4.3
Case studies..................................................................................................................................... 69
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
4.3.6
4.3.7
4.4
Sources of interference .................................................................................................................... 93
5
5.1
Overview .......................................................................................................................................... 94
5.2
Building structure ............................................................................................................................. 95
5.2.1
5.2.2
5.2.3
5.3
Device configuration....................................................................................................................... 103
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.4
Access control ................................................................................................................................ 113
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
5.5
User management .......................................................................................................................... 131
5.5.1
5.5.2
5.5.3
5.5.4
5.6
5.6.1
5.6.2
5.6.3
5.7
5.7.1
5.7.2
5.7.3
5.7.4
5.7.5
5.8
5.8.1
5.8.2
5.8.1
5.9
System Manual 2CKA001473B5074
One-family house ....................................................................................................................... 69
Perimeter.................................................................................................................................... 87
Creating buildings....................................................................................................................... 96
Creating floors ............................................................................................................................ 99
Creating rooms ..........................................................................................................................101
Create user ...............................................................................................................................132
Creating user groups .................................................................................................................135
Add authentication.....................................................................................................................138
Assigning locking rights .............................................................................................................143
Deleting locking right .................................................................................................................146
Deleting authentication ..............................................................................................................148
Delete users ..............................................................................................................................150
Table of contents
│3