Download Print this page

Genetec Synergis IX SY-SIX-CTRL-DIN Programming Reference Manual

Hide thumbs Also See for Synergis IX SY-SIX-CTRL-DIN:

Advertisement

Quick Links

Using Synergis™ IX
SY-SIX-CTRL-DIN
SY-SIX-CTRL-DIN-1D
Programming Reference Manual
Document last updated June 06, 2025

Advertisement

loading
Need help?

Need help?

Do you have a question about the Synergis IX SY-SIX-CTRL-DIN and is the answer not in the manual?

Questions and answers

Summary of Contents for Genetec Synergis IX SY-SIX-CTRL-DIN

  • Page 1 Using Synergis™ IX SY-SIX-CTRL-DIN SY-SIX-CTRL-DIN-1D Programming Reference Manual Document last updated June 06, 2025...
  • Page 2 In no event shall Genetec Inc. be liable to any person or entity with respect to any loss or damage that is incidental to or consequential upon the instructions found in this document or the computer software and hardware products described herein.
  • Page 3 Contents Introduction Controller Models What This Manual Covers System Expansion and Capacities Technical Specifications Getting Started Logging In for the First Time Creating a Secure Password Signing In Set the Controller Time Configuring the IP Address Setting Up Integrated DDNS Setting Up an HTTPS Connection Connectivity Requirements for HTTPS Third-Party Certificate...
  • Page 4 Monitoring Menu Reporting | Event Reports Common Reporting Scenarios Event Reports | Users Event Reports | Doors Event Reports | Areas Reporting | Central Station Report Programming Menu Doors Door Groups Inputs Inputs | Areas and Input Types Inputs | Options Door Types Input Types Input Types | Options 1...
  • Page 5 Daylight Savings and Network Time Servers Expanders Menu Keypads Keypads | Configuration Keypads | Options 1 Keypads | Options 2 Analog Expanders Analog Expanders | Channel 1-4 Input Expanders Output Expanders Reader Expanders OSDP Install Mode Reader Expanders | Reader 1-2 Reader Expanders | Reader 1-2 Options Smart Readers Smart Readers | Reader...
  • Page 6 Defaulting a Controller Troubleshooting Common Health Status Messages Modules that Require a Restart Modules that are Offline Areas Requiring Rearming due to Input Changes Areas with the Tamper Area Disarmed Inputs Assigned an Area but no Input Type SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 7 Introduction Synergis™ IX is an all-in-one, web-based, cross-platform system that gives you a fully functional access control and intrusion detection solution in a fraction of the time of conventional software. With no software to install, setup is quick and simple. Connect the controller and system components, then open a web browser to launch the intuitive wizard-driven interface which guides you through the process of configuring your system.
  • Page 8 ** Each reader port supports either Wiegand or RS-485 reader operation, but not both at the same time. If combining reader technologies, they must be connected on separate ports. Each reader port supports two readers, with the wiring or address determining which is the entry and which the exit reader.
  • Page 9 What This Manual Covers This manual is divided into the following sections: ⦁ Getting Started: Logging in and registering your controller. ⦁ Basic Programming: Using the Synergis™ IX configuration wizards to set up your site. ⦁ Monitoring Your System: Using the Events page, Status Lists and LED indicators to show what is happening.
  • Page 10 System Expansion and Capacities The modular-based hardware design provides the flexibility to accommodate any installation, small or large, residential or commercial. Optional expandable modules allow you to scale your system as your requirements change. Need more PIRs? Add an input expander. Want more doors? Add a reader expander.
  • Page 11 Technical Specifications The following specifications are important and vital to the correct operation of this product. Failure to adhere to the specifications will result in any warranty or guarantee that was provided becoming null and void. Ordering Information SY-SIX-CTRL-DIN-IP Synergis™ IX Web Enabled DIN Rail Controller (IP only) Power Supply Operating Voltage 11-14V DC...
  • Page 12 5% of the rated supply voltage. Genetec Inc. continually strives to increase the performance of its products. As a result these specifications may change without notice. We recommend consulting our TechDoc Hub (techdocs.genetec.com) for the latest documentation and product information.
  • Page 13 Getting Started This section outlines the process for logging in for the first time and performing initial system configuration. Logging In for the First Time The web interface can be accessed by entering the controller's current IP address into the address bar of a browser, then logging in with valid credentials.
  • Page 14 Creating a Secure Password When creating or changing the admin operator password it is highly recommended that you create a very secure password. As a guideline, a secure password should include these features: ⦁ Minimum 8 characters in length ⦁ Combination of upper and lower case letters ⦁...
  • Page 15 ⦁ Enable DHCP: When the option is enabled, the controller will use DHCP to dynamically allocate an IP address instead of using a static IP address. To use this feature, there must be a DHCP server on the network you are attempting to connect to.
