Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 

    Security: Video

    Sort by:
    ‎04-05-2021 04:22 PM
    When you open BVMS Viewer Configuration Client for the first time, the following message is displayed: "The system is running in an unregistered mode. Please activate your license package" For a proper use of BVMS Viewer you need to   activate   the  MBV-BVWR-100 License Viewer base, which is FREE! This can be found on the Bosch Security Systems Software License Manager (SLMS) platform. Follow the steps below and find out how you can license BVMS Viewer for free.
    View full article
    ‎04-05-2021 04:18 PM
    The purpose of this article is to provide step by step instructions on how to successfully import video and storage devices from a DIVAR IP Recording Appliance to a Professional BVMS system while retaining all existing recorded video. Note: This procedure should only be performed by a certified BVMS / VRM technician or installer
    View full article
    ‎04-05-2021 04:14 PM
    Logs are definitely important. We would even say they are the most important thing for a system to function properly. At some point, the Central Support Team may ask you to provide them with the BVMS Configuration Collection. This article explains you how and where you can get the BVMS Configuration Collection of your system.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 04:14 PM
    This article helps you to solve the situation where the "No Config" error message appears when you try to authenticate in Operator Client. This error can be persistent, no matter what central server you attempt to login to and no matter what user account or credentials you are trying to use. This means that you have a corrupt cache .dat file on your system. Follow the steps from this article if you attempt to login into BVMS Operator Client and encounter the message below and you want to fix it: "Please enter your credentials... No config..."
    View full article
    ‎04-05-2021 04:13 PM
    This article describes how Streamlining works and how it can be finetuned.
    View full article
    ‎04-05-2021 04:06 PM
    This technical brief will provide the step-by-step procedure on how to configure “BVMS” presets and save views. In order to better utilize system resources, BVMS no longer pre-allocates 99 black presets to newly added PTZ cameras in the system. BVMS does not read any existing presets already configured in the camera.  
    View full article
    ‎04-05-2021 12:14 PM
    Time is everything: meetings, public transportation, religion, transactions: the whole world is working because the concept of “time” exists. Within a security (or any other) system this is not different: recording schedules, logging, authorizations, encryption keys, timelines, all of these concepts can exist because of time. As a result, time can either make or break a system: problems can appear only due to a time difference of a couple of seconds between two system components. This article  describes how time services can be configured in a BVMS environment. Time: what is the challenge? Each device has its own internal clock, which is based on a hardware mechanism. This mechanism acts like a watch: try to put two watches together and synchronize them on the millisecond. A security system consists out of more than two devices, it can consist of thousands of devices. Synchronizing the time of all these devices by hand is a very time consuming task. Additionally, due to small differences in electronic components, devices can have deviations from one another. These deviations cannot be detected by the human eye, but can result in considerable time differences when a device is running for months. Synchronizing time The Network Time Protocol (NTP) was created to solve these challenges. The Network Time Protocol is a network-based protocol for clock synchronization between system components. The protocol utilizes a standard IP network to communicate and can maintain a time difference (considering a local area network) of less than one millisecond between components. The Network Time Protocol is a standard protocol and documented in   RFC 5905. The operation and configuration of the Network Time Protocol are complex: a hierarchical architecture needs to be set-up including several layers of systems which are able to run the Network Time Protocol. To reduce complexity the Simple Network Time Protocol (SNTP) was  created. The Simple Network Time Protocol is mainly used when less accuracy (deviations of 1-2 seconds are acceptable). Windows Time Service The Bosch Video Management System is running on Microsoft Windows Server operating systems. Windows includes an internal time service, which is explained on Microsoft Technet: “The Windows Time service, also known as W32Time, synchronizes the date and time for all computers running in an AD DS domain. Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The Windows Time service uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation and resource access requests. The service integrates NTP and time providers, making it a reliable and scalable time service for enterprise administrators. The W32Time service is not a full-featured NTP solution that meets time-sensitive application needs and is not supported by Microsoft as such. For more information, see Microsoft Knowledge Base article 939322,Support boundary to configure the Windows Time service for high-accuracy environments   (http://go.microsoft.com/fwlink/?LinkID=179459).” Source:   Windows Time Service Technical Reference - Microsoft Technet The Windows Time service is based on the Simple Network Time Protocol. Summary The Network Time Protocol requires a very complex infrastructure, which impacts the total installation and configuration effort of the system. The Simple Network Time Protocol (also used for the Windows Time Service) reduces the complexity, but at the same time also reduces the accuracy. For most security applications the Simple Network Time Protocol provides sufficient accuracy. Bosch recommends to use the Windows Time service, based on the Simple Network Time Protocol, as basis for time synchronization in a security network. This article provides best-practices on how to configure the Bosch Video Management System and related components in a time synchronization environment based the Windows Time service. Alternatively, the Network Time Protocol can be used whenever it is already existing inside an infrastructure or when event accuracy with a deviation less than one second is required. Due to the complexity of the infrastructure Bosch does not make any recommendations related to the Network Time Protocol.     