Page 2
Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates a hazardous situation which, if not avoided, Danger will or could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data Caution loss, performance degradation, or unexpected...
Page 3
MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF...
Page 4
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR PRODUCTION OF...
Page 5
Regulatory Information Security Grade (SG): 2 EN 50131-1:2009+A2:2017 Environmental Class (EC) : II EN 50131-3:2009 EN 50131-6:2017 EN 50131-5-3:2017 EN 50131-10: 2014 EN 50136-2: 2013 Certified by Telefication Note EN50131 compliance labeling should be removed if non- compliant configurations are used. EU Conformity Statement This product and - if applicable - the supplied accessories too are marked with "CE"...
Page 7
4.4.6 Add Keyfob ..........46 4.4.7 Arm/Disarm the Zone ........ 47 4.4.8 Bypass Zone ..........47 4.4.9 Set Zone ............. 48 4.4.10 Set Arming/Disarming Schedule ....49 4.4.11 Check System Status (Zone Status/ Communication Status) ........51 4.4.12 Check Alarm Notification ......51 4.4.13 Add a Camera to the Zone .......
Page 8
A.1.6 Alarm Information is Not Reported to APP/ 4200/Alarm Center ..........62 A.2 Mutual Exclusion of Functions ......63 A.2.1 Unable to Enter Registration Mode ... 63 A.2.2 Unable to Enter RF Signal Query Mode ..63 A.3 Zone Fault ............63 A.3.1 Zone is Offline ...........
1 Introduction 1.1 System Description AX wireless security control panel, containing 32 wireless zones, supports Wi-Fi, TCP/IP, and 3G/4G communication methods. It also supports ISAPI, Hik-Connect, DC-09, and NAL2300, which is applicable to the scenarios of market, store, house, factory, warehouse, office, etc.
Model Description DS-PWA32-HSR (Black/ supports Ethernet/ WI-FI, 3G/4G, and IC Card White) DS-PWA32-HGR supports Ethernet/ WI-FI, GPRS, and IC Card (Black/White) DS-PWA32-HR (Black/ supports Ethernet/ WI-FI and IC Card White) DS-PWA32-HS (Black/ supports Ethernet/ WI-FI, and 3G/4G White) DS-PWA32-HG (Black/ supports Ethernet/ WI-FI, and GPRS White) DS-PWA32-H (Black/...
Page 11
DS-PW32-H(R)(S)(G) 12 (only for model IC Card with -R) 13 (1 installer, 1 User administrator, 1 User manufacturer, and 10 general users) Communication Mode of operation Pass-through 4700 max log entries Stored in the FLASH Logs of which 1000 are (over-write protected) mandatory Type...
Note Ehome5.0: a privacy internet protocol that is used for accessing the third-party platform, which supports alarm report uploading, security control panel management, and short video uploading. Note Standard DC-09 Protocol ADM-CID: The data presenting method of DC-09 is CID, which is not encrypted and only for uploading alarm report.
Page 14
Indicator Description Name The device will prompt detailed alarm or fault information while authorized users disarm the system. You can set to indicate fault when arming in the web client. Not compliant the EN requirement. Solid Green: The panel is bound to Hik-connect account Link Off: The panel is not bound to Hik-...
Page 15
Description Note The function of GPRS or 3G/4G (implemented with built-in SIM card slot) varies depends on the model of the device. TAMPER Reset Button AP&STA Switch Battery Connector Network Interface Power Interface Function Button The function button is on the side of the control panel. Figure 1-3 Function Button Use the function button to add wireless devices and check the RF signal.
Note Only install peripherals when the signal strength is 100 or above. For much better system, install at 120 and above. 2 Connection You can connect peripheral device to the control panel locally, via client software, web client, or mobile client. Note Check the RF signal strength before connection and peripheral device installation.
Note For details, refer to the chapter of Configuration-Configure via Web Client-Alarm Settings. Connect via Web Client In the web client, click Wireless Device . Select a zone/relay/siren and enter the Settings page. Input the device serial No. for connection. Note For details, refer to the chapter of Configuration-Configure via Web Client-Alarm Settings.
