Table of Contents

Advertisement

AX PRO
User Manual

Advertisement

Table of Contents
loading

Summary of Contents for HIKVISION DS-PWA96-DB-WE

  • Page 1 AX PRO User Manual...
  • Page 2 INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
  • Page 3 During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision devices incorporates privacy by design principles. For example, for device with facial recognition features, biometrics data is stored in your device with encryption method;...
  • Page 4 AX PRO User Manual Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates a hazardous situation which, if not avoided, will or could Danger result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, Caution could result in equipment damage, data loss, performance degradation, or unexpected results.
  • Page 5 AX PRO User Manual Regulatory Information SSF 1014 EN 50131-1:2006+A1:2009+A2:2017+A3:2020 Security Grade (SG): 2 EN 50131-3:2009 Environmental Class (EC) : II EN 50131-6:2017+A1:2021 Larmklass R, Miljöklass II EN 50131-5-3:2017 Certified by KIWA EN 50131-10:2014 EN 50136-2: 2013 Note EN50131 compliance labeling should be removed if non-compliant configurations are used.
  • Page 6 AX PRO User Manual FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
  • Page 7: Table Of Contents

    AX PRO User Manual Contents Chapter 1 Installation Instruction ....................9 1.1 Typical Scene ........................9 1.2 Precaution ..........................9 1.3 Installation FAQ ......................... 10 Chapter 2 Introduction ......................11 Chapter 3 Start Up ........................14 3.1 Authority Management ...................... 14 3.2 Activation ..........................
  • Page 8 AX PRO User Manual 5.3.3 System ........................95 5.3.4 Maintenance and Security ..................110 5.4 Report to ARC (Alarm Receiving Center) ................115 Setup ATS in Transceiver of Receiving Center ..............115 Setup ATS in Transceiver of the Panel ................116 Signaling Test ........................
  • Page 9 AX PRO User Manual A.6.2 Failed to Send Mail during Use................124 A.6.3 Failed to Send Mails to Gmail ................124 A.6.4 Failed to Send Mails to QQ or Foxmail ..............124 A.6.5 Failed to Send Mails to Yahoo ................124 A.6.6 Mail Configuration ....................
  • Page 10: Chapter 1 Installation Instruction

    Chapter 1 Installation Instruction 1.1 Typical Scene Figure 1-1. Typical Scene Typical installation location of devices: 1. AX PRO Control Panel 2. Repeater 3. PIR Detector 4. Sounder 5. Magnetic Detector 1.2 Precaution 1. Avoid installing the device on metal surfaces. 2.
  • Page 11: Installation Faq

    7. Vertical installation is recommended for devices. 1.3 Installation FAQ Question 1: Why is the signal normal during installation, but worse in actual use? Answer: Check whether the working environment changes during installation and actual use. Such as obstruction caused by closed doors and windows. Figure 1-2.
  • Page 12: Chapter 2 Introduction

    Chapter 2 Introduction AX PRO is a wireless alarm system designed to protect premises required for proper protection from intrusion alarm. It supports LAN /Wi-Fi as the primary transmission network. The system is applicable to the scenarios of market, store, house, factory, warehouse, office, etc. ●...
  • Page 13 AX PRO Parameters 64 Series 96 Series Mandatory 1000 Event logs Total 5000 ATS Category Primary Transmission Path LAN / WiFi ARC Signaling Secondary Transmission Path GPRS or 3G/4G LTE Acknowledgement Operation Pass-through Protocols SIA-DC09 , Contact ID, ISUP 5.0 As per requirements defined in EN 50131-1:2006+A1:2009+A2:2017+A3:2020 AX Pro wireless control panel adopts pass-through mode of acknowledgement operation.
  • Page 14 RSSI Instruction for Peripherals With regards to EN 50131-5-3 4.2.2 Requirement for immunity to attenuation. Signal Strength RSSI Value Indication Remark Strong ≥66 Green Okay to install Medium 50 to 65 Yellow Not recommend to install, but can work Weak 40 to 49 Not okay to install, but can work most of time Invalid...
  • Page 15: Chapter 3 Start Up

    Chapter 3 Start Up 3.1 Authority Management You can use web browser, HPP (Hik-Partner Pro, APP) or HC (Hik-Connect, APP) to activate the device. After activation, you can manage the device by transferring permissions between APPs. You can also use the account and password of all accounts to log in to the WEB client to configure the device.
  • Page 16: Activation

    3.2 Activation While initial the device with Hik-Partner Pro or Hik-Connect, the AX PRO should always be add to an installer account first. The installer account will invite and transfer ownership to the administrator account later after finishing all initial setup and test. Follow the steps below to initializing the wireless alarm system.
  • Page 17: Activation With Wi-Fi

    Figure 3-1. Add Device 4. Tap Next. You can edit parameters of the device or skip to use it directly. Figure 3-2. Adding Completed The control panel will be added to the site (HPP) created and managed by the installer account, which also means that the installer account was created in the panel.
  • Page 18 Step1 Create a site (Only for HPP) Download the Hik-Partner Pro and login with the installer account. A site is the place where the alarm system deployed. Create a site where the device can be added to with it’s site name and address. The owner of the site would be an end user, usually regarded as administrator.
  • Page 19 7. Tap Wireless Connection. Figure 3-6. Connection Type 8. Check The device is started. And then tap Next. Figure 3-7. Device Is Started 9. The APP will automatically fill in the home Wi-Fi currently used by the mobile phone into the page, as shown in the figure below.
  • Page 20 Figure 3-8. Configure Wi-Fi 10. Tap Connect to a Network. Figure 3-9. Connect to Network 11. Tap Join. The mobile phone will disconnect the home Wi-Fi. After interacting information with the control panel, the mobile phone will automatically switch back to the home Wi-Fi. Figure 3-10.
  • Page 21 Figure 3-12. Wi-Fi Figure 3-11. Serial Number 12. After the control panel broadcasts the "Exit hotspot mode", the following page will appear. Figure 3-13. Connecting to Wi-Fi 13. Wait for the device to join the home Wi-Fi and log in the EZVIZ Cloud. (1) When the home Wi-Fi signal is good, the control panel will successfully log in to EZVIZ Cloud and complete the binding before the countdown ends.
  • Page 22 Figure 3-15. Reload If you make sure that the home Wi-Fi password is correct and quality is good, tap Refresh Network, the control panel will enter a new countdown. You can wait for the connection. If you want to change the home Wi-Fi, you should change the home Wi-Fi connected to the mobile phone first, then press the RESET button on the back of the control panel (marked in the figure below).
  • Page 23: Unbind The Device

