He intended to put in a new board and a new 5g(?) communicator. (Note that a P-1 sub-contractor/installer came close to signing me up for monitoring, but he was experienced enough to prepare for the job very slowly while I read the contract. Maybe I do not wait long enough between failed attempts? Further, I have rather poor hearing and am not always able to hear the beeps from the 6128 KP very well-and/or perhaps the KP is not working so well.Īm I correct that if I have successfully changed the MC, then with it I should be able to change/remove other user codes? If so, can you simplify for me what would be the best/easiest way to remove any other codes? I have no idea what might be in there, except that there is at least the one "limited use" UC which I stumbled upon, and which you suggested could be a duress or babysitting code?Īlso, are there any newer/more advanced keypads that I could easily upgrade to? But my ability to make changes is sketchy. I have (I think/am reasonably confident that I have. I hope that helps clarify things for you and please let us know if you have any follow up questions. ![]() Finally, for people that are looking to buy product and not be monitored at all, we'll certainly provide those people with help during the install but as we don't have the means of programming remotely (like we do with a monitored client), some of the help we'll provide will be to show you where in the manufacturer's guide it says how to do things so that you'd be able to install it yourself. Those people always have the option to switch to us, as long as they aren't under contract, of course. If he's not monitored by us, he should ask his company to remove it for him as we don't provide technical support to people monitored elsewhere, for liability purposes. If Vincent was monitored by us, it would be very easy to remove a zone remotely for him. Jorge's reply was trying to cover all bases. Also, we tend to get posts on our pages from existing customers using unknown emails. Oftentimes, to properly troubleshoot, we need access to the system programming and monitoring settings.
0 Comments
Leave a Reply. |