You can deploy Synergis™ IX to manage both access control points and intrusion points in Security Center by following a sequence of steps.
The following table lists the steps required for a Synergis IX deployment, and how to
verify that the deployment was successful. It assumes that you've already installed
Security Center.
Step | Task | Where to find more information |
---|---|---|
Understand prerequisites and key issues before deploying | ||
1 | Learn about Synergis IX and the supported hardware. | |
2 | Ensure that your system software components are compatible with each other. | |
3 | Ensure that the versions of software modules you’re using support the
features you need. NOTE: Only the latest software versions support all the
features.
|
|
Prepare Security Center for Synergis IX deployment | ||
4 | Verify that your Security Center license has the required option and
certificate for deploying Synergis IX. Go to the Config Tool homepage, click , and confirm that Synergis IX is supported. |
|
5 | Create a model of the facilities monitored and controlled by Synergis IX
units by Synergis IX units. You can do the following:
|
|
Installing the Synergis IX web enabled DIN rail controllers | ||
6 | Install the Synergis IX hardware: controllers, expander modules,
keypads, readers, and so on. Be sure to collect the following information:
|
|
Configure the Synergis IX controllers through their respective Synergis IX Portal | ||
7 | Configure the network settings for your Synergis IX
controllers. NOTE: Deploy Synergis IX units on an isolated network behind
the Synergis™ Cloud Link.
|
|
8 | Configure the expander modules and readers connected to your Synergis IX controllers. | |
9 | Configure the intrusion detection areas and inputs monitored by your Synergis IX controllers. | |
Configure the Synergis Cloud Link appliance through the Synergis™ Appliance Portal | ||
10 | Prepare and configure the Synergis™ Cloud Link appliance, also called Synergis™ appliance or Synergis™ unit. | |
11 | Connect your Synergis IX controllers to the Synergis Cloud Link unit. | |
Configure Security Center for access control and intrusion detection | ||
12 | Create the cardholders, credentials, and, optionally, badge templates. NOTE: Cardholder
groups, cardholders, and credentials must be created in Security Center.
You can create them manually, or import them from a CSV file or from an
Active Directory.
|
|
13 | Create the schedules and the access rules for access control and intrusion detection. | |
14 | Configure the Access Manager role created by
default. NOTE: If you use keypads that can display cardholder names and
you want the names to be displayed, enable the Include
identifiable personal data in synchronization
option.
|
|
15 | Create the Intrusion Manager role. NOTE: Unlike
Access Manager roles, Intrusion Manager roles are not created by default.
Only one instance of the Intrusion Manager role is allowed per
system.
|
|
16 | Enroll the Synergis™ unit in Security Center. NOTE:
|
|
17 | Configure the Synergis IX settings for cardholders and cardholder
groups. NOTE: After the Synergis IX controllers are connected to the
Synergis Cloud Link appliance and added in Security Center, the rights of
the default Master and Installer users set in Synergis IX are removed to
prevent users from being able to modify or delete cardholders through the
intrusion keypad. These operations should only be done through Config
Tool.
Best Practice: Create a new Installer user with
limited access to the intrusion keypad by creating a cardholder in
Security Center and assigning it to a cardholder group with the Synergis
IX Menu option set to
Installer.
|
|
18 | Configure the secured areas. IMPORTANT: Areas monitored by Synergis IX
controllers are imported as intrusion detection areas (
|
|
19 | Create the doors to the areas that you want to monitor and control, and configure the Synergis IX settings for these doors. | |
20 | Configure the Synergis IX settings for intrusion detection. NOTE: Each
imported intrusion detection area must be mapped to a different secured
area. Any secured area that were overlooked in the previous steps are
created here.
|
|
21 | Test your system using the various investigation and diagnostic tools available in Security Center and the Synergis™ IX Portal. |