SecurityConfig Contents Hardware and Software requirements ....................4 Installation ..................................4 Basic concepts ................................5 3.1 Menus and general buttons for selecting functions Importing data from an existing project ....................8 4.1 Importing voice messages 4.2 Importing configuration data Connecting to the Unit ............................10 Exchanging data with the Unit ........................
Windows XP or higher - Internet Explorer 6.0 or higher The SecurityConfig program is the essential tool for the configuration of the 675 20 Burglar alarm Unit. The content of this program is Space used on hard-disk under the exclusive rights •...
SecurityConfig 3. Basic concepts The SecurityConfig software is used for the configuration of the 675 20 Burglar alarm Unit which combine the burglar alarm and telephone dialling device into one device. After opening the program, the following screen will appear:...
Create a new Opens the Executes connection Executes connection project Parameters section to the Unit to the Legrand website Opens an existing Opens the Voice Selects the serial port project message section of the PC to which the Unit is connected The followings functions are included in the drop-down menus: “File”...
Page 7
SecurityConfig “Tools” menu • Parameters Opens the Parameters section • Messages Opens the Messages section • Receive configuration Receives the configuration from the Unit, it is active only when connecting to the Unit • Send configuration Sends the configuration to the Unit, it is active only when connecting to the Unit •...
SecurityConfig 4. Importing data from It is possible to import data (configuration parameters and voice messages) from a previously saved project file. an existing project 4.1 Importing voice messages To import voice messages from a project file: > Select Import messages from project from the Edit menu The following screen will appear: >...
SecurityConfig 4.2 Importing configuration data To import a previously saved configuration: > Select Import configuration data from project from the Edit menu The following screen will appear: > Select the project file (. jai) from where you want to import the configuration >...
SecurityConfig 5. Connecting To access some functions (e.g. Receive configuration, Send messages, etc.) there must be a connection between the PC where SecurityConfig is installed and the Unit, following the operation described to the Unit below. > From the Port menu, select the serial port address of the PC you want to connect the Unit to (COM1, COM2, etc.) >...
Page 11
SecurityConfig At this stage, by clicking the Details button, it is possible to display the list of communication activities between the personal computer and the unit. When connecting to the Unit, a comparison will be made between the configuration of the Unit which reflects the real system, and the configuration of the current project.
SecurityConfig > The following message will appear if click QUIT > Click YES to load the configuration of the system in the Unit > Click NO to keep the current project unchanged However, there will be a connection to the Unit. At the end of the procedure the Connection button will change into Disconnection.
SecurityConfig 7. Parameters In this section it is possible to execute the Unit parameters configurations. 7.1 Work area In this section all typical parameters for the configuration of the Unit are displayed, represented hierarchically with a tree structure on the left side. On the right side, a specific template for inputting data and, if the connection is active, for communicating with the Unit can be displayed by selecting each element of the hierarchic structure.
SecurityConfig Data input template Displays information Send configuration to the Unit Receives the history Receives Communication bar of events from configuration with the Unit the Unit from the Unit Data input Fixed zone zone Help zone The upper bar includes the commands for communication with the control unit (only active when the connection with established PC);...
Page 15
SecurityConfig Inputting with an independent window > Click the data input zone; the button will appear > An independent window will appear after clicking the button > Enter the data > Click OK to close the window...
SecurityConfig 7.2 Exchanging configuration parameters with the Unit 7.2.1 Receiving configuration parameters This function allows you to receive the configuration parameters from the Unit. > Execute the Connection to Unit procedure > Click Receive button The following screen will appear: >...
SecurityConfig 7.2.2 Sending configuration parameters This function allows you to send the configuration parameters to the Unit. > Execute the Connection to Unit procedure > Click Send button The following screen will appear: > Click the Yes button If the current project has not been saved, a reminder appears on the screen. >...
Page 18
SecurityConfig Click Yes to display all differences found. When No is clicked (or Quit in the error window), the following message apperas: > Click the Force button to send the parameters of the current project to the Unit and then modify its configuration.
SecurityConfig 7.2.3 Receiving the history of events This function allows you to receive the history of events. This is the chronological list of all events oc- curred on the burglar alarm system, and recorded by the Unit. > Execute the Connection to Unit procedure >...
Page 20
SecurityConfig The following message will appear: > Click the Yes button The following screen will appear: > Name the file > Click the Save button...