  • Page 16 Setting Up Integrated DDNS DDNS (Dynamic Domain Name Server) is a method which allows you to create a static hostname even when the external IP address of the controller is not fixed. The controller contains an integrated DDNS client which automatically updates the DDNS provider whenever the IP address changes. Controllers currently support two DDNS providers: Duck DNS (free provider) and No-IP (free accounts available, paid plans for further services).
  • Page 17 8. Enter the Username and Password that you used to sign up to No-IP. 9. Save your settings. 10. Confirm that the controller is externally accessible by browsing to the hostname on another PC. If the controller's external port is not the default port, you will need to append the port number to the URL (e.g.
  • Page 18 Setting Up an HTTPS Connection Synergis™ IX controllers come preconfigured with a self-signed certificate and HTTPS enabled by default, so that communications between the controller and the web browser are always encrypted. However, an alternative certificate can be installed if preferred. Installing a third-party certificate on the controller will remove the security warning which you may see in your browser when accessing a controller with a factory certificate.
  • Page 19 The easiest method is to configure the router to forward all traffic from external port 443 (the default HTTPS port) to the controller's internal HTTPS port, as in the image below. Port 443 Router Internet (External IP Controller HTTPS Request 203.97.123.169) (IP 192.168.1.2) Port 443...
  • Page 20 However, typically routers are assigned a dynamic IP address. This IP address is not static: internet service providers may reassign the address whenever the router is reset or even more frequently. A fixed domain name would have to be constantly monitored and updated, as the IP address it is mapped to will change unpredictably.
  • Page 21 It is recommended that you carefully note all requirements for your chosen CA before beginning. If you need help when obtaining and loading a third-party certificate, consult your IT support. Genetec Technical Support cannot assist with this process. Creating a Private Key and Certificate Signing Request To begin, it is necessary to generate the private/public encryption key pair which will be the basis for the HTTPS encryption.
  • Page 22 5. Enter your location and identity information as requested. These details will be incorporated into your certificate and publicly viewable from the web browser. Ensure that the Common Name is the same as the Domain Name which is being used for the controller.
  • Page 23 Converting the Certificate Format The controller requires a file with the .pfx extension. Your CA may have provided a different file type, potentially several files such as a certificate (e.g. .cer, .crt or .pem) and an intermediate certificate. These must be combined with the private key generated with your certificate request to create a .pfx file.
  • Page 24 Self-Signed Certificate Self-signed certificates do not require the certificate to be validated by an authority, or for the controller to be accessible over the internet. They can also be created for free. However, self-signed certificates are not considered secure by web browsers, which will generate warnings whenever the web interface is accessed.
  • Page 25 8. Create an export password when prompted. This will be required when installing the certificate on the controller. This process will generate a [name].pfx file in the current OpenSSL directory. This is your self- signed certificate. Store this file in a safe, known location. Installing the Self-Signed Certificate to the Controller 1.
  • Page 26 Synergis™ IX are removed to prevent users from being able to modify or delete cardholders through the intrusion keypad. These settings must be configured from Genetec Security Center. Schedules After the Synergis™ IX controllers are connected to the Synergis™ Cloud Link appliance and added in Security Center, the Synergis™...
  • Page 27 Using the Synergis™ IX Wizards Once logged in, the Home Page is displayed. Select the Wizards menu at the top of the page to run through each of the wizards that will guide you through the initial setup, giving you a fully functional access control and intrusion detection solution in no time.
  • Page 28 ⦁ Select the Input Type to define how an input will operate in an area. For example, Delay will go into entry delay when triggered, whereas Instant will activate immediately ⦁ Select the Area the input is assigned to 3. Click Save and Continue to proceed and configure Offsite Monitoring. All modules will be restarted automatically.
  • Page 29 Configuring Additional Areas Areas allow for the Synergis™ IX system to be divided up into separate sections (alarm areas or partitions) that will be monitored for intrusion or other purposes. There is one placeholder Area that is created by default which you can configure using the Security wizard to fit your needs.
  • Page 30 Setting the Pulse On to 1 and the Pulse Off to 9, provides a short pulse (such as a short beep or flash) every second. Setting both the Pulse On and Pulse Off values to 1 provides a rapid pulse on/pulse off. Setting both values to 5 provides a slow, steady pulse on/pulse off.
  • Page 31 Configuring Schedules and Holidays Schedules must be configured from Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 32 Monitoring Your System The All Events page and Status Lists provide functions for monitoring your site. The LED indicators on the Controller and Power Supply are useful for diagnosing faults and conditions. Viewing Events The All Events window provides a live and historic view of all events. ⦁...
