How the Genetec™ Intrusion Protocol extension works with Security Center - Genetec™ Intrusion Protocol 5.0.0

Genetec™ Intrusion Protocol Extension Guide 5.0.0

Applies to
Genetec™ Intrusion Protocol 5.0.0
Last updated
Content type
Guides > Plugin and extension guides
Genetec™ Intrusion Protocol

The Genetec™ Intrusion Protocol extension connects to the Genetec™ Intrusion Bridge, which uses drivers to connect to third-party intrusion panels. Once these connections are established, intrusion panels can be monitored, controlled, and reported on in Security Center.

Architecture diagram for Genetec™ Intrusion Protocol integration
NOTE: Synchronizing users through Synergis™ is not available for every driver that you connect to through the Genetec™ Intrusion Protocol.

Components of Genetec™ Intrusion Protocol integration

Genetec™ Intrusion Protocol extension
The Genetec™ Intrusion Protocol extension is installed on a Security Center server and adds Genetec™ Intrusion Protocol as an extension to the Intrusion Manager role. The extension uses a secure connection to connect to the Genetec™ Intrusion Bridge. The Intrusion Manager role receives events from the Genetec™ Intrusion Bridge, reports them live in Security Desk, and logs them in a database for future reporting. The role also relays user commands to the Genetec™ Intrusion Bridge. The Intrusion Manager role must be active before you can import the panels and related entities.
Genetec™ Intrusion Bridge
The Genetec™ Intrusion Bridge is the component of the Genetec™ Intrusion Protocol that facilitates the connection between the panel driver and the Genetec™ Intrusion Protocol extension. It can be installed remotely and makes outbound connections to both the extension's hub and the local intrusion panels. This allows any supported panel to be connected to Security Center without the need of opening multiple inbound/outbound, panel-specific ports and facilitating connection to centralized systems.
Drivers enable the Genetec™ Intrusion Bridge to connect to third-party intrusion panels. Unique drivers exist for each supported third-party panel, and are deployed alongside the Genetec™ Intrusion Bridge.
Config Tool
The Genetec™ Intrusion Protocol extension is also installed on a Config Tool workstation. The Security Center administrator uses Config Tool to create and configure the Intrusion Manager role.
Security Desk
The Genetec™ Intrusion Protocol extension is installed on all Security Desk workstations. Security Desk operators can monitor and control the intrusion panels.
Intrusion panel
The Genetec™ Intrusion Bridge uses drivers to connect with third-party intrusion panels. After the connection is established, communication between panels and the Genetec™ Intrusion Protocol extension occurs over TCP/IP Ethernet network.


The table below indicates the number of intrusion panels that can connect to a single Genetec™ Intrusion Bridge.

Instrusion panel manufacturer Number of panels
Bosch 50
Satel 40
Telenot 2

Performance considerations

The following should be taken into consideration when deploying the Genetec™ Intrusion Protocol extension:
  • The extension can handle between 13-25 events per second.
  • 3000 entities takes approximately 5 MB of disk space on the Genetec™ Intrusion Bridge.
  • For every 15,000 entities added to the system, the Genetec™ Intrusion Bridge will require an additional 30 seconds to boot.
  • If the Genetec™ Intrusion Bridge loses the connection with Security Center, the time it takes to reconnect depends on the amount of entities that Security Center needs to update.