To assign detection zones, the system controller auto-discovers networked alarm inputs to confirm proper
configuration. Each input is then associated with perimeter segments - or zones - of the desired length.
For added flexibility, multiple sensor technologies can be assigned to a single zone.
When an intrusion attempt occurs, alarm data is communicated to the controller and its location is
displayed on a graphic map. Zones may also be associated with specific outputs – such as camera
presets – so that when the perimeter is breached, precise visual assessment is achieved.