The Genetec™ Intrusion Protocol extension connects to the Genetec™ Intrusion Bridge, which uses drivers to connect to third-party intrusion panels. Once these connections are established, intrusion panels can be monitored, controlled, and reported on in Security Center.
Components of Genetec™ Intrusion Protocol integration
- Genetec™ Intrusion Protocol extension
- The Genetec™ Intrusion Protocol extension is installed on a Security Center server and adds Genetec™ Intrusion Protocol as an extension to the Intrusion Manager role. The extension uses a secure connection to connect to the Genetec™ Intrusion Bridge. The Intrusion Manager role receives events from the Genetec™ Intrusion Bridge, reports them live in Security Desk, and logs them in a database for future reporting. The role also relays user commands to the Genetec™ Intrusion Bridge. The Intrusion Manager role must be active before you can import the panels and related entities.
- Genetec™ Intrusion Bridge
- The Genetec™ Intrusion Bridge is the component of the Genetec™ Intrusion Protocol that facilitates the connection between the panel driver and the Genetec™ Intrusion Protocol extension. It can be installed remotely and makes outbound connections to both the extension's hub and the local intrusion panels. This allows any supported panel to be connected to Security Center without the need of opening multiple inbound/outbound, panel-specific ports and facilitating connection to centralized systems.
- Drivers enable the Genetec™ Intrusion Bridge to connect to third-party intrusion panels. Unique drivers exist for each supported third-party panel, and are deployed alongside the Genetec™ Intrusion Bridge.
- Config Tool
- The Genetec™ Intrusion Protocol extension is also installed on a Config Tool workstation. The Security Center administrator uses Config Tool to create and configure the Intrusion Manager role.
- Security Desk
- The Genetec™ Intrusion Protocol extension is installed on all Security Desk workstations. Security Desk operators can monitor and control the intrusion panels.
- Intrusion panel
- The Genetec™ Intrusion Bridge uses drivers to connect with third-party intrusion panels. After the connection is established, communication between panels and the Genetec™ Intrusion Protocol extension occurs over TCP/IP Ethernet network.
The table below indicates the number of intrusion panels that can connect to a single Genetec™ Intrusion Bridge.
|Instrusion panel manufacturer||Number of panels|
- The extension can handle between 13-25 events per second.
- 3000 entities takes approximately 5 MB of disk space on the Genetec™ Intrusion Bridge.
- For every 15,000 entities added to the system, the Genetec™ Intrusion Bridge will require an additional 30 seconds to boot.
- If the Genetec™ Intrusion Bridge loses the connection with Security Center, the time it takes to reconnect depends on the amount of entities that Security Center needs to update.