Page 18
Figure 3-2 Insert SIM Card Caution Please ensure that the SIM card is tested as there might be communication issues with some providers. 3. Connect the battery to the control panel. Figure 3-3 Connect the Battery 4. Connect the power adapter to the control panel and a power outlet.
Figure 3-5 Connect to the Ethernet 6. Secure the rear cover to the installation position with the supplied screws. Attach the control panel on the rear cover, and tighten the rear cover screw to complete the installation. Figure 3-6 Complete the Installation Note •...
Before You Start • Get the iVMS-4200 client software from the supplied disk or the official website http://www.hikvision.com/en/ . Install the software by following the prompts. • The device and the PC that runs the software should be in the same subnet.
Before You Start • Get the SADP software from the supplied disk or the official website http://www.hikvision.com/en/ , and install the SADP according to the prompts. • The device and the PC that runs the SADP tool should be within the same subnet.
Steps 1. Download, install and register to the client software. 2. Add device in Control Panel → Device Management → Device . Note Set the device port No. as 80. Note The user name and password when adding device are the activation user name and password.
Page 23
Figure 4-1 Wired Network Settings Page 4. Set the parameters. - Automatic Settings: Enable DHCP and set the HTTP port. - Manual Settings: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS Server Address. Note By default, the HTTP port is 80, which is not editable. 5.
Page 24
Figure 4-3 WLAN Settings Page 4. Set IP Address, Subnet Mask, Gateway Address, and DNS Server Address. Note If enable DHCP, the device will gain the Wi-Fi parameters automatically. 5. Click Save. Cellular Network Set the cellular network parameters if you insert a SIM card inside the device.
Page 25
Ask the network carrier to get the APN information and input the APN information. Data Usage Limit You can enable the function and set the data threshold every month. If data usage is more than the configured threshold, an alarm will be triggered and uploaded to the alarm center and mobile client.
Page 26
You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain name, port number, account code, timeout, re-upload times and heartbeat interval. Figure 4-6 SIA-DCS Note Set the heartbeat interval with the range from 10 to 3888000 seconds.
Page 27
Figure 4-8 *ADM-CID Note Set the heartbeat interval with the range from 10 to 3888000 seconds. For encryption arithmetic: The panel support encryption format for information security according to DC-09, AES-128, AES-192 and AES-256 are supported when you configure the alarm center.
Page 28
Steps 1. Click Communication Parameters → Event Communication . 2. Enable the target notification. Alarms and Tampers The device will push notifications when the zone alarm is triggered or the device tamper alarm is triggered or restored. Life Safety Alarms The device will push notifications when fire alarm, gas alarm, or medical alarm is triggered.
Page 29
Option Notification Panel Management Notification Mobile Phone Index 1 to 6 Mobile Phone Number Notification Type SMS & Voice Call Check Box Mobile Phone Alarms and Tampers Life Safety Alarms Maintenance and Faults Mobile Client Registration If you want to register the device to the mobile client for remote configuration, you should set the mobile client registration parameters.
Page 30
The system will select the communication mode automatically according to the sequence of, wired network, Wi-Fi network, and cellular data network. Only when the current network is disconnected, will the device connect to other network. Wired Network Priority The wired network has the highest priority. Note When the device supports cellular data network connection and the wired network is disconnected, it will connect to the...
Note By default, the port number for EHome is 7660. 6. Set an account, including the Device ID and Ehome Login Password. 7. Click Save. Universal Plug and Play (UPnP™) is a networking architecture that provides compatibility among networking equipment, software and other hardware devices.
Page 32
Figure 4-13 Zone Page 2. Select a zone and click to enter the Zone Settings page. 3. Edit the zone name. 4. Select a zone type. Instant Zone This Zone type will immediately trigger an alarm event when armed. Delayed Zone Exit Delay: Exit Delay provides you time to leave through the defense area without alarm.
Page 33
The zone activates all the time. It is usually used in the sites equipped with panic button, smoke detector and glass-break detector. Fire Zone The zone activates all the time with sound/siren output when alarm occurs. It is usually used in fire hazardous areas equipped with smoke detectors and temperature sensors.
Page 34
If you want to the link the device with a relay output to output the alarm, set the output parameters. Steps 1. Click Device Management → Relay to enter the Output page. 2. Add a wireless output module. 1) Click Wireless Output Module. Figure 4-14 Wireless Output Module Settings 2) Select a wireless output module number from the drop- down list.
Page 35
Figure 4-15 Siren Page 2. Click to enter the Siren Settings page. 3. Set the siren name and the volume. Note The available siren volume range is from 0 to 3 (function varies according to the model of device) . 4.
Page 36
7. Optional: Enable Link to Wireless Keypad and set the serial Note The keypad in 868 MHZ may not support this function. 8. Set the Disconnectin Duration, and the system determins connection fault if the disconnected duration of the device is longer than the configured value.
4.3.3 Partition Settings Basic Settings You can link zones to the selected partition. Steps 1. Click Partition Management → Basic Settings to enter the page. Figure 4-18 Partition Basic Information Management Page 2. Select a partition. 3. Check the Enable One-Push Arming to enable the One-Push Arming key on the keypad.
Page 38
Schedule and Timer Settings You can set the Entry Delay 1 & Entry Delay 2 time duration for the delayed zone type and the Exit Delay delayed time to exit the zone. You can also set the alarm schedule. The zone will be armed/disarmed according to the configured time schedule.
Note The buzzer beeps slowly 2 minutes before the auto arming starts, and beeps rapidly 1 minute before the auto arming starts. Note You can select to enable forced arming on the System Options page. While the function is enabled, the system will be armed regardless of the fault.
Page 40
You can add two network cameras to the security control panel, and link the camera with the selected zone for video monitoring. You can also receive and view the event video via client and Email. Add Cameras to the Security Control Panel Steps 1.
Page 41
Figure 4-23 Set Email to Receive Alarm Video 2. Click the block to enable the function. 3. Enter the sender's information. Note It is recommended to use Gmail and Hotmail for sending mails. 4. Enter the receiver's information. 5. Click Receiver Address Test and make sure the address is correct.
Figure 4-25 Video Settings 2. Select a camera and set the video parameters. Stream Type Main Stream: Being used in recording and HD preview, it has a high resolution, code rate and picture quality.. Sub-Stream: It is used to transmit network and preview pictures as a video streaming with features of lower resolution, bit rate and picture quality.
Page 43
Figure 4-26 Add User Page 5. Set the keypad password (numeric, 4~8 characters). 6. Check the check boxes to set the user permission. The user can only operate the assigned permissions. 7. Click OK. 8. Optional: Enable the user in the Enable User column to allow the enabled user operating the device.
Check different items to assign permissions. Single Key Settings Select from the drop-down list to set I key and II key's functions Combination Keys Settings Select from the drop-down list to set combination keys' functions. 4. Click OK. 5. Optional: Click to edit the keyfob information.
2. Check the Test check box to start walk test. 3. Click Save to complete the settings. 4. Trigger the detector in each zone. 5. Check the test result. Diagnosis The control panel supports diagnosis of system, alarm, wireless device, Wi-Fi, and cloud platform Steps 1.
Page 46
If the option is enabled, the system will detect all radio peripherals heartbeat. If no peripherals heartbeat is detected, the system will upload an event. Note For EN, do not switch to OFF. Forced Arming If the option is enabled and there are active faults in a zone, the zone will be bypassed automatically.
Page 47
Note Only -P model supports this function. Prompt Fault When Arming If the device applies EN standard, by default, the function is disabled. In this case, the device will not prompt faults during the arming procedure. Note Only -P model supports this function. Enable Early Alarm If you enable the function, when the zone is armed and the zone is triggered, the alarm will be triggered after the delay...
Page 48
AC Power Down Check Time The system checks the fault after the configured time duration after AC power down. To compliant the EN 50131-3, the check time duration should be 10 s. Time Settings You can set the device time zone, synchronize device time, and set the DST time.
Page 49
If the user continuously input the incorrect password for more than the configured times, the account will be locked. Note The administrator has two more attempts than the configured value. Locked Duration Set the locking duration when the account is locked. Note The available locking duration is 5s to 1800s.