SecurityConfig 7.3 Configuration of the Burglar alarm section In this section it is possible to set up the part of the Unit related to the burglar alarm system. The options are as follows: • Zones • Automations • User Preferences •...
SecurityConfig 7.3.1 Zones This screen shows the list of zones in which the burglar alarm system is divided. For each zone it is possible to enter a reference name which identifies it (eg. Entrance). Entering the description of a zone is possible only after the configuration of at least one device belonging to this zone.
Page 23
SecurityConfig Common objects This screen displays the devices which are common to the whole unit. It is possible to indicate the presence of the device and to enter a description. Connectors This screen displays the connectors included in the burglar alarm system. It is possible to signal the presence, activate, enter a description and select the type of connectors among the available ones.
Page 24
SecurityConfig Zones 1…8 This screen displays the devices included in the single zones. It is possible to signal the presence, activate, enter a description and select a type of device. Furthermore, it is possible to enable/disable the activation delay the device can be delayed or not depending on the type of device selected and on its firmware version.
Page 25
SecurityConfig Auxiliaries This screen displays the devices which are not included in the burglar alarm system (e.g. gas leak detector). It is possible to signal the presence, activate, enter a description and select a type of device.
SecurityConfig 7.3.2 Automations This screen shows the list of automations that can be set up (Max. 20). The automation lets you link an execution (set with an Open command) to one specific burglar alarm event. It is possible to enable/disable the automation, enter a description and select an event to be matched with an execution to produce the automation required.
Page 27
SecurityConfig Manual Insertion > Type in the Open Web Net code to create the Open Command > Click the Ok button Type of event - Alarm > Select the type of event from the drop-down menu Type of event - Technical >...
Page 28
SecurityConfig Click the button to set the division > An independent window will be opened, select the zones to be divided No scenarios can be set if there are no active zones > Click Ok The associated field will be activated by selecting the Connector event >...
Page 29
SecurityConfig Example of automation Lights ON in “Room 3” at every trespassing alarm. Procedure: Enable automation Type in the reference name of the automation (e.g. Staircase lights) Select type of event - Alarm Select Intrusion event Enter the Open command which will activate the automation after the Intrusion event Guided Configuration >...
Page 30
SecurityConfig Example of automation Lower the blinds at 22:30 h every day. Procedure: Enable automation Type in the reference name of the automation (e.g. Evening) Select type of event - Date Enter the date and time To set an automatic event to run every day at a certain time, enter in the Day/Month/Year fields, and then the Hour and the Minutes >...
Page 31
SecurityConfig Example of automation Lights OFF Room 4 when the blind is rolled up (e.g. light point 11). Procedure: Enable automation Type in the reference name of the automation (e.g. Day) Select type of event - Event from system Enter the Open command which will activate the automation Guided Configuration >...
SecurityConfig 7.3.3 User Preferences This screen displays the user’s preferences. It is possible to change all preferences in the procedures described hereinafter. It enables you to enter or change the user code of the Unit. In the basic configuration the user and maintenance code are the same; they also enable you to access all menus of the Unit.
> Select Activ./Deactiv. from the drop-down menu Sets the unit as a Master clock (sends the time update to all In One by Legrand® devices provided with a clock, such as Touch Screen, Web Server, etc.) or as a Slave (receives the time update from other devices).
SecurityConfig 7.3.5 Key management The programmed keys on the Control Unit can be customized using this menu. The following func- tions can be customized: • key enable/disable • ID name allocation • combination with a scenario key or with a certain division •...
Page 35
SecurityConfig It can be used to link one of the sixteen programmable division scenarios, or, in alternative, a specific division, to the key (see following paragraph). If the system is armed with the key programmed, the scenario or the division linked to the key will become active.
SecurityConfig 7.3.6 Scenarios Up to sixteen division scenarios can be created in this section. These can be selected by the user, depending on specific needs, using the Control Unit keypad. Enables/disables the scenario. Enter a name for the scenario (e.g. perimeter). Select Division and click .
SecurityConfig 7.4 Configuration of the Dialling device section In this section it is possible to set up the part of the Unit related to the Telephone Dialling Device. The options are as follows: • Telephone number directory • Set calls •...
