Intrusion zone management

An intrusion zone combines multiple sensors into logical groups for arming and disarming a defined space (zone) within a building. A group of points defines a single intrusion zone. Grouping points from other connected stations can become part of the single intrusion zone. A single intrusion zone status point represents the state of the intrusion zone and identifies, by sensor, any alarms generated in the zone.

The system offers flexibility when it comes to arming and disarming intrusion zones. To manage multiple zones from a single location, a single reader or keypad may be assigned to several zones. To allow arming and disarming a single zone from multiple locations, several devices may be assigned to a single zone. Intrusion zones may be controlled by schedules, hardware inputs, and by configuring properties in a browser interface.

Grouping includes points from other connected stations as part of a single intrusion zone. This lets you extend the zone to include readers, points, or relays that are under those additional stations. In addition to extending the intrusion zone physically, this allows sharing of arming status and zone enabled. For example, to view or control a zone’s status (armed or disarmed) from a peer station or a Supervisor station, you can do so if they are grouped.

The system logs all activity regarding enabling, disabling, and alarms within an intrusion zone. In addition, it independently logs by zone and source sensor any alarms generated by a sensor in the intrusion zone.

Devices used to enable and disable intrusion zones

Depending on the requirements and available hardware configuration, the enabled and disabled status of an intrusion zone may be controlled by different methods. If a single reader is assigned to more than one intrusion zone, then that reader enables or disables all zones to which it is assigned.

The system allows you to associate these devices and methods with intrusion zones:

  • Card reader
  • SmartKey device (SmartKey device provides keypad for entering a PIN and for arming, disarming, and displaying the status of intrusion zones.)
  • Schedule
  • Contact input
  • A manually-configure method using the browser interface.

You configure the zone-device relationship by assigning the device to the zone or the zone to the device.

Intrusion zone status indicators

The behavior and display color of designated LED indicators indicate the current status and operation of the intrusion zone (armed, disarmed, arming, disarming, waiting for exit, waiting for PIN, and other indications).

Audible beepers indicate current status and operation of the intrusion zone (armed, disarmed, arming, disarming, and other states).

Audible beeper patterns indicate current status and operation of the intrusion zone (armed, disarmed, arming, disarming, and other states).

Zone alarms related to groups can initiate system actions, including:

  • Output to a relay
  • Email notification
  • Dialer interface

Grouping

Creating a group adds peer-to-peer and subordinate stations to an existing intrusion zone. In so doing, it relates the remote host’s intrusion zone to the Supervisor station. Specifically:

  • Stations to group must be joined in either a peer-to-peer or Supervisor-to-subordinate relationship.
  • The Entry Reader and Exit Reader tabs display only on the local controller readers.
  • You can only add readers to intrusion zones when you are connected to the reader’s assigned station. Readers are not visible and cannot be configured from remotely-grouped stations.

Using both a schedule and a PIN

If you plan to use both a schedule and a PIN:

  • If the zone is armed using a schedule, the PIN can disarm the zone. To arm the zone again, the schedule must change state to disarm and back to arm.
  • If the zone is armed using a schedule, and the zone is already armed, entering the PIN arms it again. The system counts down again, but the state stays the same. If the zone is armed by a PIN and a schedule changes to the arm state, nothing happens.