Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 
    Sort by:
    100% helpful (1/1)
    ‎07-03-2023 09:29 AM
    You may have installed Configuration Manager on your PC, you tried to run it but the software no longer works. What could be the reason?
    View full article
    100% helpful (1/1)
    ‎01-23-2023 12:11 PM
    Follow the steps from this article if you want to configure your camera to detect motion and then send the event to the server, to start recording. This guide helps you set this option only for nights and weekends. It is important that you find the best possible motion detection settings for the camera in order to avoid unnecessary recordings or notifications.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 04:49 PM
    This article explains how to find and calculate the specific size of BVMS logs on your server when the log starts to overwrite your own data.
    View full article
    100% helpful (6/6)
    3 weeks ago
    The BVMS Project Checklist is an Excel-based tool which makes it easier to design a BVMS system. This article describes how to use the project checklist. Pick the attachment you need, depending on the version of BVMS you have
    View full article
    100% helpful (1/1)
    ‎09-20-2023 09:29 AM
    This article presents a consistent overview of the available BVMS articles on the Knowledge Base
    View full article
    100% helpful (2/2)
    ‎08-17-2022 04:59 PM
    The VRM eXport wizard is a tool that allows you to export video directly from the VRM. This article describes how to use the VRM eXport Wizard. BVMS 10 comes with the VRM eXport Wizard 1.20.0016.
    View full article
    100% helpful (1/1)
    ‎06-14-2022 04:55 PM
    Follow this article and find out how to store a snapshot of all cameras automatically from the Operator Client
    View full article
    100% helpful (1/1)
    ‎10-26-2022 12:41 PM
    The firewall configuration dialog is a fixed step in the setup process and will allow automatic configuration of all required firewall settings to run BVMS.
    View full article
    100% helpful (1/1)
    ‎05-04-2023 09:10 AM
    The purpose of this article is to provide step by step instructions on how to successfully import video and storage devices from a DIVAR IP Recording Appliance to a BVMS standalone installation while retaining all existing recorded video.
    View full article
    100% helpful (1/1)
    ‎04-05-2021 04:37 PM
    This article provides an overview of Operator Client (BVMS 10.0.1) for most used functionality for security operators and incidental users.
    View full article
    100% helpful (3/3)
    ‎06-18-2024 09:36 AM
    This article describes how to configure a generic Microsoft Windows Server (2012 R2, 2016 or 2019) based server to serve as an iSCSI target for a Bosch video surveillance environment. SCSI (Small Computer System Interface) is most commonly used for the communication between computers and peripheral devices, such as hard drives. iSCSI enables devices to use SCSI over a network interface, therefore it makes a lot of sense for cameras to use iSCSI to record video. The camera is a small computer that needs a (network) connection to a "hard drive" to store video footage. In other systems this job is performed by the network video recorder (NVR).
    View full article
    100% helpful (1/1)
    ‎04-05-2021 12:13 PM
    When working with previous versions of BVMS, remote connectivity was cumbersome due to the amount of port mapping that needed to be configured. BVMS 7.5 provides a new method of remote connectivity utilizing Secure Shell (SSH) Tunnelling. SSH Tunnelling constructs an encrypted tunnel established by an SSH protocol/socket connection. This encrypted tunnel can provide transport to both encrypted and un-encrypted traffic. The Bosch SSH implementation also utilizes Omni-Path protocol, which is a high performance low latency communications protocol developed by Intel. Key management The BVMS SSH service generates a private and public key when it is started for the first time. Both keys are saved in an encrypted file. When the BVMS SSH service restarts this file is detected and the private key is read.   Step-by-step guide   1.Configuration   A. Installation There is little to no configuration required for this feature to function. The SSH Service must be installed and running. If deploying a BVMS Pro system, insure the SSH Service is part of the installation process. Recording Appliances that ship with BVMS 7.5 should have the service pre-installed. Check your “Services”. If the service has not been installed, the install package can be run from the BVMS 7.5 downloadable install package. If working with a DIVAR IP Recording Appliance, the appliance “Installer Package” must be used.   B. Port mapping entry The primary configuration step is to configure one (1) port forwarding for the BVMS Central Server to utilize port 5322 for both internal and external connections. This is the only port mapping entry that needs to be made for the entire system. The image below shows a sample configuration.   2. Operation   A. Login with the Operator Client After the basic configuration is done, logging in via Operator Client is very intuitive: From the log menu, select the “Connection” drop down menu, then Select <New…> You will be prompted to enter an IP address or DNS host name. You will also notice a cheat guide below the entry menu that will assist with address entry. Addressing must be in the following format: ssh://IP or servername:5322. In the example we used: ssh://49.49.49.49:5322. After entering a properly formatted address, enter a valid user name and password. SSH users MUST have a password associated with their BVMS account. User accounts without a password cannot log in utilizing an SSH Connection.   B. Verification After connection is established via an SSH Tunnel, all communications between the BVMS Server (192.168.1.19) and a remote client (49.49.49.48) are encrypted. Below is a Wireshark Capture taken from the BVMS Server after a connection is established. C. Changing the SSH port Locate the SSH service configuration file in "C:\Program Files\Bosch\BVMS\bin" Open the configuration file and find the section below. Edit the value of the BvmsSshServicePort (the port should be unused) and restart the system.
    View full article
    100% helpful (1/1)
    ‎11-24-2022 11:27 AM
     This article shows the keyboard shortcuts that can be used by operators when operating the BVMS system. 
    View full article
    100% helpful (1/1)
    ‎02-23-2024 09:41 AM
    This article will provide a basic explanation and simple examples of the interfacing (scripting, calling functions by external applications) functionality in Bosch Video Management System.
    View full article
    100% helpful (4/4)
    ‎08-28-2023 08:52 AM
    Check this article and have a look at the attached documents which describe the settings you must perform after having installed BIS and BVMS on the different computers.
    View full article
    100% helpful (3/3)
    3 weeks ago
    This attached document describes how Bosch Building Technologies handles the life-cycle of the BVMS, BIS, AMS, and APE, and in which state a specific release can reside.
    View full article
    100% helpful (2/2)
    ‎02-08-2023 03:48 PM
    The pop-up dialog window message: "Setup has detected a pending restart.  Please reboot the system and rerun the installation"  appears when attempting to run the valid BVMS windows installer package.
    View full article
    50% helpful (1/2)
    ‎07-27-2023 08:52 AM
    The timeline is present, but the recordings appear to be black for all cameras.
    View full article
    ‎08-16-2024 03:21 PM
    Aside from configuring the camera using its own browser, there are other tools you can use to setup the camera. The choice when using which tool will come down to the individual installer. Their experience and know-how of the tool will dictate which one they will use. 
    View full article
    ‎08-05-2024 03:18 PM
    Bosch recommends that the operating systems used by the video surveillance system are constantly updated, with a maximum update cycle of 6 months. Windows updates often include fixes for recently discovered security vulnerabilities, such as the Heartbleed SSL vulnerability, which affected millions of computers worldwide.
    View full article
    Top Contributors
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist