Integration overview for the Receiver intrusion detection extension - Receiver 3.0

Receiver Intrusion Detection Extension Guide 3.0

series
Receiver 3.0
revised_modified
2020-03-30

You can integrate an alarm receiver and related intrusion panels in Security Center using the Receiver intrusion detection extension by following a sequence of steps.

The following table lists the tasks required to integrate alarm receivers in Security Center, and then how to verify that the integration was successful.

Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Before installing the extension, read the release notes to learn about new features, and to understand the requirements and known issues.
2 Learn which systems and devices can be imported into Security Center, and how the different components connect together.
3 Learn which features are included with the extension.
Prepare Security Center
4 Ensure that the expansion server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.
5 If you have video surveillance cameras, make sure that the Omnicast™ features are enabled, and that all cameras are added to Security Center and are functioning as required.
6 (Optional) In Security Center, create a map and add geo-references to it.
7 (Optional) Add additional alarms that you need for responding to alarms.
8 Grant user privileges.
9 Verify that the Security Center license has a valid certificate for the extension, by going to the Config Tool home page, clicking About > Certificates, and confirming that Receiver is in the list.
  • The license number is included in the product-release email sent by Genetec Inc. This email also includes links to the extension download package and other license information.
  • If you need to acquire a license, see License options for a Receiver integration.
Deploy the alarm receivers and intrusion panels
10 Make sure the alarm receivers are compatible with the the Receiver extension version 3.0.
11 Make sure that the alarm receivers and intrusion panels are deployed, connected, and operating as expected.

Bosch receivers must be configured to communicate using the Contact ID protocol.

Refer to the hardware manufacturer's documentation.
Install and configure the extension
12 In Config Tool, create the Intrusion Manager role.
13 On the Security Center expansion server, download the intrusion detection extension and install it.
Add and configure the devices
14 Add the alarm receivers as intrusion detection units in the Intrusion Manager role.
15 Set the time on the alarm receiver and intrusion panels to match the time of the Security Center expansion server where the extension is installed.
16 Set the geographical location of the Receiver intrusion detection unit.
NOTE:

Set the time zone so that events are shown in the entity’s local time.

Ignore the latitude and longitude settings, which only apply to video units and LPR units.

17 Configure the heartbeat timeout and choose to turn on or off heartbeat notifications.
18 Add the intrusion panels, areas, and inputs that you want to monitor to the alarm receivers (intrusion detection units).
19 Perform optional configurations.
Confirm that the integration works as expected
20 In the Monitoring task of Security Desk, add the entities to the Event monitoring list and enable alarm monitoring.
21 Confirm that you see alarms as they occur in the Monitoring task of Security Desk.
  • Generate alarms in the field and confirm that the alarms display in the Event pane of the Monitoring task in Security Desk.
22 Confirm that you see events and alarms for receivers and related entities in the supported Security Center reports. In Security Desk, generate the following supported reports:
Set up your operator workstations
23 If an operator needs to generate the Receiver activities report, install the Receiver extension on the client workstation.
NOTE: When the Receiver extension is installed on a Security Center server but not on your Security Center client workstation, the client receives events and alarms from receivers, which you can view in the Monitoring task and the Event window, but the Receiver activities tasks are unavailable.
24 In the Monitoring task of Security Desk, add receiver's entities to the Event monitoring list and enable alarm monitoring.
25 Confirm that your workstation works as expected. If it does, you have successfully completed the integration.
  • Do steps 20 to 22.