Deployment overview for Synergis IX - Australia and New Zealand only

Synergis™ IX Deployment Guide

Product
Synergis IX
Content type
Guides > Deployment guides
ft:locale
en-US
Last updated
2025-03-05

You can deploy Synergis™ IX to manage both access control points and intrusion points in Security Center by following a sequence of steps.

The following table lists the steps required for a Synergis IX deployment, and how to verify that the deployment was successful. It assumes that you've already installed Security Center.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn about Synergis IX and the supported hardware.
2 Ensure that your system software components are compatible with each other.
3 Ensure that the versions of software modules you’re using support the features you need.
NOTE: Only the latest software versions support all the features.
Prepare Security Center for Synergis IX deployment
4 Verify that your Security Center license has the required option and certificate for deploying Synergis IX.

Go to the Config Tool homepage, click About > License > Synergis™, and confirm that Synergis IX is supported.

5 Create a model of the facilities monitored and controlled by Synergis IX units by Synergis IX units. You can do the following:
  • Create partitions to divide your system into smaller, manageable parts.
  • Create areas to represent your sites and buildings.
Installing the Synergis IX web enabled DIN rail controllers
6 Install the Synergis IX hardware: controllers, expander modules, keypads, readers, and so on. Be sure to collect the following information:
  • Model and IP address of each controller
  • Model of the downstream modules connected to each controller
  • Login credentials (username and password) for each controller
  • The inputs linked to your intrusion detection areas and the outputs they trigger when they are activated
  • The inputs connected to the door sensors, REX, and manual stations
  • The outputs connected to door locks, buzzers, and push buttons
  • The doors using Card-in/Card-out and the doors using Card-in/REX-out
Configure the Synergis IX controllers through their respective Synergis IX Portal
7 Configure the network settings for your Synergis IX controllers.
NOTE: Deploy Synergis IX units on an isolated network behind the Synergis™ Cloud Link.
8 Configure the expander modules and readers connected to your Synergis IX controllers.
9 Configure the intrusion detection areas and inputs monitored by your Synergis IX controllers.
Configure the Synergis Cloud Link appliance through the Synergis™ Appliance Portal
10 Prepare and configure the Synergis™ Cloud Link appliance, also called Synergis™ appliance or Synergis™ unit.
11 Connect your Synergis IX controllers to the Synergis Cloud Link unit.
Configure Security Center for access control and intrusion detection
12 Create the cardholders, credentials, and, optionally, badge templates.
NOTE: Cardholder groups, cardholders, and credentials must be created in Security Center. You can create them manually, or import them from a CSV file or from an Active Directory.
13 Create the schedules and the access rules for access control and intrusion detection.
14 Configure the Access Manager role created by default.
NOTE: If you use keypads that can display cardholder names and you want the names to be displayed, enable the Include identifiable personal data in synchronization option.
15 Create the Intrusion Manager role.
NOTE: Unlike Access Manager roles, Intrusion Manager roles are not created by default. Only one instance of the Intrusion Manager role is allowed per system.
16 Enroll the Synergis™ unit in Security Center.
NOTE:
  • The Synergis IX controllers managed by Synergis Cloud Link units are automatically added to the Intrusion Manager role as intrusion detection units.
  • Areas monitored by Synergis IX are imported as intrusion detection areas.
17 Configure the Synergis IX settings for cardholders and cardholder groups.
NOTE: After the Synergis IX controllers are connected to the Synergis Cloud Link appliance and added in Security Center, the rights of the default Master and Installer users set in Synergis IX are removed to prevent users from being able to modify or delete cardholders through the intrusion keypad. These operations should only be done through Config Tool.
Best Practice: Create a new Installer user with limited access to the intrusion keypad by creating a cardholder in Security Center and assigning it to a cardholder group with the Synergis IX Menu option set to Installer.
18 Configure the secured areas.
IMPORTANT: Areas monitored by Synergis IX controllers are imported as intrusion detection areas () in Security Center. Create a secured area for each imported intrusion detection area. The intrusion detection areas will be mapped to their respective secured areas in a subsequent step.
19 Create the doors to the areas that you want to monitor and control, and configure the Synergis IX settings for these doors.
20 Configure the Synergis IX settings for intrusion detection.
NOTE: Each imported intrusion detection area must be mapped to a different secured area. Any secured area that were overlooked in the previous steps are created here.
21 Test your system using the various investigation and diagnostic tools available in Security Center and the Synergis™ IX Portal.