Bosch BVMS Configuration Manual
Bosch BVMS Configuration Manual
Bosch BVMS Configuration Manual
en Configuration Manual
BVMS Table of contents | en 3
Table of contents
1 Using the Help 14
1.1 Finding information 14
1.2 Printing the Help 15
2 Introduction 16
2.1 BVMS editions 17
2.2 BVMS License activation overview 18
3 System overview 20
3.1 Hardware requirements 21
3.2 Software requirements 21
3.3 License requirements 21
4 Concepts 22
4.1 BVMS design concepts 22
4.1.1 Single Management Server System 22
4.1.2 Enterprise System 23
4.1.3 Server Lookup 24
4.1.4 Unmanaged site 25
4.2 Recording 27
4.2.1 Automated Network Replenishment (ANR) 27
4.2.2 Dual / failover recording 28
4.2.3 VRM recording modes 29
4.2.4 Playback of VRM recording sources 32
4.2.5 Overview of the storage related events 39
4.3 Alarm handling 40
4.4 ONVIF event mapping 42
4.5 Inactivity logoff 43
4.6 Version independent Operator Client 43
4.6.1 Working with Compatibility Mode 44
4.7 Viewing modes of a panoramic camera 44
4.7.1 360° panoramic camera - floor- or ceiling mounted 44
4.7.2 180° panoramic camera - floor- or ceiling mounted 46
4.7.3 360° panoramic camera - wall mounted 47
4.7.4 180° panoramic camera - wall mounted 48
4.7.5 Cropped view on a panoramic camera 49
4.8 SSH Tunneling 50
4.9 Multipathing 50
5 Supported hardware 51
5.1 Installing hardware 51
5.2 Installing a KBD Universal XF keyboard 52
5.3 Connecting a Bosch IntuiKey keyboard to BVMS 52
5.3.1 Scenarios for Bosch IntuiKey keyboard connections 52
5.3.2 Connecting a Bosch IntuiKey keyboard to a decoder 54
5.3.3 Updating Bosch IntuiKey keyboard firmware 55
5.4 Connecting Bosch Allegiant Matrix to BVMS 56
5.4.1 Bosch Allegiant Connection Overview 56
5.4.2 Configuring the control channel 58
5.4.3 Bosch Allegiant Satellite System Concept 60
5.5 Allegiant CCL commands supported in BVMS 61
6 Getting started 63
i This document describes some functions that are not available for BVMS Viewer.
For detailed information about the different BVMS editions refer to www.boschsecurity.com
and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
To find out more about how to do something in BVMS, access the online Help using any of the
following methods.
To use the Contents, Index, or Search:
4 On the Help menu, click Display Help. Use the buttons and links to navigate.
To get help on a window or dialog:
Click: To:
Contents Display the table of contents for the Online Help. Click each book to
display pages that link to topics, and click each page to display the
corresponding topic in the right-hand pane.
Index Search for specific words or phrases or select from a list of index
keywords. Double-click the keyword to display the corresponding topic
in the right-hand pane.
Search Locate words or phrases within the content of your topics. Type the
word or phrase in the text field, press ENTER, and select the topic you
want from the list of topics.
Notice!
2 Introduction
Click the link to access the Open Source Software licenses used by BVMS and the Mobile App:
http://www.boschsecurity.com/oss/
Click the link to access the Open Source Software licenses used by BVMS Viewer:
http://www.boschsecurity.com/oss.
BVMS Configuration Client
The idea of the BVMS Configuration Client is to start with the configuration of the devices,
followed by the configuration of the logical tree. After these two steps, the schedules,
recordings, events, and alarms for the devices can be configured on their respective pages.
The last step is to configure the user groups in the user groups page. After configuring all
pages from left to right, everything is configured and the operator can start using the Operator
Client.
After configuring each page, save the configuration by clicking in the tools menu.
2 Pages bar Allows you to configure all necessary steps from left to right.
3 Tool bar Displays the available buttons according to the active tab. Hover
over an icon to display the tooltip.
4 Search bar Allows you to search for a specific device and their corresponding
parents in the device tree.
5 Help icon Displays the online help for the BVMS Configuration Client.
– BVMS Plus
– BVMS Lite
– BVMS Viewer
BVMS Viewer and BVMS Professional are Software Only products. You can not use them on
Bosch DIVAR IP devices.
You can use BVMS Lite and BVMS Plus on Bosch DIVAR IP devices or as Software Only
products on any other hardware.
For detailed information about the different BVMS editions refer to www.boschsecurity.com
and the BVMS Quick Selection Guide:
BVMS Quick Selection Guide.
License ordering
– Order by using the Bosch order desk.
– The order confirmation includes the new software order ID that is required for the later
software activation process.
– From BVMS 11.0 the BVMS base and expansion licenses are no longer software version
dependent.
License activation
– The Bosch Remote Portal (https://www.remote.boschsecurity.com) replaces the Bosch
License Manager.
– A new user registration is required in Bosch Remote Portal.
– Mandatory input for the license activation is the System info file and the Software order
ID.
– The output of the Remote Portal is the License file and includes all activation details. Add
this file to the installed BVMS system.
– The activation process defines the start date of the software assurance period. The end
date is displayed on the License Manager of the BVMS Configuration Client.
– The software order ID allows connect the installed software (on operating system and
hardware) to the ordered software products.
3. Activate the license
– Mandatory input for license activation is the system info file that represents the unique
operating system and hardware where the software is installed.
– The activation connects the software order ID to the installed software and creates the
license file as an output.
– The activation defines attributes of the system, like the software assurance start and end
date.
4. Activate the software
– In order to activate the software, add the license file to the installed software.
– The license files enables the BVMS features according to the activated items.
Notice!
The license file includes the following activation details:
Refer to
– Activating the software licenses, page 79
3 System overview
Notice!
i This document describes some functions that are not available for BVMS Viewer.
For detailed information about the different BVMS editions refer to www.boschsecurity.com
and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
If you plan to install and configure BVMS, participate in a system training on BVMS.
Refer to the Release Notes of the current BVMS version for supported versions of firmware
and hardware and other important information.
See data sheets on Bosch workstations and servers for information on computers where
BVMS can be installed.
The BVMS software modules can optionally be installed on one PC.
Important components
Component Description
Operator Client (selectable in Live monitoring, storage retrieval and playback, alarm and
Setup) accessing multiple Management Server computers
simultaneously.
Mobile Video Service Provides a transcoding service that transcodes the live and
(selectable in Setup) recorded video stream from a camera configured in BVMS
to the available network bandwidth. This service enables
video clients like an iPhone or a Web client to receive
transcoded streams, for example for unreliable network
connections with limited bandwidth.
Web Client You can access live and playback videos via Web browser.
Mobile App You can use the Mobile App on iPhone or iPad to access
live and playback video.
Bosch Video Streaming Gateway Provides the integration of 3rd party cameras, e.g. in low-
(selectable in Setup) bandwidth networks.
Cameo SDK (selectable in The Cameo SDK is used to embed BVMS live and playback
Setup) Image panes to your external third-party application. The
Image panes follow the BVMS based user permissions.
Component Description
Client Enterprise SDK The Client Enterprise SDK is meant to control and monitor
the behaviour of Operator Client of an Enterprise System
by external applications. The SDK allows to browse devices
that are accessible by the running, connected
Operator Client and to control some UI functionalities.
Client SDK / Server SDK The Server SDK is used to control and monitor the
Management Server by scripts and external applications.
You can use those interfaces with a valid administrator
account.
The Client SDK is used to control and monitor the
Operator Client by external applications and scripts (part
of the related server configuration).
4 Concepts
Notice!
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
Management Server
Cameras
VRM
iSCSI
Other devices
BVMS Subsystem
Refer to
– Creating an Enterprise System, page 89
– Configuring the Server List for Enterprise System, page 89
– Configuring users, permissions and Enterprise Access, page 340
– Accessing the system, page 75
Management Server
Server list
Operator Client
Refer to
– Configuring Server Lookup, page 128
– Server list / Address Book page, page 127
– Using Server Lookup, page 75
– Exporting the Server List, page 129
– Importing a Server List, page 129
– For an easy navigation sites can be grouped in folders or can be placed on maps.
Predefined username and password allow operators to quickly connect to a site .
The unmanaged site concept supports IP based BVMS system as well as analog DVR solutions:
– Bosch DIVAR AN 3000 / 5000 analog recorders
– DIVAR hybrid recorders
– DIVAR network recorders
– DIP 3000/7000 units IP based recording
– Single BVMS Management Server System
Adding a site for central monitoring only requires a license per site and is independent of the
number of channels in thesite.
Management Server
site
DVR
Refer to
– Adding an unmanaged site manually, page 211
4.2 Recording
This chapter explains the different recording and replay related functions in the system.
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
Intended use
When a failure of the network or the central storage occurs, the ANR function ensures that the
encoder transmits the locally buffered recording of the missing time period to the central
storage after the failure is fixed.
The following graphic shows the transmission of video data after a network or storage failure
is fixed.
1 Video
2 Encoder, IP network
Limitations
Notice!
i You cannot use playback from the local storage media when the passwords for `user` and
`live` are set on the encoder. Remove the passwords if required.
Refer to
– Configuring an iSCSI device, page 192
– Configuring the storage media of an encoder, page 87
– Configuring the ANR function, page 294
1 Site 1 Encoder
Secondary VRM
Limitations
You cannot use dual recording together with ANR.
Cameo SDK only supports the playback of primary recording.
Refer to
– Configuring dual recording in the Camera Table, page 295
– Adding a Mirrored VRM manually, page 176
– Adding a Failover VRM manually, page 175
– Cameras page, page 278
Encoder
Primary VRM
Primary VRM
Secondary VRM
When the Primary VRM is not connected, the configured Failover VRM provides playback.
Close the Image pane and display the camera again in an Image pane:
When the Primary VRM and the optional Primary Failover VRM are both not connected, the
encoder provides playback. Close the Image pane and display the camera again in an Image
pane:
Primary VRM
Encoder
When the Secondary VRM is not connected, the configured Failover VRM provides playback.
Close the Image pane and display the camera again in an Image pane:
When the Secondary VRM and the optional Secondary Failover VRM are both not connected,
the encoder provides playback. Close the Image pane and drag the camera again to an Image
pane:
Primary VRM
Encoder
Primary VRM
SD card
Refer to
– Automated Network Replenishment (ANR), page 27
– Configuring events and alarms, page 309
5. Finally, the user clears the alarm. This removes the alarm from his Alarm List and alarm
display.
On a monitor group, the monitors return to the cameras that were displayed before the
alarm occurred.
Alarm Image window
1. To display alarm video, the Alarm Image window replaces the Live or Playback Image
window on the monitor that has been configured for alarm display.
2. Each alarm gets a row of Image panes. Up to 5 Image panes can be associated with each
alarm. These Image panes can display live video, playback video, or maps.
On a monitor group, each alarm can call up cameras on a row of monitors. The number of
cameras in the row is limited by the number of columns in the monitor group. Monitors in
the row that are not used for alarm video can be configured to either continue with their
current display or to display a blank screen.
3. Higher priority alarms are displayed above lower priority alarms on both monitor rows
and the Operator Client workstation display alarm rows.
4. If the Alarm image window is completely full of Alarm image rows and an additional alarm
must be displayed, the lowest priority alarms "stack up" in the bottom row of the Alarm
image window. You can step through the stacked alarms with the controls at the left side
of the alarm row.
You can step through the alarm stacks on monitor groups with control buttons in the
Monitors window of the Operator Client workstation display. Monitors in alarm are
indicated by red icons with blinking "LEDs".
The alarm title, time, and date can be optionally be displayed on all monitors, or only the
first monitor in the alarm row.
5. For equal priority alarms, the administrator can configure the order behavior:
– Last-in-First-out (LIFO) mode: in this configuration, new alarms are inserted above
older alarms of the same priority.
– First-in-First-out (FIFO) mode; in this configuration, new alarms are inserted below
older alarms of the same priority.
6. An alarm's Image row can appear in the Alarm Image window in one of two ways:
– When it is generated (auto pop-up). This occurs when the alarm priority is higher
than display priority.
– When the alarm is accepted. This occurs when the alarm priority is lower than
display priority.
Auto pop-up alarms
Alarms can be configured to automatically display (pop up) in the Alarm Image window, based
on the alarm priority. Each user group's live and playback displays are also assigned priorities.
When alarms are received with priority higher than that of the user's display, the alarm
automatically displays its alarm row in the Alarm Image window. If the Alarm Image window is
not currently displayed, it automatically replaces the Live or Playback Image window on the
alarm-enabled monitor.
Although auto pop-up alarms are displayed in the Alarm Image window, they are not
automatically accepted. They can be displayed on multiple users' displays simultaneously.
When a user accepts an auto pop-up alarm, it is removed from all other users Alarm Lists and
alarm displays.
Alarm handling in case of shutdown
On a server shutdown all active alarms are preserved. The alarms are restored and reappear in
the Alarm List window, when the system restarts.
Alarms in the state Accepted or Workflow are automatically set back to the state Active when
the system restarts. Comments entered for alarms in the state Workflow are preserved.
Notice!
i The alarm data is automatically saved every minute, so the maximum data loss is the data
accumulated in one minute.
Refer to
– Configuring the pre- and post-alarm duration for an alarm, page 315
Intended use
Intended use is the mapping of ONVIF events to BVMS events. ONVIF events can then trigger
BVMS alarms and recording.
You can define default event mappings valid only for a specific ONVIF device, for all ONVIF
devices of the same manufacturer and model, or for all ONVIF devices of the same
manufacturer. Default event mappings are automatically assigned to all affected ONVIF
encoders that are added using the BVMS Scan Wizard or are added manually.
When you add an ONVIF encoder to the BVMS configuration without a connection to this
ONVIF encoder, no event mappings are assigned. You can update such an ONVIF encoder with
event mappings from an ONVIF encoder of the same manufacturer and/or model that you
already have added.
You define event mappings specific for each of the following sources:
– ONVIF encoder
– Cameras of this ONVIF encoder
– Relays of this ONVIF encoder
– Inputs of this ONVIF encoder
Example
In an ONVIF camera a motion detection event occurs. This event shall trigger a Motion
Detected event in BVMS.
To achieve this, you configure for this ONVIF camera:
– ONVIF topic (MotionDetection)
– ONVIF data item (motion)
– ONVIF data type (boolean)
– ONVIF data value (true)
Note: It is not sufficient to only configure the Motion Detected event. Please configure also
the Motion Stopped event. You always must configure a pair of events.
Import or export of a Mapping Table
You can export a Mapping Table on a computer where you have created it and import this
Mapping table on another computer where the required mapping table is not available.
Troubleshooting
You can create log files for troubleshooting.
Refer to
– Configuring an ONVIF mapping table, page 235
– Enabling logging for ONVIF events, page 363
– ONVIF Encoder Events page, page 231
Refer to
– Options dialog box (Settings menu), page 119
– Operator Features page, page 327
–
The Operator Client is connected to the Management Server.
–
The Operator Client is not connected to the Management Server. One reason can be a
physical disconnection from the Management Server to the network.
–
This state can only be displayed after a reestablished connection to the Management
Server. All affected functions are back, but the configuration of the Operator Client is
outdated due to a newer configuration available in the system. Log on again to update the
configuration.
–
This state icon is displayed when the Management Server has an earlier BVMS version
than the Operator Client workstation.
Refer to
– Configuring predefined positions and auxiliary commands, page 291
2 Dewarping
2 Dewarping
Port mapping
4 Configure one port forwarding for the BVMS Management Server to utilize port 5322 for
both internal and external connections.
This is the only port mapping entry that you need to make for the entire system.
BVMS port mapping is not required.
Encrypted communication
After the connection is established via a SSH tunnel, all communications between the BVMS
Management Server and a remote client are encrypted.
4.9 Multipathing
BVMS provides multipathing for dual controller systems. Multipath is a fault-tolerance
technique that defines more than one physical path between the camera and its iSCSI storage
devices through redundant network connections. When using mulitpathing, recording of video
data and replaying video data is possible even in case of an iSCSI controller failure.
Prerequisites and restrictions
– Netapp E2800 dual controller iSCSI unit is installed.
– Firmware 6.43 enables devices recording to E2800 to use alternative paths.
– VRM 3.71 to monitor and log devices with multipathing are enabled.
– Two physical iSCSI ports are configured per controller: either 2x2 RJ45 or 2x2 optical.
– Link speed needs to be 10 Gbit/s in order to achieve full performance.
– The Dual-Simplex mode used in E2700 is not supported anymore.
For more details on installation of DSA E2800 Full Duplex see Installation Manual DSA E-Series
E2800.
5 Supported hardware
Notice!
i Do not connect a device to more than one BVMS! This can lead to recording gaps and other
undesired effects.
i Refer to the Instructions Manual delivered with your KBD-Universal XF keyboard available on
the online product catalog.
More information
For more information, software downloads, and documentation, go to
www.boschsecurity.com and the corresponding product page.
You can connect the following hardware to BVMS:
– Mobile video clients like iPhone or iPad via DynDNS
– Various IP cameras. encoders and ONVIF cameras (live only or via Video Streaming
Gateway)
Connected via network
– Live only encoders with local storage
Connected via network
– iSCSI storage devices
Connected via network
– Analog cameras
Connected to encoders,
– Decoders
Connected via network
– Monitors
Connected to a decoder, to a Bosch Allegiant matrix, to a BVMS Client workstation
– Bosch Allegiant matrix (Firmware version: 8.75 or greater, MCS version: 2.80 or greater)
Connected to a COM port of the Management Server or to a remote computer and to an
IP encoder on the network.
If you connect the keyboard to an Enterprise Operator Client, you can control the cameras of a
specific Management Server by first pressing the server key to type in the number of this
server and then type the camera number.
Notice!
For connecting the Bosch IntuiKey keyboard with a BVMS workstation, use the specified
i Bosch cable.
For connecting the Bosch IntuiKey keyboard with a VIP XD decoder, you need a cable which
connects a serial COM port of the keyboard with the serial interface of the decoder. See
Connecting a CCTV keyboard to a decoder for connections.
Figure 5.1: Scenario 1: Bosch IntuiKey keyboard connected to a Bosch Video Management System workstation
2 BVMS workstation
4 BVMS network
5 Decoder
6 Monitors
2 BVMS workstation
3 BVMS network
5 Decoder
6 Monitors
Refer to
– Assign Keyboard page, page 155
2 TX
3 RX
5 GND
7 CTS
8 RTS
The following illustration shows the pinout of a standard RS232 adapter (1) and the pinout of
the decoder’s serial adapter (2):
Notice!
i For starting the bootloader mode directly, you can unplug the power supply from the
keyboard, press 0 and 1 simultaneously, plug In the power supply again, release 0 and 1.
Local connection
Figure 5.3: Bosch Video Management System local connection to a Bosch Allegiant matrix switch
3 RS-232 connection
4 Allegiant matrix
5 encoders
6 Network
Remote connection
Figure 5.4: Bosch Video Management System remote connection to a Bosch Allegiant matrix switch
3 Network
5 RS-232 connection
6 encoders
7 Allegiant matrix
Wiring
To configure the control channel between BVMS and the Allegiant matrix, connect one PC
through an RS-232 serial port to the Allegiant's console port (use the specified Bosch cable for
connection). This can be the BVMS Management Server, or any other PC on the network.
Installing Allegiant Master Control Software
1. Stop the Management Server service if running (Start > Control Panel > Services > Right-
click BVMS Management Server > Stop)
2. Install the Allegiant Master Control Software on the Management Server and on the
Allegiant PC (if present).
3. On an remote Allegiant PC configure it to start the Allegiant Network Host program
(ld_alghw.exe) on startup. This starts the necessary Allegiant services to allow other PCs
on the network to access the Allegiant. The software runs invisibly. It is not necessary to
have a dongle attached to this computer.
To have the service started on computer startup automatically, copy a link to
ld_alghw.exe to the Startup folder of your computer.
Creating a Bosch Allegiant configuration file
1. Using the Allegiant Master Control Software, create a Allegiant configuration file that
specifies the computer attached to the Allegiant matrix. For this task, the Master Control
dongle is required.
2. On the Transfer menu, clickCommunication Setup. In the Current Host list, enter the DNS
name of the computer connected to the Allegiant matrix, and enter the serial port
parameters (COM port number, baud rate, etc.) of the Allegiant-connected serial port.
This allows the Master Control Software on the Management Server or PC to go on-line
with the Allegiant system. If this is not successful, ensure that either the Master Control
Software or the Allegiant Network Host program is running on the computer attached to
the Allegiant matrix, and that the network security is configured to allow remote access
to this computer.
3. On the Transfer menu, click Upload. Select all tables and click Upload. To save the
configuration file, select a directory.
4. Exit the Master Control Software.
Adding the Bosch Allegiant matrix to BVMS
1. Start the BVMS Management Server service, start the Configuration Client, and add the
Allegiant device by adding this configuration file (see Adding a device for the step-by-step
instruction).
2. Ensure that the Allegiant Master Control Software configuration file used in BVMS
matches the current Allegiant configuration.
BVMS runs the required components of Master Control Software invisibly in the
background.
Configuring the user name for logging on the Allegiant services
If the Allegiant matrix is connected to a PC in the network and not to the Management Server,
ensure that the Allegiant services on this PC and on the Management Server log on with the
same user account. This user must be member of an administrators group.
Further notes in the documentation
Follow these references to get detailed information on the available windows:
– Matrix Switches page, page 133
Follow these references to get detailed information on the available step-by-step instructions:
– Configuring a Bosch Allegiant device, page 133
Refer to
– Matrix Switches page, page 133
3 Network
5 RS-232 connection
6 encoders
7 Allegiant matrix
You can apply the Satellite concept such that an Allegiant can be both a master and a slave. In
this way, each Allegiant can view cameras from the others. It is only necessary to connect
trunk lines and control lines in both directions, and to properly configure the Allegiant tables.
The concept can be further extended, with no practical limit, to multiple Allegiant systems. An
Allegiant can have many slaves, and it can be a slave to many masters. You can program the
Allegiant tables to allow or disallow user access to camera views as required by site policies.
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Supported hardware | en 61
Receiver/Driver
System
6 Getting started
This chapter provides information on how to get started with BVMS.
i Install every software module on the computer that is supposed to be used for this module.
To install:
Close Configuration Client before you start the BVMS Setup.
1. Start Setup.exe or start the BVMS Setup on the Welcome screen.
2. In the next dialog box, select the modules to be installed on this computer.
3. Follow the instructions on the screen.
Notice!
i If you want to use decoders in your system, make sure that all encoders use the same
password for the user authorization level.
Welcome page
System page
Notice!
i Only available on DIVAR IP 3000, DIVAR IP 7000, DIVAR IP all-in-one 5000, DIVAR IP all-in-one
6000 and DIVAR IP all-in-one 7000
Basic page
This page displays the latest saved configuration. You can import a BVMS file as a change to
the existing configuration. This change is saved but not activated when you click Next.
You can select the network adapter of your computer that is connected to the video devices
(IP cameras, encoders, decoders, iSCSI storage systems) of your system. The IP address of
this network adapter is used as IP address of the VRM, the VSG and the local iSCSI storage
system.
Click Port Mapping to specify the public IP address or DNS name if the system shall be
accessed via Internet.
Scan page
Note:
The scan for devices can take a time. You can cancel the scan. All devices that were already
scanned, are displayed in the table.
This page displays all video devices that are not included in the latest saved configuration.
Clear the check boxes for the devices that should not be added to the configuration, then click
Next.
If the selected devices are not located in the same IP range as the DIVAR IP system, the device
IP address can be changed by specifying a start address for the device IP range.
Authentication page
This page is used to authenticate at video devices protected by password. For easy
authentication with the same password for multiple devices you can use the clipboard (CTRL
+C, CTRL+V):
1. Click to activateShow passwords.
2. Select a row with a successfully authenticated device (green lock is displayed), press
CTRL+C, select multiple rows displaying a red lock and press CTRL+V).
Password check is performed automatically, when you do not enter a further character in the
password field for a few seconds or you click outside the password field.
You can provide a global default password for all devices that are currently not protected by a
password.
Cameras page
Recording page
Only those cameras are displayed on this page which were newly added. As soon as you
activate this configuration, you cannot change the profile assignment of these cameras.
You can enable motion recording for the recording profiles with both recording and alarm
recording enabled. If required, configure recording and alarm recording in Configuration Client
(Scheduled Recording Settings dialog box).
VCA is activated automatically for each newly added camera.
Storage page
Users page
On this page you can add new users to the existing user groups.
4 For every new user enter user name and description and set a password.
Strong password policy
The Strong password policy check box is pre-selected for all newly created user groups.
We highly recommend to keep this setting to enhance the protection of your computer against
unauthorized access.
The following rules apply:
– Minimum password length as set on the Account policies page for the appropriate user
group.
– Do not use one of the previous passwords.
– Use at least one upper-case letter (A through Z).
– Use at least one number (0 through 9).
– Use at least one special character (for instance: ! $ # %).
4 Click Apply to apply the settings, then click Next to continue.
Note: As long as there are users for whom no passwords have been set although the
Strong password policy was enabled, you cannot continue. To continue, set the missing
passwords.
Use Configuration Client to add user groups and to change user group permissions.
Finish page
Before you can activate your configuration you must perform the following tasks:
– Provide a global default password for all devices that are not currently protected by a
password.
– Activate your license package if required.
Global default password
If in Configuration Client the option Enforce password protection on activation (Settings ->
Options) is disabled, you are not forced to provide a global default password to activate.
Licensing
Expand Licensing and click License Wizard to check or activate your license package.
After clicking Save and activate, the configuration is activated.
After successful activation, the Finish page is displayed again. Now you can store a backup of
the configuration if desired: Click Save backup copy.
After clicking Save and activate, the configuration is activated.
