Adding DEA perimeter intrusion detection systems as tracking systems to Security Center - Restricted Security Area Surveillance 4.2

Restricted Security Area Surveillance Plugin Guide 4.2

Applies to
Restricted Security Area Surveillance 4.2
Last updated
Content type
Guides > Plugin and extension guides
English (United States)
Restricted Security Area Surveillance

Before you can monitor the restricted areas secured by your tracking system in Security Center, you must add the DEA system as a tracking system entity in Config Tool.

Before you begin

  • Confirm that the tracking system and its perimeter devices are configured and functioning properly.
  • Confirm that the plugin role is configured and communicating with the tracking system.
  • Ensure that the DEA server and the server hosting the plugin role are configured for the same time zone.
  • Ensure that the DEA Map Panel is configured in TCP mode.
  • Create a georeferenced map in Security Center.

    For more information, see the Security Center Administrator Guide.

  • Ensure that enough perimeter system licenses are available in Restricted Security Area Surveillance role > Properties > Licenses.

What you should know

The system is not notified of the connection status between the RSA Surveillance plugin and the DEA device. This means that if the communication configuration is incorrect or the connection is lost, the DEA tracking system cannot trigger the Tracking system offline and Tracking system online events, and does not turn red in the area view.


  1. From the Config Tool home page, open the Area view task.
  2. Click Add an entity (), and then select Tracking system.
    The Add tracking system wizard opens.
  3. On the Tracking system information page, enter the following information:
    Select DEA.
    Enter a unique name for this tracking system.
  4. Click Next page ().
  5. On the Communication page, enter the following information:
    Listening port
    The TCP port used to receive data from DEA.
    The user used by DEA to authenticate the RSA Surveillance plugin.
    The password used by DEA to authenticate the RSA Surveillance plugin.
  6. Click Next page ().
  7. On the Specific configuration page, click Add device () and specify the Name, IP address, Port, and Password to connect to the DEA service.
    NOTE: You must add at least one device. The Name is case-sensitive and must match exactly the name configured on the DEA server.
  8. Click Next page ().
  9. On the RSA configuration page, enter the following information:
    Turn on the custom events you want to monitor for this tracking system.
    NOTE: You can modify this later on the Properties page of the tracking system.
    Fence configuration
    Choose the color for the perimeter when its state changes. The available options vary by system.
    Change color on intrusion
    Turn on this option if you want the perimeter to change color when an intrusion is detected, and then choose the color for the perimeter.
  10. Click Finish.
    The tracking system and its devices are listed in the Area view entity tree.

After you finish

Create RSA zones.