Configuring intrusion detection area mapping for Security Center 5.11 and earlier - Australia and New Zealand only

Synergis™ IX Deployment Guide

Product
Synergis IX
Content type
Guides > Deployment guides
ft:locale
en-US
Last updated
2025-03-05

For each intrusion detection area imported from Synergis™ IX, you must assign a Security Center area. The area you assign must have at least one reader that is on the Synergis IX unit that monitors the intrusion detection area.

Before you begin

If you are using Security Center 5.12 or later, see Configuring intrusion detection area mapping for Security Center 5.12 and later.

What you should know

For a complete checklist of what needs to be configured for each intrusion detection area, see Configuring the imported intrusion detection areas in Security Center.

Procedure

  1. From the Config Tool homepage, open the Area view task and select the intrusion detection area () you want to configure.
  2. Click the Properties tab.
  3. Under the General section, click the Secured area drop-down, select an area, and click Apply.
    NOTE: A given secured area () can only be assigned to one intrusion detection area. If no corresponding secured area exists, create one from the Area view task.
    Two new tabs are added: Synergis™ IX and Access rules.
  4. In the area view, drag and drop the intrusion detection area under the secured area.
    NOTE: This step is optional, but recommended to get a hierarchical view of the intrusion detection areas and the secured areas to which they are assigned. Placing an intrusion detection area under a secured area is not the same as assigning the secured area to the intrusion detection area. The latter operation must be performed as described in the previous step.
  5. (Optional) Under the Intrusion detection area - Schedules section, configure the arming and disarming schedules.
    There are three schedules that you can configure:
    Arm and disarm
    Schedule that defines the periods when the intrusion detection area is automatically armed and disarmed. It must be used with the following options that are configured in the Synergis™ IX Portal under Programming > Areas > Configuration.
    Disarm area when schedule starts
    When enabled, the area automatically disarms when the selected schedule starts.
    Arm area when schedule ends
    When enabled, the area automatically arms when the selected schedule ends.
    Normal arm
    Normal arm schedule. Period 2 of the selected schedule defines the period when the area can be armed. If the area is armed before the start of Period 2, an Early to Arm event is generated. If the area is still disarmed when Period 2 ends, the system generates a Late to Arm event. No event is generated if the area is armed while Period 2 of the schedule is valid.
    Normal disarm
    Normal disarm schedule. Period 1 of the selected schedule defines the time period when the area can be disarmed. If the area is disarmed before the start of Period 1, an Early to Disarm event is generated. If the area is still armed when Period 1 ends, the system generates a Late to Disarm event. No event is generated if the area is disarmed while Period 1 of the schedule is valid.
    For more information on Synergis IX schedules, see the Using Synergis™ IX - Programming Reference Manual .
  6. Click Apply.
  7. Click the Access rules tab and configure who can arm and disarm during the controlled access periods.
    1. Select how access rules are applied:
      Arming and disarming
      Use the same set of access rules for arming and disarming.
      Either arming or disarming
      Use different sets of access rules for arming and disarming.
    2. Under the Access rules section, click Add an item (), select access rules (and cardholders), and then click OK.
      If you assign cardholders or cardholder groups directly to the area, the cardholders can arm or disarm at all times.
    3. If you chose to use different sets of access rules for arming and disarming, then configure the second set of access rules.
    IMPORTANT: To synchronize the intrusion access rules to the Synergis IX, the assigned secured area must have perimeter doors controlled by Synergis IX controllers. If the area does not have a door, you can create a virtual door to facilitate the synchronization of the intrusion access rules.
  8. Click Apply.
  9. Repeat the same process for all intrusion detection areas.