You can integrate Genetec™ Intrusion Protocol into Security Center using the Genetec™ Intrusion Protocol extension by following a sequence of steps.
The
following table lists the tasks required for the integration with Security Center, and how to verify that the integration was
successful.
Step | Task | Where to find more information |
---|---|---|
Understand prerequisites and key issues before deploying | ||
1 | Learn what you can do using the extension. | |
2 | Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations. | |
3 | Learn about the different components and how they connect together. | |
4 | Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center. | |
Prepare Security Center | ||
5 | (Optional) In Security Center,
create a georeferenced map.
Maps can enhance your situation awareness as you represent and control your
security devices directly on maps. NOTE: An intrusion device must be enrolled
before it can be added to a map.
|
|
6 | Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click , and confirm that Genetec™ Intrusion Protocol is in the list. |
|
Deploy the extension | ||
7 | On a Security Center server, download the extension and install it. | |
8 | Grant users the privileges that they need to use the extension.
|
|
9 | If not yet done, create the Intrusion Manager role for managing the Genetec™ Intrusion Protocol extension. | |
10 | (Optional) Change the extension configuration to suit your particular needs. | |
Deploy and configure your hub and Genetec™ Intrusion Bridge | ||
11 | Create your Genetec™ Intrusion Bridge. | |
Enroll and configure your intrusion detection units | ||
12 | Add intrusion devices as intrusion detection units in Security Center. |
|
13 | Configure your intrusion panels using the Genetec™ Intrusion Protocol. | |
Manage your cardholders | ||
14 | Import users from intrusion detection units to Security Center. | |
15 | Push Security Center cardholders to the Genetec™ Intrusion Bridge. | |
16 | Push Security Center cardholders from the Genetec™ Intrusion Bridge to the intrusion detection unit. |