    3.3 Unbind the Device 3.3.1 Unbind the Device from Your Own Account When the device is bound to your own account, you can delete it directly. 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the page.
  • Page 24 3. Scan the QR code on the label of the device. Figure 3-19. QR Code 4. Press the RESET button twice quickly on the back of the device. Figure 3-20. Reset Button 5. Tap Unbind Device.
  • Page 25 Figure 3-21. Unbind Device 5. Enter verification code and tap Finish. Figure 3-22. Verification Code The device is unbound from the account. You can add it to your account now. Note The maximum duration of unbinding mode is 3 minutes. After the timeout, the device will automatically exit the unbundling mode.
  • Page 26: Chapter 4 User Management

    Chapter 4 User Management 4.1 User Management Note ● The users can be created in clients. ● The name and password of network user (web client and APP user)can be 1 to 32 characters and 8 to 16 characters. 4.1.1 Invite the Administrator After the initial configuration finished, the service provider in Hik-Partner Pro can transfer the device to the administrator on the Hik-Connect.
  • Page 27: Cancel Installer Access

    5. Click OK. 6. Open the Hik-Connect APP and login with the administrator account. The installer service request will be pop-up or received at notification page. 7. Tap Notification → Service and tap the message to receive the request. 8. Tap Agree. 9.
  • Page 28: Add An Operator

    Figure 4-3. Cancel Authorization 4.1.3 Add an Operator The administrator can share the device to other operators. Figure 4-4. Share with User 1. Tap · · · → Share → Share with User. 2. Enter an operator account or select a history recipient. Administrator can also select which device to be shared.
  • Page 29: Delete An Operator

    The operator account will be added to the control panel, which could be used to login to Hik- Connect app and local web client. 4.1.4 Delete an Operator Administrator user can delete an operator. 1. Enter the Me page and tap Manage Sharing Settings. 2.
  • Page 30: Access Entries

    Figure 4-7. Invite the Installer2 1. Login Hik-Connect, tap · · · → Settings 2. Tap Authorization Service. 3. Tap Service Provider. 4. Select a service provider or add a new one. 5. Tap OK in authorization page. 6. Select configuration permission you want to send and tap OK. 4.2 Access Entries The installer and operators of the AXPRO were assigned different access levels which define the system functions that an individual user can perform.
  • Page 31 Access Entries for the Administrator and Operators (Access Level 2)  Hik-Connect Service The Hik-Connect service can be used for end users to access and manage the devices.  Local Web Client (for the administrator) As soon as the panel was added to the end user account on Hik-Connect Service, the Hik- Connect account can be used to login to the web client build in.
  • Page 32: Chapter 5 Configuration

