• Keine Ergebnisse gefunden

Operating instructions FP 3 E

N/A
N/A
Protected

Academic year: 2022

Aktie " Operating instructions FP 3 E"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Operating instructions FP 3 E

28.01.10 WKL englisch050907.doc

Important remarks

• For your own security change the user and master code in order to avoid that any unauthorised person can open the safe with the factory set code.

• Always test the new code several times with the safe door open.

• Please store the override keys and your personal code in a secure place outside the safe.

• For your own security, we recommend to use a 6-digit code (1 million different possibilities).

• Do not use personal dates like birthdays, phone numbers, etc.

• A wrongly entered code can be deleted step by step by pressing the

* button.

• If the display shows Lo-BATTE please exchange the 4 batteries.

• If the batteries inside the safe are exhausted, the safe can only be opened with the key.

Operating instructions

Push with a small pin from the lower right side into the front blend in order to remove the cover plate next to the keypad. Put the override key into the keyhole and turn it until the stop.

The door can now be opened by turning the knob.

Advice: Use the emergency lock only in emergency cases.

It is not suitable for permanent use !

Insert the batteries type LR 6 into the battery compartment on the inside of the door. You will hear several tones followed by a melody and the display showing All Ready.

Afterwards the system changes to the usual time display.

How to open the safe

Press #1234# (user code) or #123456# (master code). After the code has been entered successfully you will see OPEN in the display. Turn the knob within 6 seconds in order to open the door.

Afterwards the boltworks close again.

Advice: In case of a wrongly entered code ERROR appears in the display.

How to close the safe

Close the door and turn the knob backwards.

How to program the user and master code

Enter the actual user and master code (factory set code #1234# or

#123456# ).

Press the * button, enter your new code (1 to 6 digits) and press the

# button.

After the code has been entered successfully you will hear a melody.

Advice: If a code has been forgotten press the button on the backside of the door to retrieve the factory set code. The codes, date and time must then be programmed anew.

How to program date and time

The date is displayed in the format year / month / day, the time in hour / minute and the day in numbers. 1 = Monday, 2 = Tuesday ... 7 = Sunday.

In order to change the settings press the * button. With the buttons 0 and 8 you can enter the correct number. Please enter the number within 6 seconds otherwise the process will be interrupted.

Press the # button, if the desired number has been entered. Press the

# button once more to switch to the next field.

Assembly instructions

The safe reaches its anti-burglary and anti-fire function only after it has been fixed to a massive part of the building.

Please use the marked fixing points to ensure the necessary, local connection.

Technical information

Power supply: 4 batteries type LR 6 / AA / 1,5 V (Alkaline)

Working humidity: 20% ~ 90% rH – non-condensed / non-condensing

Referenzen

ÄHNLICHE DOKUMENTE

This function is used to compare flight trajectories to the topography of the volcano in order to determine the flight distance of ballistic clasts.. You can calculate the

Combinations  of  histone  modification  marks  are  highly  informative  of  the   methylation  and  accessibility  levels  of  different  genomic  regions,  while  the

Combinations of histone modification marks are highly informative of the methylation and accessibility levels of different genomic regions, while the converse is not always

Combinations of histone modification marks are highly informative of the methylation and accessibility levels of different genomic regions, while the converse is not always

Odor quality may be encoded in the identity of the active output fibers (thus in the spatial com- ponent of the odor code), whereas stimulus properties such as concentration and

Therefore, we predict that receiving a short packet using a demultiplexing process should take at least 2.3 mSec while for the packet filter, these overhead costs may be as low as

Our main tools – described in the next section – are the standard residual code argument (Propo- sition 2.2), the MacWilliams identities (Proposition 2.3), a result based on the

The specific materiality of a video is already a historical form of embodiment which defines itself through the original image and sound carriers onto which the code has