Table of Contents

Advertisement

Quick Links

EN
PROGRAMMING
MANUAL
Technical Manual for programming Vedo 2.6.x control panels
Passion.Technology.Design.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the VEDO 2.6 Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Comelit VEDO 2.6 Series

  • Page 1 PROGRAMMING MANUAL Technical Manual for programming Vedo 2.6.x control panels Passion.Technology.Design.
  • Page 2: Table Of Contents

    < BACK Table of contents 3.1.5 Phone App ..................19 System requirements: ..................19 How to proceed ....................19 Status / ID / description ..................20 1. Introduction to Safe Manager 2.6.0 software ......5 Checked areas ....................20 Area ........................20 1.1 INSTALLING SAFE MANAGER 2.6 ................5 Display tamper ....................20 1.1.1 System requirements ..............5 Options ........................20...
  • Page 3 < BACK Reed (options apply to Reed sensors only) .............31 User ........................49 Smoke ........................31 Colour ........................49 Zone ........................32 Acquire ........................49 Delete ........................49 3.4 WIRED ZONES ......................33 3.11 COMMUNICATION INTERFACES ................50 Duplicate the values of the current zone............33 Status ........................34 3.11.1 IP Options ..................50 Expansion type ....................34 Options ........................50 Origin ........................34...
  • Page 4 EN50131 grade 2 + incert) ..............77 5. Appendix ................... 78 5.1 PORT FORWARDING FOR REMOTE CONNECTION ...........78 5.2 COMELIT DNS REGISTRATION PROCEDURE FOR VEDOIP EXPANSION ..79 5.3 CONFIGURATIONS NECESSARY TO GUARANTEE GRADE 2 CERTIFICATION ACCORDING TO EN50131-1 .................81 5.3.1 Keypads ...................81 5.3.2 App ....................81...
  • Page 5: Introduction To Safe Manager 2.6.0 Software

    Español Français Isolated peripheral: √ NET 4.6.1 Framework (downloadable from Microsoft website). English Events log Nederlands √ Comelit Safe Manager configuration software (downloadable Alarm/ Sabotage: from pro.comelitgroup.com). Fault / Test: √ A-A USB cable. Generic: First Zone: 1.1.2 Installation procedure √...
  • Page 6: Set Communication Via Tcp/Ip

    < BACK 1.4.2 Set communication via TCP/IP Central unit firmware version Login √ Before carrying out the following procedure, make sure that Firmware version Request code the PC used and the Vedo series control panel are both on Read Enter access code the same network.
  • Page 7: Standard Procedures

    < BACK 2. Standard procedures This chapter illustrates the standard procedures usually carried out using FILTER OPTION the Safe Manager software. For example: saving the configurations for When the list of systems is particularly long, the name (or part of the your system, opening previously saved system files, sending configuration name) of the system you want to load can be entered in the text line, parameters to the control panel and reading the control panel configuration...
  • Page 8: Importing A System Configuration

    < BACK 2.5 IMPORTING A SYSTEM CONFIGURATION Send configuration parameters Poer supply station Expansions from bus Events Codes System parameters 8 input/output expansions Generic events Users Scenarios Pal-Ip video module Detailed events Installers Wired zones Radio expansions Contact-ID Map Access level 1.
  • Page 9: Receiving The Events Log

    < BACK 2.8 RECEIVING THE EVENTS LOG This option allows you to download the control panel events log for later analysis. 1. While the project is open, click the icon Receive events log... Safe Manager Project View Tools Windows Help Keypads Vedo 68 - #FW: 2.6x Control devices...
  • Page 10: System Configuration

    < BACK 3. System configuration 3.1 CONTROL DEVICES This group consists of all devices which allow the end user to manage the system connected to the control panel: • Keypads • Safetouch • Touch devices • RFID readers • App Phone •...
  • Page 11: Area

    < BACK AREA Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page SHOW Selects the areas of which you want to show the status with the device. DISPLAY TAMPER Allows you to choose to which areas the Tamper alarm generated by the device is sent. At least one area to which the tamper alarms generated by the device are to be signalled must be assigned to each active device [Reg.
  • Page 12: Partial Keys