  • Page 33 Reporting Use Genetec Security Center to generate reports. Additional reporting can also be accessed from the Monitoring menu in the Synergis™ IX interface. This Option: Is Used To: Event Reports Configure, view and export event reports. Central Monitoring Reports Export report maps for the Contact ID and Report IP services.
  • Page 34 To export a Report Map 1. Navigate to Monitoring | Reporting | Central Station Reports. 2. Click Export for either of the two services to generate a CSV format report that can be forwarded to your monitoring station. Depending on your browser settings you may be prompted to save the file, otherwise it is downloaded automatically to your Downloads folder.
  • Page 35 LED Indicators Synergis™ IX DIN rail modules feature comprehensive diagnostic indicators that can aid the installer in diagnosing faults and conditions. In some cases an indicator may have multiple meanings depending on the status indicator display at the time. Controller Power Indicator The power indicator is lit when the correct input voltage is applied to the controller.
  • Page 36 Reader Data Indicators The R1 and R2 indicators display the status of the data being received by the onboard readers. State Description Short flash A SHORT flash (<250 milliseconds) will show that data was received but was not in (red) the correct format Long flash A LONG flash (>1 second) indicates that the unit has read the data and the format...
  • Page 37 Constantly on Correct module input voltage applied Constantly off Incorrect module input voltage applied Status Indicator The status indicator displays the module status. State Description Fast flash (green) Module attempting registration with controller Slow flash (green) Module successfully registered with controller Flashing (red) Module communications activity When the fault and status indicators are flashing alternately, the module is in identification mode,...
  • Page 38 Temp Indicator The temp indicator shows the status of the unit's core temperature. State Description On (red) Core temperature exceeded. Over Temp Shutdown Activated Flashing (red) Core temperature within 10°C of Over Temp Shutdown On (green) Core temperature OK Output Current Indicator The output current indicator shows the status of the output current for both V1+ and V2+.
  • Page 39 Fault Indicator The fault indicator is lit any time the module is operating in non-standard mode. If the fault indicator is flashing, the module requires a firmware update or is in firmware update mode. When the fault indicator is on, the status indicator will flash an error code. State Description Continuous slow flash...
  • Page 40 Over Current Indicator The over current indicator will show the status of the output current for both V1+ and V2+. State Description On (red) Output current exceeded. Over Current Shutdown Activated Maximum output current not exceeded Error Code Display The following table is only valid if the fault indicator is constantly on and the status indicator is flashing...
  • Page 41 Trouble Inputs Trouble inputs are used to monitor the status of the controller and in most cases are not physically connected to an external input. These can then be used to report a message to a monitoring station, remote computer, keypad or siren. The following lists the trouble inputs that are configured in the controller: Input Number Description...
  • Page 42 Property Reference Guide The following sections describe the properties available when programming your system, and what they do. Each section represents a menu selection within the web interface, and the relevant options available. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 43 Users Menu User settings must be configured from Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 44 User CSV Import Importing users from a CSV file must be done within Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 45 Monitoring Menu Functions for monitoring a site are contained under the Monitoring menu. This Option: Is Used To: Events Display a live view of all events as they occur Doors Display a list of all doors and their current status Inputs Display a list of all inputs and their current status Areas...
  • Page 46 Reporting | Event Reports Allows operators to create, view and export customized event reports based on users, doors and areas. General ⦁ Name: The report can be named if saving is required. Start / End Times ⦁ Start Date: A valid start date must be entered. ⦁...
  • Page 47 Event Reports | Areas Areas ⦁ Defines the areas displayed in the report. Reporting | Central Station Report Central Station Reports (report maps) for the Contact ID and Report IP services can be exported from the Synergis™ IX interface and supplied to the monitoring station. SY-SIX-CTRL-DIN | Using Synergis™...
  • Page 48 Programming Menu Functions for programming a site, such as configuring doors, areas, inputs, outputs, are all found under the Programming menu. This Option: Is Used To: Configure doors to control user access or to monitor and control the flow of Doors people into an area Create and manage door groups that define which doors a user can...
  • Page 49 Doors Door settings must be configured from Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 50 Door Groups Door groups define which doors a user can access and/or control. A door group is assigned to an access level to restrict the ability of a user to gain entry to or exit from certain doors. Click Add to add doors, then apply a schedule. SY-SIX-CTRL-DIN | Using Synergis™...
  • Page 51 Inputs Motion detectors, door contacts and other protection devices are connected to the system on inputs. An input belongs to an area to protect the area and the system from unauthorized entry. For example, a motion sensor input in reception may be assigned to an Administration Area. Address ⦁...
  • Page 52 ⦁ Restore Input Speed: This setting determines how long an input must be closed before the system will register that is has been closed (restored). For example, if this time is set to 30 seconds the input must be closed for 30 seconds before an 'Input Closed' event will be generated. The restore input speed can be set between 0 seconds and 1 hour.
