🛈 Port Forwarding
Allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).
In a typical residential network, nodes obtain Internet access through a DSL or cable modem connected to a router or network address translator (NAT/NAPT). Hosts on the private network are connected to an Ethernet switch or communicate via a wireless LAN. The NAT device's external interface is configured with a public IP address. The computers behind the router, on the other hand, are invisible to hosts on the Internet as they each communicate only with a private IP address.
When configuring port forwarding, the network administrator sets aside one port number on the gateway for the exclusive use of communicating with a service in the private network, located on a specific host. External hosts must know this port number and the address of the gateway to communicate with the network-internal service. Often, the port numbers of well-known Internet services, such as port number 80 for web services (HTTP), are used in port forwarding, so that common Internet services may be implemented on hosts within private networks.
Until some years ago, new released cameras, encoders, domes and decoders that were introduced into market after a BVMS release could not be connected to an existing BVMS version because these cameras where not known to the BVMS.
In the BVMS 4.5.1, a new concept was introduced.
This concept treats Bosch video encoders and decoders as generic devices, and automatically recognizes specific device functionality (for example the number of streams, relays and inputs).
Based on this information, unknown device is added to the system and can be used by the operator.
The attached document provides a detailed description of this functionality.
Network switch has port security on and shuts down a NetApp iSCSI data port (e.g. CH3). This article is only relevant in aspects of network security / port security where MAC addresses are analysed. Some network security applications are capable of sniffing network packets thoroughly enough to pick up MAC addresses on E-Series Controller ports that are not seen in the Storage Array Profile data.
This article will explain how to set-up the RAID quickly in order to start the "re-imaging" process from the Recovery DVD (one at DIVAR IP 6000 R2 - or two DVDs at DIVAR IP 7000 R2) enclose to each DIVAR IP 7000 R2 or DIVAR IP 6000 R2 delivery.
Traffic detector has been developed to cope with all traffic densities up to high density like congestions and queues in front of traffic lights. It also detects non-moving vehicles and is thus applicable for smart parking. In addition to vehicles, it also detects pedestrians.
Tunnels & Highways: o Collection of traffic statistics o Detection of congestions for automatic speed signaling o Detection of wrong way driving
Intersections: o Detecting presence and volume of vehicles
Smart parking: o Detect parked cars
With the DSA E2800 Bosch introduced Multipathing. It is a fault-tolerance technique that defines more than one physical path between the camera and its iSCSI storage devices through redundant network connections.
When using this feature, recording of video data and replaying video data is possible even in case of an iSCSI controller failure. To ensure also that outages of infrastructure equipment (e.g. Switch) could be covered, we recommend following Interconnection.
This article describes the easiest method for adding Expansion shelves to a Base unit DSA E-Series E2600, E2700 or E2800.
This article also applies when:
The amount of storage is overloaded and you need additional storage after fully populating the base shelf.
1. Configuration Manager
2. Configuration Client which is included with BVMS
3. Santricity Software
When scanning a QR or Data Matrix code on a label using the Project Assistant app, it can happen that you get an error message that the MAC address cannot be found (1) or that only part of the address is correctly extracted (2).
First of all, there are different types of labels:
product labels (on the device)
box labels (on the outside of the box/packaging)
installer / UX labels (inside the box /packaging)
Symptom (1) can only happen when scanning a product label because some QR or Data Matrix codes do not contain a MAC address, depending on the product, even though the MAC address is available in plain text right next to the code.
The box and installer label codes, however, always contain the MAC address information.
Symptom (2) can happen when scanning certain installer labels due to legacy formatting.
We have further standardized the labels so that the symptoms mentioned above will be resolved. There will be a transition period, however. As an alternative for symptom 1, you will have smooth experience when preferably scanning the box label. If you encounter symptom 2, we ask you to enter the MAC address manually or use the December 2018 release of the Project Assistant (version 1.2)
PS: For full transparancy on QR code / Data Matrix content and/or troubleshooting purposes, you can use conventional code scanning apps available in the resepective app stores.
Bosch software is distributed via the Bosch website, but can also be re-distributed by Bosch partners. It is important for the system-installer to check if the installation file he or she has received, matches exactly with the output of the engineering process. There are several risks that, in the distribution path, changes are made to the installation file. Keyloggers or other spyware could be added to the installation, or in theory video surveillance footage could be routed to external resources.
The attached document describes how the integrity of software can be checked.
This articles gives a short introduction to scripting alarm and counter tasks with Intelligent and Essential Video Analytics in FW 7.60. It also provides a broad selection of example scripts for explanation as well as including real world application examples.
In the Manual of the VideoJet decoder 8000 at Point 6.1: Setting up the decoder with Configuration Manager Before you can operate the unit within your network, it must have a valid IP address for your network and a compatible subnet mask. Notice! As a default DHCP is enabled in the unit’s network settings. With an active DHCP server in the network you must know the IP address assigned by the DHCP server to operate the unit. The following default address is preset at the factory: 192.168.0.1 The correct inital IP address is: 192.168.0.200
Communication can get interrupted and configuraiton might fail if the below desribed actions are not performed. If your system is affected or not is described here as follows:
There can be authentication issues between the BVMS Central Server and the Video Recording Manager in case they are installed on different Servers.
It is possible to see reports at the BVMS 8.x system alarms that VRM reports wrong version
Please check in the VRM debug logging if the following logline indications can be found
This article summarizes the BVMS design details, and serves as a guide to planning a BVMS system with Bosch cameras and storage. It focuses on BVMS combined with the VRM.
The BVMS 11.0 release notes can be found on the Bosch Security Systems website. This article lists the valid design specifications for BVMS 11.0.
The attached documents should help you to make the upgrade process as smooth as possible. The upgrade itself is not restricted to BVMS software only. The supported software and firmware versions can be found in the release notes of the related BVMS version.