Opening detector to protect high-security objects
DoorProtect G3 Fibra is a Grade 3 wired opening detector for protecting high-risk facilities. The detector is equipped with two reed switches, an accelerometer for detecting opening, impact, and tilting, and a magnetometer for protection against magnet spoofing. The device can protect doors, showcases, panoramic windows, skylights, armories, and safes. All in line with the Ajax user experience, ensuring quick and easy installation of the device.
Two built-in high-end reed switches
magnet can be installed on the left or right side
Protection against false alarms
сaused by the reed switch chattering
Shock and tilt detection
with a built-in accelerometer
Adaptable to any object
adjustable shock and tilt sensors
Protection against magnet spoofing
with a built-in magnetometer
suitable for shops, commercial and non-commercial facilities
No impact from metal surfaces
on the magnet and reed switches, thanks to plastic spacers
Convenient wire connection
thanks to the removable device board
Remote control and configuration
Informative in-app notifications
Office: Opening detected, DoorProtect G3 Fibra in Hall No. 1
Production: Shock detected by DoorProtect G3 Fibra in Workshop No. 1
Fibra wired connection
Low power consumption
up to 35 mW
Fibra line connection
Up to 2,000 m2
of matte enclosure
Terminals to connect a third-party NC detector
Protection for high-security facilities
No intruder goes unnoticed
High-end reed switches for reliable opening detection
DoorProtect G3 Fibra has two high-quality reed switches. Each of them has a service life of at least 1,000,000 openings.
That guarantees decades of trouble-free operation of the device. Due to the paired use of reed switches, the detector functions effectively regardless of whether the magnet is placed on the right or left side.
The reed switches are contained in plastic capsules, not glass. Therefore, they remain intact even if the detector is dropped, improperly transported, or stored.
Reed switch lifetime exceeds 1,000,000 openings
Effective detection wherever the magnet is placed — left or right
Plastic capsules for extra protection of reed switches during transportation
Magnetometer prevents sabotage
The detector features a high-end integrated magnetometer that records and stores local magnetic field data during calibration. That enables the sensor to identify its installed magnet and monitor its effects.
Any changes in the magnetic field trigger an immediate alarm, ensuring protection against magnet spoofing. The straightforward calibration process, initiated through the app, guarantees precise detection of illegal interference and eliminates false alarms.
Plastic spacers, included in the mounting kit, reduce the impact of metal surfaces on the magnet — for example, when installing the detector on a safe door.
Magnetometer for detection of illegal interference
Calibration for accuracy of the magnetometer
Plastic spacers for metal surface interference mitigation
Prompt detection of threats
The built-in accelerometer promptly detects burglary attempts by responding to shocks. Whether an intruder is trying to pry open a safe with a crowbar or force a front door, the sensor is alert. Choose from three sensitivity levels for rapid threat detection, and engage the single-shock skip option to prevent false alarms — even during repairs or construction on the floor above.
Early threat detection via shock sensing
Three sensitivity levels for versatile adaptability
Prevent false alarms with ignoring simple impact
Protecting windows in airing mode
The built-in accelerometer can protect windows that are open for airing. The settings make it easy to adapt the device to the requirements of any object.
You can set a constant window or door tilt angle ranging from 5 to 25 degrees. Even the slightest deviation from the usual position is promptly detected.
The duration for tilt detection can be customized from 1 second up to 1 minute. If the tilt angle exceeds the selected value for longer than the specified time, the system will raise an alarm. All of this ensures accurate and fast threat detection without false alarms.
Tilt change detection
Selecting the normal tilt angle: 5 to 25 degrees
Adjustable time to alarm: 1 second to 1 minute
Ultra protection with additional sensors
DoorProtect G3 Fibra has terminals for connecting any third-party wired NC detector, enhancing the reliability of both the detector and the entire system. For example, you can integrate a second redundant opening detector that operates on a different principle, like a roller shutter motion detector. When connected to DoorProtect G3 Fibra, it will respond to alarms from both detectors and the cable breakage.
Use a detector like a doorbell
DoorProtect G3 Fibra features a chime to notify when a door is opened, even when the system is disarmed. This feature is helpful in places like stores to alert employees of entry.
You can configure the chime for different security groups, assigning each group between 1 to 4 siren signals. It also allows for distinct signals for multiple entrances for easy door identification.
Door opening sound signals
Setting up signals for different security groups
Customize signals for door distinction
Supervision of each device component
Each component of the Ajax system undergoes regular checks. Ajax Cloud server controls communication with the hub. The hub checks each device in the system.
It’s not just tamper alerts, communication, line voltage, and other essential parameters that are monitored; every sensor in each detector is also monitored.
Therefore, if a specific sensor fails, both users and the monitoring station will be immediately notified.
Automatic checks of all detector components
Hub pings every device in the system
Ajax Cloud pings the hub
Unique wired technology
An Ajax system uses secure two-way communication based on Fibra proprietary protocol. It features encryption and device authentication to prevent sabotage, spoofing, and data theft. Fibra lines are versatile and support connecting different types of devices to one line: sirens, keypads, and detectors with photo verification.