    < BACK PARTIAL KEYS This section of the program can be used to define the activation functions associated with the keys P1 and P2 on the keypads. There are two drop-down menus for each of the 2 keys. The first menu allows you to select only the Scenario / Activation option, whereas the second menu allows you to choose from several standard configurations or from a series of custom activation scenarios (see "3.9 Scenarios"...
  • Page 13: Safetouch

    < BACK 3.1.2 Safetouch In the project there must be no active or isolated SafeTouch devices [Reg. 41] For the purposes of system management, Safetouch has the same specifications and same functions as a keypad with RFID reader. Unlike on the keypad, the keys are virtual: the characteristics of the LCD graphic display are used to represent the device's keys.
  • Page 14: Options

    < BACK CONFIGURATIONS PANEL OPTIONS • Quick activation: activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will not be allowed). • Quick alarms: sends alarms when a function key on the device is pressed. •...
  • Page 15: Touch Devices

    < BACK 3.1.3 Touch devices In the project there must be no active or isolated Touch devices [Reg. 42] This group of devices includes: Planux Manager, Minitouch, PC Touch, Icona ViP and Icona SBC. Depending on the selected device, some settings will be accessible or otherwise.
  • Page 16: Options

    < BACK CONFIGURATIONS PANEL OPTIONS • Quick activation: activates the system (total / partial / scenarios) without asking for the user code (total or partial activations of the system will not be allowed). • Quick alarms: sends alarms when a function key on the device is pressed. •...
  • Page 17: Rfid Readers

    < BACK 3.1.4 RFID readers In the project there must be no active or isolated RFID readers [Reg. 43] RFID readers LED ON time on proximity key Status ID Description Unlimited Seconds (+30) Activate Reader 1 Absent Reader 2 Tamper alarm cycles Absent Reader 3 Unlimited...
  • Page 18: Cycle Actions

    < BACK CYCLE ACTIONS When a valid and authorised RFID key is passed near an RFID reader, as well as performing a Total Activation or Total Deactivation (of the relevant areas), it is possible to activate the system in custom mode (see user manual for RFID reader Art. VEDOPROX for operating modes relating to this function).
  • Page 19: Phone App

    < BACK 3.1.5 Phone App In the project there must be no active or isolated App devices [Reg. 44] SYSTEM REQUIREMENTS: √ SafeManager software installed on a PC, version 2.2.0 or higher. √ VEDO10, VEDO34 or VEDO68 control panel, version 2.2.0 or higher. √...
  • Page 20: Status / Id / Description

    < BACK App Phone Options Status ID Description Quick activation Activate App 1 Quick alarms Absent App 2 Unlimited System status display time Absent App 3 Area Absent App 4 Tamper alarm cycles Active App 5 Unlimited Cycles Absent App 6 Absent App 7 Function keys...
  • Page 21: Bridge

    < BACK 3.1.6 Bridge In the project there must be no active or isolated App devices [Reg. 45] Bridge Options Status ID Description Quick activation Activate Bridge 1 Quick alarms Absent Bridge 2 Communication Bus 485 Absent Bridge 3 Area Check connection with the central unit (ethernet) Absent Bridge 4...
  • Page 22: Expansions On Bus

    < BACK 3.2 EXPANSIONS ON BUS 3.2.1 8 input/output expansions This section is for configuring the parameters of the input/output expansions. These are bus expansions which provide 8 configurable inputs (or open-collector outputs). 8 input/output expansions Terminals Status ID Description Activate Expansion 1 Absent...
  • Page 23: Power Supply Units

    < BACK 3.2.2 Power supply units Power supply units Options Status ID Description Tamper enabled Activate Power suppl. 1 00:00:55 Network alarm signalling delay (hh:mm:ss) Absent Power suppl. 2 Absent Power suppl. 3 00:05:00 Battery alarm signalling delay (hh:mm:ss) Area Absent Power suppl.
  • Page 24: Isolators

    < BACK 3.2.3 Isolators Isolators Options Reading analogue values Status ID Description Enabled tamper Tamper voltage Activate Isolator 1 Absent Isolator 2 Tamper alarm cycles Input bus voltage Absent Isolator 3 Unlimited Cycles Output bus voltage Area Absent Isolator 4 Read Technical alarms cycles (bus / voltage levels) Absent...
  • Page 25: Radio Expansions

