Monday, May 1, 2023

AJAX User Manuals Download | ManualsLib.AJAX HUB QUICK START MANUAL Pdf Download | ManualsLib

Looking for:

Ajax manual download.AJAX Gamma User Manual 













































     


Ajax manual download



  Page 1 Hub 2 User Manual Updated January 12, Ajax is a wireless security system that protects against intrusions res, and oods, and allows users to control electrical appliances directly from a mobile app The system responds immediately to threats informing you and the security ; Page 2: Functional Elements Representing a key element of the security system, Hub 2 controls the. Page 1 Ajax Hub Quick Start Ajax Hub and neutralize any threats of burglary, fire or flood. 6 6 6 9 9 9 9 6 0 2 09 ; Page 3 Firmly slide down the back cover, and remove it from the hub. Inside, you’ll see slots for a SIM card, power cable and Ethernet.3 0. 0 0 9/ View & download of more than 49 AJAX PDF user manuals, service manuals, operating guides. Security Sensors, Security System user manuals, operating guides & specifications.    

 

Ajax PRO Desktop User Manual – ALD Security - Adding the AJAX Control Toolkit to the Toolbox



   

Delete from my manuals? Sign In OR. Don't have an account? Sign up! Restore password. Upload manual. Upload from disk. Upload from URL. Please use both communication channels to ensure more reliable communication between the hub and Ajax Cloud. The app allows responding promptly to any notifications of the security system. The user can customize notifications in the hub settings. Choose what is more convenient for you: push notifications, SMS, or calls.

If the Ajax system is connected to the central monitoring station, the alarm signal will be sent directly to it, bypassing Ajax Cloud. Up to Ajax devices can be connected to the hub. The protected Jeweller radio protocol ensures reliable communication between the devices at a distance of up to 2 km in the line of sight. Use scenarios to automate the security system and decrease the number of routine actions. Adjust the security schedule, program actions of automation devices Relay , WallSwitch or Socket in response to an alarm, Button press or by schedule.

A scenario can be created remotely in the Ajax app. Press and hold the power button for 2 seconds until the logo lights up. The hub needs approximately 2 minutes to identify the available communication channels. The bright green or white logo color indicates that the hub is connected to Ajax Cloud. During the next setup in the mobile app , you will be able to set a static IP address. For the proper setting of the access point, username, and password, please contact the support service of the operator.

The user with administrator rights can configure the Ajax security system via the app. The administrator account with the information about the added hubs is encrypted and placed on Ajax Cloud. All the parameters of the Ajax security system and connected devices set by the user are stored locally on the hub.

These parameters are inextricably linked with the hub: changing the hub administrator does not affect the settings of the connected devices. Create the Ajax account in the app following the step-by-step guide. As part of the process, you need to confirm your email and phone number. Ajax account allows to combine the roles: you can be the administrator of one hub, as well as the user of another hub. Granting access to all system functions to display notifications in particular is a mandatory condition for controlling the Ajax security system via the smartphone.

Prior to installing the hub, make sure that you have selected the optimal location: the SIM card demonstrates consistent reception, all the devices have been tested for radio communication, and the hub is hidden from direct view.

The hub should be reliably attached to the surface vertical or horizontal. We do not recommend using double-sided adhesive tape: it cannot guarantee secure attachment and simplifies the removal of the device. Do not flip the hub when attaching vertically for instance, on a wall. When properly fixed, the Ajax logo can be read horizontally. Fixing the hub on lid with screws prevents any accidental shifting of the hub and minimizes the risk of device theft.

If the hub is firmly fixed, the attempt to tear it off triggers the tamper, and the system sends a notification. The virtual rooms are used to group the connected devices. The user can create up to 50 rooms, with each device located only in one room. Please assign a name for the room, and optionally, attach or make a photo: it helps to find the needed room in the list quickly. By pressing on the gear button go to the room settings menu.

To delete the room, move all the devices to other rooms using the device setup menu. Deleting the room erases all its settings. During the first hub registration in the app, you will be prompted to add devices to guard the room. However, you can refuse and return to this step later. Icons display some of Hub statuses.

You can see them in the Ajax app, in the Devices menu. Click to open the list of Hub malfunctions. The field appears only if a malfunction is detected Cellular signal strength Shows the signal strength of the mobile network for the active SIM card. We recommend installing the hub in places with the signal strength of bars. If the signal strength is weak, the hub will not be able to dial-up or send an SMS about an event or alarm Battery Charge Battery level of the device.

Displayed as a percentage. How battery charge is displayed in Ajax apps Lid Status of the tamper that responds to hub dismantling:. What is a tamper? External power External power supply connection status:. The acceptable value is —80 dBm or lower Monitoring Station The status of direct connection of the hub to the central monitoring station of the security organization:. If this field is displayed, the security company uses a direct connection to receive events and security system alarms.