    Chapter 5 Configuration 5.1 Set-up with Hik-Partner Pro 5.1.1 Use the Hik-Partner Pro APP The installer can use the Hik-Partner Pro to configure the AX PRO, such as activation, device enrollment, etc. Download and Login the Hik-Partner Pro Download the Hik-Partner Pro mobile client and login the client before operating the AX PRO. Steps 1.
  • Page 33 Add Peripheral to the AX PRO Add peripheral to the AX PRO. Steps 1. Select a site. 2. Select a control device (AX PRO). 3. Tap the + icon. – Scan the QR code on the peripheral. – Tap to enter the Manually Input page. Enter the device serial No. and select the device type to add the device.
  • Page 34 Enable Alarm to select Audible Panic Alarm or Silent Panic Alarm. View Faults to view faults. Area Management Tap + to add an area. Tap Area to enter the area management page. Refers to Set Arming/Disarming Schedule for details. Arm/Disarm the Area Arm or disarm the area manually as you desired.
  • Page 35 can move inside the area and alarm will not be triggered. ● Disarming: Tap to disarm all areas. In Disarm mode, all the zones of all areas will not trigger alarm, no matter alarm events happen or not. ● Silence Alarm: Tap to silent alarms for all areas.
  • Page 36 After triggering, if the zone is not disarmed or silenced before the entry delay time ends, the zone will alarm. -Stay Arm Delay Time: Stay arming uses Stay Arm Delay Time to count down. The system gives Entry/Exit delay time when it is armed or reentered. It is usually used in entrance/exit route (e.g.
  • Page 37 It can be used in places equipped with magnetic contacts that require access but for only a short period (e.g., fire hydrant box's door or another external security box door). -Not-Triggered Zone Alarm: If the zone is not triggered for the set time, it will alarm. -Alarm on Zone Activated: If the zone is triggered for the set time, it will alarm.
  • Page 38 emitted. Double knock After enabled, the time interval can be set. If the same detector is triggered twice or continuously in a period of time, the alarm will be triggered. Sounder Delay Time The sounder will be triggered immediately (0s) or after the set time. Final Door Exit Only magnetic contacts have this option.
  • Page 39 Steps 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the Area page. 2. Tap Device. 3. Tap a zone in the Device tab. 4. Tap to enter the Settings page. 5.
  • Page 40 Note Only the administrator can do such an operation. Linked Area If the target user is an operator, tap the target user on the user list and then tap to set the area linked to the target user. Note Only the administrator can do such an operation. Change Keypad If the target user is an administrator, an installer or an operator, you Password...
  • Page 41 Card/Tag Management After adding cards/tags to the wireless AX PRO, you can swipe the card/tag to arm or disarm all the detectors added to specific area(s) of the AX PRO, and silence alarms. Note The tag ID/PIN is a 32 bit long integer, and the variant could be 42949672956. Steps 1.
  • Page 42 Steps 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the page. 2. Tap → System → Configuration to enter the page. 3. Select device language and time zone. System Management Steps 1.
  • Page 43 alarm and reports to Cloud (for APP) and ARC. -After Disarm: Motion detectors automatically restores after disarming and reports to Cloud (for APP) and ARC Power Saving Mode While enabled, the main power supply is off, Wi-Fi enters low power consumption, 4G closes, tag reading fails, LED off, and voice prompt off.
  • Page 44 Arming Options This function is for the whole alarm system, to inform the user of the current system status before arming. If it is enabled, there will be a fault prompt and confirmation process for tag readers, keypads, keyfobs, and APP. If it is not enabled, there will be no fault detection before arming. Steps 1.
  • Page 45 Network Camera Add Cameras to the AX PRO Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Network Camera → Network Camera Channel to enter the page. 3. Tap + → Add Channel/SADP Scanning. SADP Scanning Scan all network cameras in the same LAN.
  • Page 46 Set Arming/Disarming Schedule Steps 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the page. 2. Tap → Area to enter the page. 3. Tap an area in the list, enable the area and select linked devices. 4.
  • Page 47 2. Tap → Communication Parameters→ Wired Network to enter the page. 3. Set the parameters. – Automatic Settings: Enable DHCP and set the HTTP port. – Manual Settings: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS Server Address. 4.
  • Page 48 and mobile client. Data Used This Month The used data will be accumulated and displayed in this text box. Push Notifications When an alarm is triggered, if you want to send the alarm notification to the mobile phone, you can set the notification push parameters. Steps 1.
  • Page 49 The device will push notifications when the user operate the control panel. Smart Alarm Event The device will push notifications when alarm is triggered in network cameras(using HIKVISION protocol). PIRCAM Gif The video and pictures generated by PIR cameras will be uploaded to the alarm receiving center.
  • Page 50 Alarm Receiving Center (ARC) You can set the alarm receiving center's parameters and all alarms will be sent to the configured alarm center. Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2.
  • Page 51 Cloud Service Settings Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Communication Parameters→ Cloud Service Settings to enter the page. 3. Select the Communication Mode. Auto The connection priority order from high to low is: wired network, Wi-Fi, cellular data network.
  • Page 52 FTP Settings Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Communication Parameters→ FTP Settings to enter the page. 3. Select Preferred FTP or Alternated FTP, and enable FTP. 4.
  • Page 53 Intercom Service You can configure the Intercom service for an intercom sounder. Before You Start You should enroll an intercom sounder first. Only one sounder can be set as the intercom sounder. Steps 1. Tap → Communication Parameters→ Intercom Service to enter the page. 2.
  • Page 54: Use The Hik-Partner Pro Portal

    Device Upgrade Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap →Maintenance → Device Upgrade to upgrade the control panel, or tap →Maintenance → Detector & Peripheral Upgrade to upgrade detectors and peripherals. Remote Log Collection Steps 1.
  • Page 55 Operation Description Area only display the peripheral devices linked to the selected area, or select All to display all the peripheral devices linked to all the areas. Select the Device tab, and then select a wireless output expander Control Relay to display the sirens linked to it, and then select siren(s) to enable/disable them.
  • Page 56 Switch Language Note You should have applied for a PIN. You can click → to open the Language window, and then set the device language and enter the PIN. Figure 5-6. Switch Language Health Monitoring 1. Enter the Hik-Partner Pro Portal web site, and click Health Monitoring → Health Status to enter the page.
  • Page 57: Set-Up With Hik-Connect

    export the report. Figure 5-8. Checking Completed 4. Click to get the latest device status. 5.2 Set-up with Hik-Connect The operator can use the Hik-Connect to control the device, such as general arming/disarming operation, and user management etc. Download and Login the Mobile Client Download the Hik-Connect mobile client and login the client before operating the AX PRO.
  • Page 58 the Scan QR code page. Scan the QR code on the AX PRO. Note Normally, the QR code is printed on the label stuck on the back cover of the AX PRO. Tap + → Manual Adding to enter the Add Device page. Enter the device serial No. with the Hik- Connect Domain adding type.
  • Page 59 Figure 5-9. Main Page Enable Alarm to select Audible Panic Alarm or Silent Panic Alarm. View Faults to view faults. Area Management Tap + to add an area. Tap Area to enter the area management page. Refers to Set Arming/Disarming Schedule for details.
  • Page 60 Figure 5-10. Single Area ● Away Arming: Tap to away arm a single area. When all the people in the detection area leave, turn on the Away mode to arm all zones in the area after the defined dwell time. ●...
  • Page 61 Figure 5-12. Device Page 2. Tap + to add a new zone. 3. Tap a zone to enter the management page. You can view device status (e.g. temperature, battery status, single strength, etc.). 4. Tap on the upper right corner to enter the zone settings page. 5.
  • Page 62 Note Ensure that timer is no longer than 45 seconds in order to comply with EN50131-1. Panic Zone 24-hour active zone, whether armed or not. Report panic alarm after triggering. It is usually used in the sites equipped with panic button, smoke detector and glass-break detector. Medical Alarm 24-hour active zone, whether armed or not.
  • Page 63 Note The supported functions vary depending on the zone types. Refer to the actual zone to set the function. Arm Mode If the zone is a public zone (the zone is belongs to more than one areas), you can set arm mode.
  • Page 64 Final Door Exit Only magnetic contacts have this option. After enabling, when the user use keypads or tag readers to arm: -Arm With Faults is enabled: During the arming countdown, if the magnetic contact is triggered and then restored, the arming process will be terminated immediately after restoring, and the arming is completed.
  • Page 65 Bypass Status The detector in the zone does not detect anything and you will not receive any alarm from the zone. User Management The administrator and the installers can manage users. If you are the administrator, you can add, edit, and delete users, and assign different permissions to the newly-added users. Steps Note There are three types of users for the AX PRO, including administrator (or owner), operator, and...
  • Page 66 Change Keypad If the target user is an administrator, an installer or an operator, you Password can tap the target user on the user list and then tap Change Keypad Password to set the keypad password to the target user. Note The password (PIN code) is allowed to be 4 to 6 digits.
  • Page 67 Steps 1. Enter the site, tap the AX PRO and then log in to the device (if required) to enter the page. 2. Tap → User Management to enter the page. 3. Tap a user to enter the configuration page. 3.
  • Page 68 System Management Steps 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the page. 2. Tap → System → System Options → System Management to enter the page. Panel Sound Prompt If the option is enabled, the AX PRO will enable the voice prompt.
  • Page 69 Panel Fault Check The fault check here is only for the control panel in the normal status. The system determines whether to check the faults listed on the page. The system will only check the fault that is selected. Steps 1.
  • Page 70 keypads, keyfobs, and APP. If it is not enabled, there will be no fault detection before arming. Steps 1. On the device list page, tap the AX PRO and then log in to the device (if required) to enter the page.
  • Page 71 3. Tap + → Add Channel/SADP Scanning. SADP Scanning Scan all network cameras in the same LAN. A list will pop up after scanning. You can directly check to add cameras in the list. 4. Enter IP address, port, the user name and password of the camera. 5.
  • Page 72 Enable the function and set the time. If the alarm is triggered after the configured time, the person will be considered as late. Auto Arm Enable the function and set the arming start time. The zone will be armed according to the configured time.
  • Page 73 Wi-Fi Configuration Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Communication Parameters→ Wi-Fi Configuration to enter the page. 3. Tap a Wi-Fi to connect in the list. Cellular Data Network Steps 1.
  • Page 74 can set the notification push parameters. Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Communication Parameters→ Push Notification(s) to enter the page. 3. Enable the target notification. Zone Alarm The device will push notifications when the zone alarm is triggered or the zone lid opened is triggered or restored.
  • Page 75 Smart Alarm Event The device will push notifications when alarm is triggered in network cameras(using HIKVISION protocol). PIRCAM Gif The video and pictures generated by PIR cameras will be uploaded to the alarm receiving center. Video Clips The video and pictures generated by network cameras will be uploaded to the alarm receiving center.
  • Page 76 alarm center. Steps 1. In the site, tap the AX PRO and then log in to the device (if required). 2. Tap → Communication Parameters→ Alarm Receiving Center (ARC) to enter the page. 3. Select an ARC and enable it. Protocol Type Select the Protocol Type as ADM-CID, ISUP, SIA-DCS, *SIA-DCS, *ADM-CID, CSV-IP, FSK Module or RDC Module to set uploading mode.
  • Page 77 Auto The connection priority order from high to low is: wired network, Wi-Fi, cellular data network. Wired &Wi-Fi The system will select wired network first. If no wired network detected, it will select Wi-Fi network. Cellular Data Network The system will select cellular data network only. 4.
  • Page 78 3. Select Preferred FTP or Alternated FTP, and enable FTP. 4. Configure the FTP parameters Protocol Type FTP and SFTP are selectable. The files uploading is encrypted by using SFTP protocol. Server Address & Port The FTP server address and corresponding port. User Name &...
  • Page 79 The control panel will use ARC and SIP server. IP Receiver Pro The control panel supports intercom of cloud service and ISUP protocol. ISUP The control panel uses the ISUP protocol through the Hik-Central APP. 4. Select an intercom sounder and tap Save. Device Maintenance You can reboot the device.
  • Page 80: Set-Up With The Web Client

    information from the mobile client. Before You Start ● Make sure you have linked a zone with a detector. ● Make sure the zone is not bypassed. ● Make sure you have not enabled the silent zone function. Steps 1. Tap Notifications in the mobile client to enter the page. All alarm notifications are listed in Notification page.
  • Page 81: User Management

    You can view the device, area, zone and so on status on the overview page. Figure 5-14. Web Main Page 5.3.1 User Management The administrator and the installers can manage users. If you are the administrator, you can add, edit, and delete users, and assign different permissions to the newly-added users. Click User Management to enter the page.
  • Page 82: Device Management

