Network switch has port security on and shuts down a NetApp iSCSI data port (e.g. CH3).
This article is only relevant in aspects of network security / port security where MAC addresses are analysed.
Some network security applications are capable of sniffing network packets thoroughly enough to pick up MAC addresses on E-Series Controller ports that are not seen in the Storage Array Profile data.
This article will explain how to set-up the RAID quickly in order to start the "re-imaging" process from the Recovery DVD (one at DIVAR IP 6000 R2 - or two DVDs at DIVAR IP 7000 R2) enclose to each DIVAR IP 7000 R2 or DIVAR IP 6000 R2 delivery.
With fw7.70 a new feature was introduced that allows you to tune the scene for Day and Night separately using 2 custom scene modes.
This article explains how to switch the scene modes Custom mode#1 & Custom mode#2 based on Day or Night for Bosch cameras
In this article, the technology behind IVA Pro Buildings, IVA Pro Traffic and IVA Pro Intelligent Tracking will be explained, as well as the differences between each other, and towards the more traditional IVA Pro Perimeter and classical IVA.
With the DSA E2800 Bosch introduced Multipathing. It is a fault-tolerance technique that defines more than one physical path between the camera and its iSCSI storage devices through redundant network connections.
When using this feature, recording of video data and replaying video data is possible even in case of an iSCSI controller failure. To ensure also that outages of infrastructure equipment (e.g. Switch) could be covered, we recommend following Interconnection.
This article describes the easiest method for adding Expansion shelves to a Base unit DSA E-Series E2600, E2700 or E2800.
This article also applies when:
The amount of storage is overloaded and you need additional storage after fully populating the base shelf.
1. Configuration Manager
2. Configuration Client which is included with BVMS
3. Santricity Software
BVMS v10.1 and BVMS v11.0 come with a checkbox where you can logon to the Operator Client with Windows Credentials.
If you want to use this function, you need to set up the BVMS Configuration Client and browse the AD users-groups. Then, the users can sign in to Operator Client with their Windows-Credentials.
In order to increase system security in BVMS, it is recommended to set the Global CHAP password.
This article contains the configuration steps for an existing fully operational BVMS 11.x system with no CHAP password configured.