What is a direct connection? Hub model Hub model name Hardware version Hardware version. Unable to update Firmware Firmware version. Also located on the device box, on the device circuit board, and on the QR code under the SmartBracket panel Settings Settings can be changed in the Ajax app :. Note that after changing the settings, you should click the Back button to save them. Avatar is a customized title image for Ajax security system. It is displayed in the hub selection menu and helps to identify the required object.

Hub name. Is displayed in the SMS and push notification text. The name can contain up to 12 Cyrillic characters or up to 24 Latin characters. In this category of settings, you can invite and delete users, edit their rights, and define how the security system notifies users about events and alarms.

User Role — selecting the level of access to the system management and configuring: Admin or User. The category is available for those users who have the right to manage privacy settings.

The settings apply to the surveillance cameras, and DVRs integrated into the system. Users — setting up access levels to surveillance cameras and DVRs for system users. Installers — setting up access levels to surveillance cameras and DVRs for professional installers. The user location is determined using the smartphone GPS module. Detection Zone Test — running the detection zone test for the connected detectors. The test determines the sufficient distance for the detectors to register alarms.

Jeweller — configuring the hub-detector ping interval. The maintenance reports generated are located in this tab. The tab shows only the last 5 reports for each object. Older reports are deleted. For ease of navigation, we have provided search by name of the object, its number and address, as well as by the hub ID.

After selecting an object in the Archive tab, you can also generate a new report for this object if necessary. PDF file of the report contains all the necessary information about the object and the states of all devices of the security system. At the beginning of each file, in addition to general data, a short summary of the check is also available: if the engineer should visit the object or not. A recommendation to visit the object appears if at least one device in the system has a malfunction.

The Monitoring module allows you to process events and alarms of Ajax security systems, as well as notifications about the operators work. New alarm notifications are displayed in the New tab and are accompanied by the sound of a siren until the incident will be considered. An incident is not considered closed until it is closed by the operator.

One notification can include multiple alarms or events of the security system. The latter three are displayed as icons in the notification line, in the Source column. Notification of power outage at the object can be disabled in the Services settings menu in the Company module. The notification line displays the name, address, object number, as well as the status and time elapsed since the alarm was received, during which the operator is viewing the incident. Which operator and when started viewing the incident is recorded in the Journal module.

The journal also records all other actions of operators to process the incident: from consideration to closing the incident. Separately, the list shows incidents of loss of connection with the operator and operator logins to the PRO account from an unverified computer.

Notification Login from an unverified computer — an incident type that contains information about the user and the computer from which the login was made. By clicking the Start processing , the operator starts processing the alarm, and the incident goes to the Processing tab.

The operator has limited access to the tab: they see only those incidents that are being processed.

The head of operators has full access to see all incidents that are being processed by the operators. In the centre of the Processing tab , information about the object, a list of alarms, a menu for controlling security modes, as well as notes, a list of devices, road maps, and room layouts are displayed.

If motion detectors with photo verification are installed at the object, the operator can view a series of photos taken by the detector to check the cause of the alarm. Photos are displayed in the MotionCam tab in chronological order, starting with the latest. The operator can contact one of the responsible people indicated in the object card — when processing an alarm, their names, and phone numbers are displayed on the app screen.

PRO Desktop does not support calls from the app. But the operator can copy the phone number of the responsible person and call them using third-party software.

For example, using an app for IP telephony. Responsible people are assigned when creating an object in PRO Desktop. This may be, for example, the owner of the flat or the head of the security service at the production site. Based on the results of the connection, the operator puts a mark Accepted — if it was possible to contact and the responsible person accepted the information.

If there is no connection with the responsible person, the operator puts the mark Not responding. You can switch between responsible people using the arrows.

They appear if all responsible people cannot be displayed at the current size of the app window. The rapid response teams assigned to the object are displayed under the responsible people. You can switch between assigned groups using the arrows. They appear if all RRUs cannot be displayed at the current app window size.

The incident processing log is displayed in the lower right corner of the screen. For each record in the log, the operator can leave a comment by clicking on the record. At the top of the processing journal, you can select the cause of the alarm from the drop-down list and complete the processing. If necessary, you can comment on the cause of the alarm.

For example, to describe in more detail the cause of a false alarm at an object. When processing an incident about an operator logging in from an unverified computer, the workstation can be verified in the same window. After the incident is processed, it closes and goes to the Journal , where the log of its processing is saved. You cannot return to incident processing. An employee who has access to the monitoring module can switch an object into Sleep Mode if installation work is being carried out at the object or false alarms are coming from it.

Objects with alarms and events that are temporarily ignored are on the Sleep Mode tab. You can switch the object to Sleep Mode using the menu for managing security modes. When transferring an object to Sleep Mode , the operator specifies the time after which the object will return to normal operation. You can select 1, 5, 15, or 30 minutes, or manually enter the time from 1 to minutes.

While the object is put into Sleep Mode , PRO Desktop ignores its alarms and events — they are not displayed in the New tab but are recorded in the Journal module. At the end of the set time, the object returns to normal operation. PRO Desktop maintains a journal of alarms and events of all company objects, and also allows you to generate reports on the availability of hubs and CMS operators.