After successful activation, the Finish page is displayed again. Now you can store a backup of
the configuration if desired: Click Save backup copy.
The preconfigured default admin user is the user called Admin. Only this user can log on to
Configuration Client when you start Configuration Client for the first time.
Once you have started Configuration Client, you can rename the Admin user and change the
password.
Note:
You cannot start Configuration Client when another user on another computer in the system
has already started Configuration Client.
To start Configuration Client:
1. From the Start menu, select Programs > BVMS > Configuration Client.
The dialog box for logging on is displayed.
2. In the User Name: field, type your user name.
When you start the application for the first time, enter Admin as user name, no password
required.
3. In the Password: field, type your password.
4. Click OK.
The application starts.
When the Admin user starts Configuration Client for the first time, the Password policy is
violated dialog box is displayed asking him to set a password for the Admin user account. We
highly recommend to keep this setting and to set a strong password for the Admin user
account according to the password policy rules.
Refer to
– Strong password policy , page 340
– Configuring Admin Group, page 345
1. Click User groups > . Click the User group properties tab. Click the Operating
permissions tab.
2. In the Language list, select the desired language.
Refer to
– Adding VRM Devices via scan, page 169
– Adding an live only ONVIF device via scan, page 230
– Adding live only devices via scan, page 208
– Adding a device, page 124
2. In the Connection: list, select <Address Book...> for Configuration Client or <Address
Book...> for Operator Client.
If private and public IP address has been configured for a server, this is indicated.
If you select <Address Book...> or <Address Book...> for the first time, the Server
Lookup dialog box is displayed.
3. In the (Enterprise) Management Server address: field, type in a valid network address of
the desired server.
4. Enter a valid user name and password.
5. If required, click Remember settings.
6. Click OK.
The Server Lookup dialog box is displayed.
7. Select the desired server.
8. Click OK.
9. If the selected server has both a private and a public network address, a message box is
displayed asking whether you are using a computer located in the private network of the
selected server.
The server name is added to the Connection: list in the logon dialog box.
10. Select this server in the Connection: list and click OK.
If you have selected the Remember settings check box, you can select this server directly
when you again want to access this server.
i To prevent unauthorized access to video data through the Internet, we strongly recommend
that you protect all users and devices in the system with an appropriate password.
Protect all levels of a camera / encoder (service / user / live) with a password.
The following image shows an example of remote access from private network with Enterprise
System to remote BVMS systems:
To enable the remote access of an Operator Client to devices in a remote network, each
device is assigned a public port number in addition to the public network address of the
router. For access, Operator Client uses this public port number together with the public
network address. In the private network the incoming traffic for the public port number is
forwarded to the private network address and port number of the corresponding device.
You configure the port mapping in Configuration Client for use by Operator Client.
Notice!
i Additionally the network administrator must configure the port forwarding on the router of
the private network. The network administrator must ensure that remote access via these
ports is running outside of BVMS environment.
Refer to
– Remote Access Settings dialog box (Settings menu), page 121
– Port Mapping Table dialog box, page 122
Refer to
– License Inspector dialog box (Tools menu), page 81
– License Manager dialog box (Tools menu), page 79
– Add license dialog box, page 80
– BVMS License activation overview, page 18
License status
Displays the licensing status.
System fingerprint
For support purposes we recommend to provide the System fingerprint.
Installation site
When activating your base license in the Bosch Remote Portal, you provide information about
the installation site of your system. This information displays here.
Note: You can also provide this information in other licenses, but only the information
provided in the base license displays here.
Licenses
1. Click Add to add your licenses.
The Add license dialog box is displayed.
2. Follow the instructions in the dialog.
Effective license
Displays the effective base license that you have activated.
Features
4 Click License Inspector....
The License Inspector dialog box displays.
Displays the quantity of the licensed features that are currently installed.
You can check whether the number of installed BVMS licenses exceeds the number of
purchased licenses.
Installed BVMS version
Displays the currently installed BVMS version, for example 11.0.
Licensed BVMS versions
Displays all BVMS versions that are included and supported in the current provided license
file.
For example: BVMS 11.0 and all upcoming minor versions BVMS 11.x.
Activation date
Displays the activation date of your installed BVMS version.
Expiration date
Displays the expiration date of your installed BVMS version. An Expiration date is only
applicable when you install an emergency license or a sales demo license.
Software Maintenance Agreement
Expiration date
If you have purchased and activated any Software Maintenance Agreement, the expiration date
displays here.
Refer to
– Activating the software licenses, page 79
– Add license dialog box, page 80
– License Inspector dialog box (Tools menu), page 81
Note: If your current working copy configuration is not activated ( is active), you
export this working copy and not the activated configuration.
2. Click Save.
3. Enter a filename.
The current configuration is exported. A .zip file with database and user data is created.
To perform a backup:
1. Stop the service BVMS Central Server on the (Enterprise) Management Server.
2. Copy the file elements.bvms to the desired directory for backup.
3. Start the service BVMS Central Server on the (Enterprise) Management Server.
The VRM configuration is stored in a single encrypted file config.xml.
The file can be copied and stored for backup while the VRM service is up and running.
The file is encrypted and contains all VRM relevant data such as:
– User data
– All system devices and their VRM relevant settings
Parts of the VRM configuration are also stored in the BVMS configuration. When you change
something within these data, it is written to config.xml after activating the BVMS
configuration.
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
82 en | Getting started BVMS
Refer to
– Maintaining BVMS, page 81
– Main window > Devices > Expand > Expand > VRM Settings > Main Settings
– Main window > Devices > Expand > Expand > Network > SNMP
– Main window > Devices > Expand > Expand > Service > Advanced
– Main window > Devices > Expand > Expand > > > Advanced
Settings > Recording Preferences
– Main window > Devices > Expand > Expand > > > Load Balancing
To replace the VRM device without BVMS:
You use the original backup config.xml from the VRM device, containing all configuration
settings (no further settings are required).
1. Stop the Video Recording Manager service.
2. Copy config.xml to the new server.
3. Start the Video Recording Manager service.
To replace an iSCSI device (planned failover):
1. Add the new iSCSI device.
2. Using Configuration Manager, on the iSCSI device to be replaced, configure all LUNs as
read-only.
Note: You can remove the old iSCSI device when the old recordings are no longer required.
Notice!
When you configure the new iSCSI device, we recommend to use the same CHAP password
as for the old device.
i If you use a new CHAP password, make sure to set this new password as a system-wide CHAP
password and to assign it to all iSCSI devices.
Otherwise you will not be able to authenticate at the iSCSI and to show direct playback from
the iSCSI device.
i Do not remove a device from the Device Tree if you want to retain its recordings. For
replacing this device, exchange the hardware.
Notice!
i The next steps require the above mentioned default IP address. With DHCP assigned IP
addresses you cannot perform the initial device scan.
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Expand > Right-click > Click
Edit Decoder > Edit Decoder dialog box
After an upgrade of the device, you can update its device capabilities. A message text informs
you whether the retrieved device capabilities match the device capabilities stored in BVMS.
To update:
1. Click OK.
A message box is displayed with the following text:
If you apply the device capabilities, the recording settings and the event settings for
this device may change. Check these settings for this device.
2. Click OK.
The device capabilities are updated.
Replacing a VSG camera
When you replace a VSG camera, ensure that the replaced camera has the same type, the
same IP address and the same ONVIF profile as the old camera.
Additionally you must perform the following settings on a new AXIS camera via the Web
interface of the VSG camera before replacing the old AXIS camera:
– Set a password for user root
– Configure time synchronization
– Disable link-local address
– Create an ONVIF user
– Disable replay attack protection
Settings controlled by BVMS
Encoders and decoders configured in a BVMS system are controlled by the BVMS Server and
thus cannot be shared with other applications.
You can use the BVMS Device Monitor to check which device show a mismatching
configuration deviating from the BVMS configuration.
BVMS Configuration Client offers configuration pages for all BVIP devices.
The scale of settings depends on the particular BVIP model (e. g. VIPX 1600 XFM4).
BVMS keeps control of all BVIP settings required for a seamless integration into a BVMS
system.
Settings controlled by BVMS:
– Camera name
– Time server settings
– Recording Management (profiles, retention times, schedules)
– Definitions of quality settings
– Passwords
Stored in the BVMS configuration but not changed on the devices:
– IP address (you can change IP addresses with BVMS IP Device Configuration)
– Relay / input names (difference between names in the device and names configured in
BVMS is displayed)
System events for mismatching device configuration
– SystemInfo events are generated, once the configuration of a device has been fixed
during a periodic check.
– SystemWarning events are generated, once a mismatching configuration has been
detected on a device for the first time. Subsequent checks do not raise this event until
the configuration has been corrected by an activation or a periodic fix.
– SytemError events are generated, once an error regarding configuration has been
detected during activation or periodic checks. Subsequent checks do not raise this event
until the configuration has been corrected by an activation or a periodic fix.
Main window > Devices > Expand > Expand > > > Advanced
Settings > Recording Management
Note: Ensure that the desired cameras of this encoder are added to the Logical Tree.
You must configure the storage media of an encoder to use the ANR function.
Note: If you want to configure the storage media of an encoder that has already been added to
your system and is recorded via VRM, ensure that secondary recording is stopped:
The ANR function only works on encoders with firmware version 5.90 or later. Not all encoder
types support ANR even if the correct firmware version is installed.
To configure the storage media of an encoder:
1. Under Secondary Recording, in the Preferred storage target type list, select the storage
media. Depending on the device type, different media are available.
Refer to
– Recording Management page, page 227
– Configuring the ANR function, page 294
Refer to
– Enterprise System, page 23
Main window > Devices > Enterprise System > Server List / Address Book
You configure multiple Management Server computers in the Server List of an appropriate
Management Server.
For simultaneous access you must configure one or more Enterprise User Groups. This
changes this Management Server to an Enterprise Management Server.
A user of Operator Client can log on with a user name of an Enterprise User Group to get
simultaneous access to the Management Server computers configured in the Server List.
To add colums:
4 Right-click on the table header and click Add column.
You can add up to 10 columns.
To delete a column, right-click the desired column and click Delete column.
P When you export the Server List, the added columns are also exported.
The Management Server computers for your Enterprise System are configured.
The following screenshot shows an example:
Refer to
– Enterprise System, page 23
– Server list / Address Book page, page 127
– User Groups page, page 319
– Using Server Lookup, page 75
2. Click .
The New enterprise user group dialog box is displayed.
3. Type in the name and a description.
4. Click OK.
The Enterprise User Group is added to the corresponding tree.
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Creating an Enterprise System | en 91
Refer to
– User Group Properties page, page 321
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
– Server Access page, page 332
Notice!
i At least one device must be configured in the Device Tree before you can add an Enterprise
Account.
You perform the task of creating an Enterprise Account on a Management Server. Repeat this
task on each Management Server that is a member of your Enterprise System.
You create an Enterprise Account to configure the device permissions for an Operator Client
using an Enterprise System.
To create an Enterprise Account:
1. Click the Enterprise Access tab.
2. Click .
The New enterprise account dialog box is displayed.
3. Type in the name and a description.
4. The User must change password at next logon check box is pre-selected for all newly
created user accounts.
Type the key according to the key policy rules and confirm this key.
5. Click OK.
A new Enterprise Account is added to the corresponding tree.
6. Right-click the new Enterprise Account and click Rename.
7. Enter the desired name and press ENTER.
8. On the Device permissions page, configure the credentials and the device permissions as
required.
Refer to
– Strong password policy , page 340
– Credentials page, page 326
– Logical Tree page, page 327
– Events and Alarms page, page 326
– Control Priorities page, page 324
– Camera Permissions page, page 323
– Decoder Permissions page, page 325
Notice!
i Server Scripts gets activated during restart of Management Server service even if not
activated from within Configuration Client.
To get help on entering code, click in the Command Script Editor dialog box. The Bosch
Script API help is displayed.
To add a server scriptlet:
1. On the Tools menu, click the Command Script Editor... command.
The Select Script Language dialog box is displayed if no Command Script was created
yet.
2. In the Script Language: list, select the required entry.
The Command Script Editor dialog box is displayed.
3. In the left pane of the Command Script Editor dialog box, right-click ServerScript and
click New Scriptlet.
A new scriptlet is added.
4. Enter your code.
To add a client scriptlet
1. On the Tools menu, click the Command Script Editor... command.
The Select Script Language dialog box is displayed if no Command Script was created
yet.
2. In the Script Language: list, select the required entry.
The Command Script Editor dialog box is displayed.
3. In the left pane of the Command Script Editor dialog box, right-click ClientScript and
click New Scriptlet.
A new scriptlet is added.
4. Enter your code.
To delete a scriptlet:
1. Open the Command Script Editor dialog box.
2. Click the Server Script tab or the Client Script tab as required.
4 Click .
Refer to
– Command Script Editor dialog box, page 298
Main window > Alarms > or > Alarm Options column > ...
You configure a Client Command Script to be started in the following cases:
– Workstation starts up.
– User accepts an alarm.
To configure a Command Script at workstation startup:
See Configuring a startup Command Script.
To configure a Command Script after user has accepted an alarm:
1. Click the Workflow tab.
2. In the Execute the following Client Script when alarm is accepted: list, select the
desired Client Script.
This script is started as soon as a user accepts the selected alarm.
Refer to
– Alarm Options dialog box, page 304
– Configuring a startup Command Script (settings page), page 94
2. Click .
The dialog box for opening a file is displayed.
3. Select the required script file and click OK.
Refer to
– Command Script Editor dialog box, page 298
2. Click .
The dialog box for saving a file is displayed.
3. Type the required script file name and click OK.
Refer to
– Command Script Editor dialog box, page 298
Main window > Devices > Expand > > Settings page
You configure a Command Script to be started when the Operator Client on the selected
workstation is started.
You must create a corresponding Command Script.
For creating a Command Script, see Managing Command Scripts, page 92.
To configure a startup script:
4 In the Startup script: list, select the required Command Script.
Refer to
– Workstation page, page 136
Notice!
i If the activation is enforced, each instance of Operator Client restarts when the configuration
is activated. Avoid unnecessary activations. Perform activations preferably in the night or
during time periods with low activities.
Notice!
i If your system contains devices that are not protected by a password, you must secure these
devices before you can activate. You can deactivate this password enforcement.
1. Click .
The Activate configuration dialog box is displayed.
If your configuration contains devices that are not protected by a password, you cannot
activate. In this case the Protect Devices with Default Password... dialog box is
displayed.
Follow the instructions in this dialog box and click Apply.
The Activate configuration dialog box is displayed again.
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
96 en | Managing configuration data BVMS
2. If appropriate, enter a delayed activation time. By default, the present point in time is
configured as activation time. If you do not change the delayed activation time, the
activation is performed immediately.
If appropriate, click to check Force activation for all Operator Clients.
3. Type a description and click OK.
The current configuration is activated.
Each Operator Client workstation is instantly restarted, if connected to the network and
the activation is enforced. If a workstation is not connected, it is restarted as soon it is
connected again.
If you configured a delayed activation time, the configuration will be activated later.
Note: Delayed-activation is not executed as long as the user is logged on to the
Configuration Client.
Refer to
– Protect Devices with Global Default Password dialog box (Hardware menu), page 108
– Activate Configuration dialog box (System menu), page 107
Refer to
– Activate Configuration dialog box (System menu), page 107
– Activation Manager dialog box (System menu), page 106
Note: If your current working copy configuration is not activated ( is active), you
export this working copy and not the activated configuration.
2. Click Save.
3. Enter a filename.
The current configuration is exported. A .zip file with database and user data is created.
Refer to
– Importing configuration data, page 97
Notice!
i If you want to continue editing the configuration that has been activated for your
Management Server, perform a rollback in the Activate configuration dialog box.
Refer to
– Exporting configuration data, page 96
Notice!
Refer to
– Device Monitor dialog box (Hardware menu), page 113
Refer to
– SNMP Settings dialog box (Settings menu), page 116
Refer to
– Recording Schedules dialog box, page 115
– Task Schedules dialog box, page 115
– Cameras and Recording Parameters dialog box, page 115
– Stream Quality Settings dialog box, page 115
– Event Settings dialog box, page 115
10 Configuration examples
This chapter contains examples on how to configure selected devices in BVMS.
7. Click Events.
13. Click to save the settings and click to activate the configuration.
14. Perform a test to ensure that the alarm is working as desired.
2. In the column, click a cell and select the appropriate stream quality.
3. Under Continuous or Pre-alarm Recording, in the Select column, select the desired
recording mode.
If you click Pre-alarm: Click a cell in the Duration column to select the alarm recording
time before the alarm in seconds.
4. Under Alarm Recording, in the Duration column, click a cell and type the desired
recording time.
5. Repeat the previous steps to configure the recording settings for the other camera.
To enable Forensic Search on a workstation:
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
This chapter contains information on some basic application windows available in BVMS
Configuration Client.
Click to display the Maps and Structure page with Logical Tree,
Device Tree, and maps.
Maps and
Structure
Events
User groups
Click to update the state information for all devices and the
device capabilities if required (not available on every page). You
can update the state of a single device: Right-click the device and
click Refresh state.
Note: When you have a large system with several 1000 devices
configured, the process of updating states and device capabilities
can take a long time.
Undo All Changes on Page Restores the settings of this page since the last saving.
Export Device Information for Displays a dialog box for creating a configuration file
OPC... that you can import in a 3rd party management system.
Initial Device Scan... Displays the Initial Device Scan dialog box.
Protect Devices with Default Displays the Protect Devices with Global Default
Password... Password dialog box.
Protect iSCSI storages with CHAP Displays the Protect iSCSI storages with CHAP
password... password dialog box.
Change device passwords... Displays the Change device passwords dialog box.
Update device firmware... Displays the Update device firmware dialog box.
Change device IP and network Displays the Change device IP and network settings
settings... dialog box.
Command Script Editor... Displays the Command Script Editor dialog box
Cameras and Recording Displays the Cameras and Recording Parameters report
Parameters... dialog box.
Stream Quality Settings... Displays the Stream Quality Settings report dialog box.
Compound Event Settings... Displays the Compound Event Settings report dialog
box.
User Groups and Accounts... Displays the User Groups And Accounts report dialog
box.
User Group Permissions... Displays the User Group Permissions report dialog box.
LDAP server settings... Displays the LDAP server settings dialog box.
Define LDAP user group order... Displays the Define LDAP user group order... dialog
box.
Set Recording Qualities... Displays the Stream Quality Settings dialog box.
Remote Access Settings... Displays the Remote Access Settings dialog box.
Activate
Click to display the Activate configuration dialog box.
Refer to
– Activating the working configuration, page 95
– Activating a configuration, page 96
Refer to
– Activating the working configuration, page 95
Refer to
– Activating the working configuration, page 95
On newly added devices, the passwords are set automatically when you activate the
configuration.
Note: Setting an empty CHAP password removes the CHAP password on iSCSI and VRM
devices.
Global CHAP password
Type the iSCSI CHAP password which is necessary to authenticate at the iSCSI storage device
and to enable a direct playback from the iSCSI.
Confirm global CHAP password
Confirm the iSCSI CHAP password.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Apply
Click to apply the CHAP password.
Note: Check the operation result. It is possible that you have to set the CHAP password
manually on some iSCSI devices.
Main window > Devices > Change device passwords > Change device
passwords dialog box
or
Main window > Hardware menu > Change device passwords... command > Change device
passwords dialog box
Click to refresh the state information for all devices. You can refresh the state of a single
device: Right-click the device and click Refresh state.
Note: When you have a large system with several 1000 devices configured, the process of
refreshing states can take a long time.
Show passwords
Select the check box when you want the configured passwords being displayed in readable
form.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
The table allows you to set the following properties of the available IP devices:
– Service password
– User password
– Live password
– Destination password
Click to refresh the state information for all devices. You can refresh the state of a single
device: Right-click the device and click Refresh state.
Note: When you have a large system with several 1000 devices configured, the process of
refreshing states can take a long time.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Click to refresh the state information for all devices. You can refresh the state of a single
device: Right-click the device and click Refresh state.
Note: When you have a large system with several 1000 devices configured, the process of
refreshing states can take a long time.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
The table allows you to set the following properties of the available IP devices:
– Display name
– IP address
– Subnet mask
– Gateway IP
Notice!
i Instead of using the commands, you can type the appropriate settings in the required field.
3. Click Apply.
The new value is updated in the selected device.
Apply
Click to configure the devices with the entered values without closing the dialog box.
Refer to
– Checking the status of your encoders/decoders, page 98
Installation site
When activating your base license in the Bosch Remote Portal, you provide information about
the installation site of your system. This information displays here.
Note: You can also provide this information in other licenses, but only the information
provided in the base license displays here.
Licenses
1. Click Add to add your licenses.
The Add license dialog box is displayed.
2. Follow the instructions in the dialog.
Effective license
Displays the effective base license that you have activated.
Features
4 Click License Inspector....
The License Inspector dialog box displays.
Displays the quantity of the licensed features that are currently installed.
You can check whether the number of installed BVMS licenses exceeds the number of
purchased licenses.
Installed BVMS version
Displays the currently installed BVMS version, for example 11.0.
Licensed BVMS versions
Displays all BVMS versions that are included and supported in the current provided license
file.
For example: BVMS 11.0 and all upcoming minor versions BVMS 11.x.
Activation date
Displays the activation date of your installed BVMS version.
Expiration date
Displays the expiration date of your installed BVMS version. An Expiration date is only
applicable when you install an emergency license or a sales demo license.
Software Maintenance Agreement
Expiration date
If you have purchased and activated any Software Maintenance Agreement, the expiration date
displays here.
Refer to
– Activating the software licenses, page 79
– Add license dialog box, page 114
– License Inspector dialog box (Tools menu), page 113
Refer to
– Creating a report, page 98
Refer to
– Configuring SNMP monitoring, page 98
Proxy authentication
Anonymous
Use to log on as a guest. Select this option if the LDAP server supports it and you are not able
to configure a specific proxy user.
Use following credentials
User name
Type the unique name of the proxy user. This user is required to allow the users of this BVMS
user group to access the LDAP server.
Password
Type the proxy user password.
Test
Click to test whether the proxy user has access to the LDAP server.
LDAP basis for user
Type the unique name (DN = distinguished name) of the LDAP path in which you can search
for a user.
Example for a DN of the LDAP basis: CN=Users,DC=Security,DC=MyCompany,DC=com
Filter for user
Select a filter used to search for a unique user name. Examples are predefined. Replace
%username% with the actual user name.
LDAP basis for group
Type the unique name of the LDAP path in which you can search for groups.
Example for a DN of the LDAP basis: CN=Users,DC=Security,DC=MyCompany,DC=com
Filter for group member search
Select a filter used to search for a group member.
Examples are predefined. Replace %usernameDN% with the actual user name and his DN.
Group search filter
Do not leave this field empty. If there is no entry, you cannot assign an LDAP group to a BVMS
user group.
Select a filter to find a user group.
Examples are predefined.
Test user / User group
The entries in this group box are not saved after clicking OK. They only serve for testing.
User name
Type the name of a test user. Omit the DN.
Password
Type the test user password.
Test user
Click to test whether the combination of user name and password is correct.
Group (DN)
Type the unique group name with which the user is associated.
Test group
Click to test the association of the user with the group.
Refer to
– Selecting an associated LDAP group, page 346
Notice!
i If an LDAP group is associated with a BVMS user group, users of this LDAP group can start
the Operator Client using Single Sign-on.
Notice!
A LDAP user can be associated with more than one LDAP user group, which in turn are
i associated with a particular BVMS user group.
The LDAP user gets the permissions of the BVMS user group that is ordered above the other
LDAP user groups, that are associated with this LDAP user.
Refer to
– LDAP Server Settings dialog box (Settings menu), page 117
– User Group Properties page, page 321
11.19 Define LDAP user group order dialog box (Settings menu)
Displays the Change LDAP user group order list. The list shows the LDAP user groups with
their associated BVMS user groups and Enterprise User Groups. By drag and drop or using the
up and down arrow buttons you can change the order of the groups.
Notice!
A LDAP user can be associated with more than one LDAP user group, which in turn are
i associated with a particular BVMS user group.
The LDAP user gets the permissions of the BVMS user group that is ordered above the other
LDAP user groups, that are associated with this LDAP user.
Automatic logoff
Enforce automatic logoff of Configuration Client after this time of inactivity
Allows you to configure the automatic logoff of Configuration Client. Configuration Client will
log off after the configured time period.
Changes in the configuration pages of the following devices in the Devices page are not saved
automatically and are lost after inactivity logoff:
– Encoders
– Decoders
– VRM devices
– iSCSI devices
– VSG devices
All other pending configuration changes are saved automatically.
Note: Changes in dialog boxes that were not confirmed by clicking OK, are not saved.
Scan options
Allows you to configure if it is possible to scan for devices in the respective subnet or across
the subnet.
Logbook configuration
Database connection string
Allows you to configure the connection string for the Logbook database.
Notice!
i Change this string only when you want to configure a remote SQL server for the Logbook and
only when you are familiar with SQL server technology.
Enable advanced alarm display (hot spot coloring in maps depending on alarm)
Allows you to configure for all alarms that the hotspots of the devices belonging to this alarm,
are displayed with a background color and blink when the configured alarm occurs.
The configuration of the advanced state display is possible after you saved the configuration.
The hotspots are displayed on a map in Operator Client after you have activated the
configuration.
This setting is enabled after activating the configuration.
Multiple logon
Allow multiple logons with the same user name
Allows you to configure that a user of BVMS SDK, BVMS Web Client, BVMS Mobile App, or
Operator Client can perform multiple synchronous logons with the same user name.
Map-based tracking assistant
Enable Map-based tracking assistant
Allows you to configure that a user of the Operator Client can use the Map-based tracking
assistant.
