
TABLE OF CONTENTS
DEVICE CONNECTION ..................................................2
Wiring diagram............................................................................. 2
Siren connection ......................................................................... 4
Additional protective contour................................................ 5
Additional contour connection.............................................. 5
FIRMWARE UPDATE......................................................6
BLED 112 drivers installation ................................................ 6
The Author Flasher software installation......................... 9
The IGLA ALARM rmware update ....................................10
Setting of the IGLA ALARM parameters ..........................13
Key fobs adding .........................................................................15
DEVICE ALIGNMENT...................................................18
Alignment with the AUTOSTART-module........................18
Alignment with ATLAS or COMPASS GSM/GPS.............19
Alignment with TOR ................................................................21
Alignment with the CONTOUR-module ...........................22
Alignment with the KORD-module ....................................23
Alignment with the KEYLESS BLOCK ...............................24
FIRST SETTINGS ADJUSTMENT AND CHOOSING
OF THE OPTIONS.........................................................27
Initial setting of the PIN-code .............................................27
The IGLA ALARM anti-theft system options ..................28
Engine blocking method........................................................30
Additional functions ................................................................31
Deleting of the key fobs.........................................................33
Key fobs adding .........................................................................33
Authentication by the key fobs of the KEYLESS BLOCK.....38
Key fobs indication table .......................................................39
Authorization (authentication) modes............................. 40
Anti-hijack mode .......................................................................41
Super AntiHiJack mode...........................................................42
Alternative service/valet button.........................................42