Configuring the imported intrusion detection areas in Security Center - Australia and New Zealand only

Synergis™ IX Deployment Guide

Product
Synergis IX
Content type
Guides > Deployment guides
ft:locale
en-US
Last updated
2025-03-05

After importing the areas monitored by Synergis™ IX into Security Center, you must map them to Security Center areas and configure their arming and disarming schedules and access rules.

Before you begin

What you should know

Areas monitored by Synergis IX are imported into Security Center as intrusion detection areas.
IMPORTANT: For the intrusion management system to work with Synergis IX in Security Center, the following criteria must be met:
  • Each intrusion detection area is mapped to a different secured area.
  • The secured area assigned to the intrusion detection area has at least one perimeter door.
  • The perimeter door of the secured area has at least one reader.
  • The reader assigned to the perimeter door is on the same Synergis IX unit as the one monitoring the intrusion detection area.
  • The intrusion detection area has schedules assigned to arming and disarming.
  • The intrusion detection area has access rules applied to arming and disarming.

Procedure

  1. Do one of the following:
  2. Open the Area view task.
  3. For each intrusion detection area, do the following:
    1. Click the Properties tab.
    2. Configure the following as necessary:
      Virtual alarm configuration
      By configuring a virtual alarm, you can trigger intrusion alarms on the intrusion detection area from Security Center, even when the hardware does not support this feature.

      For this to work, you must physically connect an output relay to an input pin on the intrusion panel, and configure them as properties of the intrusion detection area.

      The input so wired is called a virtual input ().

      Devices
      Name, description, and associated cameras of the inputs that define the intrusion detection area. Cameras can be added or removed from the inputs by clicking Edit the item ().
    3. Click Apply.

After you finish

Test your system using the various investigation and diagnostic tools available in Security Center.