  • Page 53 It may be useful to disable event logging for inputs that are primarily used for automation or control to reduce their impact on event storage. ⦁ Test For Trouble Condition: This is a legacy option that has no effect. Input trouble conditions (tamper and short) are generated and reported based on the settings in the input type (see Generate 24hr Alarms and Report Tampers in Programming | Input Types | Options 1).
  • Page 54 Door Types Door types must be configured from Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 55 Input Types Input types define how an input operates in an area. Configuration ⦁ Operating Schedule: This schedule determines when this particular input type is active. When this schedule is valid the settings for this input type will be used. When the schedule is invalid the settings from the Secondary Input Type will be used instead.
  • Page 56 The control area must have the Enable Force Arming option checked in Programming | Areas | Options 2. Commands ⦁ Commands: Used to send manual commands to a device. Input Types | Options 1 Alarm options ⦁ Generate Alarms: When this option is enabled, inputs using this input type will generate alarms. Alarms are generated when an input is opened in an armed area, causing the area to go into an alarm state.
  • Page 57 This feature uses 24hr tamper monitoring to generate alarms when the main area is not armed. Therefore, the following are also required: ⦁ The Generate 24HR Alarms option above must be enabled (however, Generate Alarms may be disabled). ⦁ The 24hr portion of the assigned area must be armed. To provide more information about the alarm you should also set the Custom reporting code in the General tab to an appropriate code.
  • Page 58 ⦁ Exit Alley Input Do Not Test It: Inputs with this option enabled will not be tested when the assigned area is arming. This means that the area can be armed even if these inputs are open and not bypassed. This should be used for inputs such as PIRs that overlook keypads and other arming points, which would otherwise need to be bypassed every time the area is armed.
  • Page 59 Output Activation Options ⦁ Activate Bypass Output: With this option enabled these inputs can activate the area's Bypassed Inputs Output / Output Group. This is activated when the area is armed with bypassed inputs in it, and deactivated when the area is disarmed. ⦁...
  • Page 60 ⦁ Toggle Input Output State: With this option enabled the Control Output / Output Group set in the input programming will be toggled whenever an input with this input type is opened (alarmed). This means that each time the input is opened the output will switch from off to on, or vice versa. This option refers to the control output set in the programming for each individual input (Programming | Inputs | General).
  • Page 61 Areas Areas allow for the Synergis™ IX system to be divided into separate sections (alarm areas or partitions). This allows areas to be grouped for easy management of multiple areas at a time. An installation may contain up to 32 areas or partitions, depending on the configuration and size of the system.
  • Page 62 ⦁ Rearm Area Time (minutes): If the Re-Arm Enabled option is checked in the Options 1 tab, whenever this area is disarmed it will automatically rearm after the time defined here (in minutes). If this time is set to the area will rearm after 1 minute. ⦁...
  • Page 63 This field must be set to a value above zero to enable area counting. If there is no limit on the number of users allowed in the area you can set this field to the maximum value (65535). ⦁ Client Code: This code represents the area in reports to the central monitoring station. This is typically a hexadecimal number but the format may depend on the receiver compatibility.
  • Page 64 The minimum time that arming can be deferred from the keypad is 1 hour and the maximum is 9 hours. Arming can only be deferred in whole hours. Commands ⦁ Commands: Used to send manual commands to a device. Areas | Reporting Services This tab defines the primary reporting service for the area.
  • Page 65 The output or output group will turn on for the pulse on time, turn off for the pulse off time, then repeat. These times are set in 100ms increments. For example, if the pulse on time is set to the pulse off time is set to the output will turn on for 200ms, turn off for 800ms, then repeat, for a total cycle of 1 second.
  • Page 66 ⦁ Tamper alarm output / output group: This output or output group is activated whenever a 24hr / tamper alarm is generated in the area. It is deactivated when the area's 24hr portion is disarmed (disabled). This feature can be used to alert personnel that an input has been tampered, without activating the area's bell output.
  • Page 67 ⦁ Defer Arming Started Pulse On/Off Time: These fields are used to make the defer arming output or output group pulse on and off when activated. The output or output group will turn on for the pulse on time, turn off for the pulse off time, then repeat.
  • Page 68 ⦁ Disarm Child If All Other Areas Are Disarmed: When this option is enabled the Child Area (Configuration tab) will be disarmed whenever this area is disarmed, provided that all other parent areas are already disarmed. For example, there may be three areas; A, B and C, where C is a child area of A and B. By default, C will be disarmed whenever either A B is disarmed.
  • Page 69 ⦁ User Count Reached Output / Output Group (Outputs tab) ⦁ Arm On User Count At 0 (Options 1 tab) ⦁ Clear User Count When Armed (Options 1 tab) ⦁ Prevent Arming On Count Not Zero (Options 2 tab) ⦁ Arm On User Count At 0: When Enable User Counting is selected above, this feature causes the area to automatically arm when the user count reaches zero.