    Edit User Steps 1. Click User Management to enter the page. 2. Click to the right of a user to edit user parameters. User Parameters You can configure linked areas, the keypad password, the duress code and user permissions. Keyfob&Tag You can add, delete, enable or disable keyfobs and tags.
  • Page 83 Figure 5-15. Area Late to Disarm Notification Enable the function and set the time. If the alarm is triggered after the configured time, the person will be considered as late. Enable Auto Arm Enable the function and set the arming start time (Time Schedule). The zone will be armed according to the configured time.
  • Page 84 -Weekend Exception: Enable the function and the zone will not be armed in the weekend. -Holiday Exception: Enable the function and the zone will not be armed/disarmed in the holiday. You should set the holiday schedule after enabling. Up to 12 holiday groups can be set. 3.
  • Page 85 Figure 5-17. Zone Settings 4. Edit the zone name. 5. Check linked areas. Note  Only enabled areas will be listed.  The newly added peripheral is linked to area 1 by default. 6. Select a zone type. You can view the configurable zone types for various detectors through I. Detector Zone Types. Instant Zone This Zone type will immediately trigger an alarm event when armed.
  • Page 86 The system gives Entry/Exit delay time when it is armed or reentered. It is usually used in entrance/exit route (e.g. front door/main entrance), which is a key route to arm/disarm via operating keypad for users. Note Ensure that timer is no longer than 45 seconds in order to comply with EN50131-1. Panic Zone 24-hour active zone, whether armed or not.
  • Page 87 -Alarm on Zone Activated: If the zone is triggered for the set time, it will alarm. -Retry Time Period: Set the timeout period. 7. Enable other parameters according to your actual needs. Note The supported functions vary depending on the zone types. Refer to the actual zone to set the function.
  • Page 88 continuously in a period of time, the alarm will be triggered. Sounder Delay Time The sounder will be triggered immediately (0s) or after the set time. Final Door Exit Only magnetic contacts have this option. After enabling, when the user use keypads or tag readers to arm: -Arm With Faults is enabled: During the arming countdown, if the magnetic contact is triggered and then restored, the arming process will be terminated immediately after restoring, and the arming is completed.
  • Page 89 return the picture and video address for you to view. The number of channels that can be enabled depends on the device model. 4. Click to edit video parameters. Stream Type -Main Stream: Being used in recording and HD preview, it has a high resolution, code rate and picture quality.
  • Page 90 Figure 5-18. Sounder Settings Linked Area Only enabled areas will be listed. The newly added peripheral is linked to area 1 by default. Alarm Volume The available alarm volume range is from 0 to 3 (function varies according to the model of device).
  • Page 91 takes longer than the Polling failure Times to determine offline to reply, the system will report faults and the status of device will be shown as offline. Intercom Service Enable intercom service. Only one sounder can enable this function. 4. Click Save. Automation You can set the parameters of the relay outputs that is enrolled to the AX PRO.
  • Page 92 Repeater The repeater can amplify signals between the control panel and the peripherals. Steps 1. Click Device Management → Mount Device → Repeater to enter the page. – Click to view the serial number and linked device number. – Click to view the device status, battery status, signal strength, main power and version.
  • Page 93 2. Click +Add to add a module. 3. Click to edit the device parameters. Linked Area Only enabled areas will be listed. The newly added peripheral is linked to area 1 by default. 4. Click Save. Keypad You can set the parameters of the keypad that is enrolled to the AX PRO. Steps 1.
  • Page 94 Keypad Awake Time If the keypad has no action within the set time, it will sleep automatically. Active on Entry Delay When enabled, the keypad can be used during the entry delay. Chime Indication Enable chime. Area Status Display area status and alarm information in the keypad main page. Remote Arm/Disarm Indication Enable the remote arm/disarm LED indication.
  • Page 95 Figure 5-22. Tag Reader Settings Linked Area Only enabled areas will be listed. The newly added peripheral is linked to area 1 by default. Operation Mode -Standard Mode: Area selection and fault confirmation are supported when arming or disarming. You should set the authorization method. -Simple Mode: No Area selection and fault confirmation when swiping tag to arm or disarm.
  • Page 96: System

    4. Click Save. 5.3.3 System System Settings You can view device information and configure device time. Basic Information Click Configuration → System → System Settings → Basic Settings You can edit the device name and view device information here. Time Settings You can set the device time zone, synchronize device time, and set the DST time.
  • Page 97 Control Panel Options Option Management Set the authority options. Click Configuration → System → Control Panel Option → Option Management to enter the page. Figure 5-24. Option Management Panel Sound Prompt Enable/Disable sound prompt. Set the sound volume and trigger events. Panel LED Display Enable/Disable panel functional LED.
  • Page 98 -After Disarm: Motion detectors automatically restores after disarming and reports to Cloud (for APP) and ARC. Energy Save Mode While enabled, the main power supply is off, Wi-Fi enters low power consumption, 4G closes, tag reading fails. LED is off, and voice prompt is off. Panel Lockup Button All functions of AX PRO will be frozen after it is enabled.
  • Page 99 the alarm will be triggered. Panel Main Power Lost If the option is enabled, an alarm will be triggered when the control panel main supply is disconnected. To compliant the EN 50131-3, the report dealy duration should be 10 s. Click Save.
  • Page 100 The delay time while the ATP communication fault reports to ARC. Network Configuration TCP/IP You can set the device IP address and other network parameters. Steps Note Functions varied depending on the model of the device. 1. Click Configuration → Network → Network Configuration → TCP/IP to enter the page. Figure 5-27.
  • Page 101 Cellular Data Network Set the cellular network parameters if you insert a SIM card inside the device. By using the cellular network, the device can upload alarm notifications to the alarm center. Before You Start Insert a SIM card into the device SIM card slot. Steps 5.
  • Page 102 Ask the network carrier and enter the password. Ask the network carrier to get the APN information. Data Limit You can enable the function and set the data threshold every month. Used Traffic This Month The used data will be accumulated and displayed in this text box. Traffic Threshold If data usage is more than the configured threshold, an alarm will be triggered and uploaded to the alarm center and mobile client.
  • Page 103 ● Set the device IP address, subnet mask, gateway and DNS server in the LAN. Steps 1. Click Configuration → Network → Device Access to enter the page. Figure 5-29. Device Access 2. Drag the slider to enable the function. Note By default, the device Hik-Connect service is enabled.
  • Page 104 The system will select cellular data network only. 6. Enable Periodic Test. Enter the periodic test interval. Periodic Test After enabling, you can set the time interval, setting how often to send a test event to the ARC to ensure the connection. 7.
  • Page 105 3. Select the Protocol Type as ADM-CID, ISUP, SIA-DCS, *SIA-DCS, *ADM-CID, CSV-IP, FSK Module or RDC Module to set uploading mode. Note Standard DC-09 Protocol ADM-CID: The data presenting method of DC-09 is CID, which is not encrypted and only for uploading alarm report.
  • Page 106 Figure 5-31. Upload Video and Picture 2. Configure SMTP parameters: (1) Click Configuration → Alarm Communication → Notification by Email. (2) Slide to enable the function and set corresponding parameters. For details, see Notification by Email. Click Save. 3. Configure FTP parameters: (1) Click Configuration →...
  • Page 107 Figure 5-32. ARC(Notification) 2. Select one alarm receiving center. 3. Enable the target notification. Zone Alarm The device will push notifications when the zone alarm (on web client, software client or mobile client) is triggered or the zone peripherals alarm is triggered or restored. Peripherals Lid Opened The device will push notifications when lid opened alarm of any peripheral is triggered or restored.
  • Page 108 The device will push notifications when the user operate the control panel. Smart Alarm Event The device will push notifications when alarm is triggered in network cameras(using HIKVISION protocol). PIRCAM Gif The video and pictures generated by PIR cameras will be uploaded to the alarm receiving center.
  • Page 109 3. Click Save. Phone Call and SMS Send the alarm notifications to phones. Steps 1. Click Configuration → Alarm Communication → Event Notification → Phone Call and SMS. 2. Click +Add. 3. Enter the phone number that receives the notification. You can set the system to send the alarm notifications through Voice Call or SMS.
  • Page 110 Note ● It is recommended to use Gmail and Hotmail for sending mails. ● Only if the zone is linked with a network camera, the alarm email will be attached with alarm video. 5. Enter the receiver's information. 6. Click Receiver Address Test and make sure the address is correct. 7.
  • Page 111: Maintenance And Security

    Intercom Service You can configure the Intercom service for an intercom sounder. Before You Start You should enroll an intercom sounder first. Only one sounder can be set as the intercom sounder. Steps 1. Click Configuration → Alarm Communication → Intercom Service to enter the page. 2.
  • Page 112 4. Click Upgrade to complete. Note Both of the users and configuration information will be retained after upgrade finished. System Maintenance You can restore default settings, import configuration file, or export device parameters. Click Maintenance and Security → Maintenance →Backup and Reset to enter the page. Figure 5-34.
  • Page 113 Figure 5-35. Log Select a primary event and a sub type from the drop-down list, set the log start time and end time and click Search. All found log information will be displayed in the list. You can also click Reset to reset all search conditions. Security Audit Log You can add the Security Audit Server to the system.
  • Page 114 Note Only when all the detectors are without fault, you can enter the mode TEST mode. 2. Slide Enable. 3. Trigger the detector in each zone. 4. Click Refresh and check test results. Device Debugging You can export debugging file to the PC. Steps 1.
  • Page 115 Figure 5-37. User Lockout Attempts 2. Set parameters. Retry Times Before Auto-Lock If the user continuously input the incorrect password for more than the configured times, the account will be locked. Note The administrator has two more attempts than the configured value. Auto-lock Time Set the locking duration when the account is locked.
  • Page 116: Report To Arc (Alarm Receiving Center)

    Figure 5-38. Module Locking Settings 3. Set the following parameters of the selected module. Retry Times before Auto-Lock If a user continuously tries to authentication a password for more than the configured attempts permitted, the keypad will be locked for the programmed duration. Auto-lock Time Set the locking duration when the keypad is locked.
  • Page 117: Setup Ats In Transceiver Of The Panel

    Figure 5-39. IP Reception 3. Click Alarms and Accounts→ Accounts Management, and assign an account for the panel as show below. Figure 5-40. Account Management Setup ATS in Transceiver of the Panel Steps: 1. Login using installer account from local web client. 2.
  • Page 118 Figure 5-41. ARC1  = Protocol Setting = Protocol Type — ADM-CID — SIA-DCS — *ADM-CID — *SIA-DCS Select token supported by the receiver in the ARC. Choose the token with “*” mark to improve the communication security.  = Server Setting = Address Type ...
  • Page 119: Signaling Test

    standard. Connection Setting  Impulse Counting Time / Retry Timeout Period ○ Setup the timeout period waiting for receiver to respond. Re-transmission will be arranged if the transceiver of receiving center is timeout. Attempts ○ Setup the maximum number that re-transmission will be tried. Polling Rate ○...
  • Page 120: Chapter 6 General Operations

    Chapter 6 General Operations 6.1 Arming You can use keypad, keyfob, Tag, client software, mobile client to arm your system. After the arming command is sending to AX PRO, the system will check the detector status. If the detector is in fault, you will need to choose whether to arm the system with fault. While the system is armed, the AX PRO will prompt the result in 5s, and upload the arming report.
  • Page 121: Disarming

    ● Main power supply exception ● Backup battery exception ● Alarm receiving fault ● Sounder fault ● Low battery of the keyfob ● Others Arming with Fault While the arming is stopped with fault, user in level 2 has the permission to arm the system with fault (forced arming).
  • Page 122: Trouble Shooting

    A. Trouble Shooting A.1 Communication Fault A.1.1 IP Conflict Fault Description: IP that the panel automatically acquired or set is same as other devices, resulting in IP conflicts. Solution: Search the current available IP through ping. Change the IP address and log in again. A.1.2 Web Page is Not Accessible Fault Description: Use browser to access web pages and display Inaccessible.
  • Page 123: Alarm Information Is Not Reported To App/4200/Alarm Center

