers links to various pages in the Web Application. Use the Logoff button on the right side menu to properly close the session. The following options are available from the Main Menu: Home –...
  • Page 25 Workspace The workspace offers additional links to the following pages of the application: System Operation, Settings, History, Video and Automation. When you choose a page, either from the Main Menu, or from the workspace, the page is displayed in the workspace. For example, if you choose Arm/Disarm from the Main Menu, System Operation area and System Status area are displayed in the workspace (see the example below).
  • Page 26: Arming And Disarming

    4.4. Arming and Disarming Figure 9: System Operation Area Page Three arming modes are available: Away, Part and Perimeter. These modes enable you to arm your system accordingly to suit different circumstances. Full Arming Full Arming activates the entire system. This arming method is used when you intend to leave your home, leaving the premises empty.
  • Page 27: Web Application Settings

    4.5. Web Application Settings The Web Application Settings area offers various options including System/Web user codes, contact and password management, user interface appearance and descriptors, event log viewing and zone bypass capabilities. System Users and Codes The System Users and Codes page enables you to manage your system's users. The page displays a table of the system's current users and enables you add, edit and delete users as required.
  • Page 28 To display the System Users and Codes page: On the Menu Bar, click Settings. Click System Users and Codes. The System Users and Codes page is displayed. Figure 10: System Users and Codes Page To add a new system user: Click Add New User at the bottom of the table;...
  • Page 29 To edit an existing system user: Click Edit for the user you want to modify; the Edit User page opens. Edit the user's name in the field provided (16 characters max.). When editing an existing user, you cannot change the user type. Enter the user's 4-digit passcode.
  • Page 30 Web Interface Users and Codes The Web Interface Users and Codes page enables you to manage your Web's users. The page displays a table of the system's current users and enables you add, edit and delete users as required. You can even issue temporary (limited) codes to guests that will automatically expire after 24 hours.
  • Page 31: Change Password

    To edit an existing Web user: Click Edit for the user you want to modify; the Edit User page opens. Edit the user's name in the field provided (16 characters max.). Enter the user's password. Enter the user's password again for confirmation. Enter the Owner User password.
  • Page 32 Zone Bypass A bypassed zone is ignored by the system and does not generate an alarm when triggered. To "unbypass" a zone is to restore the zone, effectively instructing the system to monitor activity from that zone. All bypassed zones are automatically unbypassed when the system is disarmed. The Zone Bypass page displays a list of the zones (i.e.
  • Page 33 Figure 16: Change Appearance Page Click "Set" underneath the required color scheme or "Set Default" to restore the default color scheme. Alerts The Alerts feature allows those people included in your contact list to be notified by email or SMS when certain events occur. The page displays a table of the system's alert contacts and enables you add, edit, test and delete contacts as required.
  • Page 34 To add new alert contact: Click Add New at the bottom of the table; the Add New Alert Contact page opens. Figure 18: Add New Alert Contact Page Enter the contact's name in the field provided. Enter the new contact's email address. Enter the new contact's mobile phone number Select the alert language from the available list.
  • Page 35: Time Zone

    Descriptors The Descriptors page allows you to edit descriptors of registered devices for the selected control panel. To display the Descriptors page: On the Menu Bar, click Settings. Click Descriptors. The Descriptors page is displayed. Figure 19: Descriptors Page To edit a descriptor: Click Edit for the descriptor you want to modify;...
  • Page 36: Event Log History

    4.6. Event Log History The Event Log History page displays a log of events that have occurred within your system. For each event you can view the date and time that the event occurred, a description of the event, the user or device that caused the event and whether or not the event was reported to your monitoring service.
  • Page 37: Home Automation

    4.7. Home Automation The Web Application allows you to control and schedule automated lights and appliances in your home. The application offers a comprehensive interface that enables you to view the settings for all of your automated devices at once. Additionally, you can add, edit or delete devices from the comfort of your PC.
  • Page 38: Video Verification

    4.8. Video Verification Using the 2-way wireless PIR Camera detectors installed in your home, the Web Application enables you to view still video images over the Web in order to check your home and family while you are away. To view the Video Verification page: On the Menu Bar, click Video, the Video Verification Page is displayed: Figure 23: Video Verification Page The Video Verification page displays a list of your installed PIR camera detectors and...
  • Page 39 Stored Image Events The Web application provides the capability to view the stored image events. The Stored Image Events page displays a log of image events that have occurred within your system. For each event you can view the date and time that the event occurred and the user or device that caused the event.
  • Page 40 Settings The Web application provides the capability to modify the PIR camera detectors parameter settings according to your needs To view the video verification settings page: From the Video Menu Bar, click Settings; the Video Verifications Settings Page is displayed: Figure 27: Video Verification Settings Page To modify the PIR camera detectors parameter settings: Modify the following parameter settings in the Video Verification Settings page:...
  • Page 41: Panic Alarms

    Press the lower two buttons simultaneously 5.3. Medical/Panic Alarm The one-button keyfob (EL-4711M/P) is designed to send a message to your monitoring service in the event of a medical or panic emergency. The transmitter is water-resistant and can be worn around the neck as a pendant.
  • Page 42: Home Automation And

    Home Automation and PGM Home Automation is an optional feature that requires an add-on expansion module. Home Automation enables you to control up to 16 individual lights and appliances around the home, in this section; we shall refer to these lights and appliances as HA units and PGM output.
  • Page 43: Keyfob Control

    6.2. Keyfob Control You can control two separate HA units, using the four-button keyfob. This option can be programmed by the installer. For further information on keyfob button assignments refer to Keyfobs. 6.3. Telephone Control Using the Telecontrol feature, you can control HA units and PGM output remotely via the telephone.
  • Page 44: Scheduling (Not Relevant To

    6.5. Scheduling (not relevant to PGM) The Scheduling feature allows you to set an On and Off time for each HA unit. At these times the system automatically switches the HA unit on and off. You can also choose the days of the week that the schedule is active.
  • Page 45: Telecontrol

    Control System distinguish between calls so that it knows when to pick up the relevant call. For this purpose the iConnect employs a double call method. To make a call to the Control System using the double call method: Dial your telephone number.
  • Page 46 Call Procedure To prevent unauthorized attempts to call your Control System, you must enter a user code when calling your home – see User Codes, Code 29. To call your home: Call the Control System either using the double call method or directly (see above);...
  • Page 47: Service Call

    7.2. Service Call The Service Call feature enables you to call the monitoring service by pressing one key. To make a Service Call: Press and hold down the Service Call key for a few seconds. If using Simplex mode, the call is connected in Listen mode – see Simplex Mode. 7.3.
  • Page 48: Advanced System Operation

    Advanced System Operation Besides the basic functions described in the previous chapters, you can access additional functions via the menu. This chapter describes these functions and the menu navigation procedure. Menu Navigation Using the LCD keypad on the front panel, you can navigate through the menus using the menu navigation keys ( / ) and make simple yes/no decisions using the keys.
  • Page 49: Cancel Report

    8.1. Cancel Report The Cancel Report function enables you to prevent the system from reporting in the event of a false alarm. To cancel report: From the main menu, select Cancel Report [1]; all pending messages to the monitoring service are canceled. 8.2.
  • Page 50: User Codes

    8.3. User Codes The iConnect supports a variety of individual user codes. Each of these codes is four digits long. Most system functions require you to enter a valid user code. The ability to perform a function is defined by your user code’s authorization level.
  • Page 51: Deleting User Codes

    Editing User Codes User code editing is a feature that is available exclusively to the Master code. To maintain a high level of security, keep all user codes confidential. To edit a user code: From the main menu select, User Codes [4]. Select the code you want to edit;...
  • Page 52: Follow-Me

    Press when you have finished editing. 8.4. Follow-Me The Follow-Me feature is designed to notify the user that certain events have occurred. The events that are sent to the Follow-Me telephone number are those events that the user is authorized to view in the event log; events that can be viewed only by the installer are not sent to the Follow-Me number –...
  • Page 53: Service Menu

    8.6. Service Menu The Service menu includes various functions that enable you to test your system effectively. You can gain access to the Service menu using the Master code. Set Time & Date To set the time: From the Service menu, select Set Time/Date, Set Time [7011]. Enter the current time.
  • Page 54: Walk Test

    Siren Tests To test the external wireless siren: From the Service menu, select Test and then WL Siren Test [7031]; the wireless siren is sounded briefly. To test the built-in siren: From the Service menu, select Test and then Siren Test [7032]; the built-in siren is sounded briefly.
  • Page 55 Transmitters The Transmitters menu offers a number of testing utilities, TX List, TX Test, RF Link and ENV. RSSI. The TX List comprises all registered transmitters and their last reported status. To view the TX list: From the Service menu, select Transmitters, TX List [7041]; the first transmitter on the list is displayed.
  • Page 56 The second utility, TX Test enables you to identify transmitters. In TX Test mode, each time a transmission is received, a chime is sounded and the activated transmitter is displayed. To initiate TX Test mode: From the Service menu, select Transmitters, TX Test [7042]. Activate a transmitter;...
  • Page 57: Audio Volume

    Audio Volume To adjust the sensitivity of the microphone and the volume of the speaker: Establish a two-way audio connection. From the Service menu, select Audio Volume [705]. Adjust the setting according to the following table. Reading Meaning Increase microphone sensitivity Reduce microphone sensitivity Increase speaker volume Reduce speaker volume...
  • Page 58 Global Chime Each detector can be programmed by your installer to cause the system to chime when activated. This feature is active only when the system is disarmed. For example, the system can be programmed to sound a chime each time the front door is opened or closed.
  • Page 59: Appendix A: Menu Structure

    Appendix A: Menu Structure -59-...
  • Page 60: Appendix B: Glossary

    Appendix B: Glossary 24hr Zone A detector which is always active regardless of whether the system is armed or disarmed. Armed The state during which the security system is activated. In most cases, when the system is armed, triggering a detector generates an alarm.
  • Page 61 Follow-me A feature that enables users to receive notification to their telephone that an event has occurred in the system. Forced Arming Arming before the system is ready. If the system is not secured by the time that the exit delay expires, an alarm is generated. Front Panel The main interface located on the front of the Control System consisting of an LCD keypad.
  • Page 62 Non-Controlled A user code that does not cause the system to notify the monitoring Code service when used to arm or disarm. The system only reports if the code is used to disarm after an alarm. One-Key Arming Arming the system without the need for a valid user code. Panic Alarm A user initiated event that alerts the monitoring service in the event of an emergency.
  • Page 63 Telecontrol A feature that provides remote access via the telephone including remote arming/disarming, siren cancel and Two-Way audio. Tones Chimes sounded by the Control System’s internal or external siren. Trouble Tones Tones sounded by the system to indicate a trouble condition. Two-Way Audio (abbr.) Transmitter (abbr.) TX List...
  • Page 64 Electronics Line 3000 Ltd. Limited Warranty EL and its subsidiaries and affiliates ("Seller") warrants its products to be free from defects in materials and workmanship under normal use for 24 months from the date of production. Because Seller does not install or connect the product and because the product may be used in conjunction with products not manufactured by the Seller, Seller cannot guarantee the performance of the security system which uses this product.

Table of Contents