Maps and viewports
Type of background map
Allows you to select the type of background map for the global map. The following map types
are available if you have access to the internet (online mode):
– HERE street map
– HERE dark street map
– HERE satellite map
If you do not have access to the internet (offline mode), select None.
Notice!
If you switch the type of background map from online (Here maps) to offline (None) or the
i other way around you lose all positioned camera hotspots and map viewports.
You can define only one background for the global map. This background applies to all map
viewports.
Notice!
i Additionally in the router you must manually configure the port forwarding according to the
settings in the port mapping table.
Refer to
– Remote access, page 76
12 Devices page
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Notice!
i The capabilities are only retrieved for reachable devices. To see, if a device is not reachable,
you have to check the state of the device.
1. Click .
The Update device capabilities dialog box is displayed. The state information of all
devices is updated and the device capabilities are retrieved.
Only if device capabilities are not up to date, the appropriate devices are displayed in a
list and the Update button is enabled.
2. If required, click Copy device list to clipboard.
3. Click Update.
4. Click OK.
P The device capabilities are now updated.
Notice!
i The state information of all devices will always be updated, even if you cancel the Update
device capabilities dialog.
Main window > Devices > Change device passwords > Change device
passwords dialog box
or
Main window > Hardware menu > Change device passwords... command > Change device
passwords dialog box
To change the password for IP devices:
1. Select the required device.
2. Right-click the selected device and click Edit password....
The Change device passwords dialog box is displayed.
3. Select the required password type.
4. Type in the new password.
5. Click OK.
The new password is updated in the selected device.
See Change device passwords dialog box (Hardware menu), page 109 for details.
To change the settings for multiple devices:
See Configuring multiple encoders / decoders, page 225.
Refer to
– Change device passwords dialog box (Hardware menu), page 109
– BVMS workstation
A workstation must have the Operator Client software installed.
– Communication device
– Bosch ATM/POS Bridge, DTP device
– Virtual input
– Network monitoring device
– Bosch IntuiKey keyboard
– KBD-Universal XF keyboard
– Monitor group
– I/O module
– Allegiant CCL emulation
– Intrusion panel from Bosch
– Server-based analytics device
– Access control systems from Bosch
You can scan for the following devices to add them with the help of the BVMS Scan Wizard
dialog box:
– VRM devices
– Encoders
– Live only encoders
– Live only ONVIF encoders
– Local storage encoders
– Decoders
– Video Streaming Gateway (VSG) devices
– DVR devices
Notice!
Notice!
i Add the DVR using the administrator account of the device. Using a DVR user account with
restricted permissions can result in features that are not usable in BVMS, for example using
the control of a PTZ camera.
Main window > Devices > Expand > Right-click > Click Scan for
Encoders > BVMS Scan Wizard dialog box
Main window > Devices > Expand > Right-click > Click Scan for Video
Streaming Gateways > BVMS Scan Wizard dialog box
Main window > Devices > Right-click > Click Scan for Live Only Encoders>
BVMS Scan Wizard dialog box
Main window > Devices > Right-click > Click Scan for Local Storage Encoders
> BVMS Scan Wizard dialog box
Main window > Devices > Expand > Expand > Right-click > Click
Scan for decoders > BVMS Scan Wizard dialog box
This dialog box allows you to scan for available devices in your network, configure them and
add them to your system in one process.
Use
Click to select a device for adding to the system.
Type (not available for VSG devices)
Displays the type of the device.
Display Name
Displays the device name that was entered in the Device Tree.
Network Address
Displays the IP address of the device.
User Name
Displays the user name that is configured on the device.
Password
Type in the password for authenticating with this device.
Status
Displays the status of authentication.
: Succeeded
: Failed
Main window > Devices > Right-click > Click Scan for VRM Devices> BVMS
Scan Wizard dialog box
Notice!
i For configuring a Secondary VRM you must first install the appropriate software on the
desired computer. Run Setup.exe and select Secondary VRM.
Role
In the list, select the desired entry.
The following table lists which roles each VRM type can have:
Primary (Normal) X
Secondary (Normal) X
Primary Failover X
Secondary Failover X
Mirrored X
To a Primary VRM you can add a VRM device with the following roles:
– Failover VRM
– Mirrored VRM
To a Secondary VRM you can add VRM devices with the following role:
– Failover VRM
Master VRM
In the list, select the desired entry.
User Name
Displays the user name that is configured on the VRM device.
You can type in another user name if required.
Refer to
– Adding VRM Devices via scan, page 169
– Adding an encoder to a VRM pool, page 216
– Adding a live only encoder, page 216
– Adding a local storage encoder, page 216
– Scanning for devices, page 75
Main window > Devices > Enterprise System > Server List / Address Book
You can add multiple Management Server computers for simultaneous access in BVMS
Enterprise System. You can also add multiple Management Server computers for sequential
access for Server Lookup.
You can add additional columns in the Server List. This lets you add further information that
the user can search for when using Server Lookup. The added columns are also visible on the
Server access page (Main window > User groups > Enterprise User Groups tab >
Note: If you use a SSH connection, enter the address in the following format:
ssh://IP or servername:5322
Private Network Address
Displays the private network addresses of all added Management Server computers. You can
change each entry.
Public Network Address
Displays the public network addresses of all added Management Server computers. You can
change each entry. You need the public network address for accessing this Management
Server computer via remote access.
Server Number
Displays the logical numbers of all added Management Server computers. You can change
each entry.
Server Description
Type in a description for this Management Server. You need this description to find it in the
list of all available servers when you want to access the Management Server exclusively, for
example to clarify an alarm coming from another management system.
Click to get a step-by-step instruction:
– Configuring the Server List for Enterprise System, page 89
– Configuring Server Lookup, page 128
– Exporting the Server List, page 129
– Importing a Server List, page 129
Refer to
– SSH Tunneling, page 50
Main window > Devices > Enterprise System > Server List / Address Book
Server name
Type in the display name of the Management Server.
Note: If you use a SSH connection, enter the address in the following format:
ssh://IP or servername:5322
Private Network Address
Type in the private IP address or DNS name of the Management Server.
Public Network Address
Type in the public network address or DNS name used for routed access.
Server description
Type in a description for the Management Server.
Refer to
– Server Lookup, page 24
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Devices page | en 129
Main window > Devices > Enterprise System > Server List / Address Book
To add servers:
1. Click Add Server.
The Add Server dialog box is displayed.
2. Type in a display name for the server and type in the private network address (DNS name
or IP address).
Note: If you use a SSH connection, enter the address in the following format:
ssh://IP or servername:5322
3. If required, type in a public network address (DNS name or IP address) for remote
access.
4. Click OK.
5. Repeat these steps until you have added all desired Management Server computers.
To add colums:
4 Right-click on the table header and click Add column.
You can add up to 10 columns.
To delete a column, right-click the desired column and click Delete column.
P When you export the Server List, the added columns are also exported.
Refer to
– Configuring the Server List for Enterprise System, page 89
Main window > Devices > Enterprise System > Server List / Address Book
You can export the Server List with all configured properties for editing and later import.
When you edit the exported csv file in an external editor, note the limitations described in the
Server List chapter.
To export:
1. Right-click on the table header and click Export Server List....
2. Type in a name for the export file and click Save.
P All columns of the Server List are exported as a csv file.
Related Topics
– Server Lookup, page 24
– Server List
– Server list / Address Book page, page 127
Main window > Devices > Enterprise System > Server List / Address Book
When you have edited the exported csv file in an external editor, note the limitations
described in the Server List chapter.
To import:
1. Right-click on the table header and click Import Server List....
2. Click the desired file and click Open.
Related Topics
– Server Lookup, page 24
– Server List
– Server list / Address Book page, page 127
Notice!
i You do not configure the DVR itself but only the integration of the DVR device into BVMS.
Notice!
i Add the DVR using the administrator account of the device. Using a DVR user account with
restricted permissions can result in features that are not usable in BVMS, for example using
the control of a PTZ camera.
Refer to
– DVR devices, page 130
– Configuring the integration of a DVR, page 132
Notice!
i Add the DVR using the administrator account of the device. Using a DVR user account with
restricted permissions can result in features that are not usable in BVMS, for example using
the control of a PTZ camera.
Notice!
i DIVAR AN 3000/5000: When you delete video data from the DVR, please note that you always
delete at least the full hour of video data. For example if you select a time period from 6:50 to
7:05, you will effectively delete the video data from 6:00 through 8:00.
Bosch 700 Series Hybrid and Network HD Recorders: Deletion always starts with the
beginning of the recordings of all cameras that are displayed in Operator Client, and ends with
the point in time that you enter.
Refer to
– DVR (Digital Video Recorder) page, page 130
– Configuring the integration of a DVR, page 132
Main window > Devices > Expand > > Add DVR
Allows you to manually add a DVR device.
Network address / port
Type the IP address of your DVR. If required, change the port number.
User name:
Type the user name for connecting to the DVR.
Password:
Type the password for connecting to the DVR.
Security
The Secure connection check box is selected by default.
If a secure connection is not possible, a message appears. Click to remove the checkmark.
Notice!
i If the Secure connection check box is selected, command and control connections are
secure. Video data streaming is not secure.
Refer to
– Adding a device, page 124
Notice!
i Add the DVR using the administrator account of the device. Using a DVR user account with
restricted permissions can result in features that are not usable in BVMS, for example using
the control of a PTZ camera.
Notice!
i You do not configure the DVR itself but only the integration of the DVR device into BVMS.
To remove an item:
1. Click the Settings tab, the Cameras tab, the Inputs tab, or the Relays tab.
2. Right-click an item and click Remove. The item is removed.
Notice!
i To restore a removed item, right-click the DVR device and click Rescan DVR.
Refer to
– Adding a device, page 124
– DVR (Digital Video Recorder) page, page 130
Refer to
– Configuring a Bosch Allegiant device, page 133
– Connecting Bosch Allegiant Matrix to BVMS, page 56
Refer to
– Connecting a Bosch IntuiKey keyboard to BVMS, page 52
– Connection page, page 135
– Cameras page, page 135
– Outputs page, page 134
– Inputs page, page 135
Main window > Devices > Expand > > Outputs tab
Allows you to configure the usage of a Bosch Allegiant device output and to assign an encoder
to an output.
To store the video data of a Bosch Allegiant device output in BVMS, you must assign an
encoder to the output. This encoder must be connected to the output.
No.
Displays the number of the output.
Allegiant Logical No.
Displays the logical number of the output within Allegiant.
BVMS Logical No.
Allows you to change the logical number of the output within BVMS. If you enter an already
used number, a message is displayed.
Name
Displays the name of the output.
Usage
Allows you to change the usage of the output.
If you select Digital Trunk, you can assign an encoder to this output in the Encoder field. The
Allegiant output becomes network-compatible.
If you select Allegiant Monitor, in Operator Client the user can assign the camera signal to a
hardware monitor. PTZ control is possible if the camera is configured as PTZ camera. In
Operator Client, the user cannot drag this camera on an Image pane.
If you select Unused, the user cannot assign a monitor to an Allegiant camera.
Encoder
Allows you to assign an output to an encoder. You can only select an encoder when you have
checked Digital Trunk. The encoder is locked for the Logical Tree. If you assign an encoder
that is already in the Logical Tree, it is removed from there. In the Operator Client, the user
can drag the camera to an Image pane.
Refer to
– Configuring a Bosch Allegiant device, page 133
Main window > Devices > Expand > > Inputs tab
Allows you to add inputs to a Bosch Allegiant device.
Add Input
Click to add a new row in the table for specifying a new input.
Delete Input
Click to remove a row from the table.
Input No.
Type the required number of the input. If you enter an already used number, a message is
displayed.
Input Name
Type the required name of the input.
Refer to
– Configuring a Bosch Allegiant device, page 133
Main window > Devices > Expand > > Connection tab
Displays the name of the Bosch Allegiant configuration file.
BVMS can read out a configuration file in structured storage format with the names and
configuration information of all cameras connected to the Bosch Allegiant device.
Update Configuration
Click to select an updated Bosch Allegiant configuration file.
Refer to
– Configuring a Bosch Allegiant device, page 133
Main window > Devices > Expand > > Cameras tab
Displays a camera table of the cameras that are connected to the Bosch Allegiant device.
No.
Displays the consecutive number of the camera.
Allegiant Logical No.
Displays the logical number of the camera.
Camera Name
Displays the name of the camera.
Refer to
– Configuring a Bosch Allegiant device, page 133
Refer to
– Adding a workstation manually, page 136
– Configuring a startup Command Script (settings page), page 137
1. Right-click
2. Click Add Workstation.
The Add Workstation dialog box is displayed.
3. Enter the appropriate value.
4. Click OK.
4 Right-click
Click Add Default Workstation.
Notice!
If a default workstation is configured, the settings apply for each workstation that is
connected to this server and is not configured separately.
If a workstation is configured, the settings for this specific workstation apply and not the
default workstation settings.
Refer to
– Workstation page, page 136
Main window > Devices > Expand > > Settings page
You must enable Forensic Search on a workstation.
Note:
Enable video content analysis on each encoder. Use the VCA page of the encoder in the Device
Tree.
To enable Forensic Search:
4 Click to select the Enable Forensic Search check box.
Main window > Devices > Expand > > Settings page
You configure a Command Script to be started when the Operator Client on the selected
workstation is started.
You must create a corresponding Command Script.
For creating a Command Script, see Managing Command Scripts, page 92.
To configure a startup script:
4 In the Startup script: list, select the required Command Script.
Refer to
– Workstation page, page 136
Main window > Devices > Expand > > Settings tab
Allows you to configure a script that is executed when the Operator Client on the workstation
is started.
Allows you to configure TCP or UDP as transmission protocol used for all cameras that are
displayed in Live Mode on your workstation.
Allows you to configure which stream of an IP device is used for live display.
Allows you to enable Forensic Search for this workstation.
And you can configure the keyboard that is connected to this workstation.
Network address:
Type the DNS name or the IP address of your workstation.
Startup script:
Select the desired script that you want to be started when the workstation’s Operator Client
is started. You create or import such a script on the Events page.
Default camera protocol:
Select the default transmission protocol used for all cameras that are assigned to the Logical
Tree of this workstation.
Override settings from "Cameras and Recording" page
Select the check box to enable selecting the desired stream for live view.
Note: For DVR devices which offer more than 1 stream (for example DIVAR AN 3000/5000),
the Live stream setting from this DVR is also changed here. Live stream settings for DVR
devices are not available on the Cameras and Recording page.
Live Stream
Select the desired stream for live view.
When you select Image pane size optimized, the resolution of each displayed camera is
automatically adjusted to the size of the Image pane depending on the resolution of the used
monitor. This is useful for displaying multiple cameras with a large resolution, for example 4K
ultra HD cameras. Only cameras with streams whose resolution can be configured
independently, can adjust the resolution to the Image pane. The user of Operator Client can
change the stream selection for each camera individually.
Use transcoded stream instead, if available
Select the check box to enable the usage of a transcoded stream if available. This transcoded
stream is used instead of the selected stream for live view.
For a transcoded stream being available in BVMS, either MVS must be installed or your VRM
computer offers a built-in hardware transcoder.
When a camera is displayed in Live Mode then the default stream set for the workstation is
used. If the camera has no stream 2 or the transcoding service (SW and HW) is not available
then stream 1 will be used even though another setting is configured in the workstation
settings.
Enable Forensic Search
Click to enable Forensic Search for this workstation.
Use direct playback from storage
Select the check box to send the video stream directly from the storage device to this
workstation. Now the stream is not sent via VRM. The workstation still needs connection to
the VRM to ensure correct playback.
Note: You can only use the direct playback from the iSCSI storage device if you have set the
global iSCSI CHAP password.
Retrieve live video from Video Streaming Gateway instead of camera
Displays the list of Video Streaming Gateway devices. Select the desired entries to enable the
transmission of video data via low bandwidth segments between the video source and this
workstation.
Keyboard type:
Select the type of the keyboard that is connected to your workstation.
Port:
Select the COM port that is used to connect your keyboard.
Baudrate:
Select the maximum rate, in bits per second (bps), that you want data to be transmitted
through this port. Usually, this is set to the maximum rate supported by the computer or
device you are communicating with.
Data bits:
Displays the number of data bits you want to use for each character that is transmitted and
received.
Stop bits:
Displays the time between each character being transmitted (where time is measured in bits).
Parity:
Displays the type of error checking you want to use for the selected port.
Port type:
Displays the connection type that is used to connect the Bosch IntuiKey keyboard with the
workstation.
Refer to
– Configuring a startup Command Script (settings page), page 137
– Enabling Forensic Search on a workstation (settings page), page 137
Notice!
i If you want to use decoders in your system, make sure that all encoders use the same
password for the user authorization level.
Refer to
– Scanning for devices, page 75
– Bosch Encoder / Decoder / Camera page, page 214
Main window > Devices > Expand > Expand > Right-click > Click
Add Encoder > Add Encoder dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Expand > Right-click > Click Add Decoder >
Add Encoder dialog box
Allows you to add an encoder or decoder manually. This is especially useful when you want to
add any Video IP device from Bosch (only for VRM).
Notice:
If you add a Video IP encoder or decoder from Bosch with the <Auto Detect> selection, this
device must be available in the network.
To add a Video IP device from Bosch:
Right-click .
Or
Right-click .
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Expand > Right-click > Click
Edit Decoder > Edit Decoder dialog box
Allows you to check and update the device capabilities of a device. On opening this dialog box
the device is connected. The password is checked and the device capabilities of this device
are compared with the device capabilities stored in BVMS.
Name
Displays the device name. When you add a Video IP device from Bosch, the device name is
generated. If required change the entry.
Network address / port
Type the network address of the device. If required, change the port number.
User name
Displays the user name used for authenticating at the device.
Password
Type the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Authenticate
Click to authenticate at the device with the credentials entered above.
Security
The Secure connection check box is selected by default.
If a secure connection is not possible, a message appears. Click to remove the checkmark.
Notice!
i The connection between a decoder and an encoder is only secure, if both are configured with
secure connection.
Device Capabilities
You can sort the displayed device capabilities per category or alphabetically.
A message text informs you whether the detected device capabilities match the current device
capabilities.
Click OK to apply the changes of the device capabilities after an upgrade of the device.
Refer to
– Encrypting live video (Edit Encoder), page 216
– Updating the device capabilities (Edit Encoder), page 217
Main window > Devices > Expand > Expand > >
or
A password prevents unauthorized access to the device. You can use different authorization
levels to limit access.
Proper password protection is only guaranteed when all higher authorization levels are also
protected with a password. Therefore, you must always start from the highest authorization
level when assigning passwords.
You can define and change a password for each authorization level if you are logged into the
“service” user account.
The device has three authorization levels: service, user, and live.
– service is the highest authorization level. Entering the correct password gives access to
all the functions and allows all configuration settings to be changed.
– user is the middle authorization level. At this level you can operate the device, play back
recordings, and also control camera, for example, but you cannot change the
configuration.
– live is the lowest authorization level. At this level you can only view the live video image
and switch between the different live image displays.
For a decoder the following authorization level replaces the live authorization level:
– destination password (only available for decoders)
Used for access to an encoder.
Refer to
– Providing the destination password for a decoder (Authenticate...), page 209
Notice!
i Selecting a VGA setting with values outside the technical specification of the monitor can
result in severe damage to the monitor. Refer to the technical documentation of the monitor
you are using.
Window layout
Select the default image layout for the monitor.
VGA screen size
Type the aspect ratio of the screen (for example 4 x 3) or the physical size of the screen in
millimeters. The device uses this information to accurately scale the video image for
distortion-free display.
Disturbance sensitivity
Move the slider to adjust the level of the interruption that triggers the warning.
Disturbance notification text
Type the text of the warning the monitor displays when connection is lost. The maximum text
length is 31 characters.
Notice!
Refer to
– Assign Keyboard page, page 155
– Scenarios for Bosch IntuiKey keyboard connections, page 52
– Connecting a Bosch IntuiKey keyboard to a decoder, page 54
Refer to
– Scenarios for Bosch IntuiKey keyboard connections, page 52
– Connecting a Bosch IntuiKey keyboard to a decoder, page 54
workstation in .
Notice!
i You cannot control a monitor group from within Operator Client when the connection to the
Management Server is lost.
Refer to
– Adding a monitor group manually, page 145
– Configuring a monitor group, page 145
– Configuring predefined positions and auxiliary commands, page 291
– Configuring an alarm, page 314
– Alarm Options dialog box, page 304
– Select Image Pane Content dialog box (MG), page 303
Main window > Devices > Expand > Right-click > Click Add monitor
group
1. Click Add monitor group.
The Add monitor group dialog box is displayed. Type in the name for your new monitor
group.
2. Click OK.
The monitor group is added to your system.
Notice!
i You cannot control a monitor group from within Operator Client when the connection to the
Management Server is lost.
You configure the monitors in a monitor group logically in rows and columns. This
arrangement does not have to meet the physical arrangement of the monitors.
To configure a monitor group:
1. Drag the appropriate monitors from the Unassigned monitors tab to the monitor groups
field.
2. In the Layout tab, select the appropriate layout.
3. Drag any available camera from the Cameras tab to a monitor pane on the left.
The logical number of the camera is displayed as a black number on the monitor pane and
the color of this pane changes.
4. Change the logical numbers of the image panes as required. If you enter an already used
number, a message box is displayed.
5. In the Options tab, you can select, if the camera name and number are visible in the
monitor pane. You can also select the position of this information.
Monitor image
The black bold number, if present, displays the logical number of the initial camera. The black
light number displays the logical number of the monitor.
To un-assign a camera, right-click the monitor pane and click Clear monitor or drag the
camera outside the image pane.
Refer to
– Adding a monitor group manually, page 145
Refer to
– Configuring a communication device, page 147
Refer to
– Configuring a communication device, page 147
1. Click .
2. Make the appropriate settings.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
Refer to
– Adding an E-mail/SMTP Server, page 146
– SMTP Server page, page 147
Main window > Devices > Expand > Expand > > Send Test E-mail
button
Allows you to send a test e-mail.
From:
Type the e-mail address of the sender.
To
Type the e-mail address of the recipient.
Subject
Type the subject of the e-mail.
Message
Type the message.
Send Test E-mail
Click to send the e-Mail.
Refer to
– Configuring a communication device, page 147
Refer to
– Adding a Bosch ATM/POS bridge, page 100
– Configuring a peripheral device, page 150
Main window > Devices > Expand > Right-click > Add Bosch ATM/POS-
Bridge .
Allows you to add a Bosch ATM/POS Bridge.
Notice!
i When you add multiple ATM/POS Bridges to your system, ensure that the numbers for port 2
of each device deviate. Using the same number for port 2 multiple times can lead to ATM/POS
data loss.
Refer to
– Adding a Bosch ATM/POS bridge, page 100
Main window > Devices > Expand > Expand > > Bosch ATM/POS-
Bridge tab
Allows you to configure a Bosch ATM/POS Bridge.
IP address:
Type in the IP address of the device.
Port 1:
Type the appropriate port number used as the listening port of the ATM/POS Bridge.
Port 2:
Type the appropriate port number used as the listening port of the BVMS Management Server.
Notice!
i When you add multiple ATM/POS Bridges to your system, ensure that the numbers for port 2
of each device deviate. Using the same number for port 2 multiple times can lead to ATM/POS
data loss.
Refer to
– Configuring a peripheral device, page 150
– Adding a Bosch ATM/POS bridge, page 100
Main window > Devices > Expand > Expand > Bosch ATM/POS-
Bridge
or
Main window > Devices > Expand > Expand > DTP Device >
To configure a peripheral device:
4 Change the required settings.
For detailed information on the various fields, follow the link to the appropriate application
window below.
Refer to
– ATM Settings page, page 150
– Bosch ATM/POS-Bridge page, page 149
– DTP Settings page, page 150
Refer to
– ATM Settings page, page 150
– Configuring a peripheral device, page 150
Main window > Devices > Expand > Expand > >
Allows you to configure an ATM device that is connected to a DTP.
Input number of the DTP device
Select the desired input number. If the number is already used by another ATM device, you
can swap the input numbers.
Connection timeout [hours]
Enter the desired number of hours. When during this time period the ATM device did not send
any transaction data, BVMS assumes that the connection is disconnected. A corresponding
event is triggered. The Not Authenticated event is available for an ATM device but not
relevant.
Entering 0 means that no connection check is performed.
Data Inputs
Click to enable the desired inputs and type in a desired name for the inputs.
Refer to
– Configuring a peripheral device, page 150
Main window > Devices > Expand > Expand > > Inputs tab
Allows you to configure the inputs of a Bosch ATM/POS Bridge.
Refer to
– Configuring a peripheral device, page 150
– Adding a Bosch ATM/POS bridge, page 100
Main window > Devices > Expand > > Global Settings for Foyer Card
Readers tab
You can configure the settings that are valid for all foyer card readers in your system.
Serial port
Select the serial port to which the foyer card reader is connected.
Locked Out
Allows you to add bank routing codes for locking out. This means that cards with the lock
characteristics entered here do not have access authorization. Access is denied by the foyer
card reader. The default mode of electric door lock release of the foyer card reader must be
set to: Automatic
The list may contain entries with wildcards:
?: Indicates any or no character at this position.
*: Indicates a sequence (one or more characters) of any or no characters (exception: * on its
own means that all bank sort codes are locked out).
Ignore country code on EC cards
Click to enable that BVMS does not analyze card data that is used to identify in which country
the card was issued. Access is possible for cards with a different country code.
Main window > Devices > Expand > Right-click > Add Foyer Card Reader
command
You can add a foyer card reader.
Name
Type in a name for the device.
Device identifier
Select a unique number for the device. If no numbers are available, the maximum number of
foyer card readers have already been added to the system.
Main window > Devices > Expand > > > Settings for Foyer Card
Reader tab
You can configure a foyer card reader.