    Check the web page: whether the Hik-Connect is offline. A.1.6 Alarm Information is Not Reported to APP/4200/Alarm Center Fault Description: After the alarm is triggered, the app/4200/ alarm center does not receive the alarm message. Solution: "Message push" - "alarm and tamper-proof notice" is not enabled. You should enable "alarm and tamper-proof notice".
  • Page 124: Problems While Arming

    View status of zones which displays triggered/fault. Solution: Reset the detector. A.4 Problems While Arming A.4.1 Failure in Arming (When the forced arming is not enabled) Fault Description: When the panel is arming, prompt arming fails. Solution: The panel does not enable "forced arming", and when there is a fault in the zone, the arming will fail.
  • Page 125: Failed To Send Mail During Use

    Solution: Wrong configuration of mailbox parameters. Please edit the mailbox configuration information, as shown in table 1/1. A.6.2 Failed to Send Mail during Use Fault Description: Check the panel exception log. There is "mail sending failure". Solution: The mailbox server has restricted access. Please log in to the mailbox to see if the mailbox is locked.
  • Page 126: Mail Configuration

    A.6.6 Mail Configuration Table A-1 Mail Configuration Mail Type Mail Server SMTP Port Protocols Supported Gmail smtp.gmail.com TLS/STARTTLS (TLS) Outlook smtp.office365.com STARTTLS (TLS) Hotmail smtp.office365.com STARTTLS (TLS) smtp.qq.com STARTTLS (TLSv1.2) Yahoo smtp.mail.yahoo.com STARTTLS (TLSv1.2) smtp.126.com SSL/TLS SSL/TLS/STARTTLS Sina smtp.sina.com 25/465/587 (SSL/TLS) Note About mail configuration:...
  • Page 127: Input Types

    B. Input Types Table B-1 Input Types Input Types Operations The system will immediately alarm when it detects triggering event after system armed. Instant Zone Audible Response Trigger the system sound and sounder. Voice Prompt: Zone X alarm. The system will immediately alarm when it detects triggering event after system armed.
  • Page 128 Input Types Operations Audible Response: Trigger the system sound and sounder. Voice Prompt: Zone X fire alarm. The zone activates all the time with sound/sounder output when alarm occurs. Gas Zone Audible Response: Trigger the system sound and sounder. Voice Prompt: Zone X gas alarm. The zone activates all the time with beep confirmation when alarm occurs.
  • Page 129 Fault event displays on client. You can handle the fault via client software or mobile client. Voice Prompt: Armed/Arming failed.
  • Page 130: Output Types

    C. Output Types Table C-1 Output Types Output Types Active Restore After the configured output Arming Arm the AX PRO delay After the configured output Disarming Disarm the AX PRO delay When alarm event occurs. The After the configured output alarm output will be activated Alarm delay, disarm the AX PRO or...
  • Page 131: Event Types

    D. Event Types Table D-1 Event Types Default 1 Default 2 Default 3 (client (alarm Default 4 Event Types Custom (mobile software receiving (telephone) client) notification) center 1/2) Alarm and ×/√ √ √ √ √ Tamper Life Safety ×/√ √ √...
  • Page 132: Access Levels

    E. Access Levels Level Description Access by any person; for example the general public. User access by an operator and administrator; for example customers (systems users). User access by an installer; for example an alarm company professional. Table E-1 Permission of the Access Level Function Permission Arming...
  • Page 133 ● When the controller is bypassed, the user level 3 can login the controller without the permission assignment of the user level 2. ● The user level 4 can login the controller only when the user level 2 or level 3 has assigned permissions to the user level 4.
  • Page 134: Signalling

    F. Signalling Detection of ATP/ATS Faults ATP (Alarm Transmission Path) faults will be detected when network interface of the control panel disconnected or the transmission path to the transceiver of receiving center located in ARC blocked somewhere in between. An ATS (Alarm Transmission System) fault will be reported when ATP faults are detected on both transmission paths.
  • Page 135: Sia And Cid Code