Up to 2,000 m of wired communication with a hub
One line for different types of devices
Photo delivery via Fibra line without interference
Protection against sabotage and spoofing
Energy efficiency first
The detector consumes up to 35 mW at peak consumption times. This low power consumption allows installers to connect multiple devices to a single Fibra line, extending wired connectivity.
Fibra communication operates on the TDMA principle. Each device has a short time frame to exchange data with a hub. The rest of the time, their communication modules remain inactive. This significantly reduces power consumption and helps avoid interferences, even when multiple devices are communicating simultaneously.
Detector power consumption is up to 35 mW
TDMA and power-saving modes
Despite its compact size, the detector enclosure contains two tampers. The first one triggers an alert when the detector front panel is removed. The second one activates if there’s an attempt to detach the detector from the surface. If a thief tries to do something with the detector, the system will immediately notify the security company and users about the incident.
Magnet spoofing alarm
The detector features a built-in high-end magnetometer that constantly monitors the magnetic field surrounding it. It promptly notifies users and the CMS in case of interference. It is impossible to trick the detector with a powerful magnet without the system noticing it.
Authentication against spoofing
During each communication session, the hub authenticates the device using its unique parameters. If any parameter fails the authentication check, the hub ignores device commands.
Protection against short circuits
Fibra protocol, combined with a special digital algorithm, provides reliable protection against unnoticed short-circuiting of the device. If someone tries to short-circuit it, the device will notify of a malfunction. The hub informs both the Central Monitoring Station (CMS) and users about the incident.
Encryption of transmitted data
All data the system stores and transmits is protected by block encryption featuring a dynamic key. This encryption makes it extremely difficult to connect to the detector with the intention of sabotage.
The device regularly exchanges data with the hub. At minimal polling settings (3 data packages in 12 seconds), it takes just 36 seconds to detect communication loss and notify both the security company and users about the incident.
Both the monitoring station and security system users instantly receive notifications about events. The information provided includes the time, device type and name, event type, and room location3.
Additional protection of Fibra line
Introducing LineProtect — a module to protect Ajax hubs and wired devices from sabotage when an intruder causes short circuits, applies 110/230 V~, or uses stun guns.
PRO is king
The myth that wired systems are difficult to install has been busted. Ajax has revolutionized what was once a lengthy and dusty task for PROs. By developing an ultimate set of tools, the process from project design to client support and system maintenance has been made seamless and adaptable. There’s no need to disassemble the device for installation. Intuitive Ajax apps ensure swift integration into the system, and each device can be remotely reconfigured without site visits.
Fibra power supply calculator
Use our online calculator to confirm that the Fibra system is suitable for your facility. It assists in verifying the design of a wired security system and offers additional information for installers.
The device board can be removed from the enclosure for easier installation. All necessary fasteners, including screws and dowels, are included. Mounting holes and perforated areas for cable routing are also included. The front of the enclosure can be fixed in two positions, allowing wires to be routed from both the top and bottom of the detector. The enclosure is secured with a screw for reliability. The detector has two reed switches, so the magnet can be installed on either the right or left side, making installation more convenient.
Removable board for easy installation
The magnet can be positioned either on the right or left side of the detector
The enclosure can be secured with a screw for added reliability
Spacers for leveling the detector and mounting it on metal surfaces
Installers can add a detector in two ways: by scanning lines automatically or by scanning a QR code. During line scanning, they can identify the desired device either by clicking in the app or by activating a tamper. Once added, the device comes with a default name and settings that are suitable for most cases.
Pairing with a hub using line scanning or QR code
Device identification through triggering or LED indication
Optimal default settings
Forget about configuring the system via the keyboard. All testing and configuration can be done in Ajax mobile and desktop apps. An installer can work either on behalf of the company or as a sole installer.
Remote and on-site configuration and testing
Desktop and mobile apps
Accounts for companies and installers
With proprietary protocols, any Ajax system can transmit alarms to the PRO Desktop monitoring app or third-party CMS. Upon receiving an alarm, the monitoring station operator knows what happened and where the rapid response unit should be dispatched. All Ajax devices are addressable, so events, device type, its assigned name, security group, and room can be transmitted to PRO Desktop or third-party monitoring software.
Full addressability of the device
Instant notifications in Ajax apps
Alarm and event monitoring in PRO Desktop for monitoring companies
- 1—The Chime feature requires the siren to operate. It functions like a shopkeeper’s bell: when the system is disarmed, the sirens alert users of a door opening.
- 2—When using the U/UTP cat.5 twisted pair cable. Other cables may have different values. Fibra power supply calculator.
- 3—The list of transmitted parameters may vary depending on the CMS type and selected communication protocol.
Ajax product lines
Superior, Fibra, and Baseline product lines are mutually compatible. This opens up numerous possibilities for building systems of any configuration.