Deployment overview for Synergis™ IX - Australia and New Zealand only

Synergis™ IX Deployment Guide 5.8

Applies to
Australia and New Zealand only
Last updated
Content type
Guides > Deployment guides
English (United States)
Synergis™ IX

You can deploy Synergis™ IX to manage both access control points and intrusion points in Security Center by following a sequence of steps.

The following table lists the tasks required for the deployment of Synergis™ IX after you have installed Security Center, and how to verify that the deployment is successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn about Synergis™ IX.
2 Before deploying Synergis™ IX in your system, read the release notes to learn about the new features, known issues, and limitations.
3 Ensure that your system software components are compatible with each other.
Prepare Security Center for Synergis™ IX deployment
4 Verify that your Security Center license has the required option and certificate for deploying Synergis™ IX.

Go to the Config Tool home page, click About > License > Synergis™, and confirm that Synergis™ IX is supported.

5 Create a model of the facilities protected by Security Center. You can do the following:
  • Create partitions to divide your system into smaller, manageable parts.
  • Create areas to represent your sites and buildings.
6 Install, or stage the installation of the Synergis™ IX hardware: controllers, expander modules, keypads, readers, and so on. Be sure to collect the following information:
  • Model and IP address of each controller
  • Model of the downstream modules connected to each controller
  • Login credentials (username and password) for each controller
  • Which inputs are linked to your intrusion detection areas and what outputs do they trigger when they are activated?
  • Which inputs are connected to the door sensors, REX, and manual stations?
  • Which outputs are connected to the door locks, buzzers, or push buttons?
  • Which doors are Card-in/Card-out and which are Card-in/REX-out?
Configure the Synergis™ IX controller through Synergis™ IX Portal
7 Configure the network settings for your Synergis™ IX controllers.
8 Configure the modules and readers connected to your Synergis™ IX controllers.
9 Configure the areas and inputs monitored by your Synergis™ IX controllers.
Configure the Synergis™ Cloud Link appliance through Synergis™ Appliance Portal
10 Prepare and configure the Synergis™ Cloud Link appliance, also called Synergis™ appliance or Synergis™ unit.
11 Connect your Synergis™ IX controllers to the Synergis™ Cloud Link appliance.
Configure Security Center for access control and intrusion detection
12 Create the cardholders, credentials, and, optionally, badge templates.
NOTE: Cardholder groups, cardholders, and credentials must be created in Security Center. You can create them manually, or import them from a CSV file or from an Active Directory.
13 Create the schedules and the access rules for access control and intrusion detection.
14 Configure the Access Manager role created by default.
NOTE: If you use keypads that can display cardholder names and you want the names to be displayed, enable the Include identifiable personal data in synchronization option.
15 Create the Intrusion Manager role.
NOTE: Unlike Access Manager roles, Intrusion Manager roles are not created by default.
16 Enroll the Synergis™ unit in Security Center.
17 Configure the secured areas.
NOTE: Not all Security Center access control features are supported with the Synergis™ IX integration.
18 Configure the Synergis™ IX settings for cardholders and cardholder groups.
19 Create the doors to the areas that you want to monitor and control, and configure the Synergis™ IX settings for these doors.
20 Configure the Synergis™ IX settings for intrusion detection.
NOTE: Intrusion detection areas are imported from controllers through the Synergis™ Cloud Link appliance.
21 Test your system using the various investigation and diagnostic tools available in Security Center and Synergis™ IX Portal.