    < BACK 3.3 RADIO EXPANSIONS This section is for configuring the parameters of the radio expansions. Radio expansion are bus expansions for receiving and sending radio information, and managing wireless sirens and sensors. Each module can manage up to 32 radio zones, up to 32 radio controls and up to 16 radio outputs (of which 8 can be sirens). Radio expansions Tamper alarm cycles Status...
  • Page 26: Radio Outputs /Sirens

    < BACK 3.3.1 Radio outputs /sirens This section is for configuring the parameters of the input/output expansions. These are bus expansions which provide 8 configurable inputs (or open-collector outputs). The total activation time of a siren must not exceed that prescribed by local regulations (see appendix to see what parameters determine the total duration).
  • Page 27: Area

    < BACK AREAS PANEL AREA Column showing the names of the areas in the system. To edit names, see "3.6 Areas" on page DISPLAY SYSTEM STATUS Allows you to select the areas about which visual and/or aural activation/deactivation information can be sent. To each active device must be assigned at least one area to which information regarding optical and/or acoustic activation/deactivation can be sent [Reg.
  • Page 28: Radio Controls

    < BACK 3.3.2 Radio controls This section can be used to add or remove and configure remote controls. Radio controls Description Source expansion User Radio control properties Radio ctrl 1 Radio exp. 1 Serial Number Radio ctrl 2 Radio exp. 1 4 buttons Type Radio ctrl 3...
  • Page 29: Forced Activation

    < BACK FORCED ACTIVATION When the function is enabled, the Radio control will always carry out activation, forcing the activation lock conditions. Selected [Reg. 34] INSTANT ACTIVATION If selected, the enabled areas will activate immediately, therefore resetting any output time to zero. SEND MESSAGE OPTIONS See description Send Message options on page.
  • Page 30: Radio Zones

    < BACK 3.3.3 Radio zones This section of the program is for managing the radio zones, which correspond to the IR and magnetic contact wireless sensors belonging to the system. Specifically, you can acquire new sensor codes; isolate, exclude or delete sensors already present on the control panel, and modify the parameters of each radio sensor.
  • Page 31: Duplicate The Values Of The Current Zone

    < BACK DUPLICATE THE VALUES OF THE CURRENT ZONE... Button allowing the configurations of a zone to be copied so as to paste them onto an existing zone. 1. Select the zone of which you want to copy the configurations. 2.
  • Page 32: Zone

    < BACK ZONE This section is for configuring the basic behaviour of the zone. In particular, you can associate the type of operation to the zone. • Type / subtype: selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the field below (subtype) will show a series of possible choices, depending on the type of selection made (See page 94).
  • Page 33: Wired Zones

    < BACK 3.4 WIRED ZONES This section of the program is for managing the wired zones, which correspond to the wired sensors belonging to the system. Specifically, you can add new zones; isolate, exclude or delete zones already present on the control panel, and modify the parameters of each zone. Wired zones Double Balancing...
  • Page 34: Status

    < BACK STATUS/DESCRIPTION PANEL STATUS Drop-down menu, allows you to add, isolate and remove devices from the configuration. The possible statuses for the device are as follows: • Absent: when the zone does not exist or has to be removed. •...
  • Page 35 < BACK • Zone ID: uniquely identifies the wired zone. • Type / subtype: selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the field below (subtype) will show a series of possible choices, depending on the type of selection made (See page 94).
  • Page 36: Groups In And

    < BACK 3.5 GROUPS IN AND The control panel has 8 virtual zones whose behaviour depends on groups of real zones, which are assigned at the configuration stage to one of the 8 zones in AND. When 2 or more zones are assigned to a zone in AND, all of them have to be violated within a specific time limit (measured from the first violation) for an alarm state to be generated.
  • Page 37: Areas

    < BACK 3.6 AREAS The Areas section allows you to configure the times and functions of the Areas according to the requirements of the system. Areas Description Area 1 00:30 00:00 00:30 00:15 <None> <None> Area 2 00:30 00:00 00:30 00:15 <None>...
  • Page 38: Burglar Alarm Delay (Seconds)