Click Partly Restore to restore all parameters except for admin user information, wired network, Wi-Fi network, detector information, and peripheral information to default ones. Click Restore All to restore all parameters to the factory settings. Import Configuration File Click View to select configuration file from the PC and click Import Configuration File to import configuration parameters to the device.
• Zone: You can view the zone status, alarm status, detector battery capacity, and signal strength. • Siren: You can view siren status, battery status, and signal strength. • Relay: You can view relay status, battery status, and signal strength. •...
Figure 4-34 Results Page 4. Tap Add on the Results page. 5. Enter the verification code and tap OK. 6. After adding completed, enter the device alias and Tap Save. 4.4.3 Add Control Panel to the Mobile Client Add a control panel to the mobile client before other operations. Steps 1.
6. Follow the instructions. Enter the device alias and tap Save. The control panel is listed on the device list page. 7. Optional: You can delete the device. 1) On the device list page, tap the security control panel and then log in to the device (if required) to enter the partition page.
web browser. The page will need to be re-freshed every time for a new test. See also Appearance-Function Button. When performing a signal strength test it is recommended that the system is tested in the 'worst case scenario'. For example with all doors and windows closed.
1. On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. 2. Tap to enter the Scan QR Code page. 3. Tap Add Keyfob. 4. Follow the instruction on the page and press any key on the keyfob to add.
Figure 4-38 Zone Settings Page 4. Enable Zone Bypass and the zone will be in the bypass status. The detector in the zone does not detect anything and you will not receive any alarm from the zone. 4.4.9 Set Zone After the detector is added, you can set the zone, including the zone name, the zone type, zone bypass, linked camera, stay/away status, the siren, and the silent zone.
Figure 4-39 Zone Setting Page 3. Set the following parameters as you desired. Zone Type Select a zone type from the zone type list. If you select Delayed Zone, you should select an entry delay (Entry Delay 1 or Entry Delay 2) on the pop-up page. If you select Timeout Zone, you should select a timeout value or tap Custom to set a custom value.
Page 58
On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. → Partition Management and select a partition, or tap on the Parition page to enter the Settings page. Enable the auto arm/disarm function and set the auto arm time/ auto disarm time.
Entry Delay 2 Set a value for Entry Delay 1 and Entry Delay2. Entry delay is a time concept. If entry delay is configured for the delayed zone, when you enter an armed delayed zone, the zone alarm will not be triggered until the end of entry delay. Note After set value for Entry Delay 1 and Entry Delay 2, you should set the entry delay of a specific zone to the value of Entry...
Figure 4-41 Notification Page All alarm notifications are listed in Notification page. 2. Select an alarm and you can view the alarm details. Figure 4-42 Alarm Details 3. Optional: If the zone has linked a camera, you can view the playback when the alarm is triggered.
Steps 1. On the device list page, tap the security control panel and then log in to the device (if required) to enter the control panel page. 2. Tap Zone to enter the zone list page. 3. Select a zone to enter the zone settings page. 4.
Access level of Arming The user in level 2 or 3 has the permission to arm or partly arm the system. Arming Indication The arming/disaring indicator keeps solid blue for 5s. Reason of Arming Failure • Intrusion detector triggered (excepts the detector on the exit route).
5.3 Use the Keyfob The keyfod is used for away arming, stay arming, disarming, panic alarm, and clearing alarm. Figure 5-2 TypeⅠ Keyfob Table 5-1 Type Ⅰ Keyfob Keys Description Indicator Green: Successful Operation Red: Press the Key Away Arming Clearing Alarm Stay Arming Disarming...
It is poissible to arm or disarm the system with the card. While the system is not armed, present a valid card to the control panel to arm the system. While the system is armed, present a valid card to the control panel to disarm the system.
Note If there is no Security Control Panel displayed on the Control Panel page, click Selecting Modules, and select Security Control Panel 5.5.2 Partition Operation In the Security Control Panel module, you can control the selected partition , such as away arming, stay arming, instant arming, disarming, clearing alarm, group bypass, and group bypass restoring.
Steps 1. Connect the device to the Ethernet. 2. Search the device IP address via the client software and the SADP software. 3. Enter the searched IP address in the address bar. Note When using mobile browser, the default IP Address is 192.168.8.1.
