Configuring the imported intrusion detection areas in Security Center - Australia and New Zealand only

Synergis™ IX Quick Start Guide

Product
Synergis IX
Content type
Guides > Deployment guides
Language
English
Last updated
2023-11-13

Use the Synergis™ IX intrusion detection area mapping task to map the imported intrusion detection areas to Security Center areas, and configure their arming and disarming schedules and access rules.

What you should know

Areas monitored by Synergis IX are imported into Security Center as intrusion detection areas. Use the Synergis™ IX intrusion detection area mapping task to configure the imported intrusion detection areas in Security Center. You must ensure the following:
  • Each intrusion detection area is mapped to a different secured area.
  • The secured area assigned to the intrusion detection area has at least one perimeter door.
  • The perimeter door of the secured area has at least one reader.
  • The reader assigned to the perimeter door is on the same Synergis IX unit as the one monitoring the intrusion detection area.
  • The intrusion detection area has schedules assigned to arming and disarming.
  • The intrusion detection area has access rules applied to arming and disarming.
Overview of the Synergis IX intrusion detection area mapping task.
The top section of the task workspace is the mapping report. Each row in the report describes an intrusion detection area with the following information:
  • Name of the Synergis™ Cloud Link unit.
  • Name of the Synergis IX unit.
  • Name of the intrusion detection area.
  • Name of the secured area mapped to the intrusion detection area.
  • Mapping status. Either a mapping error or a blank field when there is no mapping error.

Procedure

  1. (Optional) From the Config Tool homepage, open the Area view task.
    This is for your convenience. You will frequently need to access the area view throughout this process.
  2. From the Config Tool homepage, open the Synergis™ IX intrusion detection area mapping task, hereafter referred to as the Mapping task, and click Search.
    The mapping errors () found in the system are displayed in the mapping report. Correct mappings are hidden by default.
  3. In the Advanced search panel, click Display options > Display correct mappings > Search.
    NOTE: The absence of mapping errors does not mean that your intrusion detection areas are fully configured. We therefore recommend that you display the correct mappings until you have gone through the complete list of intrusion detection areas at least once.
  4. In the mapping report, click the first row.
  5. If the secured area is not defined, click the Secured area drop-down, select the corresponding area, and click Apply.
    NOTE: A given secured area () can only be assigned to one intrusion detection area. If no corresponding secured area exists, create one from the Area view task.
    The following happens (visible from the Area view task):
    Area view task - Intrusion detection area configuration tabs.
    • Two new configuration tabs, Synergis™ IX and Access rules, are added to the intrusion detection area. These new settings are also found in the Mapping task.
    • The system automatically moves the intrusion detection area under the selected area in the area view.
    • If the assigned area has no door, the system automatically creates a virtual door () named New door under that area.
  6. Under the Doors list, select the New door created in the previous step and click Jump to () .
    Mapping task - Jump to the New door configuration page.
    You are brought to the Identity page of the New door in the Area view task.
  7. In the Area view task, rename the New door to something easily identifiable.
    Do one of the following:
    • If the New door does not correspond to any physical door, rename it to Virtual door followed by the name of the Synergis IX controller.
      NOTE: All intrusion detection areas monitored by the same Synergis IX controller can use the same virtual door for synchronization. If a virtual door already exists for the same controller, do the following:
      1. From the Area view task, delete the newly created virtual door.
      2. Switch back to the Mapping task.

        The task again offers to create a New door for synchronization purposes.

      3. Under the Doors list, click Add an item ().
      4. In the Search window that opens, select the existing virtual door.
      5. Click Select > Apply.
    • If the New door corresponds to a physical door, give it a name that indicates the area to which it belongs. For example: Area-1 door.
  8. If the New door is a real door, change its icon.
    1. Click the down arrow beside the virtual door icon and click Reset.
      The virtual door icon () changes to the regular door icon ().
    2. Click Apply
  9. Switch back to the Mapping task.
  10. Click the Reader on door side In drop-down, select a reader, and click Apply.
    The selected reader must be on the same Synergis IX unit as the intrusion detection area.
    The mapping error is cleared for this intrusion detection area. If you chose not to show correct mappings, the row is removed from the mapping report.
  11. (Optional) Under the Intrusion detection area - Schedules section, configure the arming and disarming schedules.
    Mapping task - Intrusion detection area - Schedules.
    1. Click Select schedule for arm and disarm () and select the previously created sample schedule.
    2. Click Apply.
  12. Under the Intrusion detection area - Access rules section, configure who can arm and disarm during the controlled access periods.
    Mapping task - Intrusion detection area - Access rules.
    1. Click Add an item () and select the previously created sample access rule.
    2. Click Apply.
  13. Repeat the same process for all intrusion detection areas.