Device identifier
Displays the unique number of the device.
Enable skimming protection
Click to enable that BVMS triggers an event when an attached skimming device detects
skimming. This is not supported by all types of foyer card readers.
Default mode of electric door lock release
Open: The door is open and everybody can access without a card.
Closed: The door is closed, no matter what card is inserted.
Automatic: The door only opens when a card with access authorization is inserted in the
reader.
Enable schedule-based control
Click to enable that you can assign a schedule to the selected release mode of the door lock.
When a schedule becomes active, BVMS switches the foyer card reader to the corresponding
release mode.
If the selected schedules overlap, the effective door release mode is determined by the
following priority of modes: 1. Open 2. Closed 3. Automatic
Main window > Devices > Expand > Add Inputs button
Allows you to add new virtual inputs.
To add a virtual input:
1. Expand , click .
The corresponding page is displayed.
Refer to
– Configuring an SNMP trap receiver (SNMP trap receiver page), page 153
Main window > Devices > Expand > Right-click > Add SNMP command
Allows you to add a network monitoring system to your BVMS.
To add a network monitoring device:
Refer to
– Configuring an SNMP trap receiver (SNMP trap receiver page), page 153
Notice!
i You must enter the IP address of the Bosch Video Management System Management Server
as the trap receiver in your devices that you want to monitor.
Main window > Devices > Expand > Expand > Select a generic SNMP
Trap Receiver > Click Show Trap Logger Tool
Allows you to trace SNMPtrapOIDs. You can receive traps from all devices in your network or
only from selected ones. You can filter the traps to be received and you can add OIDs and
values of selected traps to the SNMP Trap Filter Rules: table.
Start/Pause
Click to start or stop a tracing process.
Only Traps From Sender
Enter the IP address or DNS name of a device. Only traps from this device are traced.
Only Traps Containing
Enter a string a trap can contain. You can use * and ? as wildcards. Strings in {} are treated as
regular expressions. Only traps containing such a string are traced.
Received Traps
Displays the traps that are received by a tracing process.
Refer to
– Configuring an SNMP trap receiver (SNMP trap receiver page), page 153
1. Expand , click .
The corresponding page is displayed.
2. Click Add Keyboard.
A row is added to the table.
3. In the appropriate field of the Keyboard Type column, select the desired keyboard type:
IntuiKey Keyboard
KBD-Universal XF Keyboard
4. In the appropriate field of the Connection column, select the workstation that is
connected with the keyboard.
5. Make the appropriate settings.
The keyboard is added to your system.
Add Keyboard
Click to add a row to the table for configuring a keyboard.
Delete Keyboard
Click to remove the selected row.
Keyboard Type
Displays the type of the keyboard that is connected to your workstation or decoder.
Click a cell to select the required keyboard type.
– IntuiKey
Select this type if you have attached an IntuiKey keyboard from Bosch.
– KBD-Universal XF Keyboard
Select this type if you have attached a KBD-Universal XF keyboard.
Connection
In a cell, select the device your keyboard is connected to. If you select a workstation, the
Port
In a cell, select the desired COM port.
Baudrate
In a cell, select the maximum rate, in bits per second (bps), that you want data to be
transmitted through this port. Usually, this is set to the maximum rate supported by the
computer or device you are communicating with.
Data Bits
Displays the number of data bits you want to use for each character that is transmitted and
received.
Stop Bits
Displays the time between each character being transmitted (where time is measured in bits).
Parity
Displays the type of error checking you want to use for the selected port.
Port Type
Displays the connection type that is used to connect the Bosch IntuiKey keyboard with the
workstation.
Refer to
– Configuring a decoder for use with a Bosch IntuiKey keyboard, page 144
– Configuring a Bosch IntuiKey keyboard (settings page) (workstation), page 137
– Configuring a Bosch IntuiKey keyboard (decoder), page 144
Refer to
– Configuring an I/O module, page 157
Notice!
i You can also perform a scan for ADAM devices (Scan for ADAM Devices). The IP addresses of
the devices are detected. If available the device type is preselected. You must confirm this
selection.
Notice!
Refer to
– I/O Modules page, page 156
Main window > Devices > Expand > > > ADAM tab
Displays information on the selected ADAM device.
Allows you to change the display name of an ADAM device.
Adam type:
Select the appropriate device type.
Inputs total:
Displays the total number of inputs available with this device type.
Relays/Outputs total:
Displays the total number of relays available with this device type.
Main window > Devices > Expand > > > Inputs tab
Allows you to change the display names of the inputs of the selected ADAM device.
Number
Displays the logical number of the input.
Name
Click a cell to change the display name of an input.
Main window > Devices > Expand > > > Relays tab
Allows you to change the display names of the relays of the selected ADAM device.
Number
Click a cell to change the logical number of a relay.
Name
Type the display name of the relay.
Refer to
– Configuring an Allegiant CCL emulation, page 159
1. Expand , click .
The Allegiant CCL Emulation tab is displayed.
Refer to
– Allegiant CCL Emulation page, page 158
Refer to
– Adding a Mobile Video Service manually, page 160
Refer to
– Adding a Mobile Video Service manually, page 160
Main window > Devices > Right-click > Click Add Mobile Video Service
You can add one or more Mobile Video Service entries to your BVMS.
To add:
1. Type in the URI of your Mobile Video Service.
2. Click OK.
P Mobile Video Service and Management Server now know each other and the Mobile Video
Service can receive configuration data from Management Server.
Add Mobile Video Service dialog box
URI
Type in the URI of your Mobile Video Service. Follow the syntax rules of the example:
https://www.MyDomain.org/mvs
You must start the entry always with https://, even when you did not configure an encrypted
access to your Web server.
Allows you to add and configure intrusion panels from Bosch. The device must be connected
and available.
When you have added an intrusion panel, the areas, points, doors, and relays are displayed in
the Device Tree hierarchically.
You can remove or rename the panel, each area, each point, each door, and each relay.
When the configuration on the intrusion panel was changed, you must rescan the device to
display the changes in BVMS.
Notice!
i All alarm events that can occur at a point, are automatically configured as a BVMS alarm.
Example: Fire alarm
Notice!
i If a door is not assigned to a point in the configuration of an intrusion panel that is added to
your BVMS, an alarm from this door does not trigger a BVMS event and hence no BVMS alarm.
Main window > Devices > Expand > Right-click > Add Panel command
Allows you to add an intrusion panel from Bosch.
To add an intrusion panel:
Main window > Devices > Expand > Expand > > Settings tab
Allows you to change the connection settings of the intrusion panel.
Allows you to add and configure access control systems from Bosch. The device must be
connected and available. When you have added an access control system, the controller,
entrances, readers and doors are displayed in the Device Tree hierarchically.
You can remove or rename the controller, entrances, readers and doors on the Maps and
Structure page.
When the configuration or hierarchy for controllers, readers or doors of the access control
system was changed, you must rescan the device to display the changes in BVMS.
HTTPS Certificate for Client
In order to secure the connection between the access control system and BVMS, you have to
export a client certificate from the access control system and import it into BVMS. This
process is described in the section HTTPS Certificate for Client of the access control system
documentation.
Notice!
i If the certificate is not added, the systems will not be able to exchange information with each
other.
1. Right-click .
2. Click Add access control system.
The Add access control system dialog box is displayed.
Note: When adding an access control system, configured doors, readers, inputs and relays are
listed in the device tree on the Maps and Structure page.
Add access control system dialog box
Network address / HTTPS port
Type the network address of the device. If required, change the port number.
User name
Displays the user name used for authenticating at the device.
Password
Type the valid password for authenticating at the device.
To test the connection:
1. Click connect.
The BVMS Configuration Client will try to connect to the access control system and
retrieve the relevant information.
2. Click OK.
The access control system is added to your system, based on the information displayed.
1. Right-click .
2. Click Edit access control system.
The Edit access control system dialog box is displayed.
Main window > Devices > Expand > > > Settings tab
Allows you to change the connection settings of the access control system.
Main window > > Devices > Expand > Expand > Video Analytics >
Video Analytics Settings page
You can add a server-based video analytics device.
The credentials and the installation path to the analytics viewer application used for the video
analytics device must be available.
Network address
Type in the IP address of the video analytics device. DNS name is not allowed.
User name
Type in the user name as configured in the video analytics device.
Password
Type in the password as configured in the server-based analytics device.
Analytics viewer path
Type in the relative path of the installation path of the analytics viewer application. The path is
relative to C:\Program Files (x86)\ on the computer where the viewer application is used.
Example: The analytics viewer application (AnalyticsViewer.exe) is installed in the
following directory:
C:\Program Files (x86)\VideoAnalytics\
Configure the following path in the Analytics viewer path field:
VideoAnalytics\AnalyticsViewer.exe
Main window > > Devices > Right-click >Add Video Analytics Device
command > Add Video Analytics Device dialog box
When adding a server-based analytics device, you type in the credentials for the new device.
To add a server-based analytics device:
Main window > > Devices > Expand > Expand > Person
Identification devices page
Allows you to add a Person Identification device. The device must be connected and available.
You can add cameras to your Person Identification device and configure Person Identification
events and alarms.
Person groups
In the Person groups tab you can add and configure person groups.
Cameras
In the Cameras tab you can add cameras to your Person Identification device. The added
cameras appear in a list.
Note: At first, add the appropriate cameras to the Logical Tree.
i the certificate Bosch VMS CA. Otherwise you can not use an existing PID without a reset,
which deletes all stored persons.
We recommend to create a backup of the BVMS configuration and the certificate Bosch VMS
CA.
When adding a Person Identification device, make sure the certificate that is displayed in the
Add Person Identification Device dialog box corresponds to the PID that you want to add.
From BVMS 10.1 you can add multiple PID devices.
The first PID device you add is the leading device that is connected to the BVMS system. This
first PID device establishes the connection to the other PID devices and the person database
is stored on it.
Note: Before you can delete the first PID device, you have to delete all other configured PID
devices.
To add a Person Identification device:
1. Expand .
2. Right-click
3. Click Add Person Identification Device.
The Add Person Identification Device dialog box is displayed.
4. Enter the appropriate values.
5. Click View certificate... to check, if the certificate corresponds to the PID.
6. Click OK to confirm.
7. Click OK.
The device is added to your system.
Refer to
– Restoring access to a PID after a BVMS central server breakdown, page 165
– To export configuration data:, page 97
Main window > Devices > Expand > Expand > Person
i the certificate Bosch VMS CA. Otherwise you can not use an existing PID without a reset,
which deletes all stored persons.
We recommend to create a backup of the BVMS configuration and the certificate Bosch VMS
CA.
For more information on saving the BVMS configuration refer to To export configuration data:,
page 81. Certificates are managed outside of BVMS in the Windows application Manage
Computer Certificates.
Notice!
Certificates contain confidential information. Protect them by doing the following:
i - Set a strong password.
- Store the certificate in a restricted area, for example a non-public server.
- Make sure that only authorized personnel can access the certificate.
Refer to
– Exporting configuration data, page 96
1. Expand .
2. Expand .
3. Click .
4. Click the Cameras tab.
5. Drag the appropriate cameras from the Logical Tree window to the Cameras window.
Or
double-click the appropriate cameras in the Logical Tree window.
The cameras are added to your Person Identification device and are displayed in the
Cameras list.
Camera parameter
Notice!
i You can not delete or change the values of the default group.
Notice!
i You can set different alarm priorities for each camera of the appropriate person group.
You can also change the alarm priority of the default person group.
Refer to
– Alarms page, page 301
Notice!
1. Right-click
2. Click Add LPR Device.
The Add LPR Device dialog box is displayed.
3. Enter the appropriate values.
4. Click Authenticate.
5. Click OK.
The device is added to your system.
Notice!
i You have to specify the IP address of the BVMS Management Server in the LPR device
configuration. Otherwise the BVMS system does not retrieve events from this LPR device.
Password
Type the valid password for authenticating at the device.
Authenticate
Click to authenticate at the device with the credentials entered above.
Notice!
i After you have added an iSCSI device with respective encoders to your BVMS, you must add
the IQN of each encoder to this iSCSI device (valid for some iSCSI device types).
See Configuring an iSCSI device, page 192 for details.
Notice!
Ensure that the time of the VRM computer is synchronized with the Management Server.
Refer to
– Configuring multicast, page 228
– Synchronizing BVMS configuration, page 178
– VRM Settings page, page 172
– Pool page, page 179
– iSCSI device page, page 188
– Changing the password of a VRM device, page 175
Notice!
When you add an iSCSI device with no targets and LUNs configured, start a default
i configuration and add the IQN of each encoder to this iSCSI device.
When you add an iSCSI device with targets and LUNs pre-configured, add the IQN of each
encoder to this iSCSI device.
See Configuring an iSCSI device, page 192 for details.
1. Right-click .
2. Click Edit VRM Device.
The Edit VRM Device dialog box is displayed.
3. Select the Secure connection check box.
The used port changes automatically to the HTTPS port.
Or
deselect the Secure connection check box.
The used port changes automatically to the rcpp port.
Refer to
– Adding a device, page 124
– VRM Devices page, page 169
– Configuring an iSCSI device, page 192
– Dual / failover recording, page 28
Main window > Devices > Right-click > Click Add VRM > Add VRM dialog box
Allows you to add a VRM device. You can select the type of the device and enter the
credentials.
You can effectively assign a Failover VRM to a Master VRM only when both are online and are
successfully authenticated. The passwords are then synchronized.
You can add a Primary VRM device manually if you know the IP address and password.
To add a Primary VRM device:
1. Make the required settings for your VRM device.
2. In the Type list, select the Primary entry.
3. Click OK.
The VRM device is added.
You can add a Secondary VRM device manually if you know the IP address and password.
Notice!
i For configuring a Secondary VRM you must first install the appropriate software on the
desired computer. Run Setup.exe and select Secondary VRM.
Notice!
i If you migrate to BVMS version 10.0 and higher, the Secure connection check box is not
selected by default and the connection is unsecure (rcpp).
To change secure or unsecure connection, use the Edit VRM Device command and select or
deselect the Secure connection check box.
Test
Click to check whether the device is connected and authentication is successful.
Properties
If required, change the port numbers for the HTTP port and for the HTTPS port. This is only
possible when you add or edit a VRM that is not connected. If the VRM is connected, the
values are retrieved and you cannot change them.
The Master VRM table row shows the selected device if applicable.
Refer to
– Editing a VRM device, page 172
– Adding a Mirrored VRM manually, page 176
– Adding a Failover VRM manually, page 175
1. Right-click .
2. Click Edit VRM Device.
The Edit VRM Device dialog box is displayed.
3. Select the Secure connection check box.
The used port changes automatically to the HTTPS port.
Or
deselect the Secure connection check box.
The used port changes automatically to the rcpp port.
Notice!
For detailed information about the parameter of the Edit VRM Device dialog box, see chapter
Adding a primary or secondary VRM manually.
Refer to
– Adding a primary or secondary VRM manually, page 170
Main window > Devices > Expand > > Main Settings > VRM Settings
Server initiator name
Displays the iSCSI initiator name of VRM Server.
Main window > Devices > Expand > Expand > Network > SNMP
1. SNMP host address 2. SNMP host address
VRM supports the SNMP (Simple Network Management Protocol) for managing and
monitoring network components, and can send SNMP messages (traps) to IP addresses. The
unit supports SNMP MIB II in the unified code. If you wish to send SNMP traps, enter the IP
addresses of one or two required target units here.
Some events are sent as SNMP traps only. Refer to the MIB file for descriptions.
Main window > Devices > Expand > Expand > Service > Advanced
RCP+ logging / Debug logging / Replay logging / VDP logging / Performance logging
Activate the different logs for VRM Server and Configuration Manager.
The log files for VRM Server are stored on the computer on which VRM Server has been
started, and can be viewed or downloaded with VRM Monitor.
The log files for Configuration Manager are stored locally in the following directory:
%USERPROFILE%\My Documents\Bosch\Video Recording Manager\Log
Retention time (days)
Specify the retention time for log files in days.
Complete memory dump file
Only select this check box if necessary, for example, if the Technical Customer Service team
requests a complete summary of the main memory.
Telnet support
Select this check box if access with the Telnet protocol is to be supported. Only select if
necessary.
Notice!
Notice!
You have to create a redundancy key (backup certificate) before you enable encrypted
recording for the first time. You only have to create a redundancy key once for each VRM
device.
i In any case of loss of the regular encryption key, you can decrypt the recordings with the
redundancy key.
We recommend to keep a copy of the redundancy key at a secure place (for example in a
safe).
5. Click .
Note: Encryption is only enabled after the next block change. This may take a while.
Please check to ensure that the encoders are encrypting.
To check the VRM encoders that are encrypting:
1. Select the appropriate VRM device.
2. Select the Service tab.
3. Select the Recording encryption tab.
Note: You can also refer to the Monitoring tab in the VRM Monitor.
Notice!
All VRM encoders, that support encryption, are automatically encrypting recording after
i encryption is enabled in the VRM.
Encryption can be disabled for a single encoder.
VSG encoders are always encrypting, if encryption is enabled in the VRM.
5. Click .
Refer to
– iSCSI storage pool, page 188
Main window > Devices > Expand > Right-click > Click Add Failover VRM
> Add Failover VRM dialog box
Notice!
i For configuring a Secondary VRM you must first install the appropriate software on the
desired computer. Run Setup.exe and select Secondary VRM.
Either a Primary VRM or a Secondary VRM can take over the role of a Failover VRM. You add a
Primary Failover VRM to a Primary VRM or you add a Secondary Failover VRM to a Secondary
VRM.
You can add a Failover VRM device manually if you know the IP address and password. The
initially selected VRM is the Master VRM for this Failover VRM.
You can add a Failover VRM device. You can either add it manually or you can select a device
from a list of scanned VRM devices.
You can effectively assign a Failover VRM to a Master VRM only when both are online and are
successfully authenticated. The passwords are then synchronized.
To add a Failover VRM device:
1. Make the required settings for your VRM device.
2. Ensure that the correct Master VRM is selected. If not, cancel this procedure.
3. Click OK.
P The Failover VRM device is added to the selected Master VRM.
Add Failover VRM dialog box
Network address
Type in the IP address of your device or select a network address in the Scanned VRMs list.
Scanned VRMs
Displays the list of scanned VRM computers. To rescan, close the dialog box and display the
dialog box again.
Notice!
i The Failover VRM device inherits the settings that are configured in the Master VRM. If the
settings of the Master VRM are changed, the settings of the Failover VRM device are changed
accordingly.
Refer to
– Dual / failover recording, page 28
Main window > Devices > Expand > Right-click > Click Add Mirrored
VRM > Add VRM dialog box
Notice!
i For configuring a Secondary VRM you must first install the appropriate software on the
desired computer. Run Setup.exe and select Secondary VRM.
Only a Secondary VRM can take over the role of a Mirrored VRM. You add a Mirrored VRM to a
Primary VRM.
You can add a Mirrored VRM device manually if you know the IP address and password. The
initially selected VRM is the Master VRM for this Mirrored VRM.
To add a Mirrored VRM device:
1. Make the required settings for your VRM device.
2. Ensure that the correct Master VRM is selected. If not, cancel this procedure.
3. Click OK.
The Mirrored VRM device is added to the selected Primary VRM.
Add VRM dialog box
Name
Type in a display name for the device.
Notice!
i If you migrate to BVMS version 10.0 and higher, the Secure connection check box is not
selected by default and the connection is unsecure (rcpp).
To change secure or unsecure connection, use the Edit VRM Device command and select or
deselect the Secure connection check box.
Test
Click to check whether the device is connected and authentication is successful.
Properties
If required, change the port numbers for the HTTP port and for the HTTPS port. This is only
possible when you add or edit a VRM that is not connected. If the VRM is connected, the
values are retrieved and you cannot change them.
The Master VRM table row shows the selected device if applicable.
Refer to
– Adding a primary or secondary VRM manually, page 170
– Dual / failover recording, page 28
Main window > Devices > Expand > Right-click > Synchronize BVMS
Configuration command
As of BVMS 6.0, VRM 3.50 is supported. When you do not upgrade VRM to version 3.50 during
the upgrade to BVMS 6.0, recording continues but you cannot change the configuration of the
old VRM.
If you upgraded your VRM software to version 3.50, you must manually synchronize the BVMS
configuration.
2. Right-click .
3. Select Import configuration from VRM.
The configuration of the former VRM is imported.
Notice!
Refer to
– Adding a LUN, page 196
– Adding a VRM pool, page 175
To configure:
4 In the Recording preferences mode list, select Automatic.
After activation of the configuration the Automatic recording mode is active. On the
Recording Preferences page of an encoder, the primary and the secondary target list are
disabled.
Related Topics
– Configuring failover recording mode on an encoder, page 227
Main window > Devices > Expand > Expand > Right-click > Click
Add Encoder > Add Encoder dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Expand > Right-click > Click Add Decoder >
Add Encoder dialog box
Allows you to add an encoder or decoder manually. This is especially useful when you want to
add any Video IP device from Bosch (only for VRM).
Notice:
If you add a Video IP encoder or decoder from Bosch with the <Auto Detect> selection, this
device must be available in the network.
To add a Video IP device from Bosch:
Right-click .
Or
Right-click .
5. Click OK.
The device is added to the system.
Main window > Devices > > Expand > Right-click > Add iSCSI
Device > Add iSCSI Device dialog box
Allows you to add an iSCSI device to a VRM.
To add an iSCSI device:
Enable monitoring
If a DIVAR IP device is selected as iSCSI device type and any SNMP (Simple Network
Management Protocol) monitoring is supported for that type of DIVAR IP device, the Enable
monitoring checkbox is enabled.
Select the check box to enable monitoring the health state of the DIVAR IP device. BVMS now
automatically receives and analyses SNMP traps of the DIVAR IP device and activates health
monitoring events and alarms (for example CPU, storage, fan, …). As default only critical
alarms are triggered.
Note: Make sure to configure SNMP on the DIVAR IP device first.
Note: This setting is only available for supported devices.
For further information on how to configure SNMP on a DIVAR IP device, refer to the
respective DIVAR IP documentation.
Related Topics
– Adding VRM Devices via scan, page 169
Refer to
– SNMP page, page 153
– Configuring SNMP monitoring, page 98
Right-click > Add Video Streaming Gateway > Add Video Streaming Gateway dialog
box
Name
Type in the desired display name for the device.
User name
Type in the user name used for authenticating at the device. Usually: service
Network address / port
Type the IP address of your device.
If the Secure connection check box is selected, the port changes automatically to HTTPS port.
You can change the port number, if no default ports are used or the VSG instances are
configured in a different order.
Default ports
1 8756 8443
2 8757 8444
3 8758 8445
4 8759 8446
5 8760 8447
6 8761 8448
7 8762 8449
Password
Type in the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Security
The Secure connection check box is selected by default, if HTTPS is supported.
From VSG version 7.0, VSG supports secure connection.
Notice!
i If you migrate to BVMS version 10.0 and higher, the Secure connection check box is not
selected by default and the connection is unsecure (rcpp).
To change secure or unsecure connection, use the Edit Video Streaming Gateway command
and select or deselect the Secure connection check box.
Test
Click to authenticate at the device with the credentials entered above.
Refer to
– Editing a Video Streaming Gateway, page 200
– Add or move devices that are currently not connected to the network, to a pool that
allows large LUNs.
– Add or move an iSCSI device that contains large LUNs, to a pool that does not allow large
LUNs.
– Allow large LUNs on a pool that contains devices with firmware version earlier than 6.30.
– Disable large LUNs on a pool with an iSCSI device that contains large LUNs.
Please move devices with firmware earlier than 6.30 to a pool that does not allow large LUNs.
To add an initialized iSCSI device:
Main window > Devices > > Expand > Right-click > Add DSA E-
Series Device > Add DSA E-Series Device dialog box
Allows you to add a DSA E-Series iSCSI device. This device type has a management IP address
different from the IP address of the iSCSI storage. Via this management IP address the device
is automatically detected and configured.
Name
Type in a display name for the device.
Management address
Type in the IP address for automatic configuration of the device.
Password
Type the password of this device.
DSA E-Series type
Displays the device type.
Network address iSCSI Ch
Displays the IP address of the iSCSI port of the device. If available you can select another IP
address.
Management address
Displays the IP address for automatic configuration of the second controller if available. If
available you can select another IP address.
Network address iSCSI Ch
Displays the IP address of the iSCSI port of the second controller if available. If available you
can select another IP address.
Connect
Click to detect the settings of the device.
If connection is established, the fields in the Controller group and the 2nd Controller group
are filled.
Refer to
– Basic Configuration page, page 194
– Formatting a LUN, page 197
If the passwords of all devices are identical, you can enter it in the first Password field.
Then right-click this field and click Copy cell to column.
Refer to
– Configuring dual recording in the Camera Table, page 295
– Configuring the ANR function, page 294
– Dual / failover recording, page 28
Main window > Devices > Expand > Expand > Expand > Expand
You can either add a E-Series iSCSI device or any other supported iSCSI device.
Refer to
– Adding an iSCSI device manually, page 189
– Adding a DSA E-Series iSCSI device manually, page 190
– Configuring an iSCSI device, page 192
– Adding a LUN, page 196
– Formatting a LUN, page 197
In case of Automatic mode: if one target fails, VRM Server performs an automatic
reassign of the related devices to other storages. If the VRM Server is down while a target
fails, the recording is stopped on the devices currently recording on the failed target.
– Block reservation for downtime
– Sanity check period
For each pool you can configure that this pool allows LUNs larger than 2 TB.
LUNs larger than 2 TB ("large LUNs") are not supported by the following devices:
– VRM devices earlier than 3.60
– VSG devices with firmware version earlier than 6.30
– Encoders with firmware version earlier than 6.30
BVMS prevents you to perform the following procedures:
– Add or move devices with firmware version earlier than 6.30 to a pool that allows large
LUNs.