  • Page 70 ⦁ Area can be Reset: When this option is enabled the area can be rearmed from a keypad without being disarmed first. This means that an area that goes into alarm can be reset (silencing the bell output) without being disarmed. Use this option for areas that should not be disarmed after an alarm.
  • Page 71 ⦁ Disable Rearm On Schedule: When this option is enabled, automatic rearming will be disabled when the area has been disarmed by the Arm/Disarm Schedule (Configuration tab). Use this to ensure the area does not automatically rearm when it is supposed to be disarmed. ReArmLevelTrigger = true The command prevents the area from automatically rearming...
  • Page 72 ⦁ Bell Squawk On Successful Report: When this option is enabled the area's Bell Output (Outputs tab) will squawk when a successful 'Area Armed' report has been sent and acknowledged by the reporting service. Schedule ⦁ Normal Disarm Schedule: This schedule defines when the area is expected to be disarmed on any given day.
  • Page 73 Area Groups Area groups are assigned to an access level and are used to control the areas that a user can arm and disarm. An area group can be assigned for arming and disarming. Areas assigned in the disarm area group can also be armed by the user.
  • Page 74 Outputs Outputs are used to control devices from the Synergis™ IX System. An output can be used to control lighting, activate a siren, turn on an indicator or unlock a door. Address: ⦁ Module Type: The type of module that the output is connected to (e.g. keypad, output expander). ⦁...
  • Page 75 If the output is on the controller, after changing this setting you must manually activate and deactivate the output. Preset State ⦁ Preset Controller Power Up: With this option enabled the output will be set to a specific state when the controller is restarted or powered on for the first time. If not, the output will be reset to its last known state.
  • Page 76 Output Groups Output groups are used to group a number of outputs together, and are assigned to an access level to determine the outputs a user can activate and deactivate. Select the Outputs tab to manage the outputs assigned to the group. Outputs ⦁...
  • Page 77 Keypad Groups Keypad Groups are used to group a number of keypads together to restrict access. Keypad Groups are assigned to Menu Groups which, when assigned to Access Levels, determine the keypads a user can log into. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 78 Menu Groups Menu groups provide a way of grouping together the various keypad menus programmed in the system. Menu groups can be assigned to an access level to determine which keypad functions those users have access to. General ⦁ Name: The name of the menu group. ⦁...
  • Page 79 ⦁ Stay arming: When this option is enabled, users can stay arm areas by pressing the [STAY] key. The area(s) must have stay arming enabled in Programming | Areas | Options 2. ⦁ Force arming: When this option is enabled, users can force arm areas by pressing the [FORCE] key.
  • Page 80 Trouble Inputs Trouble inputs operate similarly to regular inputs, however they are used to monitor the status and condition of the system. For example, if the enclosure door on the main control device is opened, it will open the Enclosure Tamper trouble input. Address ⦁...
  • Page 81 ⦁ Reporting ID: The trouble input's reporting ID is the Zone ID index which will represent that trouble input to the monitoring station. You can manually assign an ID to each input, allowing a high amount of flexibility in input reporting. For example, if two inputs have the same Reporting ID they will both report as the same input.
  • Page 82 Elevators Elevators are not supported in Synergis™ IX. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 83 Phone Numbers Phone numbers are defined so that a telephone number can be assigned to a Contact ID service that communicates using a modem or telephone connection. Phone numbers are only used by controller models with onboard modem dialers. Configuration ⦁...
  • Page 84 Services Services are used to provide interaction between Synergis™ IX and external systems. Type ⦁ Service Type: The type of service that is programmed determines the operation the service performs. It also determines the programming screens that follow in each of the sub sections as the programming of services contains features and options dependent on this selection.
  • Page 85 Contact ID | Options ⦁ Use Alternate Dialing Method: This option determines the order in which the service will try the various phone numbers programmed in the General tab if Phone number 1 fails. The options are: ⦁ Sequential (this option disabled): When Phone number 1 fails the service continues to try this phone number until it reaches the maximum Dial attempts (General tab).
  • Page 86 ⦁ Armor IP: ArmorIP is a proprietary IP reporting protocol by Genetec. Reports are sent to an installed ArmorIP server which provides a standard Ademco 685 output and allows routing and redirection of messages to other receivers. This format provides full textual transmission that includes the names of the records (user, area, input) that generated the report and additional information such as field time and controller name.
  • Page 87 ArmorIP reporting is available in both UDP and TCP modes, and either encrypted or unencrypted. ⦁ SIA over IP (DC09): Communicates in the SIA Level 2 format using the SIA DC09 specification for digital communication. ⦁ CID over IP: Communicates in the Contact ID format using the SIA DC09 specification for digital communication.
