
Security—Security Applications 5
The general security requirements are:
xFollow the instructions contained in this manual.
xThe MPS-24/MPS-24E power supply cannot be employed; an
MPS-24A/MPS-24AE must be used.
xShielded cable must be used on all input/output wiring associated with
security functions.
- SLC loop shielding. Refer to the Installing the IFC-1010/2020
Technical Bulletin (LIT-448155) for SLC loop shielding
requirements.
- Security module I/O circuit shielding. Terminate the shield at earth
ground at the junction box containing the module.
xWhen employed as a Protected Premises Unit, the IFC-1010/2020
cabinet door must be wired with an STS-1 Tamper Switch that is
monitored by the control panel.
xIf the system has arming and disarming capability, a ringback signal
from the Central Station to the arming location is required for
Grade AA or Grade A operation. The ringback signal informs the
Protected Premises Control Panel that the signal to arm/disarm has
been received by the Central Station.
xA single SLC loop may be used for both fire and security device
connections.
There are four software Type IDs associated with security operation:
SACM (Security Access Monitor), SARM (Security Area Monitor), SEQM
(Security Equipment Monitor), and SSYM (Security System Monitor), as
well as one software function, SDEL (Security Delay). These software
elements are essential to all aspects of security operation, including
Control-By-Event (CBE) programming. Devices with the Type IDs
SACM and SEQM do not automatically display at the LCD of the DIA, or
an LCD-80 or require state change acknowledgment. State changes in
devices with these software types may be output at a printer. For more
information about the characteristics of software Type IDs, refer to the
IFC-1010/2020 Programming Technical Bulletin (LIT-448060).
!
WARNING: XP Transponder circuits are not suitable for security
applications.
General
Security
Requirements