– Add or move devices that are currently not connected to the network, to a pool that
allows large LUNs.
– Add or move an iSCSI device that contains large LUNs, to a pool that does not allow large
LUNs.
– Allow large LUNs on a pool that contains devices with firmware version earlier than 6.30.
– Disable large LUNs on a pool with an iSCSI device that contains large LUNs.
Please move devices with firmware earlier than 6.30 to a pool that does not allow large LUNs.
If a Primary VRM has a pool that allows large LUNs, the corresponding Mirrored VRM inherits
this setting and you cannot select or clear the Allow LUNs larger than 2 TB checkbox on the
corresponding pool of the Mirrored VRM. If you have added an iSCSI device with large LUNs to
a Mirrored VRM, you cannot clear the Allow LUNs larger than 2 TB checkbox on the
corresponding pool of the Primary VRM.
Refer to
– Pool page, page 179
Main window > Devices > > Expand > Right-click > Add iSCSI
Device > Add iSCSI Device dialog box
Allows you to add an iSCSI device to a VRM.
To add an iSCSI device:
Refer to
– SNMP page, page 153
– Configuring SNMP monitoring, page 98
Main window > Devices > > Expand > Right-click > Add DSA E-
Series Device > Add DSA E-Series Device dialog box
Allows you to add a DSA E-Series iSCSI device. This device type has a management IP address
different from the IP address of the iSCSI storage. Via this management IP address the device
is automatically detected and configured.
Name
Type in a display name for the device.
Management address
Type in the IP address for automatic configuration of the device.
Password
Type the password of this device.
DSA E-Series type
Displays the device type.
Network address iSCSI Ch
Displays the IP address of the iSCSI port of the device. If available you can select another IP
address.
Management address
Displays the IP address for automatic configuration of the second controller if available. If
available you can select another IP address.
Network address iSCSI Ch
Displays the IP address of the iSCSI port of the second controller if available. If available you
can select another IP address.
Connect
Click to detect the settings of the device.
If connection is established, the fields in the Controller group and the 2nd Controller group
are filled.
Refer to
– Basic Configuration page, page 194
– Formatting a LUN, page 197
4 Expand the appropriate VRM device and , click the appropriate iSCSI device
.
1. Click the Basic Configuration tab.
2. Type in the desired LUN capacity.
If you type in a value larger than 2 TB, you must enable your pool for LUNs larger than 2
TB.
3. Click Initialize.
The LUNs are created.
4. Click Close.
5. Right-click the iSCSI device, and then click Scan Target.
The LUNs are displayed with an unknown state.
6. Save and activate the configuration.
7. Format all LUNs.
8. If you added an iSCSI device with dual controller, remove the desired LUNs from the first
controller, right-click the second controller, and click Scan Target to add these LUNs.
To perform basic configuration on other iSCSI devices:
1. Click the Basic Configuration tab.
2. Type in the desired LUN count.
3. Click Set.
The LUNs are created.
4. Click Close.
5. Right-click the iSCSI device, and then click Scan Target.
The LUNs are displayed with an unknown state.
6. Save and activate the configuration.
7. Format all LUNs.
To perform IQN mapping for other iSCSI devices:
1. Expand the appropriate VRM device and , click the appropriate iSCSI device
Refer to
– Basic Configuration page, page 194
– Load Balancing dialog box, page 195
– iqn-Mapper dialog box, page 198
– Formatting a LUN, page 197
Main window > Devices > Expand > Expand > Expand > Click
> Basic Configuration tab
The displayed options can differ depending on the used type of iSCSI storage system.
Allows you to perform a basic configuration of your iSCSI device. You create LUNs on the
iSCSI hard drive and format these LUNs.
Only displayed if the device is one of the iSCSI storage systems supported by Bosch, for
example DSA or DLS 1x00.
Notice!
i After the basic configuration of an E-Series the system needs many hours (or even days) to
initialize. In this phase the full performance is not available and in phase 1.5 formatting can
fail.
Notice!
If you change the number of LUNs, the entire iSCSI system is reorganized and any sequences
i saved on the system are lost.
Therefore, before making changes, check the recordings and back up any important
sequences.
Additional information
Displays additional information, for example information that the storage system is not
configured correctly and that therefore no setup is possible.
Refer to
– Adding a DSA E-Series iSCSI device manually, page 190
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Expand > Expand > Expand >
You move a device from one pool to another within the same VRM device without any
recording loss.
To move:
Main window > Devices > Expand > Expand > Expand > Expand
>
Allows you to add, remove, or format LUNs, and to view information on the LUNs.
Add
Click to display the Add LUN dialog box.
Remove
Click to remove the selected rows. To select a row, click the row header on the left side. Each
row represents a LUN.
A message box is displayed.
Format LUN
Click to format the selected LUN. A message box is displayed.
Format
Click the check box to select the LUN and then click Format LUN.
LUN
Displays the name of the LUN.
Size [GB]
Displays the maximal capacity of the LUN.
Large LUN
Each cell displays whether this is a LUN larger than 2 TB or not.
State
Displays the state of the LUN.
Progress
Displays the progress of the formatting process.
Refer to
– Pool page, page 179
– Adding a LUN, page 196
– Adding VRM Devices via scan, page 169
Main window > Devices > Expand > Expand > Expand > Expand
Refer to
– Pool page, page 179
– LUNs page, page 195
Main window > Devices > Expand > Expand > Expand > Expand
>
You format a LUN to prepare it for the first use.
Notice!
To configure:
1. Select the desired LUN and, in the Format column, click to check.
2. Click Format LUN.
3. Read the displayed message carefully and confirm the message if desired.
The selected LUN is formatted. All data on this LUN is lost.
Refer to
– LUNs page, page 195
Main window > Devices > Expand > Expand > Expand > Right-click
Refer to
– Adding VRM Devices via scan, page 169
– Configuring an iSCSI device, page 192
Main window > Devices > Expand > Expand > Expand >
This chapter provides information on how to configure the VSG device in your system.
Allows you to add and configure the following encoder types:
– Bosch encoders
– ONVIF encoders
– JPEG encoders
– RTSP encoders
To add VSG devices via scan:
Refer to
– Editing a Video Streaming Gateway, page 200
– ONVIF page, page 230
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Devices page | en 199
Right-click > Add Video Streaming Gateway > Add Video Streaming Gateway dialog
box
Name
Type in the desired display name for the device.
User name
Type in the user name used for authenticating at the device. Usually: service
Network address / port
Type the IP address of your device.
If the Secure connection check box is selected, the port changes automatically to HTTPS port.
You can change the port number, if no default ports are used or the VSG instances are
configured in a different order.
Default ports
1 8756 8443
2 8757 8444
3 8758 8445
4 8759 8446
5 8760 8447
6 8761 8448
7 8762 8449
Password
Type in the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Security
The Secure connection check box is selected by default, if HTTPS is supported.
From VSG version 7.0, VSG supports secure connection.
Notice!
i If you migrate to BVMS version 10.0 and higher, the Secure connection check box is not
selected by default and the connection is unsecure (rcpp).
To change secure or unsecure connection, use the Edit Video Streaming Gateway command
and select or deselect the Secure connection check box.
Test
Click to authenticate at the device with the credentials entered above.
Refer to
– Editing a Video Streaming Gateway, page 200
Main window > Devices > Expand > Expand > Expand >
To change secure/unsecure connection:
1. Right- click .
2. Click Edit Video Streaming Gateway.
The Edit Video Streaming Gateway dialog box is displayed.
3. Select the Secure connection check box.
The used port changes automatically to the HTTPS port.
Or
deselect the Secure connection check box.
The used port changes automatically to the rcpp port.
Notice!
Refer to
– Adding a Video Streaming Gateway manually, page 199
Main window > Devices > Expand > Expand > Expand >
You can add the following devices to your VSG:
– Encoders from Bosch
– ONVIF cameras
– JPEG cameras
– RTSP encoders
If you added VSG encoders offline, you can refresh their state.
To add:
3. Click OK.
The device is added.
To refresh:
4 Right-click the desired encoder and click Refresh state.
The properties of the device are retrieved.
Refer to
– Add Bosch Encoder dialog box, page 201
– Add ONVIF Encoder dialog box, page 202
– Add JPEG Camera dialog box, page 204
– Add RTSP Encoder dialog box, page 204
Main window > Devices > Expand > Expand > Expand > Right-click
UDP
Used for connectionless and lightweight data transmission in
private networks. Data packets can get lost. Bandwidth
requirement can be low.
Supports multicast.
Use video input 1 - Use Click to select the video inputs if you configure a multichannel
video input 4 device.
Refer to
– Adding a camera to a VSG, page 200
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Right-click > Add ONVIF Encoder command
You can add an ONVIF encoder to your VSG device or as a live only encoder.
You must configure the used profile for recording and live in the Camera Table.
From BVMS 10.0, ONVIF encoder events can be retrieved from VSG or ONVIF encoder directly.
If you add a new ONVIF encoder, the retrieve ONVIF events from VSG (Profile S, T) check
box is selected by default and Profile T is supported.
The following features are only supported, if an ONVIF encoder is added to your system via a
VSG device:
– If ONVIF encoder events are retrieved from VSG, default ONVIF events are already
mapped.
– The Operator can switch relays on or off in the Operator Client.
Notice!
i Retrieving ONVIF events from VSG is only available from VSG version 7.0. If you migrate to
BVMS version 10.0, existing ONVIF encoder events are retrieved from ONVIF encoder directly.
You have to update the VSG to version 7.0.
Name
Type in the desired display name for the device.
Network address / port
Type the network address of the device. If required, change the port number.
User name
Type in the user name used for authenticating at the device. Usually: service
Password
Type in the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Test
Click to authenticate at the device with the credentials entered above.
Secure connection
You can activate the secure connection of live video transferred from an ONVIF encoder to
your VSG device.
Note:
When activated, the user of Operator Client cannot switch a stream to UDP and to UDP
multicast.
When activated, ANR does not work for the affected device.
When activated, encoder replay does not work on encoders with firmware earlier than 6.30.
Notice!
i Port 443 is set by default. You can edit the port number to match the configured HTTPS port
on the encoder.
The configured port number will not be remembered.
Properties
Auxiliary commands If the check box is selected, auxiliary commands are supported.
Use video input {0} Select the check box to use the appropriate video input.
Notice!
i The Video Streaming Gateway settings options are not available for ONVIF encoder, that are
added as live only encoder.
Refer to
– Adding a camera to a VSG, page 200
Main window > Devices > Expand > Expand > Expand > Right-click
Number of video input Enter the number of available video inputs if available.
channels
Refer to
– Adding a camera to a VSG, page 200
Main window > Devices > Expand > Expand > Expand > Right-click
URL
Enter the URL of your JPEG camera / RTSP camera.
For a JPEG camera from Bosch, type in the following string:
http://<ip-address>/snap.jpg?jpegCam=<channel_no.>
For an RTSP camera from Bosch, type in the following string:
rtsp://<ip-address>/rtsp_tunnel
User name
Type in the user name used for authenticating at the device. Usually: service
Password
Type in the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Test
Click to authenticate at the device with the credentials entered above.
Properties
Number of video input Enter the number of available video inputs if available.
channels
Refer to
– Adding a camera to a VSG, page 200
Main window > Devices > Expand > Expand > >
You move a device from one pool to another within the same VRM device without any
recording loss.
To move:
Main window > Devices > Expand > Expand > Expand >
For each camera assigned to a Video Streaming Gateway device you can configure a multicast
address and port.
To configure multicast:
1. Select the desired check box to enable multicast.
2. Type a valid multicast address and a port number.
3. If required, configure continuous multicast streaming.
Multicast tab
Main window > Devices > Expand > Expand > Expand > >
Network tab > Multicast tab
Allows you to configure multicast for the assigned cameras.
Enable
Click to enable multicast for this camera.
Multicast Address
Insert a valid multicast address (in the range 224.0.0.0 - 239.255.255.255).
Enter 1.0.0.0. A unique multicast address is automatically inserted based on the MAC
address of the device.
Port
When a firewall is used, enter a port value that is configured as non-blocked port in the
firewall.
Streaming
Click to enable continuous multicast streaming to the switch. This means that the multicast
connection is not preceded by a RCP+ registration. The encoder streams always all data to the
switch. The switch in return (if no IGMP multicast filtering is supported or configured) sends
this data to all ports, with the result that the switch will flood.
You need streaming when using a non-Bosch device for receiving a multicast stream.
Main window > Devices > Expand > Expand > Expand > >
Service tab > Advanced tab
Allows you to activate logging for Video Streaming Gateway.
The log files are usually stored in the following path:
C:\Program Files (x86)\Bosch\Video Streaming Gateway\log
From VSG version 7.0, the log files are usually stored in the following path:
C:\ProgramData\Bosch\VSG\log
Note: If you upgrade to VSG 7.0 or newer, previous log files are automatically moved to this
location.
Log files from older VSG versions are usually stored in the following path:
C:\Program Files (x86)\Bosch\Video Streaming Gateway\log
Advanced tab
RCP+ logging
Click to enable RCP+ logging.
Debug logging
Click to enable debug logging.
RTP logging
Click to enable RTP logging.
Retention time (days)
Select the desired number of days.
Notice!
12.26.11 Starting ONVIF Camera Event Driver Tool from Configuration Client
Main window > Devices > Expand > Expand > Expand >
You can start the ONVIF Camera Event Driver Tool directly from the Configuration Client for
the selected VSG.
Note: You can also start the tool from the Windows start menu.
The ONVIF Camera Event Driver Tool allows you to map ONVIF events to VSG BVIP events. You
can connect to ONVIF cameras and retrieve the ONVIF events for mapping.
To start the ONVIF Camera Event Driver Tool from the Configuration Client:
1. Right-click the appropriate VSG.
2. Click Start ONVIF Camera Event Driver Tool.
The ONVIF Camera Event Driver Tool is displayed.
Notice!
i The ONVIF Camera Event Driver Tool only supports secure connection to the VSG.
To add, edit, and configure a live only ONFIV encoder, see ONVIF page, page 230.
Refer to
– Adding a live only encoder, page 216
– Scanning for devices, page 75
– Bosch Encoder / Decoder / Camera page, page 214
– ONVIF page, page 230
– Configuring multicast, page 228
Main window > Devices > Expand > Expand > Right-click > Click
Add Encoder > Add Encoder dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Right-click > Click Add Encoder > Add Encoder
dialog box
or
Main window > Devices > Expand > Right-click > Click Add Decoder >
Add Encoder dialog box
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Devices page | en 209
Allows you to add an encoder or decoder manually. This is especially useful when you want to
add any Video IP device from Bosch (only for VRM).
Notice:
If you add a Video IP encoder or decoder from Bosch with the <Auto Detect> selection, this
device must be available in the network.
To add a Video IP device from Bosch:
Right-click .
Or
Right-click .
Main window > Devices > Expand > Expand > Right-click > Click
Authenticate... > Enter password dialog box
To enable the access of a password protected encoder to a decoder, you must enter the
password of the user authorization level of the encoder as the destination password in the
decoder.
To provide:
1. In the Enter user name list, select destination password.
2. In the Enter password for user field, type in the new password.
3. Click OK.
P The password is changed immediately on the device.
Refer to
– Changing the password of an encoder / decoder (Change password / Enter password),
page 142
1. In the Device Tree right-click and click Scan for Local Storage Encoders.
The BVMS Scan Wizard dialog box is displayed.
2. Select the desired check boxes for the devices that you want to add.
3. Click Next >>.
The Authenticate Devices dialog box of the wizard is displayed.
4. Type in the password for each device that is protected by a password.
Password check is performed automatically, when you do not enter a further character in
the password field for a few seconds or you click outside the password field.
If the passwords of all devices are identical, you can enter it in the first Password field.
Then right-click this field and click Copy cell to column.
Refer to
– Configuring multicast, page 228
– Adding a local storage encoder, page 216
– Bosch Encoder / Decoder / Camera page, page 214
– Scanning for devices, page 75
Refer to
– Unmanaged site, page 25
– Adding an unmanaged site manually, page 211
– Importing unmanaged sites, page 211
– Configuring the time zone, page 213
Refer to
– Unmanaged site, page 25
– Unmanaged Site page, page 211
Main window > Devices > Expand > Right click > Click Add Unmanaged
Network Device
Device type:
Select the entry that is applicable for this device.
Available entries:
– DIVAR AN / DVR
– DIVAR IP (AiO), BVMS
– Bosch IP camera / encoder
Network address:
Type an IP address or hostname. If required, change the port number.
Note: If you use a SSH connection, enter the address in the following format:
ssh://IP or servername:5322
Security
The Secure connection check box is selected by default.
Notice!
i If adding DVR and the Secure connection check box is selected, command and control
connections are secure. Video data streaming is not secure.
User name:
Type the valid user name for this network device if available. See Unmanaged site, page 25 for
details.
Password:
Type the valid password if available. See Unmanaged site, page 25 for details on user
credentials.
Refer to
– Unmanaged site, page 25
Refer to
– Unmanaged Site page, page 211
To configure an encoder:
Main window > Devices > Expand > Expand > >
or
Main window > Devices > Expand > Expand > Expand >
or
Main window > Devices > Expand > Expand > >
Main window > Devices > Expand > Expand > > >
or
Main window > Devices > Expand > Expand > Expand > >
or
or
click . If you click another tab without clicking and changes have occurred, two
corresponding message boxes are displayed. Confirm them both if you want to save.
To change the passwords of an encoder right-click the device icon and click Change
password....
To display the device in a Web browser right-click the device icon and click Show webpage in
browser.
Note:
Depending on the selected encoder or camera, not all pages described here are available for
each device. The wording used here for describing the field labels can deviate from your
software.
4 Click a tab to display the corresponding property page.
To add encoders via scan:
Repeat this step for all devices that require an initial password.
Note: As long as you have not set the initial password for all devices in the list that
require an initial password, you cannot continue.
5. Click Finish.
The device is added to the Device Tree.
Refer to
– Scanning for devices, page 75
Refer to
– Adding a device, page 124
Refer to
– Adding a device, page 124
– Live Only page, page 207
Refer to
– Adding a device, page 124
– Local Storage page, page 210
Main window > Devices > Expand > Expand > Expand > Click
Main window > Devices > Expand > Right click > Edit Encoder dialog
box
Main window > Devices > Expand > Click > Edit Encoder dialog box
You can activate the secure connection of live video transferred from an encoder to the
following devices if HTTPS port 443 is configured on the encoder:
– Operator Client computer
– Management Server computer
– Configuration Client computer
– VRM computer
– Decoder
Note:
When activated, ANR does not work for the affected device.
When activated, encoder replay does not work on encoders with firmware earlier than 6.30.
Only encoder with firmware version 7.0 or later support secure UDP. When secure connection
is activated in this case, the user of Operator Client can switch a stream to UDP and to UDP
multicast.
To activate:
1. Select the check box Secure connection.
2. Click OK.
Secure connection is enabled for this encoder.
Refer to
– Configuring multicast, page 228
– Edit Encoder / Edit Decoder dialog box, page 218
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Expand > Right-click > Click
Edit Decoder > Edit Decoder dialog box
After an upgrade of the device, you can update its device capabilities. A message text informs
you whether the retrieved device capabilities match the device capabilities stored in BVMS.
To update:
1. Click OK.
A message box is displayed with the following text:
If you apply the device capabilities, the recording settings and the event settings for
this device may change. Check these settings for this device.
2. Click OK.
The device capabilities are updated.
Refer to
– Edit Encoder / Edit Decoder dialog box, page 218
Main window > Devices > Expand > Expand > Expand > Right-click
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Right-click > Click Edit Encoder >
Edit Encoder dialog box
or
Main window > Devices > Expand > Expand > Right-click > Click
Edit Decoder > Edit Decoder dialog box
Allows you to check and update the device capabilities of a device. On opening this dialog box
the device is connected. The password is checked and the device capabilities of this device
are compared with the device capabilities stored in BVMS.
Name
Displays the device name. When you add a Video IP device from Bosch, the device name is
generated. If required change the entry.
Network address / port
Type the network address of the device. If required, change the port number.
User name
Displays the user name used for authenticating at the device.
Password
Type the valid password for authenticating at the device.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Authenticate
Click to authenticate at the device with the credentials entered above.
Security
The Secure connection check box is selected by default.
If a secure connection is not possible, a message appears. Click to remove the checkmark.
The following decoders support secure connection:
– VJD 7000
– VJD 8000
– VIP XD HD
Notice!
i The connection between a decoder and an encoder is only secure, if both are configured with
secure connection.
Device Capabilities
You can sort the displayed device capabilities per category or alphabetically.
A message text informs you whether the detected device capabilities match the current device
capabilities.
Click OK to apply the changes of the device capabilities after an upgrade of the device.
Refer to
– Encrypting live video (Edit Encoder), page 216
– Updating the device capabilities (Edit Encoder), page 217
Refer to
– Verification of authenticity , page 219
Note: Do not change the certificate when recording is running. If you have to change the
certificate, first stop the recording, change the certificate, and start recording again.
For verifying the authenticity of a recording, this recording is replayed in a background
process with maximum speed. In networks with low bandwidth the playback can be slow. The
verify process can then take as long as the time period selected for verifying. Example: You
select a time period of 1 hour. The verifying process can last up to 1 hour.
The user can only verify that a recording is authentic. If the verification process is not
successful, this does not necessarily mean that the video has been manipulated. Many other
reasons can be responsible for the failure, for example a manual deletion. The user of
Operator Client cannot distinct between an intended change of the recording or fraudulent
manipulation.
Video authentication deals solely with methods of validating the authenticity of video. Video
authentication does not deal with the transmission of video, or data, in any way.
The watermark feature for verifying authenticity in earlier BVMS versions is replaced. The new
authenticity verification is automatically available after upgrade to the latest BVMS version.
Authenticity checks that were successful in the past, can now not be verified because these
recordings do not contain the required extended information.
Verifying authenticity is not supported in the following cases:
– Transcoding
– Local recording
– VSG
– Digital Video Recorder
– Bosch Recording Station
– ANR
Refer to
– Configuring the authentication, page 220
– Uploading a certificate, page 221
– Downloading a certificate, page 221
– Installing a certificate on a workstation, page 221
Main window > Devices > Expand > Expand > Expand >
or
4. Click .
Main window > Devices > Expand > Expand > Expand >
or
6. Click .
Main window > Devices > Expand > Expand > Expand >
or
6. Select the certificate file that you have downloaded from the encoder.
7. Click Next.
8. Leave the settings unchanged and click Next.
9. Leave the settings unchanged and click Finish.
Main window > Devices > Expand > Expand > Right-click > Click
Authenticate... > Enter password dialog box
To enable the access of a password protected encoder to a decoder, you must enter the
password of the user authorization level of the encoder as the destination password in the
decoder.
To provide:
1. In the Enter user name list, select destination password.
2. In the Enter password for user field, type in the new password.
3. Click OK.
P The password is changed immediately on the device.
Refer to
– Changing the password of an encoder / decoder (Change password / Enter password),
page 222
Main window > Devices > Expand > Expand > >
or
2. In the Enter user name list, select the desired user for which you want to change the
password.
3. In the Enter password for user field, type in the new password.
4. Click OK.
P The password is changed immediately on the device.
A password prevents unauthorized access to the device. You can use different authorization
levels to limit access.
Proper password protection is only guaranteed when all higher authorization levels are also
protected with a password. Therefore, you must always start from the highest authorization
level when assigning passwords.
You can define and change a password for each authorization level if you are logged into the
“service” user account.
The device has three authorization levels: service, user, and live.
– service is the highest authorization level. Entering the correct password gives access to
all the functions and allows all configuration settings to be changed.
– user is the middle authorization level. At this level you can operate the device, play back
recordings, and also control camera, for example, but you cannot change the
configuration.
– live is the lowest authorization level. At this level you can only view the live video image
and switch between the different live image displays.
For a decoder the following authorization level replaces the live authorization level:
– destination password (only available for decoders)
Used for access to an encoder.
Refer to
– Providing the destination password for a decoder (Authenticate...), page 222
Main window > Devices > Expand > Expand > >
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > Expand > Expand >
You move a device from one pool to another within the same VRM device without any
recording loss.
To move:
Main window > Devices > Expand > Expand > >
If replacing a defective encoder, the recordings of the replaced encoder are available for the
new encoder when selecting the new encoder in the Operator Client.
Notice!
i An encoder can only be replaced by an encoder with the same amount of channels.
Notice!
Main window > Devices > Expand > Expand > > > Advanced
Settings > Recording Management
Note: Ensure that the desired cameras of this encoder are added to the Logical Tree.
You must configure the storage media of an encoder to use the ANR function.
Note: If you want to configure the storage media of an encoder that has already been added to
your system and is recorded via VRM, ensure that secondary recording is stopped:
The ANR function only works on encoders with firmware version 5.90 or later. Not all encoder
types support ANR even if the correct firmware version is installed.
To configure the storage media of an encoder:
1. Under Secondary Recording, in the Preferred storage target type list, select the storage
media. Depending on the device type, different media are available.
2. If required, click the … button to format the storage media.
After the successful formatting process, the storage media is ready for use with the
ANR function.
3. Configure the ANR function for this encoder on the Cameras and Recording page.
Refer to
– Recording Management page, page 227
– Configuring the ANR function, page 294
Notice!
i You can only select the password types that are available for all selected devices.
Notice!
Notice!
i You can also copy complete rows to change IP addresses, display names, subnet masks and
gateway IDs for multiple devices.
Operation Result
Displays the appropriate state for the affected devices.
Main window > Devices > Expand > Expand > >
Prerequisites: On the Pool page, in the Recording preferences mode list, select Failover. If
Automatic is selected, the settings are performed automatically and cannot be configured.