Figure 5-7 Keyfob Management 2. Click Add and press any key on the keyfob. 3. Set the keyfob parameters. Name Customize a name for the keyfob. Permission Settings Check different items to assign permissions. Single Key Settings Select from the drop-down list to set I key and II key's functions Combination Keys Settings Select from the drop-down list to set combination keys'...
Figure 5-8 Add User Page 5. Set the keypad password (numeric, 4~8 characters). 6. Check the check boxes to set the user permission. The user can only operate the assigned permissions. 7. Click OK. 8. Optional: Enable the user in the Enable User column to allow the enabled user operating the device.
A. Trouble Shooting A.1 Communication Fault A.1.1 IP Conflict Fault Description: IP that the panel automatically acquired or set is same as other devices, resulting in IP conflicts. Solution: Search the current available IP through ping. Change the IP address and log in again. A.1.2 Web Page is Not Accessible Fault Description: Use browser to access web pages and display Inaccessible.
A.2 Mutual Exclusion of Functions A.2.1 Unable to Enter Registration Mode Fault Description: Click the panel function key, and prompt key invalid. Solution: The panel is in "AP" mode. Switch the panel to "station" mode, and then try to enter the registration mode again. A.2.2 Unable to Enter RF Signal Query Mode Fault Description: Double-click the host function key, and the prompt button invalid.
Zone status, alarm status or zone power is abnormal. A.5.2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm Clearing Report Fault Description: The alarm clearing operation on the panel does not produce the alarm clearing report. Solution: In the absence of alarm, no report will be uploaded for arm clearing.
Fault Description: The receiver's mailbox is yahoo. Click "test inbox" and prompt test fails. 1. The security level of mailbox is too high. Solution: Go to your mail account and turn on "less secure sign-in". A.6.6 Mail Configuration Table A-1 Mail Configuration Protocols Mail Type Mail Server...
B. Input Types Table B-1 Input Types Input Types Operations The system will immediately alarm when it detects triggering event after system armed. Instant Zone Audible Response Trigger the system sound and siren. Voice Prompt: Zone X alarm. The system will immediately alarm when it detects triggering event after system armed.
Page 75
Input Types Operations The zone activates all the time with sound/siren output when alarm occurs. Fire Zone Audible Response: Trigger the system sound and siren. Voice Prompt: Zone X fire alarm. The zone activates all the time with sound/siren output when alarm occurs.
Page 76
Input Types Operations e.g. The output expander linked relays will be enabled when the control panel is armed. When armed: Voice prompt for fault. You can handle the fault according to the voice prompt. •System sound for arming with card or keyfob.
C. Output Types Table C-1 Output Types Output Types Active Restore After the Arm the control Arming configured panel output delay After the Disarm the Disarming configured control panel output delay When alarm After the event occurs. configured The alarm output delay, Alarm output will be...
E. Access Levels Level Description Access by any person; for example the general public. User access by an operator; for example customers (systems users). User access by an engineer; for example an alarm company professional. User access by the manufacturer of the equipment. Table E-1 Permission of the Access Level Permission Function...
Page 80
• When the controller is bypassed, the user level 3 can login the controller without the permission assignment of the user level • When the controller is bypassed, the user level 3 can login the controller without the permission assignment of the user level •...
G. Device in EN Certificate Standard/ Basic Standard Table G-1 User Permission in EN Standard User Permission in EN Standard Functio Level 1 Level 2 Level 3 Level 4 Basic Admini Installe Manuf Body User strator acturer Accordi ng to Arming x configu √...
Page 88
Bypass Accordi ng to Disabli configu √ √ Manda tory permis Arming sion Adding Accordi ng to Changi configu √ √ √ Authent ication permis Code sion Adding Accordi Deletin ng to g Level 2 User configu √ √ Authent permis ication sion...
Page 89
Accordi ng to Disarm configu √ √ permis sion Accordi ng to Alarm Clearin configu √ √ permis sion Accordi ng to Walk configu √ √ Test permis sion Accordi ng to configu √ √ Query permis sion Bypass Accordi ng to Disabli configu...
Need help?
Do you have a question about the AXHub and is the answer not in the manual?
Questions and answers