Step-by-step guide   Management server configuration   A. Operating system configuration This section also applies for the   Video Recording Manager   and   Mobile Video Service   when these are not running on the management server. Microsoft has prepared a lot of documentation related to time configuration Go to the   Microsoft Support: How to configure an authoritative time server in Windows Server   page and scroll down to the section “Configuring the Windows Time service to use an external time source”. Click the download button under the “Here’s an easy fix” section. Figure:   Download the Microsoft Windows Time service configuration utility   The utility will configure external time servers. To select these, browse to   http://pool.ntp.org   and select two servers which are related to the geographical location of the system, for example “de.pool.ntp.org” and “nl.pool.ntp.org”, referring to Germany and the Netherlands. Another (local or external) (S)NTP server can also be chosen.   Start the Microsoft configuration utility and configure it as indicated and shown in the figure below. Administrative access is required to run the utility. Figure:   Pool.ntp.org   locations   Figure:   Windows Time service configuration   Alternatively the configuration can be done from the command-line, using the command shown below. net stop w32time w32tm   /config   /syncfromflags :manual   /manualpeerlist : "nl.pool.ntp.org,   de.pool.ntp.org" net start w32time The configuration can be verified by starting the Windows Command prompt and issuing the command “w32tm /query / status”, as shown in the figure below. Notice the time source, this should point towards the configured servers. Figure:   verifying configuration   It can take up to one minute before the correct time source is displayed. When there is a problem, the configured (S)NTP server can be tested by issuing the “w32tm /stripchart /computer:de.pool.ntp.org”, which should result in the output displayed in the figure below. Figure:   test the (S)NTP service   When an unexpected result is returned, it is recommended to check access to the specific (S)NTP server. A firewall might prevent the communication between the (S)NTP server and the management server.   B. BVMS Management Server configuration BVMS automatically points devices to its own time-server. This can be changed by editing the BvmsCenterlServer.exe.config file, located in C:\Program Files\Bosch\VMS\bin\. Find the key "TimeServerIPAddress" and adjust the value, as shown in the example below (192.168.0.1). <!--   Ip address of the time server for VRM/NVR encoders(defaults to the Central-Server IP if not set) . --> < add   key = "TimeServerIPAddress"   value = "192.168.0.1"   />     C. Workstation configuration The Bosch Video Management System Operator client runs on a Windows workstation. When the workstation and server are part of the same Microsoft Active Directory service domain, no manual time synchronization needs to be configured. Figure:   workstation configuration, "192.168.0.200" needs to be replaced by the IP address or Fully Qualified Domain Name of the management server.   When the Bosch Video Management System workstation and management Server are not joined in a domain, or into the same domain, the workstation(s) need to be manually configured to use the management server as a time server. To achieve this, the description above can be used. Instead of using the   pool.ntp.org   as a server, the management server is now entered.   D. Camera configuration If a camera is connected to a BVMS system the time server will be automatically configured.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 12:13 PM
    When working with previous versions of BVMS, remote connectivity was cumbersome due to the amount of port mapping that needed to be configured. BVMS 7.5 provides a new method of remote connectivity utilizing Secure Shell (SSH) Tunnelling. SSH Tunnelling constructs an encrypted tunnel established by an SSH protocol/socket connection. This encrypted tunnel can provide transport to both encrypted and un-encrypted traffic. The Bosch SSH implementation also utilizes Omni-Path protocol, which is a high performance low latency communications protocol developed by Intel. Key management The BVMS SSH service generates a private and public key when it is started for the first time. Both keys are saved in an encrypted file. When the BVMS SSH service restarts this file is detected and the private key is read.   Step-by-step guide   1.Configuration   A. Installation There is little to no configuration required for this feature to function. The SSH Service must be installed and running. If deploying a BVMS Pro system, insure the SSH Service is part of the installation process. Recording Appliances that ship with BVMS 7.5 should have the service pre-installed. Check your “Services”. If the service has not been installed, the install package can be run from the BVMS 7.5 downloadable install package. If working with a DIVAR IP Recording Appliance, the appliance “Installer Package” must be used.   B. Port mapping entry The primary configuration step is to configure one (1) port forwarding for the BVMS Central Server to utilize port 5322 for both internal and external connections. This is the only port mapping entry that needs to be made for the entire system. The image below shows a sample configuration.   