Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 

    Security: Video

    Sort by:
    100% helpful (1/1)
    ‎11-18-2021 04:35 PM
    This is an example on how to integrate 3rd party devices/software to trigger an event to take place on the encoder. 
    View full article
    100% helpful (5/5)
    ‎07-28-2021 01:29 PM
    The BVMS Project Checklist is an Excel-based tool which makes it easier to design a BVMS system. This article describes how to use the project checklist. Pick the attachment you need, depending on the version of BVMS you have
    View full article
    ‎09-06-2021 02:19 PM
    Not all Cisco PoE+ switches are able to power up the UHO-PoE-10 or VSP-UHO-PoE-10 outdoor housing (F.01U.300.502, F.01U.332.052). Bosch has introduced the UHO-PoE-10 in 2014 following the IEEE802.3-2009 standards Cisco claims that the Bosch UHO-PoE-10 at startup for a short moment (around 1 micro second) exceeds maximum current peek allowed by the updated IEEE 802.3-2015 standard, allowing the PSE (Power Source Equipment) to withdraw the power as a protective measure. Due to analogue overcurrent protector components in the Cisco switch it can happen that tolerances may cause variety in behavior over different Cisco switches, even when the same model and setups are used. Currently this behavior is only known on some Cisco models. (reports were seen on C2960X, C3560CX and recently C9200.)  
    View full article
    ‎04-17-2020 05:45 PM
    Question What's new in version 1.4.0? Answer   ## Bosch Remote Portal ## Easily register cameras to the Bosch Remote Portal - the IoT hub to connect all Bosch BT products. For End-Customers and Installers it provides device management and value-added services as well as camera application management benefits. ## Faster configuration ## Cameras delivered with firmware version 7.10 and newer do not require a reboot anymore when changing the IP address or other network settings. This version of the Project Assistant takes this into account, speeding up the commissioning process even more. ## Specify DNS server address ## A DNS server address is now supported in the application. Now you can simply add a time server URL or connect your cameras, with static IP addresses, to the Bosch Remote Portal. We always appreciate feedback, which you can share here our Knowledge Base as well as as via email (security.apps.com). Thank you and please stay safe in these challenging times. Your Bosch Security App Team PS: The Windows version will be available shortly in our Download Area and the Android respectively iOS versions will made available in the stores once the publishing process completed.
    View full article
    100% helpful (1/1)
    ‎04-17-2020 04:45 PM
    When a support case involves a Bosch DIVAR AN, DIVAR network or DIVAR hybrid for further technical analysis it usually requires obtaining the service log. This is a short how-to manual for retrieving this service log. There are 2 options to retrieve the service log: 1) Using a USB stick and access to the local user interface. 1. Insert a USB memory stick in the device 2. Log on as administrator in the local unit (or ADMINISTRATOR for DIVAR AN model) 3. Access the Main menu by right-clicking the mouse for the Quick menu, and select ‘Main menu' 4. Select Export (or Backup for DIVAR AN model) 5. Select the USB device in field ‘Selected device’. 6. Press on front panel first ‘Shift’ and then within one second the button up. 7. Press OK to save the Service Log on USB stick. The Service log is saved in a protected ZIP file (e.g. ServiceLog-20200302T172254.zip). 2) access to the web interface 1. start browser and enter: http://<IPaddress>/cgi-bin/loadSvrfile/ServiceLog.zip 2. A dialog will popup “The server <ip-address> at Device_CGI requires a username and password”. Enter administrator (or ADMINISTRATOR for DIVAR AN) and password 3. Dialog for the File Download will open stating “Do you want to open or save this file”, propose to Select save and choose preferred filename and location for the Service Log 4. The service log is saved in a password protected zip file  
    View full article
    100% helpful (1/1)
    ‎08-05-2021 04:52 PM
    With the VRM eXport Wizard 2.0 encrypted and unencrypted VRM recordings can be exported (VRM block export) from any video surveillance system based on Bosch Video Recording Manager (VRM) and exported recordings can be converted to mp4-files. Therefore, the VRM eXport Wizard 2.0 offers the following two options, compare also Figure 1: Export VRM recordings of cameras Convert already exported data to mp4-file
    View full article
    ‎08-05-2021 04:54 PM
    Question Dear Bosch, you have so many nice articles related to BVMS on the knowledge base( 😉 ). I would really like to have a consistent overview of the available information. Answer Sure! Status Article Description   Bosch Visio Design Icons Set of Visio Design icons for Bosch products. 2021-06 Updated BVMS - Device Compatibility This document describes how BVMS works with older and newer Bosch cameras.   BVMS - Single port connectivity  This document describes how the SSH functionality works.   BVMS - Configure time services  This document provides a guideline on how to configure time services.   BVMS - Merging VRM systems  This document describes how to merge two VRM systems into a single system.   BVMS - Operator quick guide This document serves as a quick guide for operators.   BVMS - Streamlining This document describes the streamlining concept.   BVMS - Configuring a Microsoft iSCSI target This document explains how a Microsoft iSCSI target can be configured. 2021-06 Updated BVMS - Deployment guide This document describes how a BVMS system can be deployed from the commandline. This is useful when using software deployment environments. 2021-06 Updated Virtualization - A concept explained This document explains virtualization. 2021-06 Updated BVMS - Upgrade guide Described the process on how to upgrade a system (checklist)   BVMS - BIS Connectivity Describes how to connect BVMS to BIS 2021-06 Updated BVMS - SDK help Provides instructions and examples on how to use the BVMS SDK   BVMS - Keyboard shortkeys Shows a (normal computer) keyboard and the shortkeys that are available for BVMS.   BVMS - OPC Server Describes the functionality available in the OPC server.   BVMS - Mobile Video Service Describes the Mobile Video Service conceptually.   BVMS - GDPR Description on how GDPR impacts BVMS.   BVMS - Network design guide First version composed together with ASA. Feedback welcome! 2021-06 Updated BVMS - System design guide Previously known as pre-sales guide.   BVMS - Policy based recording Describes the “cameras and recordings” tab, in addition to the product manuals. 2021-08 Updated BVMS - Blueprints Shows general BVMS system design blueprints.   BVMS - Activate demo license Describes how customer can generate and activate their own demo license. Includes link to the LIF file. 2021-06 Updated BVMS - AE Specification Architects and Engineering specification.   BVMS - Automatic login of Operator Client Describes the parameters which allow the operator client to automatically login.   BVMS - ONVIF Compatibility Lists the tested ONVIF devices.   BVMS - Configuring LDAP Explains how BVMS can be connected to a LDAP environment.   Safe software delivery Describes how customers can check the integrity of the installation zip files.   BVMS - Client installation package Describes how a reduced client installation package can be used. 2021-06 Updated BVMS - Decoding performance Shows the workstation performance   BVMS - Migrating SQL Database Describes how to migrate the SQL database to a different server. 2020-08 Updated BVMS - Securing the security systems Describes how to secure a BVMS system.   BVMS - ANPR by ISS Describes how to configure ISS SecureOS and BVMS to combine ANPR functionality.   BVMS - IEC62676-1 Describes how BVMS meets the requirements specified in IEC62676-1   BVMS Lite - Quick start guide Describes how BVMS Lite can be set-up.   How-to: Transition from Project Assistant to (B)VMS Have you ever wondered how to best transition from the Project Assistant to (B)VMS?   Software-defined video surveillance storage Describes the collaboration between HPE, SUSE and Bosch in modernizing video surveillance storage.   BVMS Person Identification - Data Protection Information The attached document aims to provide concerned parties, such as customers, users, operators or consultants, with an overview of data privacy and protection related features of BVMS Person Identification. 2021-06 Updated Software Service and Support Describes how software moves through the product lifecycle.   VRM eXport Wizard Describes how to use the VRM eXport wizard 2021-06 Updated BVMS Project checklist The BVMS Project Checklist is an Excel-based tool which makes it easier to design a BVMS system.   BVMS - Automated firewall configuration How does BVMS 10.0.1 (or newer) configure the firewall during the installation of the system?   BVMS - Store snapshot of all cameras My customers asks me to store the field of view of the cameras connected to BVMS. Is there an easy way to achieve this without opening every camera manually?   BVMS - Demonstrating (JPEG) cameras How can I use "virtual" cameras to demonstrate BVMS?   How to create CA signed certificates for cameras and distribute  Configure video authenticity / integrity using CA signed certificates   BVMS - Operator collaboration using Slack  Configure BVMS to integrate with Slack.   BVMS - Person Identification Camera Placement Guide  Describes best-practices on camera placement when using person identification.   BVMS - Tattile configuration  Describes how to configure Tattile (LPR) cameras and BVMS.
    View full article
    100% helpful (1/1)
    ‎04-06-2020 06:19 PM
    The VRM eXport wizard is a tool that allows you to export video directly from the VRM. You can find the VRM eXport wizard setup file in the bonus directory of the BVMS zip file. Exports made with the VRM eXport Wizard 1.20.0010 can be open in BVMS (Viewer) 9.0 or newer. The attached document describes how to use the VRM eXport Wizard. BVMS 10 comes with the VRM eXport Wizard 1.20.0016.
    View full article
    100% helpful (1/1)
    ‎03-30-2020 02:50 PM
    Question How can I use "virtual" cameras to demonstrate BVMS? Answer Demonstrating a video surveillance system typically requires a couple of cameras. However, when you only have a couple of cameras, the screen can look boring and empty. Did you know you can use the video streaming gateway to pull in any online JPEG picture as a camera into BVMS? This makes your demonstration more interesting! Additionally, you can set-up your own webserver and host customer JPEG images yourself. You can find a warehouse example below, fully based on JPEG based static images. The attached document describes how to configure JPEG cameras.
    View full article
    100% helpful (1/1)
    ‎03-30-2020 11:46 AM
    Question My customers asks me to store the field of view of the cameras connected to BVMS. Is there an easy way to achieve this without opening every camera manually? Answer The embedded BVMS script engine makes this easy to achieve. The attached document explains how to achieve this and included an example script.
    View full article
    100% helpful (1/1)
    ‎08-26-2021 04:05 PM
    The firewall configuration dialog is a fixed step in the setup process and will allow automatic configuration of all required firewall settings to run BVMS. The applied rules and settings can be found in the readable command script file "C:\Program Files\Bosch\VMS\bin\FirewallConfig.cmd". The firewall rules that have been applied with the setup cannot be reverted and must be manually changed/removed if required.
    View full article
    100% helpful (1/1)
    ‎04-28-2021 02:25 PM
    Related Products: Configuration Manager 7.00 and above. This article shows how to use recorded video in Configuration Manager in order to calibrate a camera and to configure a task.  
    View full article
    ‎06-08-2021 09:16 AM
    In order to quickly offer a technical solution or to provide a professional advice for the next analysis steps, the technical support specialists need to get some general and basic information. Ticket content should always be in English and provided in a well summarized and structured way in order to be able to provide a quick and appropriate feedback. Not following the guideline will impact the processing time of the ticket. Related Products: BVMS Operator Client Overview: This article describes the initial steps one can take for   troubleshooting BVMS display   issues (during   live view   or   playback). It also summarizes what initial information and logs are needed for support in order to start the issue investigation.   General Information   SMA validity How to retrieve the Hardware ID for BVMS and check the Software Maintenance Agreement (SMA) status? BVMS stand alone or appliance Detailed problem description Check and eventually update the version of your Graphic Card driver. During BVMS system tests there were documented cases of display issues related with out of date Graphic card divers. ❗   It is important that the Graphic Card driver of the client is up to date. Find the supported version of the Graphic Card driver in the corresponding to your BVMS version Release Notes (https://downloadstore.boschsecurity.com), in the section Hardware drivers.   Symptom specific Information   Problem Description   Is the issue camera type / FW dependent? Are all the devices in the system affected? Is the issue existent for all BVMS Operator Clients in the system? Is the issue existent for hardware decoders, for camera Web Interface or other display Clients? Is the recording, the playback or are both affected?   Logging Information   BVMS ConfigCollector logs keeping the following conditions: From the machine that shows the issue VSDK logging – please follow the steps from the article: How to collect Video SDK log files  VRM logs (in case VRM runs on the same machine like the BVMS MS, then BVMS ConfigCollector logs from the server) for VRM version 3.82 and onwards use VRM Monitor.   The following articles will help you out:    How to access VRM monitor from BVMS Configuration Client? How to collect VRM logs with VRM Monitor (v3.82/ v3.83)? Screenshot of the Dashboard of the VRM for VRM version till 3.81 - contact support to receive BVIP Log collector tool and use it to collect VRM logs Movie showing the display artefacts can be helpful
    View full article
    100% helpful (1/1)
    ‎03-02-2020 11:43 AM
    CPP6 minimum FW release changes to version 7.10
    View full article
    100% helpful (2/2)
    ‎05-20-2021 10:09 AM
    Question   What is the difference between RAID 5, RAID 5 plus a Hot Spare and RAID 6?   Answer   The RAID combines two or more physical drives into a logical unit presented as a single hard drive to the operating system. There are currently six basic RAID levels: RAID 0, RAID 1, RAID 0+1, RAID 1+0, RAID 3, RAID 4, RAID 5 and RAID 6. The scope of this article is to provide basic information for the levels RAID 5 and RAID 6 and to compare them from point of view of performance and security.   