Bosch ST has sold the HP Workstations and the HP Enterprise Servers and is responsible to provide the required Service & Support for these products regardless of the SLA in place with HP. Therefore, the customer always will contact the Bosch After Sales organization in case of any problems encountered with one of these products. The customer must never been told to contact HP or HPE directly if he seeks support from Bosch. In this solution article a questionnaire for a first basic analysis of a reported issue is described. This checklist is intended to help to identify and resolve known issues immediately and to collect relevant data in case of an unknown issue.
Network switch has port security on and shuts down a NetApp iSCSI data port (e.g. CH3). This article is only relevant in aspects of network security / port security where MAC addresses are analysed. Some network security applications are capable of sniffing network packets thoroughly enough to pick up MAC addresses on E-Series Controller ports that are not seen in the Storage Array Profile data.
In rare situations it might happen that the mirrored SSD drives used for the Operating system need to be set-up from scratch when not only one, but both SSD drives used in the RAID-1 mirrored setup need to be exchanged with two new drives (e.g. Both SSD have been removed or were missing during first install attempt or imaging process from the recovery DVD. It is strongly recommended to always open a Technical Support Case at the local BOSCH Security Systems Level 1 Support team / help desk. Report the the following details to the support: Is the system registered at BOSCH? What is the System Serial-No.? What is the storage capcity of the new inserted two SSD drives at the rear side of the used DIVAR IP 70000 R2 system?
In December 2017 information about two vulnerabilities in modern processors were published. These exploits are often referred to as Meltdown and Spectre. Due to the nature of the flaw, many processors(AMD, ARM, Intel, etc.) are considered vulnerable. In order to use the exploit, an attacker needs to execute malicious code on the target system. It is thus generally advised to protect systems from unauthorized access (e.g. by using a strong password policy). BOSCH IP Cameras and BOSCH Encoders are based on Common Product Platform (CPP) designs. Each CPP uses a specific System-on-Chip (SOC), or a family of SoC’s, which inherit various CPU cores. Some of them include ARM cores, which are considered vulnerable. We therefore have analyzed our Common Product Platforms if they are affected, with the result: • Our Common Product Platforms CPP-ENC, CPP3 and CPP4 are not affected by the vulnerabilities. • The processors used in the SoC’s of our Common Product Platforms CPP6, CPP7 and CPP7.3 are affected. As we do not allow 3rd party code being installed or executed on our cameras, successful exploitation is considered not possible with Meltdown or Spectre. In short, our IP cameras and encoders are not vulnerable to Meltdown or Spectre exploitations. In general we recommend to always keep your device Firmware up to date.
In the Manual of the VideoJet decoder 8000 at Point 6.1: Setting up the decoder with Configuration Manager Before you can operate the unit within your network, it must have a valid IP address for your network and a compatible subnet mask. Notice! As a default DHCP is enabled in the unit’s network settings. With an active DHCP server in the network you must know the IP address assigned by the DHCP server to operate the unit. The following default address is preset at the factory: 192.168.0.1 The correct inital IP address is: 192.168.0.200