Integration overview for the Bosch Map 5000 intrusion panel extension - Bosch Map 5000 intrusion panel 3.0

Bosch Map 5000 Intrusion Panel Extension Guide 3.0

Applies to
Bosch Map 5000 intrusion panel 3.0
Last updated
2023-08-03
Content type
Guides > Plugin and extension guides
Language
English
Product
Bosch Map 5000 intrusion panel
Version
3.0

You can integrate a Map 5000 intrusion panel into Security Center using the Bosch Map 5000 intrusion panel extension by following a sequence of steps.

The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn what you can do using the extension.
2 Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.
3 Learn about the different components and how they connect together.
4 Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.
Prepare Security Center
5 In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.
6 Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click About > Certificates, and confirm that Bosch Map 5000 intrusion panel is in the list.
Deploy the extension
7 On a Security Center server, download the extension and install it.
8 Grant users the privileges that they need to use the extension.
  • Grant users the appropriate "intrusion" privileges and "alarm" privileges. Tip: You can search the privileges by keywords.
  • Security Desk operators do not need special privileges to use this extension.
9 If not yet done, create the Intrusion Manager role for managing the Bosch Map 5000 intrusion panel extension.
10 (Optional) Change the extension configuration to suit your particular needs.
11 (Optional) Change the extension configuration to suit your particular needs.
Add and configure the devices
12 Prepare the intrusion devices for enrollment.
13 Add intrusion devices as intrusion detection units in Security Center.
14 Link the inputs to intrusion detection areas.
15 Identify the inputs and outputs.
16 Assign cameras to intrusion detection units and inputs.
17 Map intrusion panel events to Security Center actions.