Configuring a Senstar perimeter intrusion detection system for integration with Security Center - Restricted Security Area Surveillance 4.2

Restricted Security Area Surveillance Plugin Guide 4.2

Applies to
Restricted Security Area Surveillance 4.2
Last updated
Content type
Guides > Plugin and extension guides
English (United States)
Restricted Security Area Surveillance

To prepare your Senstar perimeter system for integration with Security Center, you must configure specific settings.

Before you begin

  • Make sure your tracking devices and systems are operating as expected.
  • Make sure your tracking devices and software are compatible with the plugin.

What you should know

This task describes in a general way how Senstar devices needs to be configured to communicate with the plugin. For specific details about the configuration of your devices and software, refer to your manufacturer's documentation.


  1. Deploy and configure the Senstar devices, as described in the Senstar documentation.
  2. Make sure that the IP address of the RSA Surveillance plugin server is white listed in the Senstar software.
  3. To use TLS 1.2 or TLS 1.3 communication, copy the MyCertificate.pem file into C:\Program Files (x86)\Security Center Plugins\RSA Plugin\TrackingSystem\Senstar\Certificate on the RSA server.
    By default, the certificate is located in C:\Senstar\Network Manager\Certificates.
    NOTE: There must only be one file in C:\Program Files (x86)\Security Center Plugins\RSA Plugin\TrackingSystem\Senstar\Certificate.
  4. If your organization's network security policies require that the IP devices, routers, and switches in your network block unused ports, make sure to open the TCP port that the RSA Surveillance plugin and CIAS use to communicate.
    NOTE: Senstar NMS uses ports 850 to 859, depending of the number of devices you have.