Watchguard ALMKIT-D1 User Manual page 7

Alarm hub
Hide thumbs Also See for ALMKIT-D1:
Table of Contents

Advertisement

5.5 Network Configuration....................................................................................................................... 46
5.5.1 Wired Network Configuration.................................................................................................. 46
5.5.2 Wi-Fi Network Configuration................................................................................................... 47
5.5.3 Cellular Configuration...............................................................................................................47
5.6 Managing Users................................................................................................................................... 47
5.6.1 Adding User............................................................................................................................... 48
5.6.2 Deleting User............................................................................................................................. 50
6 General Operations....................................................................................................................................... 53
6.1 Single Arming and Disarming.............................................................................................................53
6.2 Global Arming and Disarming............................................................................................................ 53
6.3 Manual Arming and Disarming...........................................................................................................54
6.4 Scheduled Arming and Disarming..................................................................................................... 54
Appendix 1 Arming Failure Events and Description.................................................................................... 55
Appendix 2 SIA Event Codes and Description.............................................................................................. 57
Appendix 3 Cybersecurity Recommendations............................................................................................. 61
VI
User's Manual

Advertisement

Table of Contents
loading

Table of Contents