![]() You can then use WireShark (or equivalent) to trap whatever commands/replies you want to and either extend the ParadoxMap.py's existing dictionaries or add in a complete new Class for another alarm type.Ĭonfirmed supported systems: See the (././wiki) (please let me know if yours work, or not)ġ. ![]() Then within it's root folder find a file called COM.ini and change the 'IPEncrypted' setting to FALSE. If you want to do some tcp dump of your alarm model to add into there, get Paradox's Winload software. ![]() The script was designed to be extendable to support more alarm types. NB: For a more feature-filled alternative to this script, I suggest looking at Python-based IP150 'middle-ware' that uses the IP module's software port for monitoring and control of the alarm via an MQTT Broker. Tertiush/ParadoxIP150v2/blob/master/README.md # Paradox IP150-MQTTv2
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |