Notes:
Hostage password can be used in a critical situation for instance a kidnaping or an emergency, users need
to enter the following sequence in order to trigger the actions set for the Hostage Mode:
"* HostagePassword #".
Tamper alarm is anti-hack from Hardware level. When this option is checked, if the GDS3710 is removed
from the installation board, it will generate the alarm actions configured. There is an embedded mechanism
on the GDS3710 that allow it to sense when the it is removed.
Alarm schedule
This page specifies the configuration of Alarm Schedule. Schedule must be in place before the alarm take
the related action.
Figure 42: Alarm Schedule
There are 8 Period allowed to be configured, with time span specified by users. User can edit the alarm
schedule by clicking
button. Usually the 24 hours' span is 00:00 ~ 23:59, which is 24 hours' format.
Users can copy the configuration to different date during the schedule programming.
P a g e
|
56
GDS3710 User Manual