If you want to use a secondary target for both automatic or failover mode: On the Pool page,
in the Secondary target usage list, select On.
It is recommended to configure at least 2 iSCSI devices for failover mode.
To configure:
1. Click Advanced Settings.
2. Click Recording Preferences.
3. Under Primary target, select the entry for the required target. All storage systems
entered under Storage Systems will be shown in the list.
4. Under Secondary target, select the entry for the required target. All storage systems
entered under Storage Systems are displayed in the list.
The changes are active immediately. An activation is not required.
Related Topics
– Configuring automatic recording mode on a pool, page 180
Point to the icon. Detailed information about the active recordings are displayed.
Recordings manually managed
The recordings are managed locally on this encoder. All relevant settings must be carried out
manually. The encoder / IP camera acts as a live only device. It is not be removed from VRM
automatically.
Recording 1 managed by VRM
The recordings of this encoder are managed by the VRM system.
Dual VRM
Recording 2 of this encoder is managed by a secondary VRM.
iSCSI Media tab
Click to display the available iSCSI storage connected to this encoder.
Local Media tab
Click to display the available local storage on this encoder.
Add
Click to add a storage device to the list of managed storage media.
Remove
Click to remove a storage device from the list of managed storage media.
Refer to
– Configuring the storage media of an encoder, page 225
Refer to
– Pool page, page 179
Main window > Devices > Expand > Expand > >
Notice!
i Multicast streams are only secure, if the encoder has firmware version 7.0 or later and the
Secure connection check box is selected.
Refer to
– Encrypting live video (Edit Encoder), page 216
14 ONVIF page
Main window > Devices > Expand > Expand > Expand > Expand
>
Refer to
– Video Streaming Gateway device page, page 198
– Live Only page, page 207
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder tab
Displays information on a live only ONVIF encoder added to your BVMS.
Name
Displays the name of the ONVIF device. You can rename it in the Device Tree directly.
Network Address
Displays the IP address of the device.
Manufacturer
Displays the manufacturer name.
Model
Displays the model name.
Video Inputs
Enter the number of cameras connected to this encoder.
Audio Inputs
Enter the number of audio inputs connected to this encoder.
Alarm Inputs
Enter the number of alarm inputs connected to this encoder.
Relays
Enter the number of relays connected to this encoder.
Refer to
– ONVIF Encoder Events page, page 231
– Adding a live only encoder, page 216
– Configuring an ONVIF mapping table, page 235
Notice!
i Retrieving ONVIF events from VSG is only available from VSG version 7.0. If you migrate to
BVMS version 10.0, existing ONVIF encoder events are retrieved from ONVIF encoder directly.
You have to update the VSG to version 7.0.
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab
You have to map ONVIF events to BVMS events, if ONVIF encoder events are retrieved from
ONVIF encoder directly. This ensures that you later can configure ONVIF events as BVMS
alarms.
Notice!
i If ONVIF encoder events are retrieved from VSG, default ONVIF events are already mapped.
Mapping Table
You can create or edit a Mapping Table.
If ONVIF events are retrieved from VSG, the following events are mapped to VSG by default:
– Global Change - Detected
– Global Change - Not detected
– Motion Detection - Motion Detected
– Motion Detection - Motion Stopped
– Reference Image Check - Deadjusted
– Reference Image Check - Adjusted
– Video Loss - Video Signal Lost
– Video Loss - Video Signal OK
– Video Loss - Video Signal State Unknown
Refer to
– Starting ONVIF Camera Event Driver Tool from Configuration Client, page 207
– ONVIF event mapping, page 42
– Configuring an ONVIF mapping table, page 235
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab
You can add, remove or change ONVIF profiles for a selected encoder.
To add:
1. Click Add....
2. In the Add Profile dialog box, type a name for the profile.
3. Click Next >.
4. In the next dialog box, select the desired camera.
5. Click Next >.
6. In the next dialog box, select the desired non-recording encoder profile.
7. Click Save.
The new profile is saved.
The settings of this profile are filled with the values from the selected encoder profile.
You can change these values if required.
To remove:
4 In the list, select a profile and click Remove.
To change:
1. In the list, select a profile.
2. Change the settings as required.
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab
You can export an ONVIF Mapping Table as a file (OMF file). The Mapping Table is saved for
the selected encoder model.
To export:
1. Click .
2. Type in a filename and click Save.
The ONVIF Mapping Table is exported as OMF file for the selected encoder model.
Refer to
– ONVIF Encoder Events page, page 231
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab
You can import an ONVIF Mapping Table available as a file (OMF file).
Released ONVIF Mapping files are stored in the following directory of Configuration Client:
– %programdata%\Bosch\VMS\ONVIF
If the same Mapping Table name is already imported, an error message is displayed.
If a newer version of this file is imported, a warning is displayed. Click OK if you want to
import this file. Otherwise click Cancel.
To import:
1. Click .
2. Select the desired file and click Open.
The Import Mapping Table dialog box is displayed.
3. Make the appropriate settings.
4. Click OK .
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab >
Manufacturer
Displays the manufacturer name this Mapping Table is valid for.
Model
Displays the model name this Mapping Table is valid for.
Description
Displays further information for example on tested camera models.
Mapping Table name
Displays the name of the Mapping Table. Change this name if it is already in use in BVMS.
You can select one of the following options to decide to which ONVIF encoders you want to
apply the Mapping Table.
Apply only to selected ONVIF encoder
Apply to all ONVIF encoders of the listed models
Apply to all ONVIF encoders of the manufacturer
Existing ONVIF event mapping is continued. You cannot import OMT files from earlier BVMS
versions.
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab
You configure Mapping Tables for mapping ONVIF events to BVMS events.
You configure a Mapping Table for all ONVIF encoders of the same model or all ONVIF
encoders from the same manufacturer.
Click to update ONVIF encoders that were added offline with the event mapping of an
already added ONVIF encoder with the same manufacturer and/or model name.
For multichannel encoders you can configure the event sources, for example a specific camera
or a relay.
1. Click .
The Add Mapping Table dialog box is displayed.
2. Type in a name for the Mapping Table.
3. In the Manufacturer and the Model lists, select the entries if desired.
When you select <none> in both lists, the event mapping is only valid for this device.
When you select <none> in the Model list and the manufacturer name in the
Manufacturer list, the event mapping is valid for all devices with the same manufacturer.
When you select the available entries in both lists, the event mapping is valid for all
devices with the same manufacturer and model.
4. Click OK.
You can now edit the Mapping Table, for example add a row to the Motion Detected
event.
To edit a Mapping Table:
1. Click .
The Rename Mapping Table dialog box is displayed.
2. Change the desired entries.
To add or remove event mappings:
1. In the Mapping Table list, select the desired name.
2. To add a row: Click Add row.
3. In the row, select the desired entries.
When multiple rows are available, an event is triggered when only one of the rows is true.
4. To remove a row: Click Remove row.
To remove a Mapping Table:
1. In the Mapping Table list, click the name of the event mappings that you want to remove.
2. Click .
To configure an event source:
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Encoder Events tab >
or
Allows you to add a Mapping Table. If this Mapping Table shall serve as a template for future
ONVIF encoders of the same manufacturer and model, select the correct entries.
Mapping Table name
Type in name for easy identification.
Manufacturer
Select an entry if required.
Model
Select an entry if required.
Refer to
– Enabling logging for ONVIF events, page 363
– ONVIF event mapping, page 42
– ONVIF Encoder Events page, page 231
– ONVIF Event Source page, page 250
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > > ONVIF Configuration tab
You can select multiple ONVIF encoders and change settings on the Video Encoder Profile
page. The changed settings are valid for all selected devices.
This page is only available for ONVIF encoders.
Notice!
Limitations of ONVIF configuration
i Settings which you perform on these pages, are possibly not executed correctly because they
are not supported by your camera. Supported ONVIF cameras were tested only with default
settings.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Unit Access tab
or
Main window > Devices > Expand > > ONVIF Configuration tab > Main
Settings tab > Unit Access tab
Manufacturer
Displays the manufacturer name of the selected encoder.
Model
Displays the model name of the selected encoder.
Note: If you want to export any event mappings into a ONVIF Mapping file select this model
name as file name.
Hardware ID
Displays the hardware ID of the selected encoder.
Firmware version
Displays the firmware version of the selected encoder.
Note: Please ensure with the BVMS compatibility list whether the firmware version is correct.
Serial number
Displays the serial number of the selected encoder.
MAC address
Displays the MAC address of the selected encoder.
ONVIF version
Displays the ONVIF version of the selected encoder.
For BVMS, the ONVIF version 2.0 is required.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Date/Time tab
or
Main window > Devices > Expand > > ONVIF Configuration tab > Main
Settings tab > Date/Time tab
Time zone
Select the time zone in which the system is located.
If there are multiple devices operating in your system or network, it is important to
synchronize their internal clocks. For example, it is only possible to identify and correctly
evaluate simultaneous recordings when all devices are operating on the same time.
1. Enter the current date. Since the device time is controlled by the internal clock, it is not
necessary to enter the day of the week – it is added automatically.
2. Enter the current time or click Sync to PC to apply the system time from your computer
to the device.
Note:
It is important that the date/time is correct for recording. An incorrect date/time setting could
prevent correct recording.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > User Management tab
or
Main window > Devices > Expand > > ONVIF Configuration tab > Main
Settings tab > User Management tab
These user settings are used for 3rd party applications such as direct Web Client access to
encoders.
Following user roles for the access of 3rd party applications are supported:
– Anonymous: This role has unlimited access only to those devices where no users from
other roles (User, Operator, Administrator) are registered. On the devices with at least
one above mentioned user, the anonymous user has the right only to view time settings.
– Administrator (not supported by Configuration Client): This role has access to all
application sections and features, the rights to reboot the device, reset settings and
update firmware as well as create other users with different access rights.
The first user created on the device must be Administrator.
For differences in Operator's and User's default access rights of the Operator role and the
User role, see the following table.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Camera tab > Video Encoder Profile tab
or
Main window > Devices > Expand > > ONVIF Configuration tab >
Camera tab > Video Encoder Profile tab
Profiles are rather complex and include a number of parameters that interact with one
another, so it is generally best to use the pre-defined profiles. Only change a profile if
completely familiar with all the configuration options.
Profiles
Click the desired name.
Notice!
The profiles configured here can be selected in Configuration Client.
Name
You can enter a new name for the profile here. The name is then displayed in the list of
available profiles in the Active profile field.
Encoding
Select the desired codec.
Resolution
Select the desired resolution for the video image.
Quality
This parameter allows you to reduce the load on the channel by means of reducing the picture
definition. The parameter is set with the help of the slider bar: The left most position
corresponds to the highest picture definition, the right most - to the lowest load on the video
channel.
Frame rate limit
Frame rate (frame per second) denotes how many frames per second are captured by the
video camera connected to the device. This parameter is shown just for information.
If an encoding interval is provided the resulting encoded frame rate is reduced by the given
factor.
Bit rate limit
The less the bit rate is, the less the final video file size. But when the bit rate is considerably
reduced, the program will have to use stronger compression algorithms, which also reduces
video quality.
Select the maximum output bit rate in kbps. This maximum data rate is not exceeded under
any circumstances. Depending on the video quality settings for the I- and P-frames, this fact
can result in individual images being skipped.
The value entered here should be at least 10% greater than the typical target data bit rate.
Encoding interval
Encoding interval (number of frames) denotes at which rate the frames coming from the
camera are encoded. For example, when encoding the interval comprises 25, it means that 1
frame from 25 captured per second is encoded and transmitted to the user. The maximum
value reduces the load on the channel but may cause skipping information from the frames
that were not encoded. Reducing the encoding interval increases the frequency of picture
update as well as the load on the channel.
GOP length
GOP length is possible to edit only in case the encoder is Н.264 or H.265. This parameter
denotes the length of the picture group between the two key frames. The higher this value is,
the less the load to the network is, but the video quality is affected.
An entry of 1 indicates that I-frames are continuously generated. An entry of 2 indicates that
every second image is an I-frame, and 3 only every third frame, and so on. The frames in
between are encoded as P-frames or B-frames.
Session timeout
The RTSP session timeout for the related video stream.
The session timeout is provided as a hint for keeping RTSP session by a device.
Multicast - IP address
Enter a valid multicast address to be operated in multicast mode (duplication of the data
stream in the network).
With a 0.0.0.0 setting, the encoder for the stream operates in multi-unicast mode (copying of
data stream in device). The camera supports multi-unicast connections for up to five
simultaneously connected receivers.
Duplication of data places a heavy demand on the CPU and can lead to impairment of the
image quality under certain circumstances.
Multicast - Port
Select the RTP multicast destination port. A device may support RTCP. In this case the port
value shall be even to allow the corresponding RTCP stream to be mapped to the next higher
(odd) destination port number as defined in the RTSP specification.
Multicast - TTL
A value can be entered to specify how long the multicast data packets are active on the
network. If multicast is to be run via a router, the value must be greater than 1.
Notice!
Multicast operation is only possible with the UDP protocol. The TCP protocol does not
i support multicast connections.
If the device is operated behind a Firewall, select TCP (HTTP port) as the transfer protocol.
For use in a local network, select UDP.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Camera tab > Audio Encoder Profile tab
or
Main window > Devices > Expand > >ONVIF Configuration tab >
Camera tab > Audio Encoder Profile tab
Profiles are rather complex and include a number of parameters that interact with one
another, so it is generally best to use the pre-defined profiles. Only change a profile if
completely familiar with all the configuration options.
Encoding
Select the desired encoding for the audio source if available:
– G.711 [ITU-T G.711]
– G.726 [ITU-T G.726]
– AAC [ISO 14493-3]
Bit rate
Select the desired bit rate, for example 64 kbps, for transmitting the audio signal.
Sample rate
Enter the output sample rate in kHz, for example 8 kbps.
Session timeout
The RTSP session timeout for the related audio stream.
The session timeout is provided as a hint for keeping RTSP session by a device.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Camera tab > Imaging General tab
or
Main window > Devices > Expand > >ONVIF Configuration tab >
Camera tab > Imaging General tab
Brightness
Adjust the image brightness to your working environment.
Color saturation
Adjust the color saturation in the image to make the reproduction of colors on your monitor as
realistic as possible.
Contrast
You can adapt the contrast of the video image to your working environment.
Sharpness
Adjust the sharpness in the image.
A low value makes the picture less sharp. Increasing sharpness brings out more detail. Extra
sharpness can enhance the details of license plates, facial features and the edges of certain
surfaces but can increase bandwidth requirements.
IR cut-off filter
Select the state of the IR cut-off filter.
The AUTO state lets the exposure algorithm handle when the IR cut-off filter is switched.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Backlight compensation tab
or
Main window > Devices > Expand > >ONVIF Configuration tab > Main
Settings tab > Backlight compensation tab
Depending on the device model you can configure here parameters for the backlight
compensation.
Mode
Select Off to switch off backlight compensation.
Select On to capture details in high-contrast and extremely bright-dark conditions.
Level
Enter or select the desired value.
14.4.8 Exposure
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Exposure tab
or
Main window > Devices > Expand > >ONVIF Configuration tab > Main
Settings tab > Exposure tab
Depending on the device model you can configure here parameters for the exposure.
Mode
Select Auto to enable the exposure algorithm on the device. The values in the following fields
are used by the algorithm:
– Priority
– Window
– Min. exposure time
– Max. exposure time
– Min. gain
– Max. gain
– Min. iris
Select Manual to disable the exposure algorithm on the device. The values in the following
fields are used by the algorithm:
– Exposure time
– Gain
– Iris
Priority
Configure the exposure priority mode (low noise/frame rate).
Window
Define a rectangular exposure mask.
Min. exposure time
Configure the minimum exposure time period [μs].
Max. exposure time
Configure the maximum exposure time period [μs].
Min. gain
Configure the minimum sensor gain range [dB].
Max. gain
Configure the maximum sensor gain range [dB].
Min. iris
Configure the minimum attenuation of input light affected by the iris [dB]. 0dB maps to a fully
opened iris.
Max. iris
Configure the maximum attenuation of input light affected by the iris [dB]. 0dB maps to a fully
opened iris.
Exposure time
Configure the fixed exposure time [μs].
Gain
Configure the fixed gain [dB].
Iris
Configure the fixed attenuation of input light affected by the iris [dB]. 0dB maps to a fully
opened iris.
14.4.9 Focus
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Focus tab
or
Main window > Devices > Expand > >ONVIF Configuration tab > Main
Settings tab > Focus tab
Depending on the device model you can configure here parameters for the focus.
This page allows for moving the lens in an absolute, a relative or in a continuous way. Focus
adjustments through this operation turn off the autofocus. A device with support for remote
focus control usually supports control through this move operation. The focus position is
represented with a certain numeric value. The state of the focus can be one of the following:
MOVING
OK
UNKNOWN
Additionally error information can be displayed, for example a positioning error indicated by
the hardware.
Mode
Select Auto to enable the lens to automatically focus at any time according to the objects in
the scene. The values in the following fields are used by the algorithm:
– Near limit
– Far limit
Select Manual to adjust the focus manually. The values in the following fields are used by the
algorithm:
– Default speed
Default speed
Configure the default speed for focus move operation (when the speed parameter not is
present).
Far limit
Configure the near limit for focus lens [m].
Far limit
Configure the far limit for focus lens [m].
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > Wide Dynamic Range tab
or
Main window > Devices > Expand > >ONVIF Configuration tab > Main
Settings tab > Wide Dynamic Range tab
Depending on the device model you can configure here parameters for the wide dynamic
range.
Mode
Enter or select the desired value.
Level
Enter or select the desired value.
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Main Settings tab > White Balance tab
or
Main window > Devices > Expand > >ONVIF Configuration tab > Main
Settings tab > White Balance tab
Depending on the device model you can configure here parameters for the white balance.
Mode
Auto mode allows the camera to continually adjust for optimal color reproduction using an
average reflectance method or in an environment with natural light sources.
In Manual mode the Red, Green, and Blue gain can be manually set to a desired position
It is only necessary to change the white point offset for special scene conditions:
– indoor light sources and for colored LED light illumination
– sodium vapor light sources (street lighting)
– for any dominant color in the image for example, the green of a football pitch or of a
gaming table
R-gain
In Manual white balance mode, adjust the Red gain slider to offset the factory white point
alignment (reducing Red, increases Cyan).
B-gain
In Manual white balance mode, adjust the Blue gain slider to offset the factory white point
alignment (reducing Blue, increases Yellow).
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Network tab > Network Access tab
or
Main window > Devices > Expand > >ONVIF Configuration tab >
Network tab > Network Access tab
Here you can configure various network settings.
Ethernet IPv4
DHCP
If a DHCP server is employed in the network for the dynamic assignment of IP addresses, you
can activate acceptance of IP addresses automatically assigned to the encoder.
BVMS uses the IP address for the unique assignment of the encoder. The DHCP server must
support the fixed assignment between IP address and MAC address, and must be
appropriately set up so that, once an IP address is assigned, it is retained each time the
computer is restarted.
Subnet mask
Type in the appropriate subnet mask for the set IP address.
If DHCP server is enabled, the subnet mask is automatically assigned.
Default gateway
If you want the module to establish a connection to a remote location in a different subnet,
type in the IP address of the gateway here. Otherwise leave the field empty (0.0.0.0).
Ethernet IPv6
DHCP
Enter or select the desired value.
IP address
Displays the IPv6 address of the device, provided by the DHCP server.
Prefix length
Displays the prefix length of the device, provided by the DHCP server.
Default gateway
Displays the default gateway of the device, provided by the DHCP server.
Host name
Enter or select the desired value.
DNS
Using a DNS server, the device can resolve an address indicated as a name. Enter the IP
address of the DNS server here.
NTP servers
Type in the IP address of the desired time server or let the DHCP server do this for you.
The encoder can receive the time signal from a time server using various time server
protocols, and then use it to set the internal clock. The module polls the time signal
automatically once every minute. Enter the IP address of a time server here. This supports a
high level of accuracy and is required for special applications.
HTTP ports
Select a different HTTP browser port if required. The default HTTP port is 80. If you want to
allow only secure connections via HTTPS, you must deactivate the HTTP port.
Note: Not supported by BVMS.
HTTPS ports
Note: Not supported by BVMS.
If you want to grant access on the network via a secure connection, select an HTTPS port if
necessary. The default HTTPS port is 443. Select the Off option to deactivate HTTPS ports;
only unsecured connections will now be possible.
Default gateway
Enter or select the desired value.
RTSP ports
If necessary, select a different port for the exchange of the RTSP data. The standard RTSP
port is 554. Select Off to deactivate the RTSP function.
Zero configuration address
Enable or disable the zero configuration discovery of the selected camera.
Zero configuration is an alternative method to DHCP and DNS for assigning IP addresses to
cameras. It automatically creates a usable IP network address without configuration or special
servers.
Note: In the ONVIF standard only the service discovery of zero configuration is used.
Alternatively without zero configuration the network must provide services, such as DHCP or
DNS.
Otherwise configure the network settings of each IP camera manually.
ONVIF discovery mode
If enabled, the camera can be scanned in the network. This includes its capabilities.
If disabled, the camera does not send any discovery messages to avoid denial-of-service
attacks.
We recommend disabling the discovery after adding the camera to the configuration.
Enter or select the desired value.
Enable DynDNS
Alllows for enabling DynDNS.
A dynamic Domain Name Service (DNS) allows you to select the unit via the Internet using a
host name, without having to know the current IP address of the unit. To do this, you must
have an account with one of the dynamic DNS providers and you must register the required
host name for the unit on that site.
Note:
For information about the service, registration process and available host names refer to the
DynDNS provider on dyndns.org.
Type
Enter or select the desired value.
Name
Type in the name of your DynDNS user account.
TTL
Enter or select the desired value.
14.4.13 Scopes
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Network tab > Scopes tab
or
Main window > Devices > Expand > > ONVIF Configuration tab >
Network tab > Scopes tab
You can add or remove scopes to your ONVIF device with URIs having the following format:
onvif://www.onvif.org/<path>
The following example illustrates the usage of the scope value. This is just an example, and
not at all an indication of what type of scope parameter to be part of an encoder
configuration. In this example we assume that the encoder is configured with the following
scopes:
onvif://www.onvif.org/location/country/china
onvif://www.onvif.org/location/city/bejing
onvif://www.onvif.org/location/building/headquarter
onvif://www.onvif.org/location/floor/R5
onvif://www.onvif.org/name/ARV-453
You can give the device a detailed location and device name to identify it within your list of
devices.
The table shows the basic capabilities and other properties of the device, which are
standardized:
hardware Any character string or path A string or path value describing the hardware of
value. the device. A device shall include at least one
hardware entry into its scope list.
name Any character string or path The searchable name of the device. This name is
value. displayed in the Device and the Logical Tree.
The scope name, model, manufacturer determine how the device appears in the Device Tree
and the ONVIF Encoder Identification and Main Settings.
14.4.14 Relays
Main window > Devices > Expand > Expand > Expand > Expand
> > ONVIF Configuration tab > Interfaces tab > Relay tab
Main window > Devices > Expand > > ONVIF Configuration tab >
Interfaces tab > Relay tab
The physical idle state of a relay output can be configured by setting the idle state to open or
closed (inversion of the relay behavior).
The available digital outputs oft he device are listed with their name, e.g.:
– AlarmOut_0
– AlarmOut_1
For any event mapping of relays within BVMS use the names listed here.
Mode
The relay can work in two relay modes:
– Bistable: After setting the state, the relay remains in this state.
– Monostable: After setting the state, the relay returns to its idle state after the specified
delay time.
Idle state
Select Open if you want the relay to operate as a normally open contact, or select Closed if
the relay is to operate as a normally closed contact.
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
250 en | ONVIF page BVMS
Delay time
Set the delay time . After this time period, the relay switches back to its idle state if
configured in the Monostable mode.
If you like to test any configurations related to a relay status change, click Activate or
Deactivate to switch the relay. You can check the configured camera relay events for correct
functioning: Status display of the relay icon in Logical Tree, Events in Alarm List or Event Log.
Activate
Click to switch the relay to the configured idle state.
Deactivate
Click to switch the relay to the configured non-idle state.
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > Expand > > ONVIF Event
Source tab
or
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > Expand > > ONVIF Event
Source tab
or
Main window > Devices > Expand > Expand > Expand > Expand
Main window > Devices > Expand > Expand > > ONVIF Event
Source tab
You can configure ONVIF events of a source (video channel, input or relay). An activated event
definition is added to the Mapping Table of the encoder.
For example for a multichannel encoder, you configure for which camera a Motion Detected
event is triggered.
Trigger Event
Activate this event.
ONVIF Topic
Type in or select a string.
ONVIF Source Name
Type in or select a string.
ONVIF Source Type
Type in or select a string.
ONVIF Source Value
Type in or select a string.
Refer to
– ONVIF event mapping, page 42
– Configuring an ONVIF mapping table, page 235
Refer to
– Cameras page, page 278
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
Displays a dialog box for adding or managing Command Scripts to the Logical Tree.
Symbols
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Notice!
i If you move a group of devices in the Logical Tree, these devices lose their permission
settings. You must set the permissions in the User groups page again.
Refer to
– Resource Manager dialog box, page 257
– Select Resource dialog box, page 258
– Sequence Builder dialog box, page 260
– Add Sequence dialog box, page 262
– Add Sequence Step dialog box, page 262
– Add URL dialog box, page 258
– Select Map for Link dialog box, page 264
– Malfunction Relay dialog box, page 269
– Link to External Application dialog box, page 259
Main window > Maps and Structure > Logical tree tab
You can add devices, resource files, map viewports, sequences, client command scripts, and
folders to the logical tree. Devices are listed in the device tree and you can drag any level of
the device tree to the logical tree.
A resource file can be, for example, a site map, a document, a web file, an audio file, or a
command script.