    < BACK BURGLAR ALARM DELAY (SECONDS) The "pre-alarm" Burglar alarm delay Timer is the time that passes between zone violation and Alarm event generation. During the Burglar alarm delay, the enabled checking devices will emit an audible alert.  = 0 sec [Reg. 49] ACTIVATION DELAY AFTER ALARM (MINUTES) The Activation delay after alarm is the time that must pass before the violated area which generated the alarm event can be activated again.
  • Page 39: Outputs

    < BACK 3.7 OUTPUTS This section is for configuring the physical outputs present on the control panel or made available by the expansion modules on the bus. The total activation time of any siren connected to an output must not exceed that prescribed by local regulations (see appendix to see what parameters determine the total duration).
  • Page 40: Expansion Type

    < BACK EXPANSION TYPE Shows the physical location of the output, with information such as “Central unit” or “8 I/O Expansion”. OUTPUT ID Uniquely identifies the output. TERMINAL Shows the name for the terminal of the peripheral to which the output in question is routed. CONFIGURATIONS PANEL EVENT 1 / 2 / 3 / 4 See description on page 90.
  • Page 41: Events Group

    < BACK 3.8 EVENTS GROUP The outputs, both standard outputs and radio outputs, can manage up to four events each, freely selected in terms of type and polarity. It is sometimes useful to have indications grouped according to a logic that cannot be obtained by configuring the four events available for a single output, e.g. a summary indication of block events relating to all the RFID readers, when there are more than 4 of them in the system.
  • Page 42: Scenarios

    < BACK 3.9 SCENARIOS In this section you can configure the activation statuses for each area of the system and for 8 (for Vedo 10, Vedo 34) or 16 (for Vedo 68) different scenarios. Scenarios Description Area Action Scenario P1 Area 1 Scenario P2 Area 2...
  • Page 43: Codes

    < BACK 3.10 CODES This heading covers the sections for the configuration, programming and acquisition of the codes, divided by type. The number of codes, keys and remote controls that can be activated depends on the type of control panel used: VEDO10 VEDO34 VEDO34M...
  • Page 44: Users

    < BACK 3.10.1 Users There must be at least one active user [Reg. 53] The users section is for the management of codes reserved for users, who therefore have the possibility of activating and deactivating the system, depending on their authorisations. Users User name User type...
  • Page 45: Area

    < BACK AREAS PANEL AREA An alphanumeric field; shows the name of the area (Area n by default) or the name that will be assigned to it by modifying the default in the Areas section. ENABLE Checkboxes; if selected, enable the user to operate on the corresponding areas. CONFIGURATIONS PANEL RESET CODE Allows editing of the selected user code.
  • Page 46: Installers

    < BACK 3.10.2 Installers There must be at least one active installer [Reg. 53] The installers section allows you to configure the codes intended for installers. Installers Description Installer type Reset Delete Installer 1 Install. type 1 ID Passwords associated with user Installer 2 Install.
  • Page 47: Access Levels

    < BACK 3.10.3 Access levels In this section, you can enable each individual function for each individual user type. The option is enabled when the box is checked. The options that can be enabled are listed below: OPTION OPTION OPTION Activation Extraordinary request Zones menu...
  • Page 48: How To Logout From Different Control Devices

    < BACK HOW TO LOGOUT FROM DIFFERENT CONTROL DEVICES From any device/application for system control after a determined period of time in which the user does not perform any operation (timeout), the work session is closed automatically (logout). To close the session before timeout, follow the indications in the table below. Devices/Applications Logout procedure Vedolcd - Vedolcdprox...
  • Page 49: Proximity Keys

    < BACK 3.10.4 Proximity keys This section allows you to acquire RFID digital keys and assign them to users. You can save up to 56 keys. ACQUIRING AN RFID DIGITAL KEY CODE 1. Select the position in which you intend to acquire the key. 2.
  • Page 50: Communication Interfaces

    < BACK 3.11 COMMUNICATION INTERFACES This group of sections describes the communication interfaces other than the digital communicator. 3.11.1 IP Options Important: to use the options, the following conditions must be met: √ The control panel must be equipped with an IP network card module. √...
  • Page 51: Network Time Protocol Options

    IMPORTANT: to use this service you need to register with one of the suggested providers. On completion of registration, the service "5.2 Comelit DNS registra- provider will communicate all the necessary information for configuring the dynamic DNS service. (see chapter tion procedure for VEDOIP expansion"...
  • Page 52: Gsm Options

    < BACK 3.11.2 GSM Options Important: to use these options correctly, the following conditions must be met: √ The control panel must be equipped with the GSM expansion module, correctly connected to its antenna. √ The GSM expansion module must be configured as present by selecting the checkbox IP Network Card in the Expansions Present section of the System Parameters menu.
  • Page 53: Email Options

    < BACK SECTION PRE-DEFINABLE PARAMETERS (OVERWRITTEN IF APPROPRIATE) SMS options Text to send, service centre number Email Options APN address, Username, Password SMTP options Server address, Port MMS options Service centre address (MMSC), APN address, Username, Password, Proxy IP address Telephone companies Select Telephone Company...
  • Page 54: Pal/Ip Video Module

    < BACK 3.11.3 Pal/IP video module In the project there must be no active or isolated Palip devices [Reg. 104] This section is for configuring, adding or deleting PAL-IP devices. Pal-Ip video module Network parameters Status ID Description Assign new IP to module... 0 .
  • Page 55: Status / Id / Description

    < BACK STATUS/DESCRIPTION PANEL STATUS / ID / DESCRIPTION See description Status / ID / Description on page AREAS PANEL AREA Alphanumeric box; shows the name assigned to the control panel areas. DISPLAY TECHNICAL ALARMS AREAS Column of checkboxes; by checking the appropriate checkboxes, you can choose the areas to which to send technical alarms generated by the selected PAL/IP module.
  • Page 56: Technical Alarms Cycles (Bus/Voltage Levels)

    • IP/Hostname: Hostname or IP address for IP CAM (as for camera configuration) • Low resolution channel: channel for low resolution video streaming (for Comelit cameras IPCAM100="/ch01_sub.264", for Comelit cameras IPCAM700="/1/stream2", for cameras supplied by third parties, refer to the respective manuals) •...
  • Page 57: Cloud Options

    • Enable Cloud service: checkbox, when selected, enables the Comleit Cloud service. • Server address: alphanumeric box, enter the address of the server on which the Comelit Cloud service is installed. • Port: numerical box, enter the port to be used for connection to the Comelit Cloud service (default: 443).
  • Page 58: Communicator

    < BACK 3.12 COMMUNICATOR 3.12.1 Telephone Options Telephone Options Answer Priority management Number of rings (only PSTN) Priority send message requesting user code input: Skip fax (only PSTN) Message repetitions Email Voice call Pause between repetitions Digital communication Code recognition time (sec.) Tones recognition timeout (sec) Call Switchboard...
  • Page 59: Priority Management

    < BACK SELECTION FROM THE BEHAVIOUR OF THE TELEPHONE SIGNALLING DEVICE MENU Delay the message will be sent after the delay time set in the "delay" parameters Press key 1 Once the line is obtained, if the caller presses the 1 key on his telephone (in DTMF mode), the message will be transmitted to the caller Voice delay not implemented •...
  • Page 60: Stop Calls

    < BACK STOP CALLS Checkbox; if selected, allows the selected user to stop the flow of calls directly from the telephone using the Hash (#) and Asterisk (*) keys. The "End Call With Keys" option must be enabled in Telephone Options. RECEIVING SMS / EMAIL / MMS Checkbox;...
  • Page 61: Generic Events

    < BACK 3.12.4 Generic events This section is for configuring the events that can generate communications/messages to the devices. In practice, the configuration of a generic event consists of assigning behaviour rules and procedures for contacting the available telephone numbers to each of the forty-eight possible events.
  • Page 62: Options

    < BACK CONFIGURATIONS PANEL OPTIONS Options Priority event Select free Auto-composed voice message Burglary Message Voice message Stop calls Priority to call on PSTN Message Burglary SMS Selection Email None Burglary Email Selection DVR camera link • Priority event: checkbox. Events are normally processed in order of presentation. If this checkbox is selected, the event is processed before all other events that do not have this checkbox selected.
  • Page 63: Auto-Composition