  • Page 88 ⦁ Enable Offline Polling: Offline polling occurs when the service is not normally in use, i.e. operating as a backup. If the backup service loses connection the Reporting Failure trouble input will open and a report will be sent to the monitoring station. This ensures that any issues are detected before the backup service is required.
  • Page 89 Scheduling Menu Schedules must be configured from Genetec Security Center. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 90 Time Do not set up the SNTP time server in Synergis™ IX. The Synergis™ Cloud Link keeps the controller time in sync based on the Access Manager server. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 91 Daylight Savings Daylight savings periods are associated with a controller. Programming the daylight saving settings in the Synergis™ IX system allows the system to accurately compensate for daylight savings adjustments for the time zone the system controller is located in. Configuration ⦁...
  • Page 92 Expanders Menu The Expanders menu contains the settings required to connect and configure the various expander modules available that extend your Synergis™ IX system. This Option: Is Used To: Keypads Configure the keypads attached to your system Analog Expanders Configure the analog expanders used to monitor power supplies Configure the input expanders used to extend the number of inputs Input Expanders available within the system...
  • Page 93 Keypads Keypads are used for all functions within the Synergis™ IX system and are typically located near an entrance or door to allow areas within the system to be armed and disarmed. General ⦁ Name: The name of the keypad. ⦁...
  • Page 94 ⦁ Display Primary Area Status: When enabled the keypad will display the status of the primary area that is assigned to the keypad. ⦁ Display Scrollable Area Group: When enabled the keypad will display the status of the area's that are assigned in the area group. ⦁...
  • Page 95 ⦁ Offline Access to Automation Menu: When enabled the keypad will allow access to the Automation Menu if no user is logged in. In addition to the offline options outlined above, it is also possible to view any open inputs in the OfflineInputView = true primary area in the offline menu, using the command .
  • Page 96 Analog Expanders Analog expanders are used to monitor the power supplies connected to your Synergis™ IX system. Configuration ⦁ Invert Device Tamper: When this option is enabled the module's tamper input will be inverted. This should be enabled when the tamper switch has a normally open configuration. ⦁...
  • Page 97 Input Expanders Input Expanders extend the number of inputs available within the system. Configuration ⦁ High Charge Current: This is a legacy option that has no effect. ⦁ Virtual Module: Enable this option to register the module as a virtual module. Virtual modules act as placeholders in the system, allowing you to program virtual inputs and outputs for use with programmable functions and other advanced features.
  • Page 98 Output Expanders Output Expanders extend the number of outputs available within the system. Configuration ⦁ High Charge Current: This is a legacy option that has no effect. ⦁ Virtual Module: Enable this option to register the module as a virtual module. Virtual modules act as placeholders in the system, allowing you to program virtual inputs and outputs for use with programmable functions and other advanced features.
  • Page 99 Port 1/2 Network Type: These fields determine how each reader port will operate (i.e. what kind of data it will send and receive). The options are: ⦁ Genetec RS-485: Used for card readers wired in RS-485 configuration (recommended). ⦁ Wiegand: Used for any standard Wiegand reader.
  • Page 100 ⦁ Multiple Reader Input Port 2: When enabled the reader will process the multiplexed reader inputs on Port 2 so that dual readers can be connected for entry and exit processing. The duplex reader that is connected will always operate as the exit reader. When disabled the reader port 2 interface will operate as a single reader input.
  • Page 101 ⦁ Area Control: The reader expander input is used to ONLY control an area for arming and disarming. Please note that this can be achieved using the Access Mode as well by integrating the alarm and access control systems. ⦁ Reader Door: The reader controlled door setting sets the door that the reader on port one will provide card and control information to.
  • Page 102 ⦁ Arm Area on 2 Reads: Two successive reads from the same user will result in the inside or outside area (depending on the card reader type configuration) starting the arming process. ⦁ Read and Input 4/8 of Expander: Users can hold input 4 (for reader port 1) or input 8 (for reader port 2) and enter their credentials to arm the associated area.
  • Page 103 to disarm the area. When the option is disabled and the user who is attempting access to a door that has an area assigned that is armed, and the user cannot disarm the area, the user will be denied entry to the door even though they may have the correct door and schedule settings. ⦁...
  • Page 104 expander. To program the Door Sense function for normal operation refer to the Inputs tab of the Doors menu. ⦁ Bond Sense Input Enabled: Enables the magnetic bond sense functions. The magnetic bond sense is a contact that indicates if the magnetic bond between the electromagnet and the clamp is complete.
  • Page 105 Smart Readers Smart readers represent OSDP readers connected to the reader expanders. Configuration ⦁ Expander Address: The address of the reader expander that the smart reader is connected to. ⦁ Expander Port: The reader port used by the smart reader. ⦁...