– A site map is a file that you can add to the logical tree. Adding a site map to the logical
tree creates a map folder in which you can organize the logical devices that are specific to
the map.
– A map viewport is an area of a global map with a specific center and zoom level.
– A folder allows you to further organize devices in the logical tree.
When you start the Configuration Client for the first time, the logical tree is empty.
If a user group does not have the permission to access a device (e.g., a camera), the device is
not being displayed on the site map, on the map viewport, or in the logical tree.
You can add the following items from the device tree or the logical tree as hot spots to a site
map:
– Cameras
– Inputs
– Relays
– Command Scripts
– Sequences
– Documents
– Links to other site maps
– VRM
– iSCSI
– Readers of an access control system
– Intrusion panels
– Management Server of Enterprise Systems
Adding an item to a site map creates a hot spot on the map.
When you add an item to a map folder in the logical tree, it is also displayed on the upper left
corner of the map. When you add an item to a map, it is also added under the corresponding
map node in the logical tree of the Operator Client.
You can add the following items from the device tree to the global map:
– Cameras
To configure the logical tree you perform some of or all the following steps several times.
Refer to
– Maps and Structure page, page 252
Main window > Maps and Structure > Logical tree tab
To add a device:
4 Drag an item from the Device Tree to the required location in the Logical Tree.
You can drag a complete node with all sub-items from the Device Tree to the Logical Tree.
You can select multiple devices by pressing the CTRL- or the SHIFT-key.
Refer to
– Maps and Structure page, page 252
Main window > Maps and Structure > Logical tree tab
To remove a tree item from the Logical Tree:
4 Right-click an item in the Logical Tree and click Remove. If the selected item has sub-
items, a message box is displayed. Click OK to confirm. The item is removed.
When you remove an item from a map folder of the Logical Tree, it is also removed from
the map.
Refer to
– Maps and Structure page, page 252
Main window > Maps and Structure > > Logical tree tab >
or
Notice!
1. Click .
The Import Resource dialog box is displayed.
2. Select one or more files.
3. Click Open.
The selected files are added to the list.
If a file has already been imported, a message box is displayed.
If you decide to import an already imported file again, a new entry is added to the list.
To remove a resource file:
1. Select a resource file.
2. Click .
The selected resource file is removed from the list.
To rename a resource file:
1. Select a resource file.
2. Click .
3. Enter the new name.
The original file name and creation date persists.
To replace the content of a resource file:
1. Select a resource file.
2. Click .
The Replace Resource dialog box is displayed.
2. Click .
A dialog box for selecting a directory is displayed.
3. Select the appropriate directory and click OK.
The original file is exported.
Refer to
– Select Resource dialog box, page 258
Main window > Maps and Structure > > Resource Manager dialog box
Allows you to manage resource files.
You can manage the following file formats:
– DWF files (map resource files)
For use in Operator Client, these files are converted to a bitmap format.
– PDF
– JPG
– PNG
– HTML files (HTML documents, e.g. action plans)
– MP3 (audio file)
– TXT files (text files)
– URL files (contain links to web pages or Intelligent Insights widgets)
– MHT files (Web archives)
– WAV (audio file)
– EXE
Click to display a dialog box for replacing the selected resource file with another one.
Click to display a dialog box for exporting the selected resource file.
Refer to
– Adding a map, page 263
– Assigning a map to a folder, page 264
– Adding a document, page 258
Main window > Maps and Structure > Logical tree tab
You can add text files, HTML files (including MHT files), URL files (containing an Internet
address) or HTTPS URL files (for example containing an Intelligent Insights widget) as
documents. And you can add a link to another application.
Before you can add a document, you must have document files imported.
To import document files see Managing resource files, page 255 for details.
To add a map document file / to add an Intelligent Insights widget:
1. Ensure that the document file that you want to add has already been imported.
2. Select a folder where you want to add the new document.
Refer to
– Select Resource dialog box, page 258
– Managing resource files, page 255
URL
Type the URL.
For secure connection only
User
Type the user name for the HTTPS URL.
Password:
Type the password for the HTTPS URL.
Show password
Click to enable that the entered password is displayed. Be careful that nobody can spy out
this password.
Refer to
– Adding a document, page 258
Main window > Maps and Structure > Logical tree tab > > Resource Manager
Notice!
i An external application that starts with a splash screen will not work as expected.
An external application which shares functions with Operator Client, will not work as
expected and can, under rare circumstances, lead to a crash of Operator Client.
Name
Type in a name for the link that is displayed in the Logical Tree.
Path
Type in or browse the path to the external application. This path must be valid on the
workstation where the user of Operator Client uses this link.
Arguments
If required, type in arguments for the command that executes the external application.
Main window > Maps and Structure > Logical tree tab
Before you can add a Command Script, you must have Command Script files imported or
created.
If required, see Configuring Command Scripts, page 92 for details.
To add a Command Script file:
1. Select a folder where you want to add the new Command Script.
4. Click OK.
A new Command Script is added under the selected folder.
Refer to
– Select Resource dialog box, page 258
Main window > Maps and Structure > Logical tree tab
You add a camera sequence to the root directory or to a folder of the Logical Tree.
To add a camera sequence:
1. In the Logical Tree, select a folder where you want to add the new camera sequence.
4. Click Add to Logical Tree. A new is added under the selected folder.
Refer to
– Sequence Builder dialog box, page 260
Add Step
Click to display the Add Sequence Step dialog box.
Remove Step
Click to remove selected steps.
Step
Displays the number of the step. All cameras of a particular step have the same dwell time.
Dwell
Allows you to change the dwell time (seconds).
Camera Number
Click a cell to select a camera via its logical number.
Camera
Click a cell to select a camera via its name.
Camera Function
Click a cell to change the function of the camera in this row.
Data
Type the time for the duration of the selected camera function. To configure this, you must
have selected an entry in the Camera column and an entry in the Camera Function column.
Data Unit
Select the unit for the selected time, for example seconds. To configure this, you must have
selected an entry in the Camera column and an entry in the Camera Function column.
Add to Logical Tree
Click to add the selected camera sequence to the Logical Tree and to close the dialog box.
Refer to
– Managing pre-configured camera sequences, page 261
Main window > Maps and Structure > Logical tree tab
You can perform the following tasks for managing camera sequences:
– Create a camera sequence
– Add a step with a new dwell time to an existing camera sequence
– Remove a step from camera sequence
– Delete a camera sequence
Notice!
When the configuration is changed and activated, a camera sequence (pre-configured or
automatic) usually is continued after restart of the Operator Client.
But in the following cases the sequence is not continued:
i A monitor where the sequence is configured to be displayed has been removed.
The mode of a monitor (single/quad view) where the sequence is configured to be displayed
has been changed.
The logical number of a monitor where the sequence is configured to be displayed is
changed.
Notice!
2. Click .
The Sequence Builder dialog box is displayed.
5. Click OK.
Refer to
– Sequence Builder dialog box, page 260
Main window > Maps and Structure > > Sequence Builder dialog box >
Allows you to configure the properties of a camera sequence.
Sequence name:
Type an appropriate name for the new camera sequence.
Logical number:
For using with a Bosch IntuiKey keyboard, enter a logical number for the sequence.
Dwell time:
Enter the appropriate dwell time.
Cameras per step:
Enter the number of cameras in each step.
Steps:
Enter the appropriate number of steps.
Main window > Maps and Structure > > Add Step button
Allows you to add a step with a new dwell time to an existing camera sequence.
Dwell time:
Enter the appropriate dwell time.
Main window > Maps and Structure > Logical tree tab
To add a folder:
1. Select a folder where you want to add the new folder.
Refer to
– Maps and Structure page, page 252
Main window > Maps and Structure > Logical tree tab
Before you can add a map, you must have map resource files imported.
To import a map resource file see Managing resource files, page 255 for details.
To add a map:
1. Ensure that the map resource file that you want to add has already been imported.
2. Select a folder where you want to add the new map.
Refer to
– Select Resource dialog box, page 258
Main window > Maps and Structure > Logical tree tab
After you have added at least two maps, you can add a link on one map to the other so that
the user can click from one map to a linked one.
To add a link:
Main window > Maps and Structure > Select a map folder in the Logical Tree >
On the map, right-click and click Create Link
Allows you to select a map for creating a link to another map.
Main window > Maps and Structure > Logical tree tab
Before you can assign maps, you must have map resource files imported.
If required, see Managing resource files, page 255 for details.
To assign a map resource file:
1. Right-click a folder and click Assign Map.
The Select Resource dialog box is displayed.
2. Select a map resource file in the list.
Refer to
– Maps and Structure page, page 252
– Select Resource dialog box, page 258
Main window > Maps and Structure > Logical tree tab
Before you can manage devices on a site map you must add a map or assign a map to a folder
and add devices to this folder.
Notice!
Notice!
Refer to
– Configuring bypass of devices, page 269
– Maps and Structure page, page 252
Main window > Maps and Structure > Global map tab
In order to use online maps or the Map-based tracking assistant in the Operator Client you
have to add and configure cameras on the global map.
You can configure map viewports from a global map. A map viewport is an area of the global
map with a specific center and zoom level. A map viewport can be displayed in an image pane
of the Operator Client.
If you want to create a map viewport or use the Map-based tracking assistant in the
Operator Client, do the following first:
1. Select the background map type of the global map.
2. Drag your cameras to the global map.
3. Configure the direction and view cone of your cameras on the global map.
Notice!
If you switch the type of background map from online (Here maps) to offline (None) or the
i other way around you lose all positioned camera hotspots and map viewports.
You can define only one background for the global map. This background applies to all map
viewports.
The camera, location or address displays and is indicated with a flag for some
seconds.
Refer to
– Options dialog box (Settings menu), page 119
16.15.2 Configuring direction and view cone of cameras on the global map
To configure a camera on the global map:
1. Select the Global map tab.
2. To go to the position, where you want to place your camera, type an address or a location
in the search field.
You can also zoom in and out by using the and buttons or the mouse scroll
wheel.
3. Drag a camera from the device tree to the respective area of the global map.
4. Click on the camera to select it.
5. Configure the direction and the view cone of the camera.
Note: When you select a dome camera, you see the reachable view cone and the actual
view cone. A warning symbol indicates that the actual view cone of the dome camera
needs a horizontal and vertical calibration. To calibrate the dome camera, open the live
video preview.
To configure the horizontal direction and view cone of a PTZ camera (platform CPP4 or
higher):
Notice!
To ensure the optimal usage of the Map-based tracking assistant, you also have to adjust the
i vertical position of the PTZ camera. We recommend to adjust the vertical position in the live
video preview based on a well-known position in the area, for example based on a distinctive
monument. The Map-based tracking assistant will later always use this configured vertical
position.
You can also zoom in and out by using the and buttons or the mouse scroll
wheel.
3. Click .
The Select Resource window opens.
4. Select your map and click OK.
5. Click and drag to rotate the map.
6. Click and drag to move the map.
Main window > Maps and Structure > Logical tree tab
To add a map viewport:
If you do not know the address or location, you can zoom in and out by using the
Main window > Maps and Structure > Logical tree tab > > Malfunction Relay
dialog box
Intended use
A malfunction relay is intended to switch in case of any severe system error to trigger an
external alert (strobe, siren, etc.).
The user must reset the relay manually.
The malfunction relay can be one from the following list:
– BVIP encoder or decoder relay
– ADAM relay
– Intrusion panel output
Example
If something happens that severely affects the system functioning (for example a hard disk
failure) or an incident occurs that endangers the security of a site (for example a failing
reference image check), the malfunction relay is activated. This can for example trigger an
audible alarm or can close doors automatically.
Functional description
You can configure a single relay to act as a malfunction relay. The malfunction relay gets
activated automatically when an event from a set of user-defined events is triggered.
Activation of a relay means that a command will be sent to the relay to close it. The
subsequent “Relay Closed” event is decoupled from the command and will only be generated
and received if the relay state is physically changed! For example a relay being closed before,
will not send this event.
Apart from being automatically triggered by the set of user-defined events, the malfunction
relay is treated like any other relay. Therefore, the user is able to deactivate the malfunction
relay in Operator Client. The Web Client also allows deactivating the malfunction relay.
Because the regular access permissions apply to the malfunction relay as well, all clients need
to consider the permissions of the logged-on user.
To add:
1. In the Malfunction Relay list, select the desired relay.
2. Click Events...
The Events selection for Malfunction Relay dialog box is displayed.
3. Click to select the desired events that can trigger the malfunction relay.
4. Click OK.
The malfunction relay is added to the system.
Main window > Maps and Structure > Logical tree tab > > Malfunction Relay
dialog box
You can add a malfunction relay to your system. You define the relay that is to be used as
malfunction relay and you configure the events that can trigger the malfunction relay.
The relay must already be configured in the Logical Tree.
Malfunction Relay
In the list, select the desired relay.
Events...
Click to display the Events selection for Malfunction Relay dialog box.
Main window > Maps and Structure > Logical tree tab
It is possible to bypass certain encoders, cameras, inputs and relays, for example, during
construction work. If an encoder, camera, input or relay is bypassed, recording is stopped, the
BVMS Operator Client does not display any events or alarms and alarms are not recorded in
the Logbook.
The bypassed cameras still show live video in the Operator Client and the Operator still has
access to old recordings.
Notice!
i If the encoder is bypassed, no alarms and events are generated for all cameras, relays and
inputs of this encoder. If a certain camera, relay or input is bypassed separately and the
certain device will be disconnected from the encoder, these alarms are still generated.
Notice!
Refer to
– Managing devices on a site map, page 264
17 Schedules page
Refer to
– Configuring schedules, page 273
Main window > > Select an item in the Recording Schedules tree
Allows you to configure Recording Schedules.
Weekdays
Click to display the Schedule Table for weekdays. The time periods of all configured Recording
Schedules are displayed.
Drag the pointer to select the time periods for the selected schedule. All selected cells get the
color of the selected schedule.
The 24 hours of the day are displayed horizontally. Every hour is divided into 4 cells. One cell
represents 15 minutes.
Holidays
Click to display the Schedule Table for holidays.
Exception Days
Click to display the Schedule Table for exception days.
Add
Click to display a dialog box for adding the required holidays or exception days.
Delete
Click to display a dialog box for removing holidays or exception days.
Refer to
– Configuring a Recording Schedule, page 273
– Adding holidays and exception days, page 275
– Removing holidays and exception days, page 276
– Renaming a schedule, page 276
Main window > > Select an item in the Task Schedules tree
Allows you to configure the available Task Schedules. You can configure a standard or a
recurring pattern.
Standard
Click to display the Schedule Table for configuring standard Task Schedules. If you configure a
Standard Pattern, no Recurring Pattern is valid for the selected schedule.
Recurring
Click to display the Schedule Table for configuring a recurring pattern for the selected Task
Schedule. For example, you configure a schedule for every second Tuesday of every month or
for the 4th of July of every year. If you configure a recurring pattern, no standard pattern is
valid for the selected Task Schedule.
Weekdays
Click to display the Schedule Table for weekdays.
Drag the pointer to select the time periods for the selected schedule. The selected cells are
displayed in the color of the selected schedule.
The 24 hours of the day are displayed horizontally. Every hour is divided into 4 cells. One cell
represents 15 minutes.
Holidays
Click to display the Schedule Table for holidays.
Exception Days
Click to display the Schedule Table for exception days.
Clear All
Click to clear the time periods of all available days (weekdays, holidays, exception days).
Select All
Click to select the time periods of all available days (weekdays, holidays, exception days).
Add...
Click to display a dialog box for adding the required holidays or exception days.
Delete...
Click to display a dialog box for deleting holidays or exception days.
Recurrence Pattern
Click the frequency with which you want the Task Schedule to recur (Daily, Weekly, Monthly,
Yearly) and then select the corresponding options.
Day Pattern
Drag the pointer to select the time period(s) for the recurring pattern.
Refer to
– Adding a Task Schedule, page 274
– Configuring a standard Task Schedule, page 274
– Configuring a recurring Task Schedule, page 274
– Removing a Task Schedule, page 275
– Adding holidays and exception days, page 275
– Removing holidays and exception days, page 276
– Renaming a schedule, page 276
18 Configuring schedules
Refer to
– Recording Schedules page, page 271
– Task Schedules page, page 272
default. You can change these settings. Entries with the gray icon do not have a time
period configured.
Recording Schedules share the same weekdays.
Each Standard Task Schedule has its own weekdays patterns.
To configure a Recording Schedule:
1. In the Recording Schedules tree, select a schedule.
Refer to
– Recording Schedules page, page 271
Refer to
– Task Schedules page, page 272
Refer to
– Task Schedules page, page 272
2. In the Recurrence Pattern field, click the frequency with which you want the Task
Schedule to recur (Daily, Weekly, Monthly, Yearly) and then make the corresponding
settings.
3. In the Start date: list, select the appropriate start date.
4. In the Day Pattern field, drag the pointer to select the appropriate time period.
Refer to
– Task Schedules page, page 272
Main window > > Select an item in the Task Schedules tree
To remove a Task Schedule:
1. In the Task Schedules tree, select an item.
2. Click Delete.
The Task Schedule is deleted. All items that are assigned to this schedule, are not
scheduled.
Refer to
– Task Schedules page, page 272
Notice!
You can configure empty exception days and holidays. Exception days and holidays replace
the schedule of the corresponding week day.
Example:
i Old configuration:
Weekday schedule configured to be active from 9:00 to 10:00
Exception day schedule configured to be active from 10:00 to 11:00
Result: activity from 10:00 to 11:00
Same behavior is valid for holidays.
You can add holidays and exception days to a Recording Schedule or to a Task Schedule.
Recording Schedules share the same holidays and exception days.
Each standard Task Schedule has its own holidays or exception days patterns.
To add holidays and exception days to a schedule:
1. In the Recording Schedules or Task Schedules tree, select a schedule.
2. Click the Holidays tab.
3. Click Add.
The Add Holiday(s) dialog box is displayed.
4. Select one or more holidays and click OK.
The selected holidays are added to the Schedule Table.
5. Drag the pointer to select the appropriate time period (this is not possible for Recording
Schedules).
The selected cells are cleared and vice versa.
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
276 en | Configuring schedules BVMS
Refer to
– Recording Schedules page, page 271
– Task Schedules page, page 272
Refer to
– Recording Schedules page, page 271
– Task Schedules page, page 272
2. Click .
3. Enter the new name and press ENTER. The entry is renamed.
Refer to
– Recording Schedules page, page 271
– Task Schedules page, page 272
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Main window > Cameras and Recording > Click an icon to change the Cameras page
Notice!
i Applicable only if the stream quality profiles quiet, standard or busy are selected:
The value Active platform changes if you change the codec of the selected camera. The target
bit rate is adjusted automatically and the name of the platform settings is displayed.
Live Video - Stream (only VRM and Live Only and Local Storage)
Click a cell to select the stream for a VRM or a local storage / live only encoder.
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
280 en | Cameras and Recording page BVMS
Notice!
i If a Mirrored VRM is already configured for an encoder, you cannot change any settings for
this encoder in the Secondary Recording columns.
Click a cell to select the appropriate protocol for the PTZ control.
Refer to
– Configuring dual recording in the Camera Table, page 295
– Configuring predefined positions and auxiliary commands, page 291
– Configuring PTZ port settings, page 291
– Configuring stream quality settings, page 284
– Copying and pasting in tables, page 283
– Configuring the ANR function, page 294
– Exporting the Camera Table, page 284
– Assigning an ONVIF profile, page 295
– Configuring the ROI function, page 293
Main window > Cameras and Recording > > Click a Recording Schedule tab
(for example )
Allows you to configure the recording settings.
The displayed Recording Schedules are configured in Schedules.
Only those columns are described that are not part of a camera table.
4 Click a column title to sort the table by this column.
Continuous Recording
In the Quality column, click a cell to disable recording or to select the stream quality of
stream 1.
Refer to
– Copying and pasting in tables, page 283
i This document describes some functions that are not available for BVMS Viewer.
For detailed information about the different BVMS editions refer to www.boschsecurity.com
and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
Refer to
– Cameras page, page 278
– Scheduled Recording Settings dialog box (only VRM and Local Storage), page 288
– Stream Quality Settings dialog box, page 285
– Predefinded positions and AUX commands dialog box, page 292
– Copy Recording Settings dialog box, page 294
Refer to
– Cameras page, page 278
– Scheduled Recording Settings dialog box (only VRM and Local Storage), page 288
– Events page, page 296
– Alarms page, page 301
Main window > Cameras and Recording > Click an icon to change the Cameras page
Select a predefined stream quality and click to add a new stream quality on the
basis of the predefined stream quality. When you select a single stream and click , this
stream quality setting is copied as a childless top level node.
Click to delete a selected stream quality. You cannot delete the stream quality settings.
The list displays all available predefined stream quality settings. We recommend assigning a
stream quality with the same name as the platform of the camera.
The following profiles for stream qualities are available:
Image optimized: The settings are optimized for image quality. This can burden the network.
Bit rate optimized: The settings are optimized for low bandwidth. This can reduce the image
quality.
Balanced: The settings offer a compromise between optimal image quality and optimal
bandwidth usage.
The following profiles for stream qualities are available since BVMS 9.0 to support the
Intelligent Streaming feature of Bosch cameras:
Cloud optimized 1/8 FR: The settings are optimized for low bandwidth and identically for all
camera types.
PTZ optimized: The settings are optimized for PTZ cameras.
Image optimized quiet / standard / busy
Bit rate optimized quiet / standard / busy
Balanced quiet / standard / busy
quiet: The settings are optimized for images with low activity. 89% static scene, 10% normal
scene, 1 % busy scene.
standard: The settings are optimized for images with medium activity. 54% static scene, 35%
normal scene, 11 % busy scene.
busy: The settings are optimized for images with high activity. 30% static scene, 55% busy
scene, 15% crowded scene.
The percentage values are related to a distribution during a day.
Notice!
i For each combination of camera platform (CPP3-CPP7.3) and for each of the available
resolutions a specific setting exists to be able to set the correct bit rates for the cameras.
The profile has to be selected manually with the corresponding scene type for each camera.
Notice!
i If doing an update installation the new profiles have to be selected manually to become
active. The old profiles remain.
Name
Displays the name of the stream quality. When you add a new stream quality, you can change
the name.
SD video resolution
Select the desired video resolution. For an HD quality you configure the SD quality of
stream 2.
Image encoding interval
Move the slider or type the appropriate value.
The system helps you in calculating the corresponding value for IPS.
With the image encoding interval you configure the interval at which images are encoded and
transmitted. If 1 is entered, all images are encoded. Entering 4 means that only every fourth
image is encoded, the following three images are skipped - this can be particularly
advantageous with low bandwidths. The lower the bandwidth the higher this value should be
to achieve best-quality video.
GOP structure
Select the structure you require for the Group-of-Pictures (GOP). Depending on whether you
place higher priority on having the lowest possible delay (IP frames only) or using as little
bandwidth as possible, you choose IP, IBP or IBBP. (GOP selection is not available on some
cameras.)
Note:
B-frames are only supported by cameras up to a resolution of 1080 p and from firmware 6.40.
Target bit rate [Kbps]
Move the slider or type the appropriate value.
You can limit the data rate for the encoder to optimize usage of bandwidth in your network.
The target data rate should be set according to the desired picture quality for typical scenes
with no excessive motion.
For complex images or frequent changes of image content due to frequent movements, this
limit can be temporarily exceeded up to the value you enter in the Maximum bit rate [Kbps]
field.
Refer to
– Configuring stream quality settings, page 284
Refer to
– Cameras page, page 278
3. Click or .
4. In the Recording column, select the desired recording setting for each encoder.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
Refer to
– Scheduled Recording Settings dialog box (only VRM and Local Storage), page 288
20.6 Scheduled Recording Settings dialog box (only VRM and Local
Storage)
Select the desired device family to configure the recording settings valid for this device
family.
For the selected device family, select a Recording Schedule to configure the recording
settings.
Recording
Switch on or off the normal recording (continuous and prealarm).
Audio recording
Select, if you want to record audio.
Meta data recording
Select, if you want to record metadata.
Recording Mode
Select the desired recording mode.
The following items are available:
– Continuous
– Pre-alarm
Stream
Select the desired stream used for normal recording.
Note: It depends on the device family which streams are available.
Quality
Select the desired stream quality used for normal recording. The available quality settings are
configured in the Stream Quality Settings dialog box.
Duration (pre-alarm)
Enter the desired recording time before an alarm. You enter the time in the format hh.mm.ss.
Note: Only enabled when Pre-alarm is selected.
Notice!
For pre-alarm settings between 1 and 10 s, the pre-alarms are automatically stored on the
i RAM of the encoder if enough RAM space is available, otherwise on the storage.
For pre-alarm settings greater than 10 s, pre-alarms are stored on the storage.
The storage of pre-alarms on the RAM of the encoder is only available for firmware version 5.0
or later.
Alarm Recording
Allows you to switch on or off the alarm recording for this camera.
Motion Alarm
Allows you to switch on or off alarm recording triggered by motion.
Stream
Select the stream used for alarm recording.
Note: It depends on the device family which streams are available.
Quality
Select the desired stream quality used for alarm recording. The available quality settings are
configured in the Stream Quality Settings dialog box.
Only for devices belonging to Device Family 2 or 3: When you select the No modification
entry, alarm recording uses the same quality as used for continuous/prealarm recording. We
recommend using the No modification entry. When you select a stream quality for alarm
recording, only the values for image encoding interval and target bit rate are modified
according to the settings in this stream quality. The other quality settings are used that are
configured in the quality setting assigned to the continuous/prealarm recording.
Duration (post-alarm)
Enter the desired alarm recording time. You enter the time in the format hh.mm.ss.
