Configuring intrusion detection area mapping for Security Center 5.12 and later - Australia and New Zealand only

Synergis™ IX Deployment Guide

Product
Synergis IX
Content type
Guides > Deployment guides
ft:locale
en-US
Last updated
2025-03-05

If you’re using Security Center 5.12 or later, use the Synergis™ IX intrusion detection area mapping task to configure the mapping of imported intrusion detection areas to Security Center areas.

Before you begin

If you’re using Security Center 5.11 or earlier, see Configuring intrusion detection area mapping for Security Center 5.11 and earlier.

What you should know

The Synergis™ IX intrusion detection area mapping task is an administration task that detects missing or incorrect mappings to Security Center areas. Using this task, you can correct all faulty settings from a single page.
Overview of the Synergis IX intrusion detection area mapping task.
The top section of the task workspace is the mapping report. Each row in the report describes an intrusion detection area with the following information:
  • Name of the Synergis™ Cloud Link unit.
  • Name of the Synergis IX unit.
  • Name of the intrusion detection area.
  • Name of the secured area mapped to the intrusion detection area.
  • Mapping status. Either a mapping error or a blank field when there is no mapping error.

Procedure

  1. (Optional) From the Config Tool homepage, open the Area view task.
    This is for your convenience. You’ll frequently need to access the Area view throughout this process.
  2. From the Config Tool homepage, open the Synergis™ IX intrusion detection area mapping task, hereafter referred to as the Mapping task, and click Search.
    The mapping errors () found in the system are displayed in the mapping report. Correct mappings are hidden by default.
  3. Set the search filters to increase or reduce the number of elements displayed in the report.
    Display options
    Expand this filter to select what you want to include in the report:
    Include correct mappings
    Correct mappings are excluded by default from the report. Select this option to include the correct mappings.
    NOTE: The absence of mapping errors does not mean that your intrusion detection areas are fully configured. We therefore recommend that you display the correct mappings until you’ve gone through the complete list of intrusion detection areas at least once.

    For a checklist of what needs to be configured for each intrusion detection area, see Configuring the imported intrusion detection areas in Security Center.

    Include system intrusion detection areas
    An intrusion detection area named System Area is created by default for each Synergis™ IX controller. The System Area is used to monitor trouble inputs, which are automatically assigned to this area.
    NOTE: System areas do not need to be mapped to secured areas, which is why they are excluded by default from the mapping report. However, we recommend grouping all system areas under a single Security Center area for ease of viewing. Select this option to show system areas in the mapping report.
    Entities
    Expand this filter to select which entities or entity types you want to include in the mapping report.
  4. In the mapping report, click the first row.
  5. If the secured area is not defined, click the Secured area drop-down, select the corresponding area, and click Apply.
    NOTE: A given secured area () can only be assigned to one intrusion detection area. If no corresponding secured area exists, create one from the Area view task.
    The following happens (visible from the Area view task):
    Area view task - Intrusion detection area configuration tabs.
    • Two new configuration tabs, Synergis™ IX and Access rules, are added to the intrusion detection area. These new settings are also found in the Mapping task.
    • The system automatically moves the intrusion detection area under the selected area in the Area view.
    • If the assigned area has no door, the system automatically creates a virtual door () named after the Synergis IX unit under that area.
  6. If a secured area is assigned but has no perimeter door, do the following:
    1. Click one of the Reader on door side drop-down and select a reader.
      The selected reader must be on the same Synergis IX unit as the intrusion detection area.
    2. Click Apply.
    A virtual door () named after the Synergis IX unit is created under the assigned area. Change its configuration as necessary.
  7. If the secured area is marked by a light bulb icon (), do the following:
    The light bulb marker is a reminder that the intrusion detection area is not placed under the secured area in the entity hierarchy. It is not an error, but for ease of viewing, we recommended moving the intrusion detection area () under the secured area () in the area view.
  8. If the door of the secured area has no reader, do the following:
    1. Click one of the Reader on door side drop-down and select a reader.
      NOTE: The selected reader must be on the same Synergis IX unit as the intrusion detection area.
    2. Click Apply.
  9. If the reader of the secured area door is not on the same Synergis IX unit as the intrusion detection area, do one of the following and click Apply.
    • If the wrong secured area is assigned to the intrusion detection area, correct the assignment.
    • If the wrong door is assigned to the secured area, delete it and add the correct door.
    • If the wrong reader is assigned to the door, click the Reader on door side drop-down and select the correct reader.
  10. (Optional) Under the Intrusion detection area - Schedules section, configure the arming and disarming schedules.
    There are three schedules that you can configure:
    Arm and disarm
    Schedule that defines the periods when the intrusion detection area is automatically armed and disarmed. It must be used with the following options that are configured in the Synergis™ IX Portal under Programming > Areas > Configuration.
    Disarm area when schedule starts
    When enabled, the area automatically disarms when the selected schedule starts.
    Arm area when schedule ends
    When enabled, the area automatically arms when the selected schedule ends.
    Normal arm
    Normal arm schedule. Period 2 of the selected schedule defines the period when the area can be armed. If the area is armed before the start of Period 2, an Early to Arm event is generated. If the area is still disarmed when Period 2 ends, the system generates a Late to Arm event. No event is generated if the area is armed while Period 2 of the schedule is valid.
    Normal disarm
    Normal disarm schedule. Period 1 of the selected schedule defines the time period when the area can be disarmed. If the area is disarmed before the start of Period 1, an Early to Disarm event is generated. If the area is still armed when Period 1 ends, the system generates a Late to Disarm event. No event is generated if the area is disarmed while Period 1 of the schedule is valid.
    For more information on Synergis IX schedules, see the Using Synergis™ IX - Programming Reference Manual .
  11. Click Apply.
  12. Under the Intrusion detection area - Access rules section, configure who can arm and disarm during the controlled access periods.
    1. Select how access rules are applied:
      Arming and disarming
      Use the same set of access rules for arming and disarming.
      Either arming or disarming
      Use different sets of access rules for arming and disarming.
    2. Under the Access rules section, click Add an item (), select access rules (and cardholders), and then click OK.
      If you assign cardholders or cardholder groups directly to the area, the cardholders can arm or disarm at all times.
    3. If you chose to use different sets of access rules for arming and disarming, then configure the second set of access rules.
  13. Click Apply.
    There’s no more mapping error. If you chose not to include correct mappings, the row is removed from the mapping report.
  14. Repeat the same process for all intrusion detection areas.