SecurityConfig 7.4.1 Telephone number directory In this screen it is possible to set up the jolly number and the 10 telephone numbers of the directory. Jolly number It is the first telephone number called by the Unit when any type of alarm is detected (intrusion, failure, technical alarm).
SecurityConfig 7.4.2 Setting up calls This screen lets you match some telephone numbers stored in the directory with the alarm events detectable by the burglar alarm or any specific Open event chosen by the user. When a specific even occurs, the Control Unit will call the set phone number and communicate the Please note: type of alarm that has occurred using a voice message (see chapter “Messages”).
SecurityConfig 7.4.3 Telephone functions This screen displays the telephone functions that can be customized. It is possible to change all functions in the procedures described hereinafter. Enables/disables the dialling device to make telephone calls. > Select Yes/No from the drop-down menu If this function will be disabled and if a protocol ADEMCO is active, the following message will ap- pear: >...
Page 41
> Select the waiting time from the drop-down menu Enables/disables entry remote assistance calls for the surveillance units using the ADEMCO protocol. Remote assistance is only possible if the 675 20 control unit is in “System Test” mode. > Select Yes/No from the drop-down menu...
SecurityConfig 7.4.4 Block (Lock) In this screen it is possible, through the options available in the “Enabling” drop-down menu, to decide not to lock the open commands remotely, to lock all of them or to set up to 4 Open commands that cannot be performed remotely.
SecurityConfig 7.4.5 Protocol - ADEMCO This setting enables automatic sending of alarm notifications and events to the surveillance unit using the Contact ID protocol. > In Type select ADEMCO Service > Enter the ADEMCO ID supplied by the surveillance unit Please note: The ADEMCO protocol can only be activated if the Control unit is...
SecurityConfig 7.4.6 Line test The Control unit can be set to check the good working order of the telephone line at set times and intervals. > Set the frequency for the completion of the test > Enter the Test Start Hour and Minutes...
SecurityConfig 7.4.7 Telephone commands In this screen it is possible to set up telephone commands which can later be executed by the user through simplified codes consisting of just 4 digits, through the Unit keypad or by telephone. > Enable/disable the command >...
SecurityConfig 8. Messages In this section, it is possible to manage voice messages which are sent from the Unit to the set telephone numbers when a particular event occurs or as an answer to telephone commands sent by the user. 8.1 Work area The screens in the “Messages”...
SecurityConfig 8.2 Exchanging voice messages with the Unit 8.2.1 Sending voice messages This function allows you to send one or more messages to the Unit. > Execute the Connection to Unit procedure > Select by ticking the box next to the message to be sent Or select all messages: >...
SecurityConfig 8.2.2 Listening to messages from the Unit loudspeaker This function allows you to listen to the message selected from the Unit loudspeaker. > Execute the Connection to Unit procedure > Select a message; the message will be highlighted > Click Listen from the message management bar The message will be emitted from the Unit loudspeaker.
SecurityConfig 8.3 Voice message commands 8.3.1 Importing an audio file This function allows you to import an audio file. > Select a message; the message will be highlighted > Click Import wav from the message management bar The following screen will appear: >...
SecurityConfig 9. Update Firmware This function allows you to update the permanent basic software (firmware) in the unit through revision procedures distributed by Legrand. > Select Update Firmware from the Tools menu The Download Firmware screen will appear: Stops the update...
Page 51
SecurityConfig The following screen will appear: > Select the update file (.fwz) > Click the Open button The Update button is now available. > From the Port drop-down menu, select the serial port of the PC you want to connect the Unit to. >...
Page 52
SecurityConfig > Execute the required operations and then click OK Select the maintenance menu Slide switch of the Unit and start the auto-learning function Language Key program System test Learning Flip the slide switch to off Click the OK button Connect the programming cable to a USB port of the PC and to the 6-way connector of the Unit...
Page 53
SecurityConfig If the selected firmware is a more recent version than the one on the Control Unit, the update procedure will continue without any other messages. When the update procedure has been completed, the following message will appear along with an audible alert.
Page 54
Legrand reserves at any time the right to modify the contents of this booklet and to communicate, in any form and modality, the changes brought to the same. World Headquarters and International Department 87045 LIMOGES CEDEX FRANCE : 33 5 55 06 87 87 Fax: 33 5 55 06 74 55 www.legrandelectric.com...
Need help?
Do you have a question about the 675 20 and is the answer not in the manual?
Questions and answers