4.10.Settings - AlarmManager-BASIC and -PRO
General Settings
System name
Enter the name of the system and choose the active state.
Regional settings
This settings allow to choose the timezone and the temperature unit.
Security
Webinterface always needs authentication. This prevents the system state to be accessed by unauthorized
users.
Backup folder
The path to the backup files of the AlarmManager‘s configuration is set here.
Alarm behavior
Alarm functions
Set the behavior of the AlarmManager for pending alarms here. The arming delay makes it possible to set a
timespan between arming and alarm triggering.
Signaling
The acoustic feedback (buzzers of AlarmManager and MultiSensors) and the feedback of the LEDs can be
activated or deactivated as needed, except the CO-alarming. A CO-alarm always triggers all buzzers for the
specified buzzer time.
E-Mail, SNMP & GSM
E-Mail
For e-mail notifications an account can be configured with or without user credentials. Depending on the E-
mail server, setting an encryption method might be necessary. When choosing the encryption mode
(STARTTLS / SSL) the required port will be set to the according default port. The port can be changed if
needed.#
Enter the IP-address of the e-mail server and the sender address here. #
It is possible to resolve DNS addresses to the according ip by hitting the button „DNS -> IP“.
Via the Kentix-Check-Button a test e-mail with the entered configuration can be sent.
SNMP - Monitoring
The AlarmManager supports full SNMP-functionality, therefore alarms can be sent as traps. Additionally the
AlarmManager can be configured for requests via network monitoring systems. For this purpose you can
download a MIB (Management Information Base) for the SNMP host.
GSM settings
Enter the mobile number and PIN of the SIM card.
NOTE!
The test e-mail is sent to the e-mail-address of the first user. In case of an error please check, whether an
e-mail-address has already been configured for this user. Also take care of possible restrictions (routing/
firewalls) in your network and synchronize data like encryption and communication port with the
responsible persons.
Kommentare zu diesen Handbüchern