To prepare your Senstar perimeter system for integration with Security Center, you must configure specific settings.
Before you begin
- Make sure your tracking devices and systems are operating as expected.
- Make sure your tracking devices and software are compatible with the plugin.
This task describes in a general way how Senstar devices needs to be configured to communicate with the plugin. For specific details about the configuration of your devices and software, refer to your manufacturer's documentation.
What you should know
- Deploy and configure the Senstar devices, as described in the Senstar documentation.
- Make sure that the IP address of the RSA Surveillance plugin server is white listed in the Senstar software.
To use TLS 1.2 or TLS 1.3 communication, copy the
MyCertificate.pem file into C:\Program Files
(x86)\Security Center Plugins\RSA
Plugin\TrackingSystem\Senstar\Certificate on the RSA
By default, the certificate is located in C:\Senstar\Network Manager\Certificates.NOTE: There must only be one file in C:\Program Files (x86)\Security Center Plugins\RSA Plugin\TrackingSystem\Senstar\Certificate.
If your organization's network security policies require that the IP devices,
routers, and switches in your network block unused ports, make sure to open the
TCP port that the RSA Surveillance plugin and
CIAS use to communicate.
NOTE: Senstar NMS uses ports 850 to 859, depending of the number of devices you have.
Add Senstar systems as tracking systems to Security Center.