    < BACK AUTO-COMPOSITION Auto-composition Areas. Message type Burglar Zone Alarm Part A Part B Input. Area 2. Area 3. Area 4. Generate audio Play In this section, the auto-composed message is converted into audio so that it can be sent by telephone. •...
  • Page 64: Detailed Events

    < BACK 3.12.5 Detailed events This is the section in which you can select whether to send messages for each event or action detected by the control panel, and if so, what type of messages. This detailed section works in conjunction with the individual permissives for the transmission of detailed messages present in each zone screen, area screen etc.
  • Page 65: Contact-Id Map

    < BACK Example: Areas/system tab Safetouch Touch devices Change codes Reset database Bridge Zones Areas/System Keypad RFID Remote connections Timer Outputs Actions Activations Zone alarm Sabotage Faults Generic Description Total activation Partial activation 1 • ID: numerical box, uniquely identifies the event. •...
  • Page 66: Free Voice Messages

    < BACK 3.12.7 Free voice messages This section enables you to compose text messages that can be sent in audio form to one or more telephone numbers. The messages can be entered by means of the configuration PC keyboard and must then be transferred to the messages memory. Sixteen free messages are available.
  • Page 67: Sms

    < BACK 3.12.8 SMS This section enables you to compose up to sixteen different text messages that can be sent in SMS form to one or more telephone numbers. The messages can be entered by means of the configuration PC keyboard and must then be transferred to the messages memory. Description Text Burglary SMS...
  • Page 68: Timetable Programmer

    < BACK 3.13 TIMETABLE PROGRAMMER This section allows you to configure Timers and timed or automatic activations. The timers relate mainly to time-dependent authorisations (e.g. you can enable keypads to perform operations only within certain timeframes) and conditions on outputs. 3.13.1 Timer The control panel provides eight different timer configurations.
  • Page 69: Activations

    < BACK 3.13.2 Activations In this section it will be possible to configure any programmed activations. Up to eight different activation profiles can be configured. Each profile can operate on eight areas simultaneously, and for each area, eight independent and programmable timeframes are available. Activations ID Description Working day...
  • Page 70: System Parameters

    < BACK 3.14 SYSTEM PARAMETERS System parameters Presence of expansions Audio PSTN Domotics Network card (Ip) Intercom PRESENCE OF EXPANSIONS Includes 6 independent checkboxes for enabling any expansions that may be present on the control panel. The check mark in the checkbox enables the peripheral, which would not otherwise be considered, even if present.
  • Page 71: Control Devices

    < BACK • Activation with monitoring fault (radio): checkbox; if selected, allows activation of the system even if there is a radio sensors monitoring anomaly. The system must be activated by forcing. Must be selected if active radio sensors are present [Reg.
  • Page 72: Fault Cycles

    < BACK • Unlimited: checkbox, for putting no limit on the test time: the zones in test mode will remain in test mode until taken out of test mode. • Maximum number of overtime requests: numerical box for setting the maximum number of overtime requests (which equate to an activation delay requested by a user) that can be made before automatic activation.
  • Page 73: Events Log

    < BACK 3.15 EVENTS LOG The events log can record up to 1024 standard-compliant events, 1024 generic events and 8 events of “first zone event” type on a non-volatile memory. First Zone type events refer to the first zone in the area to which they belong, and amount to one per potentially used area. For each of the three types of event, once you have filled all the locations assigned to recording, subsequent records of mandatory and generic events will rewrite the non-volatile memory, starting from the oldest events.
  • Page 74: Events To Be Saved

    < BACK 3.15.2 Events to be saved In this section, it is possible to choose which events to save in the events memory, for subsequent analysis. Detailed selection of the individual events that can be saved, makes it possible to increase the level of detail of the records while reducing the maximum retention period or, conversely, to reduce the level of detail of the records while extending the available retention time, assuming the same conditions of system use.
  • Page 75: System Verification

    < BACK 4. System Verification This chapter will show how to: CONTROL PANEL ALARMS/SABOTAGE • check the system status using the function "Control panel check (Real Element Parameters Time)" • Burglar • Robbery • verify the system configurations for grade 2 certification to ENEN50131 •...
  • Page 76: Launch Control Panel Check Function (Real Time)

