All customers using the Bosch Video Security application are requested to update to latest version 3.0.3 ( build number 220.127.116.11 )
What changes have been made in the new version 3.0.3:
Bug fix for the connection issues occurring in the former versions (version 3.0.1 as well as 3.0.2) listed below
Usability adjustments regarding the certificate management
After you have updated the current version, you are able to accept all used certificates even if they are valid or expired. The application will not ask you for any further accepting anymore.
As you looking to renew your expired certificates please refer to following knowledge base article: https://community.boschsecurity.com/t5/Security-Video/HowTo-update-Certificate-on-IP-Camera-s-amp-VRM-Servers/ta-p/8538
After updating the Bosch Video Security App in version 18.104.22.168 on an apple device, a login to a site (e.g. DIVAR IP 3000 or DIVAR IP 7000) is no longer possible. Bosch Video Security App in version 22.214.171.124 offers a workaround until the next release of the App will provide the full enhancements needed
This article is to inform that the Bosch Video Security App unfortunately shows connectivity issues in older version 126.96.36.199.
Versions affected: Affected versions of the BOSCH Video Security App * Version 188.8.131.52 * Version 184.108.40.206
Note: Newer DIVAR IP all-in-one units added to the BOSCH product portfolio or DIVAR IP without BVMS included (like DIVAR IP 5000) are not affected.
How to work with App version 220.127.116.11
The BOSCH Video Security Client App in version 18.104.22.168 was published on 20th of June 2019.
In case users can not connect to their DIVAR IP 3000 or DIVAR IP 7000 units using the BOSCH Video Security App in version 22.214.171.124 are requested to follow the steps here below.
Steps to connect to DIVAR IP 3000 or DIVAR IP 7000 using the App version 126.96.36.199
(status 2019/06/21) Newer versions contain enhancements to allow secure connections to sites. Especially for users migrating from an existing App version below version 188.8.131.52 are requested to follow the steps in this article. Version 184.108.40.206 allows users to connect again to sites with e.g. DIVAR IP 3000 or DIVAR IP 7000. All units like DIVAR IP 5000 or DIVAR IP 6000 are able to connect with the App 220.127.116.11 without following special steps mentioned here below.
💡 Steps to achieve connections to existing sites using version 18.104.22.168:
1. All users with existing sites configured in the Bosch Video Security App version 22.214.171.124 are requested to note and save the site URL and credentials.
2. After the Bosch Video Security Appp version 126.96.36.199 is updated to version 188.8.131.52, check for existing sites migrated to the list of sites in the BOSCH Video Security App 184.108.40.206 (see below screenshot of a apple iPhone device) 3. click on the edit "pencil" icon to be able to check the site settings and to note the user credentials. Tap on "Customize" to see the site details. Tap on "Next" to see also the Logon details like - User name - URL - Port - Secure connection (SSL) yes/no - The password is not shown visible and must be known by the technician/user 4. Note down the details shown in steps 3 and make sure the password is known from the site.
5. Now exit the dialog with tap on "Cancel" to exit the editing dialog. In the Site overview in edit mode you see the delete / waste bin icon to delete a complete site. This will remove the complete site.
6. Now add your unit (e.g. DIVAR IP 3000 or DIVAR IP 7000 etc.) as new site again to the BOSCH Video Security App in version 220.127.116.11. Please again be sure that version 18.104.22.168 is used minimum. Use the credentials and URL noted in step 2 and step 3 and also use your password to setup the site again.
7. In the next screen the user is requested to approve and accept the certificate. Please tap on "Accept Selected" and proceed to next step.
8. As the connection is not possible without User name and Password you will see the message "The authentication failed" - which is normal when credentials have been in use before. Insert now your - User Name (e.g. admin) - Password and proceed as normal with "Retry". Proceed and connection will be established. In case the user want to view a live video the transcoder will also help to find the best bandwith for transcoding. 9. Now you are ready and users can reconnect to the site any time. As soon the new Bosch Video Security client newer thant 22.214.171.124 is online, BOSCH will inform here in this article. Please make use of the RSS feed funciton in your browser/mail client to get notified any time there is a new BOSCH KB article online.
Symptom in older Version 126.96.36.199 online before 20th of June 2019
The below Patterns are just for explanation and are obsolete for the Bosch Video Security App 188.8.131.52. This details are provided for users running on the older App version 184.108.40.206
Pattern 1: diplayed message is „Interner Fehler“ / „Internal Error“ initial connection directly after adding a new site works. All following connection attemts fail with above mentioned message „Internal Error“ in the Login-Window.
