You can configure Security Center to trigger
alarms on intrusion panels, regardless of their model. This is done by physically connecting the
input pin associated to an alarm to an output relay on the panel, and configuring the pair as a
virtual alarm in Config Tool.
Before you begin
Do the following preparation on the intrusion panel:
- Associate an input pin to an alarm on the intrusion panel. You might need a proprietary
software.
- Physically connect that input pin to an output relay on the same panel.
What you should know
We use the
Trigger intrusion alarm action to activate alarms on intrusion
detection areas. But not all intrusion panel models support the alarm activation from an
external source. For panels that do not support this feature, a workaround exists. The
solution is to physically connect an output to an alarm input on the intrusion panel. We call
this configuration, a
virtual alarm, and the input that you physically connected to the
output, a
virtual input. When the virtual alarm is configured, Security Center sends a signal to the output that is
physically connected to the alarm input when the
Trigger intrusion alarm action is
used, thus activating the intrusion alarm.
Procedure
-
From the Config Tool homepage, open the Area
view task.
-
Select the intrusion detection area () to configure,
and click the Properties tab.
-
From the Output list, select the output relay that is
physically connected to the input pin.
-
From the Input list, select the input pin that is
physically connected to the output relay.
-
Click Apply.
The input icon changes to
, meaning that it is now a virtual input.
Results
Now, you can configure event-to-actions to trigger the action
Trigger intrusion
alarm on this intrusion detection area. The source entity of the event used to trigger
the intrusion alarm will be shown as the alarm source on a map if you monitor this intrusion
detection area on a map, and as the initiator of the
intrusion detection area alarm
activated event in the
Intrusion detection area activities
report.
Example
Suppose you create an event-to-action to trigger the
Trigger intrusion alarm
action on
Access denied (at a door) event, the door where access is being denied would
be shown as the alarm source in your
Monitoring task and on the map. If
on top of that, you configure a second event-to-action to trigger the same action on
Access
denied (to cardholder) event, the cardholder would also be shown as the alarm source
when the event occurs.