2. Operation   A. Login with the Operator Client After the basic configuration is done, logging in via Operator Client is very intuitive: From the log menu, select the “Connection” drop down menu, then Select <New…> You will be prompted to enter an IP address or DNS host name. You will also notice a cheat guide below the entry menu that will assist with address entry. Addressing must be in the following format:   ssh://IP or   servername:5322. In the example we used:   ssh://49.49.49.49:5322. After entering a properly formatted address, enter a valid user name and password. SSH users MUST have a password associated with their BVMS account. User accounts without a password cannot log in utilizing an SSH Connection.   B. Verification After connection is established via an SSH Tunnel, all communications between the BVMS Server (192.168.1.19) and a remote client (49.49.49.48) are encrypted. Below is a Wireshark Capture taken from the BVMS Server after a connection is established. C. Changing the SSH port Locate the SSH service configuration file in " C:\Program Files\Bosch\BVMS\bin " Open the configuration file and find the section below. Edit the value of the BvmsSshServicePort (the port should be unused) and restart the system.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 12:11 PM
    Motion detection is an important option in most surveillance systems. Depending on your configuration, you can determine when video is recorded (saved on the surveillance system server), when notifications are sent, when output is triggered and more. Follow the steps below if you want configure your camera to detect motion and then send the event to the server, to start recording. This guide helps you set this option only for nights and weekends. It is important that you find the best possible motion detection settings for the camera in order to avoid unnecessary recordings or notifications.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 12:09 PM
    Collect Video SDK Logs for VSDK based applications:
    View full article
    100% helpful (1/1)
    ‎04-05-2021 12:02 PM
    This guide is meant to help you adding new cameras in VRM in Configuration Client and display their images in Operator Client. Before adding a new camera there are a few things that need to be taken into consideration: You are not exceeding the maximum number of channels allowed. Each unit has a maximum number of channels. For example: DIP 5000 AIO the maximum number of channels is 42 DIP 6000/ 7000 AIO the maximum number of channels is 128 You have the neccesarry number of licenses installed on the system The units come with 8 channels pre-licensed. If you want to add more cameras or encoders/ decoders, you need first to make sure that licenses have been purchased. The system has enough storage to cover the retention time of the cameras. If there is no storage available,   there is a risk that your system will stop recording. The bandwidth available of the unit is not exceeded. For example: Bandwidth   DIP 5000 AIO: 170   Mbit/s Bandwidth   6000/ 7000 AIO: 550   Mbit/s Article requirements: Operator Client Configuration Client Camera PC/ Server/ Workstation
    View full article
    ‎04-05-2021 11:53 AM
    In order to use the software modules, the software needs to be licensed and to receive licenses for the software, the keys need to be registered online. This article explains how to license a system that runs in full Bosch Video Management System (BVMS) mode with help of Security Systems Software License Manager tool (SLMS).
    View full article
    ‎04-02-2021 05:32 PM
    After clicking the   Forensic Search button   in Bosch Video Management System (BVMS) - Operator Client,   "Video image is not available" message is displayed. What could be the reason?
    View full article
    100% helpful (1/1)
    ‎04-02-2021 05:31 PM
    You may have installed Configuration Manager on your PC, you tried to run it but the software no longer works. What could be the reason?
    View full article
    ‎01-20-2021 09:59 AM
     The attached documents show the different design options that are available when designing a BVMS system. For BVMS 10.1, we have extended the blueprints with Person Identification, the Access Management System, and updated the Enterprise overview.
    View full article
    ‎12-01-2020 04:08 PM
    The attached document describes how a Tattile camera can be connected to BVMS and describes the provided functionality in the BVMS operator client. We recommend keeping the Tattile camera documentation and BVMS configuration manual at hand to fine tune the system configuration to the specific needs of your project.
    View full article
    ‎09-10-2020 11:25 AM
    Our portfolio contains quite a variety of (mobile) video clients and applications. To get a fast first overview we created the attached table to compare the most important ones.
    View full article
    ‎08-19-2020 08:27 AM
    The attached document describes the considerations that need to be taken into account when designing a video surveillance system that is suitable for person identification.
    View full article
    ‎08-19-2020 08:25 AM
    Security guards as well as operators are all member of this Slack channel and use the channel to collaborate. Guards can use their mobile phones to upload still images or movies to the channel for archiving by the security operators. Security operators are able to send snapshots (directly from BVMS), videos (exported), or chat messages to instruct security guards. BVMS automatically posts events to the channel and, optionally, can post camera snapshots or short video clips of incidents into the channel automatically. The attached document provides more insights into the system configuration.
    View full article
    ‎08-19-2020 08:21 AM
    Question How can I protect my security system, from an IT security perspective? Answer The attached document explains how the security system can be hardened. Additionally the BVMS - Network Design Guide includes best practices for desgning a secure network.  
    View full article
    Top Contributors
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist