Understanding intrusion alarm integration in the ATRIUM software

Understanding intrusion alarm integration in the ATRIUM software

Introduction

This integration allows you to arm/disarm an intrusion detection system (burglar alarm) with a card. The intrusion detection system must  support key switch arming.

These are the options and advantages when you implement this feature:
  1. Select which cards have this capability.
    1. Some cards may have the capability to arm and disarm.
    2. Some cards may only arm.
    3. Some cards may only disarm.
  2. Present the card to the reader 2 consecutive times (double-swipe) to arm.
  3. Present the card once (single-swipe) to disarm.
  4. View the armed or disarmed status in real time within the ATRIUM software or web page.
  5. Arm or disarm the intrusion (alarm) system from your smartphone, tablet or any web-enabled device.
  6. Use a simple mouse click to arm or disarm in the ATRIUM software.
  7. Monitor the alarm condition of the intrusion (alarm) system when it is armed.
  8. Let ATRIUM send an email when an intrusion (alarm) is detected.

Enabling Intrusion Alarm Integration

From the Hardware tab, click on the System Overview icon.  Select the Master controller from the list and click on the Properties button.



From the Module Properties window, expand the Advanced Options tab.
Select the Integration tab and check/enable Intrusion (Alarm) Integration . Click the Save button.



You can arm an alarm system by double-swiping the card to the reader. You must enable the Double Swipe  option for each door to which you want to apply this option.

From the Door Properties window (display basic view by default), click the Advanced button.  Check/enable Double Swipe then click the Save button. Repeat for each door you want to activate Double  Swipe arming.




Setting Areas

Any readers associated to an area, can be used to arm and disarm the intrusion alarm system.

From the Dashboard tab, click on the Areas icon.  Select an area from the list and click on the Properties button.



From the  Area Properties window, select the Integration tab.



Integration

  1. Enabled: Check Active to activate this area to arm and disarm the intrusion (alarm) system.
  2. Armed Status Input: Select an ATRIUM input that will monitor the armed or disarmed status of the intrusion (alarm) system. ATRIUM will send an arming request to the intrusion (alarm) system only if the Arm Status Input state is in disarmed condition. The intrusion (alarm) system must be configured to activate a programmable (pgm) output when it is armed. Connect an external dry contact relay to the programmable (pgm) output and the selected ATRIUM input. 
Refer to the wiring diagram at the end of this article to see the connections.
  1. Alarm Status Input: Select an ATRIUM input that will monitor the alarm status of the intrusion (alarm) system. The intrusion (alarm) system must be configured to activate a programmable (pgm) output when it detects an alarm condition. Connect an external dry contact relay to the programmable (pgm) output and the selected ATRIUM input. 
Refer to the wiring diagram at the end of this article to see the connections.
  1. System Control Output: Options include either the dry contact relays (RLY1/RLY2 on the controller) or any of the reader outputs.
    1. If a reader output is selected, you must de-activate (leave the Output field blank) its default settings in the Reader Properties menu. See this article to view the reader output configuration settings.


    1. An external 12V relay must be connected to the selected reader output terminal. The external relay is then connected to the key switch arming input.
  1. Output Type: Maintained or Momentary
    1. Maintained:
      1. The output will activate and remain activated when a valid double-swipe is detected.
      2. The output will de-activate when a valid swipe is detected.
    2. Momentary:
      1. The output will activate for the amount of time defined in the Pulse Delay field and de-activate when the time expires.
  2. Pulse Time: Amount of time, in seconds, the selected control output will activate.

Enabling a User to Arm/Disarm

From the Dashboard tab, click on the Users icon.  Select a user from the list and click on the Properties button.


From the User Properties window, select Advanced View.


Check Can Arm to activate the selected user to arm the intrusion alarm system.
Check Can Disarm to activate the selected user to disarm the intrusion alarm system. Save your modifications.

Wiring Diagram



Next, learn how to set up and manage elevator integration in the ATRIUM software. 




    • Related Articles

    • Understanding areas in the ATRIUM software

      Introduction Programming areas determines the different access rooms that will be controlled by the ATRIUM system. Once defined, an area can be assigned to an access level, which can in turn be assigned to one or more users/card holders.  Areas are ...
    • Understanding doors in the ATRIUM software

      Overview The term door refers to any access point controlled by a reader and/or keypad such as a door, turnstile, gate, and wireless or wired door handles. To control entry and exit through an access point (door), a reader and/or keypad can be used ...
    • Understanding elevator integration in the ATRIUM software

      Introduction Integrating elevator control into ATRIUM allows you to manage up to 256 floors per account. To do this, convert your main A22 to an A22-EC, or add an A22 as a subcontroller (see this article), then convert it into an A22-EC (see ...
    • Understanding macros, macro counters, and macro timers in the ATRIUM software

      Introduction Macros are used to cause an action on a device when triggering on an event. The macro instructs a device to perform a specific action like Activate Relay, Lock Door (Latched), etc. The ATRIUM application allows the creation of a macro by ...
    • Managing users in the ATRIUM software

      Programming a user allows to define the details pertaining to the user. Any individual that needs to access an area (room) must be defined in the system as a user. Once defined, a credential can be assigned to a user. Users Overview From the ...