Hot spare   is a drive that acts as a stand by drive in RAID 1, RAID 5 or RAID 6 volume. It is fully functional drive that contains no data and is not used during normal operation. If a drive from the volume fails, the controller reconstructs the data from the failed drive to the hot spare drive. A   RAID 5   array is designed to protect against the failure of a single disk within the array. Because of the way that RAID 5 works, the total capacity of one disk is lost to overhead. If, for example, a RAID 5 array contained five 10TB disks, then the array’s usable capacity would be 40TB. A   RAID 5 (with Hot Spare disk)   array can be configured to treat one of the disks as a hot spare. Then one of the disks is reserved as a replacement in the event that a disk fails. For the above example with five 10TB disks, this would decrease the example array’s usable capacity to 30TB. A   RAID 6   array is designed to protect against two simultaneous disk failures. However, the price for this extra protection is that two disks' worth of capacity is lost to overhead. As such, a RAID 6 array made up of five 10TB disks would have a usable capacity of 30TB because 20 TB is lost to overhead. The   performance   during Normal Operation is measured in IOPS (Input/output operations per second) and as a sum for all the disks (excluding the Hot Spares and decreased for writing parity data) in the array.  As a rule of the thumb, the higher the overhead associated with writing parity data (in the above example RAID 5 with Hot Spare causes the same overhead like RAID 6) the lower the IOPS. The reason for implementing RAID arrays is to   secure the data. The level of   protection   does not directly correlate with the overhead. From the above example both RAID 5 with Hot Spare and RAID 6 have same capacity, but offer different level of protection. In case of failure of RAID 5 array with Hot Spare, the Hot Spare is activated and the rebuild process start immediately. The system can recover from a single disk failure and during the recovery, process is vulnerable to second disk failure. Therefore, RAID 5 and RAID 5 with Hot Spare disk offer the same level of protection – single disk failure.   In contrast, if a disk fails at RAID 6 array, the recovery will start only after the faulty disk is replaced manually.  However, if during the recovery process second disk fails, the RAID 6 array will stay functional.
    View full article
    ‎04-05-2021 04:18 PM
    The purpose of this article is to provide step by step instructions on how to successfully import video and storage devices from a DIVAR IP Recording Appliance to a Professional BVMS system while retaining all existing recorded video. Note: This procedure should only be performed by a certified BVMS / VRM technician or installer
    View full article
    ‎04-05-2021 04:37 PM
    This article  provides an overview of Operator Client (BVMS 10.0.1) for most used functionality for security operators and incidental users.
    View full article
    100% helpful (2/2)
    ‎08-05-2021 09:26 AM
    This article describes how to configure a generic Microsoft Windows Server (2012 R2, 2016 or 2019) based server to serve as an iSCSI target for a Bosch video surveillance environment. SCSI (Small Computer System Interface) is most commonly used for the communication between computers and peripheral devices, such as hard drives. iSCSI enables devices to use SCSI over a network interface, therefore it makes a lot of sense for cameras to use iSCSI to record video. The camera is a small computer that needs a (network) connection to a "hard drive" to store video footage. In other systems this job is performed by the network video recorder (NVR).
    View full article
    ‎04-05-2021 04:13 PM
    This article describes how Streamlining works and how it can be finetuned.
    View full article
    ‎08-24-2021 02:09 PM
    Time is everything: meetings, public transportation, religion, transactions: the whole world is working because the concept of “time” exists. Within a security (or any other) system this is not different: recording schedules, logging, authorizations, encryption keys, timelines, all of these concepts can exist because of time. As a result, time can either make or break a system: problems can appear only due to a time difference of a couple of seconds between two system components. This article  describes how time services can be configured in a BVMS version ≤ 10.1 environment. For BVMS  version ≥ 11.0 please refer to the following article:  Where can you configure NTP server for cameras/encoders in BVMS≥11? Time: what is the challenge? Each device has its own internal clock, which is based on a hardware mechanism. This mechanism acts like a watch: try to put two watches together and synchronize them on the millisecond. A security system consists out of more than two devices, it can consist of thousands of devices. Synchronizing the time of all these devices by hand is a very time consuming task. Additionally, due to small differences in electronic components, devices can have deviations from one another. These deviations cannot be detected by the human eye, but can result in considerable time differences when a device is running for months. Synchronizing time The Network Time Protocol (NTP) was created to solve these challenges. The Network Time Protocol is a network-based protocol for clock synchronization between system components. The protocol utilizes a standard IP network to communicate and can maintain a time difference (considering a local area network) of less than one millisecond between components. The Network Time Protocol is a standard protocol and documented in   RFC 5905. The operation and configuration of the Network Time Protocol are complex: a hierarchical architecture needs to be set-up including several layers of systems which are able to run the Network Time Protocol. To reduce complexity the Simple Network Time Protocol (SNTP) was  created. The Simple Network Time Protocol is mainly used when less accuracy (deviations of 1-2 seconds are acceptable). Windows Time Service The Bosch Video Management System is running on Microsoft Windows Server operating systems. Windows includes an internal time service, which is explained on Microsoft Technet: “The Windows Time service, also known as W32Time, synchronizes the date and time for all computers running in an AD DS domain. Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The Windows Time service uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation and resource access requests. The service integrates NTP and time providers, making it a reliable and scalable time service for enterprise administrators. The W32Time service is not a full-featured NTP solution that meets time-sensitive application needs and is not supported by Microsoft as such. For more information, see Microsoft Knowledge Base article 939322,Support boundary to configure the Windows Time service for high-accuracy environments   (http://go.microsoft.com/fwlink/?LinkID=179459).” Source:   Windows Time Service Technical Reference - Microsoft Technet The Windows Time service is based on the Simple Network Time Protocol. Summary The Network Time Protocol requires a very complex infrastructure, which impacts the total installation and configuration effort of the system. The Simple Network Time Protocol (also used for the Windows Time Service) reduces the complexity, but at the same time also reduces the accuracy. For most security applications the Simple Network Time Protocol provides sufficient accuracy. Bosch recommends to use the Windows Time service, based on the Simple Network Time Protocol, as basis for time synchronization in a security network. This article provides best-practices on how to configure the Bosch Video Management System and related components in a time synchronization environment based the Windows Time service. Alternatively, the Network Time Protocol can be used whenever it is already existing inside an infrastructure or when event accuracy with a deviation less than one second is required. Due to the complexity of the infrastructure Bosch does not make any recommendations related to the Network Time Protocol.     Step-by-step guide   Management server configuration   A. Operating system configuration This section also applies for the   Video Recording Manager   and   Mobile Video Service   when these are not running on the management server. Microsoft has prepared a lot of documentation related to time configuration Go to the   Microsoft Support: How to configure an authoritative time server in Windows Server   page and scroll down to the section “Configuring the Windows Time service to use an external time source”. Click the download button under the “Here’s an easy fix” section. Figure:   Download the Microsoft Windows Time service configuration utility   The utility will configure external time servers. To select these, browse to   http://pool.ntp.org   and select two servers which are related to the geographical location of the system, for example “de.pool.ntp.org” and “nl.pool.ntp.org”, referring to Germany and the Netherlands. Another (local or external) (S)NTP server can also be chosen.   Start the Microsoft configuration utility and configure it as indicated and shown in the figure below. Administrative access is required to run the utility. Figure:   Pool.ntp.org   locations   Figure:   Windows Time service configuration   Alternatively the configuration can be done from the command-line, using the command shown below. net stop w32time w32tm   /config   /syncfromflags :manual   /manualpeerlist : "nl.pool.ntp.org,   de.pool.ntp.org" net start w32time The configuration can be verified by starting the Windows Command prompt and issuing the command “w32tm /query / status”, as shown in the figure below. Notice the time source, this should point towards the configured servers. Figure:   verifying configuration   It can take up to one minute before the correct time source is displayed. When there is a problem, the configured (S)NTP server can be tested by issuing the “w32tm /stripchart /computer:de.pool.ntp.org”, which should result in the output displayed in the figure below. Figure:   test the (S)NTP service   When an unexpected result is returned, it is recommended to check access to the specific (S)NTP server. A firewall might prevent the communication between the (S)NTP server and the management server.   B. BVMS Management Server configuration BVMS automatically points devices to its own time-server. This can be changed by editing the BvmsCenterlServer.exe.config file, located in C:\Program Files\Bosch\VMS\bin\. Find the key "TimeServerIPAddress" and adjust the value, as shown in the example below (192.168.0.1). <!--   Ip address of the time server for VRM/NVR encoders(defaults to the Central-Server IP if not set) . --> < add   key = "TimeServerIPAddress"   value = "192.168.0.1"   />     C. Workstation configuration The Bosch Video Management System Operator client runs on a Windows workstation. When the workstation and server are part of the same Microsoft Active Directory service domain, no manual time synchronization needs to be configured. Figure:   workstation configuration, "192.168.0.200" needs to be replaced by the IP address or Fully Qualified Domain Name of the management server.   When the Bosch Video Management System workstation and management Server are not joined in a domain, or into the same domain, the workstation(s) need to be manually configured to use the management server as a time server. To achieve this, the description above can be used. Instead of using the   pool.ntp.org   as a server, the management server is now entered.   D. Camera configuration If a camera is connected to a BVMS system the time server will be automatically configured.
    View full article
    Top Contributors
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist