Add Security Control Partitions from Device

Add Security Control Partitions from Device

HikCentral Professional provides areas to manage the added resources in different groups. You can group the resources into different areas according to the locations of the resources. After adding security control devices to the platform in Physical View, you need to import the partitions configured on the devices to different areas as well as group the alarm inputs (zones) in the partitions into different areas for further operations.

  1. Click Logical View on the home page.
  2. Choose one of the following methods to enter the area's resource group page.
    • Select one area and click to enter the editing area page.

      Figure 1. Enter Area Editing Page
    • Select Group tab on the left to display all the resource groups of different areas.

      Figure 2. Enter Resource Group Page
  3. In the Security Control Partition field, click + or Add.
    Figure 3. Add Security Control Partition

    In the Partition list, all the security control devices with partitions which are not added to the platform will be displayed.

  4. Select the partitions that you want to add to the platform.
  5. Optional: Check Import Alarm Inputs if you want to add the alarm inputs (zones) in the selected partitions to this area.
    Note:

    After adding the alarm inputs to this area, you can manage them by different areas.

  6. Optional: If the area is configured with map(s), you can locate the partitions on the map by setting the border of the partition for detection.
    1. Check Add to Map.

      The region of the partition as well as the alarm inputs in the partition will be added to the map of the area on the right.

    2. Drag to draw the region according to the actual needs.
    3. Drag the icons of the alarm inputs to set the their locations on the map.
    4. Right click to finish.
      Figure 4. Draw Security Control Partition on Map
  7. Click Add.

    The partitions will be displayed in the Security Control Partition list.

    Figure 5. Security Control Partition List
  8. Optional: Set a defense schedule for this partition, which defines how and when to arm the alarm inputs in the security control partition.
  9. Optional: Perform one or more of the following operations after adding the security control partitions to the area.
    Option Description

    Edit Security Control Partition

    Click to edit the partition settings.

    You can edit the partition name, locations of the partition and alarm inputs on the map, and set the defense schedule for this partition, which defines how and when to arm the alarm inputs in the partition.

    Bypass Zone

    When some exception occurs in one zone, and other zones can work normally, you need to bypass the abnormal zone to turn off the protection of it. Otherwise, you cannot arm the security control partition which the zone belongs to. To bypass the zone, click to enter the partition details page, and click in the Operation column of the Alarm Input list to bypass the alarm input.

    When you want to recover the zone that is bypassed to make it work normally, click in the Operation column to recover it.

    Arm or Disarm Security Control Partition

    After arming the partitions, the platform can receive the triggered alarms in the partitions.

    There are three arming modes available.

    • Away Arming: This mode is usually used when people leave the detection area. Event or alarms will be activated when the zone is triggered or tampered. For delayed zone, the alarm will not be activated when the zone detects triggering event during entry/exit delay.

    • Stay Arming: This mode is usually used when people stay inside the detection area. During stay arming, all the perimeter burglary detections (such as perimeter detector, magnetic contacts, curtain detector in the balcony) will be turned on. Meanwhile, the detectors inside the detection area are bypassed (such as PIR detectors). People can move inside the area and not trigger an event or alarm.

    • Instant Arming: This mode is usually used when people leave the detection area. The zone will be immediately triggered when it detects event or alarm with no delay and notify the security personnel.

    In the Security Control Partition list, select the partitions and click these buttons to arm the partitions, or click Disarm to disarm them. After disarmed, when there are alarms triggered by the zones in the partitions, the platform will not receive any alarms.

    Clear Alarms

    click to clear the generated alarms in the security control partition.

    Delete Security Control Partition

    Click to delete the added security control partition.

Add Security Control Partitions from Device

HikCentral Professional provides areas to manage the added resources in different groups. You can group the resources into different areas according to the locations of the resources. After adding security control devices to the platform in Physical View, you need to import the partitions configured on the devices to different areas as well as group the alarm inputs (zones) in the partitions into different areas for further operations.

  1. Click Logical View on the home page.
  2. Choose one of the following methods to enter the area's resource group page.
    • Select one area and click to enter the editing area page.

      Figure 1. Enter Area Editing Page
    • Select Group tab on the left to display all the resource groups of different areas.

      Figure 2. Enter Resource Group Page
  3. In the Security Control Partition field, click + or Add.
    Figure 3. Add Security Control Partition

    In the Partition list, all the security control devices with partitions which are not added to the platform will be displayed.

  4. Select the partitions that you want to add to the platform.
  5. Optional: Check Import Alarm Inputs if you want to add the alarm inputs (zones) in the selected partitions to this area.
    Note:

    After adding the alarm inputs to this area, you can manage them by different areas.

  6. Optional: If the area is configured with map(s), you can locate the partitions on the map by setting the border of the partition for detection.
    1. Check Add to Map.

      The region of the partition as well as the alarm inputs in the partition will be added to the map of the area on the right.

    2. Drag to draw the region according to the actual needs.
    3. Drag the icons of the alarm inputs to set the their locations on the map.
    4. Right click to finish.
      Figure 4. Draw Security Control Partition on Map
  7. Click Add.

    The partitions will be displayed in the Security Control Partition list.

    Figure 5. Security Control Partition List
  8. Optional: Set a defense schedule for this partition, which defines how and when to arm the alarm inputs in the security control partition.
  9. Optional: Perform one or more of the following operations after adding the security control partitions to the area.
    Option Description

    Edit Security Control Partition

    Click to edit the partition settings.

    You can edit the partition name, locations of the partition and alarm inputs on the map, and set the defense schedule for this partition, which defines how and when to arm the alarm inputs in the partition.

    Bypass Zone

    When some exception occurs in one zone, and other zones can work normally, you need to bypass the abnormal zone to turn off the protection of it. Otherwise, you cannot arm the security control partition which the zone belongs to. To bypass the zone, click to enter the partition details page, and click in the Operation column of the Alarm Input list to bypass the alarm input.

    When you want to recover the zone that is bypassed to make it work normally, click in the Operation column to recover it.

    Arm or Disarm Security Control Partition

    After arming the partitions, the platform can receive the triggered alarms in the partitions.

    There are three arming modes available.

    • Away Arming: This mode is usually used when people leave the detection area. Event or alarms will be activated when the zone is triggered or tampered. For delayed zone, the alarm will not be activated when the zone detects triggering event during entry/exit delay.

    • Stay Arming: This mode is usually used when people stay inside the detection area. During stay arming, all the perimeter burglary detections (such as perimeter detector, magnetic contacts, curtain detector in the balcony) will be turned on. Meanwhile, the detectors inside the detection area are bypassed (such as PIR detectors). People can move inside the area and not trigger an event or alarm.

    • Instant Arming: This mode is usually used when people leave the detection area. The zone will be immediately triggered when it detects event or alarm with no delay and notify the security personnel.

    In the Security Control Partition list, select the partitions and click these buttons to arm the partitions, or click Disarm to disarm them. After disarmed, when there are alarms triggered by the zones in the partitions, the platform will not receive any alarms.

    Clear Alarms

    click to clear the generated alarms in the security control partition.

    Delete Security Control Partition

    Click to delete the added security control partition.