Integration overview for the Genetec™ Intrusion Protocol extension - Genetec™ Intrusion Protocol 5.0.0

Genetec™ Intrusion Protocol Extension Guide 5.0.0

Applies to
Genetec™ Intrusion Protocol 5.0.0
Last updated
Content type
Guides > Plugin and extension guides
Genetec™ Intrusion Protocol

You can integrate Genetec™ Intrusion Protocol into Security Center using the Genetec™ Intrusion Protocol extension by following a sequence of steps.

The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn what you can do using the extension.
2 Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.
3 Learn about the different components and how they connect together.
4 Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.
Prepare Security Center
5 (Optional) In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.
NOTE: An intrusion device must be enrolled before it can be added to a map.
6 Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click About > Certificates, and confirm that Genetec™ Intrusion Protocol is in the list.
Deploy the extension
7 On a Security Center server, download the extension and install it.
8 Grant users the privileges that they need to use the extension.
  • Grant users the appropriate "intrusion" privileges. Tip: You can search the privileges by keywords.
  • Security Desk operators do not need special privileges to use this extension.
9 If not yet done, create the Intrusion Manager role for managing the Genetec™ Intrusion Protocol extension.
10 (Optional) Change the extension configuration to suit your particular needs.
Deploy and configure your hub and Genetec™ Intrusion Bridge
11 Create your Genetec™ Intrusion Bridge.
Enroll and configure your intrusion detection units
12 Add intrusion devices as intrusion detection units in Security Center.
13 Configure your intrusion panels using the Genetec™ Intrusion Protocol.
Manage your cardholders
14 Import users from intrusion detection units to Security Center.
15 Push Security Center cardholders to the Genetec™ Intrusion Bridge.
16 Push Security Center cardholders from the Genetec™ Intrusion Bridge to the intrusion detection unit.