Pattern 2: Crash in case of remote login to an BVMS DIVAR IP (e.g. DIVAR IP 3000) Precondition: No local connection with DIVAR IP possible: Connection then via remote URL --> Video Security App shows German message: „Geräte nicht unterstützt“ or English message: „Device not supported“
Please monitor the IOS App store for newer versions of the BOSCH Video Security App. Versions newer than 3.0.1.x will contain enhancemnts to offer an easier log-on and connnection experice.
... View more
Microsoft Event Logging, when an error occurs, the system administrator or Integrator must determine what caused the error. The operator can then use the event log to help determine what conditions caused the error and identify the context in which it occurred.
Starting Event Viewer
The procedure for starting Event Viewer depends on your starting point, e.g. windows key + R type in ”eventvwr.msc” hit enter.
With the decent administrative access, you can select any computer in your network to view that Microsoft system event logs.
To select computers in Event Viewer:
In the top of the console tree, right-click Event Viewer (local), and then click Connect to another computer.
Enter FQDN/NetBIOS name or browser to the regarding machine
Adjusting Event Viewer Settings
In the console tree, right-click the appropriate log file, and then click Properties. Click the General tab.
Saving Event Logs
In the console tree, right-click the appropriate log file, and then click Save Log File As. Navigate to the subfolder in which you want to save the file, type a name for the file, click the file type, and then click Save.
Clearing Event Logs
In the console tree, right-click the appropriate log file, and then click clear all Events. You are prompted for whether you want to save the log to a file before clearing it. Click “Yes” to save a log and clear all events. If you click No, the log is not saved, but all events are cleared from the selected Event log. If you click Cancel, the request to clear the log is canceled.
Viewing Event Details
In the console tree, right-click the appropriate log file. A list of events in the log file is displayed in the details pane of Event Viewer. Click a specific event in the details pane to display the Event Properties dialog box and details about the event.
In the console tree, right-click the appropriate log file, and then click Properties. Click the Filter tab. Type the appropriate information that you would like to filter.
In the console tree, right-click the appropriate log file. On the View menu, click Find. Type the appropriate information that you would like to find in the dialog box, and then click Find Next.
An event that indicates a significant problem such as loss of data or loss of functionality. For example, if a service fails to load during startup, an Error event is logged.
An event that is not necessarily significant, but may indicate a possible future problem. For example, when disk space is low, a Warning event is logged. If an application can recover from an event without loss of functionality or data, it can generally classify the event as a Warning event.
An event that describes the successful operation of an application, driver, or service. For example, when a network driver loads successfully, it may be appropriate to log an Information event. Note that it is generally inappropriate for a desktop application to log an event each time it starts.
An event that records an audited security access attempt that is successful. For example, a user's successful attempt to log on to the system is logged as a Success Audit event.
An event that records an audited security access attempt that fails. For example, if a user tries to access a network drive and fails, the attempt is logged as a Failure Audit event.
The events themselves are what we’re trying to see, of course, and their usefulness can range from really specific and obvious things that you can fix easily to the totally undefined messages that don’t make any sense and you can’t find any information on your preferred search engine. example:
The regular fields on the display contain:
Log Name – while in older versions of Windows everything got dumped into the Application or System log, in the more modern editions there are dozens or hundreds of different logs to choose from. Each Windows component will most likely have its own log.
Source – this is the name of the software that generates the log event. The name usually doesn’t directly match with a filename, of course, but it is a representation of which component did it.
Event ID – the all-important Event ID can actually be a little confusing. If you were to Google for “event ID 122” that you see in the next screenshot, you wouldn’t end up with very useful information unless you also include the Source, or application name. This is because every application can define their own unique Event IDs.
Level – This tells you how severe the event is – Information just tells you that something has changed or a component has started, or something has completed. Warning tells you that something might be going wrong, but it isn’t all that important yet. Error tells you that something happened that shouldn’t have happened, but isn’t always the end of the world. Critical, on the other hand, means something is broken somewhere, and the component that triggered this event has probably crashed.
User – this field tells you whether it was a system component or your user account that was running the process that caused the error. This can be helpful when looking through things.
OpCode – this field theoretically tells you what activity the application or component was doing when the event was triggered. In practice, however, it will almost always say “Info” and is pretty useless.
Computer – on your home desktop, this will usually just be your PC’s name, but in the IT world, you can actually forward events from one computer or server to another computer. You can also connect Event Viewer to another PC or server.
Task Category – this field is not always used, but it ends up basically being an informational field that tells you a bit more information about the event.
Keywords – this field is not usually used, and generally contains useless information.
As a rule of thumb (common way of doing), you should try searching by the general description, or the Event ID and the source, or a combination of those values. Just remember that the Event ID is unique for each application. So there is a lot of overlap and you can’t just search for “Event ID 122” only. This is because users might find the list is too large and too general, your specific search aspect might not fit your issue.
... View more
IP cameras, Configuration Manager, BVMS Configuration Client
This article provides a background information about syslog, tips for 3 rd party Syslog server options and step by step instructions how to configure, activate and collect the syslog.
Syslog feature is implemented in all IP BOSCH Products. The BOSCH IP cameras as network devices can continuously send system messages via Syslog to a Syslog server software. This function should first be activated and configured.
Once configured syslog will allow a continuous monitoring information even throughout a complete IP camera power cycle (reboot) as the camera starts connecting to the syslog server IP as soon it is getting back online.
Syslog can be useful for analyzing issues that are unpredictable and difficult to reproduce.
3 rd party tools as Syslog server:
There are many different monitoring tools available on the market. Examples of some easy tools to start working with can be e.g.:
PRTG NETWORK MONITOR from PAESSLER
Kiwi Syslog Server
EventLog Analyzer from ManageEngine
Example configuration for KIWI syslog free edition to receive and save the syslog send by the camera.
Syslog server software must be installed on PC/Workstation that is on the same IP-network as the camera/encoder.
One should check the size of the log file per a day and be sure there is enough storage capacity.
1. Enable the logging of the Kiwi software. Access "Setup/Rules/Default/Actions/Log to file", check the box for “Log to file”, then browse to the path where the log files can be saved.
2. Add the IP address of the camera(s) to "Setup/Inputs". Click on the address box, type in the address of the camera, click “Add”, then “OK”. (The Free Edition can log a maximum of 5 cameras.)
3. This point should be done after the camera is configured to send the syslog data. Open the Kiwi software and select “Manage” then Click on “Start the Syslogd service”. Log information should start to scroll in the Syslog main window. How fast or often messages appear depend on which debug command was provided by Tech support
Configure the camera to send the syslog data
The configuration can be done via the Web Interface of the camera, Bosch Configuration Manager (stand-alone configuration software) or BVMS Configuration Client software (part of BVMS management system). The layout of the above 3 interfaces is very similar. The following steps and screenshots are done for Configuration Manager.
1. Ensure that the Date/Time of the Syslog PC, camera(s), and recording system are synchronized (as close as possible)
2. Enable the Time Stamping and ensure that it is set for milliseconds. a. NOTE: The time stamp is important for troubleshooting.
3. Navigate to Configuration Tab “Network/Advanced/Syslog”. Enter the IP address of the Syslog Sever PC/Workstation and click the “Save” icon.
4. Navigate to Configuration Tab “Service/Logging”, then Debug Logging. At the Even Logging text box the debug command that was provided to you by Bosch support team.
If no debug command was provided, use: syslog_dbg. Click on the “Save” icon.
Collecting the logs
Once the issue appears, note the date and time, collect and provide the maintenance.log from the camera and the syslog saved at the of the Syslog Sever PC/Workstation.
... View more
In all VRM installation packages the required .NET framework package is included in the VRM installation routine.
As Microsoft Operating Systems are expected to get and have the latest security updates applied before installing any new software component like VRM (Video Recording Manger) or VSG (Video Streaming Gateway), the installer will successfully finish the installation routine. The same is valid for BOSCH DIVAR IP product range: The DIVAR IP Appliance installer contains Microsoft update packages available from Microsoft at the time BOSCH creates the Appliance installer. But all Microsoft Updates release after the Appliance installer release date are not included in the BOSCH package. It is therefore recommended to check for Microsoft updates whenever a Bosch DIVAR IP Appliance installer is installed.
For VRM (Video Recording Manager) stand-alone Systems and Servers with VSG (Video Streaming Gateway) installed, it is also strongly recommended to check for Microsoft OS updates before the VRM Master Installer is installed/updated.
Note: In case an error code 5100 is shown during the VRM Software installation, please ensure that all Microsoft updates for the used Operating Systems are installed and run the BOSCH Software installer after that once again. For more details Microsoft provides more informaiton here: https://blogs.msdn.microsoft.com/astebner/2008/10/13/net-framework-setup-verification-tool-users-guide/
For older BVMS and VRM installations please also refer to the following previous article:
... View more