  • Page 106 In addition, this option allows you to use two factor authentication for keypad access. This is required when Keypad login requires card (Expanders | Keypads | Options 2) is enabled. When the user badges their card they can enter their PIN and press [ENTER] to log in to the keypad.
  • Page 107 from the reader port. When disabled the reader performs no action when a card is presented and the door is unlocked or open. ⦁ Door Sense Enabled: When enabled the reader will send door events when the door input is opened or closed.
  • Page 108 which must have its contacts held open even if the pathway is blocked. When disabled the reader will not perform beam processing. ⦁ Always Allow REX: When enabled the reader will always allow a request to exit event even if the door is forced open.
  • Page 109 Expander Addressing The Expander Addressing option is used to view the hardware connected to the system network and to set the addresses (see page 131) of the modules that have auto-addressing capability. This page displays the details of all modules currently connected or that have registered previously but may currently be offline.
  • Page 110 Automation Menu Functions relating to automation are found under the Automation menu. This Option: Is Used To: Configure programmable functions to perform special processing of actions when Programmable a particular event or operation occurs, such as unlocking doors in the event of a Functions fire alarm SY-SIX-CTRL-DIN | Using Synergis™...
  • Page 111 Programmable Functions Programmable functions are special automated processes that can be programmed in the Synergis™ IX system. Generally these processes have a trigger - such as an output turning on - which causes the controller to activate the process. These functions present an extensive variety of applications for control and automation. For example, you might use them to arm an area based on the state of an output, operate a complex series of devices each time a specific door is unlocked, or unlock the doors in the event of a fire alarm.
  • Page 112 ⦁ Inverted Follow and Test: The control output continuously follows the state of the first output in an inverted manner. When the first output is ON, the control output is OFF. When the first output is OFF, the control output is ON. ⦁...
  • Page 113 ⦁ Follow Logic NAND: The function performs a logical NAND operation to determine the state of the control output. If both the first and second outputs are ON, the control output is OFF. If either the first or second output is OFF, the control output is ON. First Output Second Output Control Output...
  • Page 114 ⦁ Follow and Test Output: The control area continuously follows the state of the output. When the output is ON, the control area is ARMED. When the output is OFF, the control area is DISARMED. ⦁ Inverted Follow and Test Output: The control area continuously follows the state of the output in an inverted manner.
  • Page 115 Configuration ⦁ Door Function Mode: This field determines the control response to the output status, i.e. whether the output turns the chosen Door Control Mode on or off. The available door function mode options are: ⦁ Follow and Test Output: The door control mode continuously follows the state of the output.
  • Page 116 ⦁ Door Lockdown (Allow Entry + Exit): When the door control mode is activated the door will be locked down. Access will be allowed in both directions (including REX and REN). When the door control mode is deactivated the lockdown will be cleared and the door will return to its previous state.
  • Page 117 System Menu The System menu is used to configure system settings, backup programming and update firmware. This Is Used To: Option Settings Configure the Controller settings including the IP address Create and manage the operators that can access Synergis™ IX to maintain and Operators monitor the system Roles...
  • Page 118 Synergis™ IX controllers have HTTPS connection enabled by default with a pre-loaded certificate. However, an alternative certificate can be installed if preferred. For older controllers not equipped with a default certificate, Genetec strongly recommends that all live Synergis™ IX sites establish an HTTPS connection between the controller web interface and the web browser.
  • Page 119 Commands ⦁ This field is used to send programming commands to the device. It should only be used when specifically advised by Genetec documentation or technical support. System Settings | Adaptor - Onboard Ethernet Onboard Ethernet ⦁ Enable Onboard Ethernet*: This option configures the controller to communicate via its onboard ethernet communication link.
  • Page 120 ⦁ Duck DNS: The username should be left blank. The password is the Token generated by your Duck DNS account. ⦁ No-IP: The username and password are the credentials used to log in to your No-IP account. System Settings | Configuration Configuration ⦁...
  • Page 121 ⦁ Adds a 10 second grace period following a failed poll before a module is reported as offline. Each module sends a poll message to the controller every 250 seconds. The module will be reported as offline if no poll has been received for the duration of this poll time plus the 10 second grace period.
  • Page 122 ⦁ SMTP Timeout: Defines how long (in seconds) before the connection times out. ⦁ Sender Email Address: The email address used when sending outgoing mail. ⦁ Sender Display Name: The display name used when sending outgoing mail. If a display name is not entered, the sender email address is used.
  • Page 123 ⦁ Clear Bit: A clear bit defines a location in the received data that must always be cleared (or a logical '0'). The clear bit defines the location of the bit in the received data. SY-SIX-CTRL-DIN | Using Synergis™ IX | Programming Reference Manual Last updated June 2025...
  • Page 124 Operators An operator is a person who uses Synergis™ IX for maintaining the system and monitoring the site. General ⦁ Name: The name of the operator. This is the name displayed in the status bar at the top of the page.