    G. SIA and CID Code Note The code is for transmitting from the security control panel to ARC via DC09 protocol. Read the table below to obtain the events corresponding to the CID code. You can scan the QR code and download the CID table separately. Control Panel AX PRO CID Code/STD...
  • Page 136 Walk Test Enabled Operation 1607 1607 Walk Test Disabled Operation 3607 3607 Enter Programming Operation 1627 1627 Exit Programming Operation 1628 1628 Cellular Data Network Exception Status 1350 1920 Cellular Data Network Connected Status 3350 3920 SIM Card Exception Status 1350 1921 SIM Card Detected...
  • Page 137 Intrusion Detection Restored Alarm 3131 3759 Line Crossing Alarm Alarm 1131 1778 Line Crossing Alarm Restored Alarm 3131 3778 Fire Source Alarm Alarm 1112 1780 Fire Source Alarm Restored Alarm 3112 3780 High Temperature Pre-Alarm Alarm 1158 1781 High Temperature Pre-Alarm Alarm 3158 Restored...
  • Page 138 Multi IO transmitter DS-PM1-I16O2-WE CID Code/STD Event Description Event Type Code Code Code Battery Disconnected Status 1311 1311 Battery Reconnected Status 3311 3311 Power Output Short Circuit Status 1312 1328 Power Output Short Circuit Restored Status 3312 3328 Expander AC Power Down Status 1301 1342...
  • Page 139 DS-PSP1-WE, DS-PSP1-EU-WE, DS-PSP1-UK- Smart Plug WE, DS-PSP1-IT-WE, DS-PSP1-US-WB, DS- PSP1-AU-WB Wireless Output Module DS-PM1-O1H-WE, DS-PM1-O1L-WE CID Code/STD Event Description Event Type Code Code Code Overcurrent Protection Triggered Status 1312 1312 Overcurrent Protection Restored Status 3312 3312 Overvoltage Protection Triggered Status 1319 1319 Overvoltage Protection Restored...
  • Page 140 Sounder Enrolled Operation 3306 3979 Wireless External Sounder DS-PS1-EV-WE CID Code/STD Event Description Event Type Code Code Code Motion Detection Alarm Alarm 1148 1148 Motion Detection Alarm Restored Alarm 3148 3148 Expander AC Power Down Status 1301 1342 Expander AC Power Restored Status 3301 3342...
  • Page 141 Sounder Lid Opened Alarm 1144 1344 Sounder Lid Closed Alarm 3144 3344 Sounder Offline Status 1381 1345 Sounder Online Status 3381 3345 Sounder Battery Low Status 1384 1919 Sounder Battery Voltage Restored Status 3384 3919 Sounder Deleted Operation 1306 1979 Sounder Enrolled Operation 3306...
  • Page 142 Tag Reader Unlocked Status 3501 3864 Peripheral Deleted Operation 1306 1980 Peripheral Enrolled Operation 3306 3980 Unregistered Tag Status 1865 1865 Patrol Signing Operation 3250 3965 Wall Switch DS-PM1-O1H-WE CID Code/STD Event Description Event Type Code Code Code Expander Offline Status 1381 1916...
  • Page 143 Wireless Detector Battery Low Status 1384 1915 Wireless Detector Battery Voltage Status 3384 3915 Restored Detector Deleted Operation 1306 1975 Detector Enrolled Operation 3306 3975 DS-PDMC-EG2-WE, DS-PDMCS-EG2-WE, DS-PDMCK- Wireless Magnet Detector EG2-WE CID Code/STD Event Description Event Type Code Code Code Instant Alarm Alarm...
  • Page 144 DS-PDPC12P-EG2-WE, DS-PDPC12PF-EG2-WE, DS- PIR Camera PDPC12P-EG2-WE(B), DS-PDPC12PF-EG2-WE(B) CID Code/STD Event Description Event Type Code Code Code Instant Alarm Alarm 1130 1103 Instant Alarm Restored Alarm 3130 3103 Burglary Alarm Alarm 1130 1130 Burglary Alarm Restored Alarm 3130 3130 24H Alarm Alarm 1130 1133...
  • Page 145 Detector Lid Opened Alarm 1144 1383 Detector Lid Closed Alarm 3144 3383 Bypassed Alarm 1570 1570 Bypass Restored Alarm 3570 3570 Wireless Detector Offline Status 1381 1914 Wireless Detector Online Status 3381 3914 Wireless Detector Battery Low Status 1384 1915 Wireless Detector Battery Voltage Status 3384...
  • Page 146 Burglary Alarm Alarm 1130 1130 Burglary Alarm Restored Alarm 3130 3130 24H Alarm Alarm 1130 1133 24H Alarm Restored Alarm 3130 3133 Delay Alarm Alarm 1134 1134 Delay Alarm Restored Alarm 3134 3134 Confirmed Alarm Alarm 1139 1139 Confirmed Alarm Restored Alarm 3139 3139...
  • Page 147 Bypassed Alarm 1570 1570 Bypass Restored Alarm 3570 3570 Wireless Detector Offline Status 1381 1914 Wireless Detector Online Status 3381 3914 Wireless Detector Battery Low Status 1384 1915 Wireless Detector Battery Voltage Status 3384 3915 Restored Detector Deleted Operation 1306 1975 Detector Enrolled Operation...
  • Page 148 Detector Deleted Operation 1306 1975 Detector Enrolled Operation 3306 3975 Water Leak Detector DS-PDWL-E-WE CID Code/STD Event Description Event Type Code Code Code Instant Alarm Alarm 1130 1103 Instant Alarm Restored Alarm 3130 3103 24H Alarm Alarm 1130 1133 24H Alarm Restored Alarm 3130 3133...
  • Page 149 Delay Alarm Restored Alarm 3134 3134 Confirmed Alarm Alarm 1139 1139 Confirmed Alarm Restored Alarm 3139 3139 Detector Lid Opened Alarm 1144 1383 Detector Lid Closed Alarm 3144 3383 Bypassed Alarm 1570 1570 Bypass Restored Alarm 3570 3570 Wireless Detector Offline Status 1381 1914...
  • Page 150 Detector Enrolled Operation 3306 3975 Wireless CO Detector DS-PDCO-E-WE CID Code/STD Event Description Event Type Code Code Code Gas Leakage Alarm Alarm 1162 1151 Gas Leakage Alarm Restored Alarm 3162 3151 Detector Lid Opened Alarm 1144 1383 Detector Lid Closed Alarm 3144 3383...
  • Page 151: User Privacy Statement

    H. User Privacy Statement User Privacy Statement ● The debug or zhimakaimen command is used to control access to the file system to ensure device security. To obtain this permission, you can contact technical support. ● The device has admin, installer, maintenance, operator account. You can use these accounts to access and configure the device.
  • Page 152: Detector Zone Types

    I. Detector Zone Types This table is applicable to detectors of version 1.2.8, to show the configurable zone types of various detectors. Detector Available Zone Type Wireless PIR Detector PIR Camera & Wireless Triple Signal AM Detector: Instant/Delay/Follow/24 Hour/Disabled Others: Instant/Delay/Follow/Timeout/24 Hour/Disabled Wireless DT Detector Instant/Delay/Follow/Timeout/24 Hour/Disabled Wireless Magnetic Contact...

Table of Contents