    < BACK 1. Click on the alarm condition, activation, command that you ETH EXPANSIONS want to verify (e.g.: Activations/Total activation). Element Parameters 2. Press "run" to startd the condition. In the case of activations: • No Link • DDNS error •...
  • Page 77: Conformance Verification (En50131 Grade 2 / En50131 Grade 2 + Incert)

    < BACK 4.2 CONFORMANCE VERIFICATION (EN50131 GRADE 2 / EN50131 GRADE 2 + INCERT) This function allows you to verify whether the system configuration conforms to standards (EN50131 grade 2 / EN50131 grade 2 + incert) 4.2 1 Run the function Conformance verification (EN50131 grade 2 / EN50131 grade 2 + incert) 1.
  • Page 78: Appendix

    Vedo application) 49110 49110 STREAMING (for streaming √ data transmis- sion via Vedo application) 24104 24104 √ (Comelit Signal- ling Protocol) 30013 10012 GRAB Second Pal- (for capturing IP module √ screenshots using the Vedo application) 49111 49111...
  • Page 79: Comelit Dns Registration Procedure For Vedoip Expansion

    < BACK 5.2 COMELIT DNS REGISTRATION PROCEDURE FOR VEDOIP EXPANSION An Internet connection is required for this procedure. √ The device must be connected to the same network as the control panel. 1. Open your browser (from a PC, tablet, smartphone...).
  • Page 80 < BACK 6. Press to continue with "product registration". » Product registration via the website comelitdns.com is complete! 7. Return to the "IP Options" configuration screen in Safe Manager, tick "Enable DDNS (Dynamic DNS)" and enter the host name (including "comelitdns. com"), email address and password entered during registration on the websitecomelitdns.com (see step 5) in the "Host name", "Username"...
  • Page 81: Configurations Necessary To Guarantee Grade 2 Certification According To En50131-1

    5.3 CONFIGURATIONS NECESSARY TO 5.3.5 Isolators GUARANTEE GRADE 2 CERTIFICATION Vedo10 x: from 1 to 4 / Vedo34 x: from 1 to 8 / Vedo68 x: from 1 to 16 / Vedo200 x: from 1 to 16 ACCORDING TO EN50131-1 Configurations necessary to guarantee Indices Parameters...
  • Page 82: Radio Zones

    5.3.9 Radio zones WIRED OUTPUT EVENTS Configurations necessary to guarantee Vedo10 x: from 1 to 16 / Vedo34 x: from 1 to 64 / Vedo68 x: from 1 to 96 / Vedo200 x: from 1 to Indices Parameters Grade 2 certification * Alarms/Sabotage+ Motion sensor 1.1.1.17.x.11.y.1 Event...
  • Page 83: Ip Options

    5.3.15 IP Options Configurations necessary to guarantee Indices Parameters Grade 2 certification Configurations necessary to guarantee Indices Parameters * If the digital communicator is not active, the following events must be signalled: Grade 2 certification - Robbery Alarm * Completed 1.1.1.24.1.1 - Burglar Alarm * Completed...
  • Page 84 Configurations necessary to guarantee Configurations necessary to guarantee Indices Parameters Indices Parameters Grade 2 certification Grade 2 certification * - activation: Selected * - activation: Selected 1.1.1.31.x.6.y.37 Tamper bus free 0 1.1.1.31.x.6.y.85 Fault free bus 4 * - reset: Selected * - reset: Selected * - activation: Selected * - activation: Selected...
  • Page 85: Service Voice Messages

    5.3.22 Service voice messages Configurations necessary to guarantee Indices Parameters Grade 2 certification x: from 1 to 6 Selected 1.1.1.43.x.27 Bus keypad tamper Selected 1.1.1.43.x.28 RFID tamper Configurations necessary to guarantee Indices Parameters Selected Grade 2 certification 1.1.1.43.x.29 Safetouch tamper The system address field must be Selected 1.1.1.43.x.30...
  • Page 86: Configurations Necessary To Guarantee Incert Certification

