To monitor and control third-party intrusion panels from Security Center, you must install the Genetec™ Intrusion Protocol extension on a Security Center server and on all client workstations.
Before you begin
- Your server meets the recommended system requirements.
- A compatible version of Security Center is installed.
What you should know
- For information about adding the Genetec™ Intrusion Protocol extension to your Security Center SaaS edition deployment, consult the Security Center SaaS edition Deployment Guide 5.10.
- The Genetec™ Intrusion Bridge and the driver to connect to third-party intrusion panels can be installed alongside the Genetec™ Intrusion Protocol extension.
- The Genetec™ Intrusion Protocol Bridge and driver can be installed on a distinct server, and connect to the Genetec™ Intrusion Protocol extension hub of your intrusion manager primary server. For example, in a Security Center SaaS environment, you would install the Genetec™ Intrusion Protocol Bridge and panel driver on a local server within the same network as your intrusion panels. Once installed, you will connect the Genetec™ Intrusion Protocol Bridge to the hub of the Genetec™ Intrusion Protocol extension on your hosted system.
- Although it is possible to host the Intrusion Manager role on any Security Center server, it is a best practice to host that role on a dedicated expansion server for best system performance.
- If you already have an Intrusion Manager role set up, install the extension on that server.
- For your operators to have access to the features added by this extension, you must install this extension on all Security Center client workstations.