Configuration consists of a series of steps that need to be followed in sequence.
The following table summarizes the configuration process for the Bosch intrusion panel extension:
Step | Task | Where to find more information |
---|---|---|
1 | Read all the required information, and perform all the required tasks before integrating the Bosch intrusion panel in Security Center. | |
2 | Set up communication between Security Center server and the Bosch intrusion panel using an IP network, and configure the panel settings. | |
3 | (Optional) Add an expansion board to your intrusion panel. |
|
4 | Create the Intrusion Manager role in Security Center to manage the intrusion detection unit. | |
5 | Create the Bosch intrusion panel as an intrusion detection unit in Security Center. | |
6 | Configure the Bosch extension and intrusion detection unit properties, such as the clock synchronization, how events from the panel are handled, and so on. | |
7 | Configure Security Center to be able to trigger an intrusion detection alarm on a selected intrusion detection area in Security Desk. | |
8 | Configure the inputs and outputs controlled by the intrusion panel. | |
9 | Map Security Center cameras to intrusion detection areas. | |
10 | (Optional) Create events-to-actions, where actions are triggered when Bosch intrusion panel events are received in Security Center. | |
11 | (Optional) Monitor your intrusion detection areas using a map in Security Desk. |
|
12 | (Optional) Synchronize users on the Bosch intrusion panel with Security Center. |