  • Page 125 Roles To control access to the Synergis™ IX system, each operator must be assigned a role. The role determines which pages are visible to the operator when they are logged in. If an option is enabled, that page will be visible. If it is disabled, the page is hidden. The system comes programmed with three preset roles.
  • Page 126 Password Policy A password policy represents a set of guidelines designed to enforce a higher level of security. Synergis™ IX systems enable you to define your own password policy that other users of the system are required to follow. Configuration ⦁...
  • Page 127 Maintaining Your System This section covers system maintenance, including how to back up and restore controller programming and update firmware. Changing Operator Passwords For security reasons, you may want to change operator passwords periodically. Only operators with sufficient security permissions will have access to changing passwords for other operators.
  • Page 128 Backing Up and Restoring Controller Programming Creating backups of your controller programming is good practice to ensure you are protected against damage in the event of hardware failure or malfunction. The Synergis™ IX interface provides a simple export tool for backing up the system to a proprietary encrypted backup file (*.bak).
  • Page 129 Module: This section is used to update the firmware of modules connected to the controller. You can also view the serial number and firmware version of card readers connected to the network by Genetec RS-485 or OSDP. Select the connected module that requires a firmware update from the dropdown.
  • Page 130 This option should only be selected at the direction of Genetec Technical Support . 4. Click Upload Firmware to browse to the firmware file (.bin format) supplied by Genetec, and open the file to install the firmware on the selected module.
  • Page 131 When connecting a module to the network it must be added to Synergis™ IX and allocated a unique physical address. By default all DIN rail modules are shipped from Genetec with the address of 254 and without changing this address the module will not be able to register with the controller.
  • Page 132 Maximum Module Addresses The Synergis™ IX controller has a set limit on the number of modules of each type that it can support. This applies to both physical and virtual modules. The maximum addresses available for each type of module are outlined in the table below: Module Type Maximum Address Keypad...
  • Page 133 Configuring the IP Address The controller must be programmed with a valid IP address to allow communication. When a controller is first connected or has been factory defaulted it will wait for the DHCP server to assign it an IP address, but if DHCP is not available the IP and network configuration can be programmed manually.
  • Page 134 Setting the IP Address from a Keypad If the current IP address of the controller is not known it can be viewed and changed using a Synergis™ IX keypad. 1. Connect the keypad to the module network. 2. Log in to the keypad using any valid installer code. The default installer code is 000000. If the default code has been overridden and you do not know the new codes you will need to default the controller (see Defaulting the Controller...
  • Page 135 Temporarily Defaulting the IP Address If the controller IP address is not assigned by a DHCP server it can be temporarily set to 192.168.111.222 so that you can connect to the web interface to manually configure the network. This will also temporarily disable HTTPS security. This defaults the IP address for as long as power is applied, but does save the change permanently.
  • Page 136 SB SA S- S+ Z2 V- Z1 NC C NO RS485 NETWORK 12VDC OUT INPUT 2 INPUT 1 RELAY 1 N+ N- NA NB 12VDC IN/OUT RS485 NETWORK ETHERNET 5. Power up the controller. Wait for the status indicator to begin flashing steadily. Accessing the Controller 5.
  • Page 137 Defaulting a Controller The controller can be factory defaulted, which resets all internal data and event information. This allows you to remove all programming and start afresh. Defaulting the controller resets its network configuration to DHCP. The controller will wait for the DHCP server to assign it an IP address.
  • Page 138 5. Power up the controller. Wait for the status indicator to begin flashing steadily. 6. Remove the wire links before making any changes to the controller's configuration. The system will now be defaulted with all programming and System Settings returned to factory configuration, including resetting the IP address and all network configuration, and removing all operator records.
  • Page 139 Troubleshooting This section includes helpful troubleshooting information. Common Health Status Messages The Health Status is displayed on the Home Page and provides details of the overall status of the system and can be useful in identifying any problem areas that need to be addressed. It lists any problems that the Controller has with its current configuration.
  • Page 140 Solution 1. If you have cycled power to the Controller, ensure you have allowed enough time for the module to come online. 2. Navigate to the appropriate Expander menu (for example, Expanders | Reader Expander). 3. Check that the Physical Address allocated on the General tab matches that allocated under Expanders | Expander Addressing.
  • Page 141 Cause An input has been assigned to an area but the system has not been instructed on what to do if the input is activated. Solution 1. Navigate to Programming | Inputs and select the input listed in the message. 2.
  • Page 142 © Genetec Inc., 2025. Genetec™, Synergis™ IX, Synergis™ IX, the Synergis™ IX logo and the Genetec™ Logo are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the manufacturers or vendors of the respective products.

This manual is also suitable for:

Synergis ix sy-six-ctrl-din-1d