To go to it, select the Journal in the list of app modules. Object notifications are displayed in chronological order. To set the time interval for notifications, their type, or object number, use the filters. Above the filters, a counter of filtered records is displayed, as well as buttons for resetting filters and refreshing the journal.

To filter notifications by device or user, click on them in the list of notifications. By clicking on the number of the object in the column, you can filter the notifications of this object.

Notifications can also be filtered by clicking on the event icon — you will get a list of all events of the same type. PRO Desktop can generate reports showing the connection time with security systems Hubs availability. You can also generate a report on the Operators availability.

To generate reports on hub availability, select the Hubs availability filter. By default, the report has information of the last 7 days. If necessary, the period can be changed in the Time frame filter, and you can also set the object number. The availability report will be generated for the selected objects if the filter by object number is active. If the filter by object number is inactive, the report will be generated for all hubs of the company. After setting parameters, click the report generation button next to the filter name — the report will open in a new window.

To generate the operators availability report, only the workstations of operators verified in the Company module are considered. To generate a report, click the Operators availability filter. A list of events will be displayed on the right:. Set and apply the range to filter events by time. To generate a report based on the specified parameters, click the report generation button next to the filter name. Central units. Indoor security. Outdoor security. Controls and panic buttons.

Fire protection. Flood protection. Power Supply Units. For Pro. Android PRO app. PRO Desktop for Windows. CMS Connection. PRO Integration. For Users. Android app. Video Surveillance. General information One company connected to the hub is one user.

Comparison of hubs. Open the downloaded file. Install PRO Desktop. Company accounts are required for running the security business: monitoring alarms and events, maintenance, configuring, and installing Ajax security More about PRO account. Switching between a personal PRO account and a company account When you enter the app, the company the PRO account worked the last time with is automatically opened.

Hub 2 is an intelligent security system control panel that supports detectors with visual alarm veri cation, that developed only for indoor use. Representing a key element of the security system, Hub 2 controls the operation of Ajax devices Page 2: Functional Elements The personal data and system operation logs are stored under multilevel protection, and information exchange with Hub 2 is carried out via an encrypted channel on a hour basis.

Page 3: Operational Principles Hub 2 uses the Jeweller radio technology. For visual data transmission, Hub 2 uses Wings: a high-speed radio protocol based on the Jeweller technology. Wings also uses a dedicated antenna to improve channel reliability. All Ajax devices To con gure the system, install the Ajax app and create the Ajax account. We recommend using the Ajax Security System app to manage one or several hubs. Page 5: Security Requirements Ajax account!

You do not need to create a new account for each hub—you can add several hubs to one account. An account with information regarding the added hubs is uploaded to the cloud-based Ajax Cloud service in an encrypted form.

For the proper setting of the access point, username, and password, please contact the support service of the operator. Page 7 Changing the hub administrator does not affect the settings of the connected devices.

Ajax security system user rights Hub statuses Icons Icons display some of Hub 2 statuses. Page 8 The hub have lost connection with the central monitoring station of the security organization via direct connection States States can be found in the Ajax app 1. Go to the Devices tab 2.

Select Hub 2 from the list. Parameter Meaning Click to open the list of hub malfunctions. Page 10 50 rooms, with each device located only in one room. Without creating the room, you are not able to add devices in the Ajax app!

https://newsfromulcumcilnvt2cji.blogspot.com/2022/12/contra-game-free-full-version-for-pc.html https://newsfromfenritiniwfxx.blogspot.com/2022/12/windows-server-2012-foundation-serial.html https://newsfrom44nectetajil3ri.blogspot.com/2022/12/macoslogic-pro-x-mirror-of-es.html https://newsfrom3quitapocbufr1kz7.blogspot.com/2022/12/como-instalar-solidworks-2019-premium.html https://newsfrom3cratatinbo65sv2.blogspot.com/2022/12/windows-server-iso-free-download.html https://newsfrom071tritcogebueyai8u.blogspot.com/2022/12/bluetooth-setup-for-windows-10.html https://newsfrom272iminmena3r9hn9.blogspot.com/2022/12/download-hercules-pc-game-full-version.html https://newsfrom93rialaporkidpg.blogspot.com/2022/12/mf-toolbox-windows-10-downloadresults.html https://newsfromingihamad34d81.blogspot.com/2022/12/windows-10-all-in-one-iso-download.html https://newsfrom7lastervuldzujf8t.blogspot.com/2022/12/besiege-free-download-v-steamunlocked.html https://newsfromtranimcauma1femxt.blogspot.com/2022/12/windows-10-pro-cost-australia.html https://newsfrom372quiprovriyaxvz9ha.blogspot.com/2022/12/bbs-aya.html https://newsfrom020fircoggitsucz91ql.blogspot.com/2022/12/serial-number-dreamweaver-cs3.html https://newsfrom66conctergymhefesfw.blogspot.com/2022/12/overview-of-windows-10-iot-windows-iot.html


No comments:

Post a Comment