You can integrate DMP intrusion panels into Security Center using the DMP intrusion panel extension by following a sequence of steps.
Step | Task | Where to find more information |
---|---|---|
Understand prerequisites and key issues before deploying | ||
1 | Learn what you can do using the extension. | |
2 | Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations. | |
3 | Learn about the different components and how they connect together. | |
4 | Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center. | |
Prepare Security Center | ||
5 | (Optional) In Security Center, create a georeferenced map. | |
6 | Verify that the Security Center license has a valid certificate for the . Go to the Config Tool home page, click , and confirm that DMP intrusion panel is in the list. |
|
Deploy the extension | ||
7 | On a Security Center server, download the extension and install it. | Downloading and installing the DMP intrusion panel extension. |
8 | Grant users the privileges that they need to use the extension. |
|
9 | If not yet done, create the Intrusion Manager role for managing the DMP intrusion panel extension. | Creating the Intrusion Manager role. |
10 | Schedule regular back ups and grooming of events. | Scheduling database backups and cleanups for the DMP intrusion panel extension. |
11 | (Optional) Change the extension configuration to suit your particular needs. | Configuring communications parameters for all DMP intrusion detection units |
Add and configure the devices | ||
12 | Prepare the intrusion devices for enrollment. | |
13 | Add intrusion devices as intrusion detection units in Security Center. | |
14 | Verify that the DMP inputs and outputs are listed as expected. (Optional) Change the names and descriptions of inputs and outputs. |
Viewing and configuring DMP inputs and outputs. |
15 | (Optional) Enable PIN padding. | Enabling PIN and user code padding. |
16 | (Optional) Configure inputs to raise a Trouble event. | Configuring a DMP input to raise a Trouble event. |
17 | (Optional) Assign cameras to intrusion detection areas and inputs so that you can view video of related events. | Assigning cameras to intrusion detection areas and inputs. |
18 | Review the arming configuration of your intrusion detection areas. (Optional) Change the Bad Zones setting. |
Configuring bad zones and reviewing arming parameters for DMP intrusion detection areas. |
19 | Create event-to-action for intrusion detection events. | Mapping intrusion panel events to Security Center actions. |
Synchronizing and configuring DMP user codes and Security Center cardholders | ||
20 | Import the DMP users from a panel. | Importing DMP intrusion panel users as cardholders. |
21 | If you have Security Center cardholders you want to add as a user on the panel, export those cardholders to the DMP panel. | Exporting cardholders to a DMP intrusion panel. |
22 | Define the ambush code as the duress cardholder. | Defining the ambush code as the duress cardholder. |
23 | (Optional) Schedule automatic updates of users. | Scheduling and automating cardholder export. |