You can integrate an alarm receiver and related intrusion panels in Security Center using the Receiver intrusion detection extension by following a sequence of steps.
The following table lists the tasks required to integrate alarm receivers in Security Center, and then how to verify that the integration was successful.
Step | Task | Where to find more information |
---|---|---|
Understand prerequisites and key issues before deploying | ||
1 | Before installing the extension, read the release notes to learn about new features, and to understand the requirements and known issues. | |
2 | Learn which systems and devices can be imported into Security Center, and how the different components connect together. | |
3 | Learn which features are included with the extension. | |
Prepare Security Center | ||
4 | Ensure that the expansion server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center. | |
5 | If you have video surveillance cameras, make sure that the Omnicast™ features are enabled, and that all cameras are added to Security Center and are functioning as required. | |
6 | (Optional) In Security Center, create a map and add geo-references to it. | |
7 | (Optional) Add additional alarms that you need for responding to alarms. |
|
8 | Grant user privileges. | |
9 | Verify that the Security Center license has a valid certificate for the extension, by going to the Config Tool home page, clicking About > Certificates, and confirming that Receiver is in the list. |
|
Deploy the alarm receivers and intrusion panels | ||
10 | Make sure the alarm receivers are compatible with the the Receiver extension version 3.1. | |
11 | Make sure that the alarm receivers and intrusion panels are deployed,
connected, and operating as expected. Bosch receivers must be configured to communicate using the Contact ID protocol. |
Refer to the hardware manufacturer's documentation. |
Install and configure the extension | ||
12 | In Config Tool, create the Intrusion Manager role. | |
13 | On the Security Center expansion server, download the intrusion detection extension and install it. | |
Add and configure the devices | ||
14 | Add the alarm receivers as intrusion detection units in the Intrusion Manager role. | |
15 | Set the time on the alarm receiver and intrusion panels to match the time of the Security Center expansion server where the extension is installed. |
|
16 | Set the geographical location of the Receiver intrusion detection
unit. NOTE: Set the time zone so that events are shown in the local time
of the entity.
Ignore the latitude and longitude settings, which only apply to video units and LPR units. |
|
17 | Configure the heartbeat timeout and choose to turn on or off heartbeat notifications. | |
18 | Add the intrusion panels, areas, and inputs that you want to monitor to the alarm receivers (intrusion detection units). | |
19 | Perform additional configurations. |
|
Confirm that the integration works as expected | ||
20 | In the Monitoring task of Security Desk, add the entities to the Event monitoring list and enable alarm monitoring. | |
21 | Confirm that you see alarms as they occur in the Monitoring task of Security Desk. |
|
22 | Confirm that you see events and alarms for receivers and related entities in the supported Security Center reports. | In Security
Desk, generate
the following supported reports:
|
Set up your operator workstations | ||
23 | If an operator needs to generate the Receiver
activities report, install the Receiver extension on the client
workstation. NOTE: When the Receiver extension is installed
on a Security Center server but
not on your Security Center
client workstation, the client receives events and alarms from receivers,
which you can view in the Monitoring task and the
Event window, but the Receiver
activities tasks are unavailable.
|
|
24 | In the Monitoring task of Security Desk, add receiver's entities to the Event monitoring list and enable alarm monitoring. | |
25 | Confirm that your workstation works as expected. If it does, you have successfully completed the integration. |
|