You can integrate Genetec™ Intrusion Protocol into Security Center using the Genetec™ Intrusion Protocol extension by following a sequence of steps.
The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
|Step||Task||Where to find more information|
|Understand prerequisites and key issues before deploying|
|1||Learn what you can do using the extension.|
|2||Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.|
|3||Learn about the different components and how they connect together.|
|4||Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.|
|Prepare Security Center|
|5||(Optional) In Security Center,
create a georeferenced map.
Maps can enhance your situation awareness as you represent and control your
security devices directly on maps.
NOTE: An intrusion device must be enrolled before it can be added to a map.
|6||Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click , and confirm that Genetec™ Intrusion Protocol is in the list.||
|Deploy the extension|
|7||On a Security Center server, download the extension and install it.|
|8||Grant users the privileges that they need to use the extension.
|9||If not yet done, create the Intrusion Manager role for managing the Genetec™ Intrusion Protocol extension.|
|10||(Optional) Change the extension configuration to suit your particular needs.|
|Deploy and configure your hub and Genetec™ Intrusion Bridge|
|11||Create your Genetec™ Intrusion Bridge.|
|Enroll and configure your intrusion detection units|
|12||Add intrusion devices as intrusion detection units in Security Center.||
|13||Configure your intrusion panels using the Genetec™ Intrusion Protocol.|
|Manage your cardholders|
|14||Import users from intrusion detection units to Security Center.|
|15||Push Security Center cardholders to the Genetec™ Intrusion Bridge.|
|16||Push Security Center cardholders from the Genetec™ Intrusion Bridge to the intrusion detection unit.|