    5.4 CONFIGURATIONS NECESSARY TO Configurations necessary to guarantee Indices Parameters Grade 2 certification GUARANTEE INCERT CERTIFICATION Selected 1.1.1.43.x.126 Change date and time Selected 1.1.1.43.x.127 Change site data Only set selected This chapter provides indications on the configuration parameters which, 1.1.1.43.x.130 Telephone call failed Outgoing phone if varied, could lower the safety level of the system, and the configurations...
  • Page 87 < BACK STATUS/DESCRIPTION PANEL STATUS Drop-down menu, allows you to add, isolate and remove devices (Keypad, Safetouch...)/zones/outputs/expansions from the configuration. The possible statuses for the device are as follows: • Absent: when the device/zone/output/expansions do not exist or have to be removed. •...
  • Page 88 < BACK FUNCTION KEYS The function keys can be used to perform actions on the system directly. This section of the program allows you to define the actions to be assigned to each key. There are two drop-down menus for each function key. The first allows you to decide the action category to assign to the function key, while the second (activated when the category has been chosen from the first menu) allows you to choose the specific action.
  • Page 89 < BACK SEND MESSAGE OPTIONS When specific events occur, it is possible to send SMSs, emails, digital communications or notifications to the smartphone app. In this section, you can assign an initial general permit to generate such events. From the Detailed Events section (see "3.12.5 Detailed events"...
  • Page 90 < BACK EVENT 1 / 2 / 3 / 4 /... / 16 The purpose of the outputs is to move on command, in a configurable manner, when one or more events occur. To explain the behaviour of the outputs and of the control panel logic properly, it is useful to describe what is meant by the term 'event': at logic level, an event can be defined as the condition that exists between the detection of a status and its cessation (or the cessation of its active status).
  • Page 91 < BACK BEHAVIOUR • Output type: can be used to select output conduct by associating with Monostable or Bistable type operation. All radio sirens must be set as monostable. [Reg. 22] All active outputs connected to a siren must be monostable [Reg. 51] •...
  • Page 92 < BACK The set of tables below (one for each available event type and applicable to each of the four available event sections) shows the possible choices. EVENT TYPE: APP EVENT SUBTYPE EVENT App Events • Wrong code • Event 1 key •...
  • Page 93 < BACK EVENT TYPE: RADIO CONTROL EVENT SUBTYPE EVENT • Event 1 key pressed Radio control events • Event 2 key pressed EVENT TYPE: SAFETOUCH EVENT SUBTYPE EVENT • False key • Event 1 key pressed Safetouch events • Valid key •...
  • Page 94 < BACK ZONE TYPE / SUBTYPE Selects the type of zone from four possibilities: Alarm, Command, Sabotage, Fault Once you have made your selection, the field below (subtype) will show a series of possible choices, depending on the type of selection made. ZONE TYPE: ALARMS SUBTYPE EVENTS GENERATED...
  • Page 95 < BACK REACTION TYPE This section is enabled only for Burglary type zones. For all other types of zone, this zone is made inaccessible. The reaction of a zone, in the event of violation, derives from the fact that the following conditions must be met: √...
  • Page 96 < BACK ATTRIBUTES • Excluded: the zone with this attribute will be excluded, it will not generate the Zone alarm event. Anomaly and sabotage conditions will be indicated. • Cannot Exclude: the zones with this attribute cannot be forced if they are not ready for activation during the system activation process (alarm, sabotage, fault).
  • Page 97 < BACK TAB FOR SELECTING DETAILS OF EVENTS TO SIGNAL The group of tables below provides a list of the events associated with each tab: ZONES EVENTS MANAGED • Command • Zone isolation • Zone exclusion • zone restriction Areas/System EVENTS MANAGED •...
  • Page 98 < BACK ACTIONS EVENTS MANAGED • Activation Deactivation action Activations Tab • Burglar alarm action • Panic alarm action • Gas alarm action • 24H alarm action • Robbery alarm action • Medical Emergency alarm action Alarms tab • Fire alarm action •...
  • Page 99 < BACK < BACK...
  • Page 100 C E R T I F I E D M A N A G E M E N T S Y S T E M S w w w . c o m e l i t g r o u p . c o m Via Don Arrigoni, 5 - 24020 Rovetta (BG) - Italy...

Table of Contents