Access by any person; for example the general public.
User access by an operator and administrator; for example customers
(systems users).
User access by an installer; for example an alarm company professional.
Table E-1 Permission of the Access Level
Bypass(zone)/Disabling/Force Arming
Adding/Changing Verification Code
Adding/Editing Level 2 User and
Verification Code
Adding/Editing Configuration Data
Replacing software and firmware
Note
a
By the condition of being accredited by user in level 2.
b
By the condition of being accredited by user in level 2 and level 3.
d
Users can only edit their own user code.
● The user level 2 can assign the login permission of the controller to the user level 3 in the
settings page.
● The user level 2 should assign permissions to the user level 3 if the user level 3 wants to login
the controller remotely.
● When the controller is bypassed, the user level 3 can login the controller without the permission
assignment of the user level 2.