Refer to
– Copying and pasting in tables, page 283
– Configuring recording settings (only VRM and Local Storage), page 288
Main window > Devices > Expand > Expand > > Interfaces tab >
Periphery tab
Main window > Devices > > > Interfaces tab > Periphery tab
You can only configure port settings for an encoder where the control of the camera is
available and activated.
When the encoder or PTZ camera is exchanged, the port settings are not retained. You must
again configure them.
After a firmware update check the port settings.
To configure the port settings of an encoder:
4 Make the appropriate settings.
The settings are valid immediately after saving. You do not have to activate the
configuration.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
column.
Note: Click for each defined position. Otherwise the position is not saved.
9. Click OK.
4. Click .
The predefined camera position is displayed in the preview window.
Note:
Predefined positions for PTZ and ROI cameras are stored on the camera directly. Predefined
positions for panoramic cameras are stored in BVMS.
PTZ cameras move physically to the predefined position. Panoramic and ROI cameras only
display an image section of the complete camera view.
To configure auxiliary commands for PTZ cameras:
1. In the Cameras table, select the required encoder.
Refer to
– Predefinded positions and AUX commands dialog box, page 292
– Configuring PTZ port settings, page 291
– Configuring an alarm, page 314
– Select Image Pane Content dialog box, page 302
– Alarm Options dialog box, page 304
– Select Image Pane Content dialog box (MG), page 303
Main window > Cameras and Recording > > Select a PTZ, ROI or panoramic
camera >
Allows you to configure a PTZ, ROI or panoramic camera.
For ROI and panoramic cameras no auxiliary commands are available.
Note: First configure the port settings of your PTZ camera before you can configure the PTZ
camera settings. Otherwise the PTZ control is not working in this dialog box.
Icons
Click to move the camera to the predefined position or to execute the command.
Refer to
– Configuring PTZ port settings, page 291
– Configuring predefined positions and auxiliary commands, page 291
Refer to
– Cameras page, page 278
Main window > Cameras and Recording > Click an icon for recording device (for
Main window > Cameras and Recording > Click an icon for recording device, for
Refer to
– Configuring dual recording in the Camera Table, page 295
– Cameras page, page 278
– Configuring the storage media of an encoder, page 225
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Configuring cameras and recording settings | en 295
Refer to
– Configuring dual recording in the Device Tree, page 187
– Configuring the ANR function, page 294
– Dual / failover recording, page 28
– Cameras page, page 278
Refer to
– Cameras page, page 278
21 Events page
device is displayed beyond as . All other events are displayed under device
dependant groups as .
You can configure for each event:
– Trigger an alarm according to a schedule (not available for all events).
– Log the event according to a schedule. An event is displayed in the Event List of the
Operator Client if it is logged.
– Execute a Command Script according to a schedule (not available for all events).
Click to duplicate an event. Use it to generate multiple alarms for a certain event.
Click to display a dialog box for creating Compound Events using Boolean expressions
of other events (maximum 10).
Compound Events are added to the Event Configuration Table.
Click to display a dialog box for creating and editing Command Scripts.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Refer to
– Configuring events and alarms, page 309
– Configuring Command Scripts, page 92
– Options dialog box (Settings menu), page 119
For each event or alarm, you can configure the background color and the behavior
(blinking or not blinking) for hotspots. For example you can configure for a event or
alarm of a device that its device icon on a map starts blinking when the state of this device
changes.
Additionally you can configure the display priority for all hotspots. This is required when
different events occur for the same device. (1 = highest priority)
The configured color is valid for all hotspots with the same display priority. You can change
color, behavior and priority at any event or alarm: The changed color and behavior is
used for all hotspots of all other events or alarms which have the same priority.
Enable color states on maps
Click to enable that the hotspots of the devices belonging to this event are displayed with
colored background and can blink on maps.
Display priority on map:
Click the arrows to change the priority for the hotspots of the devices belonging to this event.
Background color on map:
Click the color field to select the background color used for the hotspots of the devices
belonging to this event.
Note: All state events of all devices with the same priority have the same color.
Blinking
Click to enable blinking of the hotspots of the devices belonging to this event.
Click to convert an existing script to the other available script language. All existing script
text is deleted.
Refer to
– Configuring Command Scripts, page 92
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Refer to
– Creating a Compound Event, page 312
– Editing a Compound Event, page 313
Refer to
– Configuring Command Scripts, page 92
Main window > Events > Debounce Settings tab > Edit Priorities button
You can configure priorities for the different state changes of an event type if applicable, for
example Virtual Input Closed and Virtual Input Opened. A state change with higher priority
overrides the debounce time of another state change with lower priority.
Name of Priority:
Type in a name for the priority setting.
State Value
Displays the names of the event states of the select event.
State Priority
Enter the desired priority. 1=highest priority, 10=lowest priority.
Main window > Events > or > Debouce Settings tab > Add Setting
button
Select
Select the check box for the desired entry and click OK to add a row in the Devices with
Deviating Debounce Settings table.
Main window > Events > In the Event Tree select Data Input (text data must be
available, for example: Foyer Card Reader Devices > Foyer Card Reader > Card Rejected) >
Text Data Recording column > …
You can configure the cameras for which text data is added to the continuous recording.
Refer to
– Triggering alarm recording with text data, page 315
22 Alarms page
Displays a dialog box to set alarm settings valid for this Management Server.
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Refer to
– Alarm handling, page 40
Notice!
i For existing alarm configurations the multi-row alarm display is on, for new alarm
configurations the default value is off and the single view display is active.
Refer to
– Configuring settings for all alarms, page 314
Main window > Alarms > or > Alarm Image Panes column > Click ... in
one of the 1-5 columns
Allows you to select the Logical tree item that is displayed and recorded (if the item is a
camera) in case of the selected alarm.
Notice!
i A site map displayed in an alarm image pane is optimized for display and contains only the
initial view of the original map file.
Search Item
Enter text to find an item in the Logical Tree.
Find
Click to find the camera with the entered search text in its description.
Live
Click to determine that the live image of the camera is displayed in case of an alarm.
Instant playback
Click to determine that instant playback of the camera is displayed.
The rewind time for alarm instant playback is configured on the Operator features page, see
Operator Features page, page 327.
Pause playback
Select the check box to display the alarm instant playback camera with paused instant
playback. The user can start instant playback if needed.
Loop playback
Select the check box to display the alarm instant playback camera with looped instant
playback.
The duration of looped instant playback in the alarm image pane is rewind time plus the
duration of the alarm state plus rewind time.
Record this camera
Select the check box to enable alarm recording for this camera in case of an alarm. If an alarm
is triggered, this camera is recorded in alarm recording quality. The duration of the recording
is the duration of the alarm state plus pre- and post-alarm time. This setting directly changes
the setting for alarm recording in the Alarm Options dialog box and vice versa.
Note: If a predefined position is selected for a panoramic camera, not only this image section
is stored but the complete circle view.
Panoramic predefined position
If you have selected a panoramic camera, you can select a predefined camera position. When a
user of the Operator Client accepts this alarm, the alarm image is displayed in the predefined
position in cropped view.
If <none> is selected, the alarm image is displayed in panorama view.
Refer to
– Operator Features page, page 327
– Configuring an alarm, page 314
Alarms > or > Alarm Options column > Click ... > Alarm Options dialog box >
Monitor Group tab > Click ... in one of the 1-10 columns
Allows you to select a camera from the Logical tree. This camera will be displayed in the
assigned monitor in case of the selected alarm.
Search Item
Enter text to find an item in the Logical Tree.
Find
Click to find the camera with the entered search text in its description.
Panoramic predefined position
If you have selected a panoramic camera, you can select a predefined camera position. When a
user of the Operator Client accepts this alarm, the alarm image is displayed in the predefined
position in cropped view.
If you select <none>, the decoder displays the alarm image in circle view.
No Camera
Click to clear a camera from the monitor group column.
Note:
The field of view of a predefined panoramic camera position differs between the Operator or
Configuration Client and the decoder.
Notice!
i To use configured predefined positions for panoramic cameras, the Mounting position of the
panoramic camera has to be Wall or Ceiling.
Main window > Alarms > or > Alarm Options column > ...
Allows you to configure the following settings for alarms:
– Cameras that start recording in case of an alarm.
– Enabling protection for these alarm recordings.
– Enabling and configuring deviating alarm duration settings.
– Triggering PTZ commands in case of alarm.
– Notifications that are sent in case of an alarm.
– Workflow that has to be processed in case of an alarm.
– Assigning cameras that are displayed in monitor groups in case of an alarm.
Cameras tab
Protect Recording Select a check box to protect the alarm recording of this
camera.
Note: The protected video data will never be deleted by the
VRM automatically. Be aware that too many protected
blocks can fill up the storage and the camera may stop
recording.
Deviating Alarm Duration The check box is automatically enabled when you enable
Settings the Record check box and when the camera supports ANR.
Notifications tab
Workflow tab
Record only alarm Select the check box to specify that the camera is only
recorded and not being displayed in case of this alarm. This
check box is only active if the Record check box on the
Cameras tab is selected.
Auto-clear alarm after Select the check box to specify that this alarm is
configured time ('Alarm automatically cleared.
Settings' dialog box)
Auto-clear alarm when event Select the check box to specify that this alarm is
state changes back to normal automatically cleared when the event that triggers this
alarm changes its state. The alarm will not be cleared
automatically if it is accepted and unaccepted.
Prevent alarm clearing while Select the check box to prevent that this alarm is deleted
triggering state lasts as long as the cause for the alarm exists.
Suppress duplicate alarms in Select the check box to avoid alarms for the same event
alarm list type and device being duplicated in the Alarm List of BVMS
Operator Client.
As long as an alarm is active (in alarm state Active or
Accepted), no further alarms for the same event type and
device are displayed in the Alarm List.
Note:
– Events are still logged in the logbook.
– Please be aware that all alarm actions triggered by this
alarm (for example starting alarm recording etc.) are
not retriggered.
After the alarm has been cleared and a new alarm has
been triggered for the same device and by the same
event type, the new alarm appears again in the Alarm
List and all alarm actions set for this alarm are
triggered again.
– This check box is preselected for person identification
alarms.
Show action plan Select the check box to enable the workflow that must be
processed in case of an alarm.
Display a comment box Select the check box to enable displaying a comment box in
case of an alarm. In this comment box the user can type
comments on the alarm.
Force the operator to process Select the check box to force the user to process the
the workflow workflow. If selected, the user cannot clear the alarm until
he has entered a comment on the alarm.
Execute the following Client Select a Client Command Script that is executed
Script when alarm is accepted: automatically, when the user accepts an alarm.
Alarm title Select the check box to configure that the title of the alarm
is displayed on the monitors as an on-screen display.
Alarm time Select the check box to configure that the time of the alarm
is displayed on the monitors as an on-screen display.
Alarm date Select the check box to configure that the date of the alarm
is displayed on the monitors as an on-screen display.
Alarm camera name Select the check box to configure that the name of the
alarm camera is displayed on the monitors as an on-screen
display
Alarm camera number Select the check box to configure that the number of the
alarm camera is displayed on the monitors as an on-screen
display.
Only on 1st monitor Select the check box to configure that the title and the time
of the alarm is displayed only on the first monitor of the
monitor group as an on-screen display.
Use profile settings Click to enable this setting. For this camera the pre-alarm
and post-alarm duration settings are used that are
configured in the Scheduled Recording Settings dialog
box.
Override settings Click to enable the following settings for pre-alarm and
post-alarm duration.
Duration (post-alarm)
Only available for events.
Refer to
– Select Image Pane Content dialog box (MG), page 303
– Triggering alarm recording with text data, page 315
– Configuring an alarm, page 314
– Configuring the pre- and post-alarm duration for an alarm, page 315
Main window > Alarms > or > Alarm Identity column > Audio File
column > Click ...
Allows you to select an audio file that is played in case of an alarm.
Play
Click to play the selected audio file.
Pause
Click to pause the selected audio file.
Stop
Click to stop the selected audio file.
Manage...
Click to display the Resource Manager dialog box.
Refer to
– Configuring an alarm, page 314
– Managing resource files, page 310
Refer to
– Debounce Settings tab, page 297
– Settings tab for advanced map display, page 297
– Settings tab for event configuration, page 298
– Command Script Editor dialog box, page 298
– Create Compound Event / Edit Compound Event dialog box, page 299
– Select Script Language dialog box, page 299
– Edit Priorities of Event Type dialog box, page 300
– Select Devices dialog box, page 300
– Text Data Recording dialog box, page 300
– Alarm Settings dialog box, page 302
– Select Image Pane Content dialog box, page 302
– Alarm Options dialog box, page 304
2. Click .
Refer to
– Events page, page 296
To configure an event:
1. In the tree, select an event or event state, for example System Devices > Authentication
> Operator Authentication Rejected.
The corresponding Event Configuration Table is displayed.
2. In the Trigger Alarm - Schedule column, click a cell and select the appropriate schedule.
The schedule determines when the alarm is triggered.
Select one of the Recording Schedules or Task Schedules that you have configured in the
Schedules page.
3. In the Log - Schedule column, click a cell and select the appropriate schedule.
The schedule determines when the event is logged.
4. In the Script - Script column, click a cell and select an appropriate Command Script.
5. In the Script - Schedule column, click a cell and select the appropriate schedule.
The schedule determines when the event triggers the start of the Command Script.
Refer to
– Events page, page 296
3. Click . A new table row is added below. It has the default settings.
Refer to
– Events page, page 296
Main window > Events > Expand System Devices > User Actions
You can configure the logging behavior of several user actions for each available user group
individually.
Example:
To log user events:
1. Select a user event to configure its logging behavior, e.g. Operator Logon.
The corresponding Event Configuration Table is displayed.
Each user group is displayed in the Device column.
2. If available: In the Trigger Alarm - Schedule column, click a cell and select the
appropriate schedule.
The schedule determines when the alarm that is supposed to notify the user is triggered.
You can select one of the Recording Schedules or Task Schedules that you have
configured in Schedules.
3. In the Log - Schedule column, click a cell and select the appropriate schedule.
The schedule determines when the event is logged.
In the example, the Operator logon of the Admin Group and the Power User Group are
not logged whereas the Operator logon of the Live User Group are logged during Day
schedule.
Refer to
– Events page, page 296
Refer to
– Events page, page 296
Refer to
– Events page, page 296
2. In the Event Configuration Table, in the Device column, right-click the required
Compound Event and click Edit.
The Edit Compound Event dialog box is displayed.
3. Make the required changes.
4. Click OK.
The Compound Event is changed.
Refer to
– Events page, page 296
Refer to
– Configuring an event, page 310
– Alarms page, page 301
– Select Image Pane Content dialog box, page 302
– Alarm Options dialog box, page 304
1. Click .
The Alarm Settings dialog box is displayed.
2. Make the appropriate settings.
4 Click OK.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
Refer to
– Alarm Settings dialog box, page 302
2. Select or
3. In the Alarm Options column click ...
The Alarm Options dialog box is displayed.
4. In the Record column, select the check box of the ANR enabled camera to enable alarm
recording.
The check box in the Deviating Alarm Duration Settings column is selected
automatically.
5. Click the Deviating Alarm Duration Settings tab.
6. Configure the alarm duration settings as required.
Refer to
– Alarm Options dialog box, page 304
Before configuring an alarm you must configure an event that contains text data.
Example: Events > In the Event Tree select (text data must be available, for
example: Foyer Card Reader Devices > Foyer Card Reader > Card Rejected)
Notice!
Refer to
– Alarm Options dialog box, page 304
– Text Data Recording dialog box, page 300
Main window > Events > In the Event Tree select Data Input (text data must be
available, for example: Foyer Card Reader Devices > Foyer Card Reader > Card Rejected) >
Text Data Recording column > …
You can add text data to continuous recording.
Notice!
If you protect the alarm recording of a camera, the protected video data will never be deleted
i by the VRM automatically. Be aware that too many protected blocks can fill up the storage
and the camera may stop recording. You have to manually unprotect the video data in the
Operator Client.
Refer to
– Alarm Options dialog box, page 304
For each event or alarm, you can configure the background color and the behavior
(blinking or not blinking) for hotspots. For example you can configure for a event or
alarm of a device that its device icon on a map starts blinking when the state of this device
changes.
Additionally you can configure the display priority for all hotspots. This is required when
different events occur for the same device. (1 = highest priority)
The configured color is valid for all hotspots with the same display priority. You can change
color, behavior and priority at any event or alarm: The changed color and behavior is
used for all hotspots of all other events or alarms which have the same priority.
The configuration of the color states on maps is only possible when you click to check the
Enable advanced state display (hot spot coloring in maps depending on state) option or the
Enable advanced alarm display (hot spot coloring in maps depending on alarm) option in the
Options dialog box.
To configure a blinking hotspot for an event:
1. In the tree, select an event state ( ), for example Encoders/Decoders > Encoder
Relay > Relay State > Relay Opened.
The corresponding Event Configuration Table is displayed.
2. Click Enable color states on maps.
3. In the Display priority on map: field, enter the desired priority.
4. Click the Background color on map: field to select the desired color.
5. If desired, click to enable Blinking.
To configure a blinking hotspot for an alarm:
See chapter Device , page 301 on the Alarms page, page 301.
Notice!
The device icons on a map blink in the same color configured for the alarm or event.
Refer to
– Events page, page 296
– Options dialog box (Settings menu), page 119
Notice!
i We recommend to set the highest priority (1) for the Access requested alarms. This ensures
that the alarms automatically pop-up and receive the necessary attention of the operator.
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
Icon Description
Click to add a new user to the selected user group. Change the default user name if
desired.
Displays a dialog box for copying permissions from a selected user group to another
user group.
Click to display the pages available for configuring the permissions of this group.
Click to display the page available for configuring the properties of this user.
Click to display the page available for configuring the properties of this logon pair.
Click to display the pages available for configuring the permissions of this dual
authorization group.
Notice!
i User name changes and password changes are reverted after a configuration rollback.
Dual authorization User groups – See user groups – See user groups
user group
active filter is indicated by . Enclose strings with double quotes to find them exactly, for
example "Camera 1" exactly filters the cameras with this name, not camera 201.
Main window > User groups > User Groups tab > > Operating permissions tab
> User group properties tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > User group properties tab
Allows you to configure the following settings for the selected user group:
– Logon schedule
– Selection of an associated LDAP user group
User group properties
Description:
Type an informative description for the user group.
Language
Select the language of the Operator Client.
Logon schedule
Select a task or recording schedule. The users of the selected group can only log on to the
system in the times defined by this schedule.
LDAP properties
Search for groups
Click to display the available associated LDAP groups in the Associated LDAP group list. To
select an associated LDAP group, you must make the appropriate settings in the LDAP server
settings dialog box.
Associated LDAP group
Select an LDAP group in the Associated LDAP group list that you want to use for your system.
Refer to
– Selecting an associated LDAP group, page 346
– Associating an LDAP group, page 119
– Scheduling user logon permission, page 346
Main window > User groups > User Groups tab >
or
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
322 en | User Groups page BVMS
Main window > User groups > Enterprise User Groups tab > >
Allows you to configure a new user in a standard user group or in an Enterprise User Group.
If you change the password for a user or delete a user while this user is logged on, this user
can still continue working with Operator Client after password change or deletion. If after
password change or deletion the connection to Management Server is interrupted (for
example after activating the configuration), the user cannot automatically reconnect to the
Management Server again without logoff/logon at Operator Client.
Account is enabled
Select check box to activate a user account.
Full name
Type the full name of the user.
Description
Type an informative description for the user.
User must change password at next logon
Select check box to enforce users to set a new password at next logon.
Enter new password
Type the password for the new user.
Confirm password
Type the new password again.
Notice!
i We highly recommend to assign a specific password to all new users, and have the user
change this at logon.
Notice!
i Clients of Mobile Video Service, Web Client, Bosch iOS App and SDK clients are not able to
change the password on logon.
Apply
Click to apply the settings.
Main window > User groups > User Groups tab > New dual authorization
group >
or
Main window > User groups > Enterprise User Groups tab > New enterprise
Refer to
– Adding a logon pair to dual authorization group, page 344
Main window > User groups > User Groups tab > > Device permissions tab >
Camera permissions tab
or
Main window > User groups > Enterprise Access tab > > Device permissions
tab > Camera permissions tab
Allows you to configure the access rights for the features of a selected camera or camera
group for the selected user group.
If new components are added, camera permissions must be configured afterwards.
You can recall the access to a camera on the Camera page.
Camera
Displays the camera name as configured on the Cameras and Recording page.
Location
Displays the location of the camera as configured on the Maps and Structure page.
Access
Select a check box to allow access to this camera.
Live Video
Select a check box to allow using live video.
Live Audio
Select a check box to allow using live audio.
Manual Recording
Select a check box to allow manual recording (alarm recording).
You can select or clear this check box only when the manual alarm recording is enabled on the
Operator features page.
Playback Video
Select a check box to allow using playback video.
You can select or clear this check box only when playback is enabled on the Operator features
page.
Playback Audio
Select a check box to allow using playback audio.
You can select or clear this check box only when playback is enabled on the Operator features
page.
Text Data
Select a check box to allow displaying metadata.
You can select or clear this check box only when the display of metadata is enabled on the
Operator features page.
Export
Select a check box to allow exporting video data.
You can select or clear this check box only when the export of video data is enabled on the
Operator features page.
PTZ/ROI
Select a check box to allow using the PTZ control or the ROI of this camera.
You can select or clear this check box only when the PTZ control or ROI of this camera is
enabled on the Operator features page. Additionally you must configure PTZ or ROI in the
Camera Table.
Aux
Select a check box to allow executing auxiliary commands.
You can select or clear this check box only when the PTZ control of a camera is enabled on the
Operator features page.
Set predefined positions
Select a check box to allow the user to set prepositions of this PTZ camera.
You can also set prepositions for the Region of Interest feature, if enabled and authorized.
You can select or clear this check box only when the PTZ control of a camera is enabled on the
Operator features page.
Reference Image
Select a check box to allow updating the reference image of this camera.
Main window > User groups > User Groups tab > > Device permissions tab >
Control priorities tab
or
Main window > User groups > Enterprise Access tab > > Device permissions
tab > Control priorities tab
Control priorities
Move the appropriate slider to the right to decrease the priority for acquiring PTZ controls and
Bosch Allegiant trunk lines. A user with a high priority can lock the PTZ controls or the control
of a trunk line for users with lower priorities. You set the timeout for locking PTZ control on
the Timeout in min. field. The default setting is 1 minute.
Timeout in min.
Enter the time period in minutes.
Refer to
– Configuring various priorities, page 348
Main window > User groups > User Groups tab > >
or
Main window > User groups > Enterprise User Groups tab > >
Allows you to select user group permissions to be copied to selected user groups.
Copy from:
Displays the selected user group. Its permissions are to be copied to another user group.
Settings to copy
Select a check box to select the desired user group permissions for copying.
Copy to:
Select a check box to specify the user group where to copy the selected user group
permissions to.
Refer to
– Copying user group permissions, page 348
Main window > User groups > User Groups tab > > Device permissions tab > Decoder
permissions tab
or
Main window > User groups > Enterprise Access tab > > Device permissions
tab > Decoder permissions tab
Allows you to configure the decoders that the users of this group have access to.
Decoder
Displays the available decoders.
Click the check box to give the user group access to this decoder.
Monitor Group
Select the check box to give the users of the selected user group access to this monitor
group.
Main window > User groups > User Groups tab > > Device permissions tab >
Events and Alarms tab
or
Main window > User groups > Enterprise Access tab > > Device permissions
tab > Events and Alarms tab
Allows to configure the permissions for the Events Tree, for example you set the events the
user group is authorized or not authorized to use.
You cannot change these settings for a default user group.
For each event there is at least one device. For example, for the Video Loss event the available
cameras are the devices. For an event like Backup Finished the corresponding device is Time
Controlled Backup. Hence, a device can be a software process.
1. Expand a tree item and click the required check boxes for enabling the events. In the
Access column, select the check box of a device to enable the events of this device. The
access to the devices is configured on the Camera page and on the Camera permissions
page.
2. To enable or disable all events at once, select or clear the Events and Alarms check box.
Main window > User groups > Enterprise Access tab > > Device permissions tab >
Credentials tab
Configure the credentials of an Enterprise Account on a Management Server.
You configure Enterprise Access on each Management Server that is member of your
Enterprise System. The Enterprise Management Server uses this credential to grant access to
the devices of this Management Server for the Operator Client that logs on as a user of an
Enterprise User Group.
Description:
Type in a description for the desired Enterprise Account.
Strong key policy
The Strong key policy check box is pre-selected for all newly created user groups.
We highly recommend to keep this setting to enhance the protection of your computer against
unauthorized access.
The following rules apply:
– Minimum key length as set on the Account policies page for the appropriate user group.
– Do not use one of the previous keys.
– Use at least one upper-case letter (A through Z).
– Use at least one number (0 through 9).
– Use at least one special character (for instance: ! $ # %).
Enter new key: / Confirm key:
Type in and confirm the key for this Management Server.
Refer to
– Creating an Enterprise Account, page 342
Main window > User groups > User Groups tab > > Device permissions tab >
Logical Tree tab
or
Main window > User groups > Enterprise Access tab > > Device permissions
tab > Logical Tree tab
Allows you to configure the Logical Tree for each user group.
To configure permissions:
4 Select or clear the check boxes as appropriate.
Selecting an item below a node, automatically selects the node.
Selecting a node, automatically selects all items below.
Camera
Select a check box to give the users of the selected user group access to the corresponding
devices.
You can recall the access to a camera on the Camera permissions page.
Monitor Group
Select the check box to give the users of the selected user group access to this monitor
group.
Refer to
– Configuring device permissions, page 347
Main window > User groups > User Groups tab > > Operating permissions tab
> Operator features tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Operator features tab
Allows you to configure various permissions for the selected user group.
PTZ control of dome cameras
Select the check box to allow the control of a camera.
Control priorities page: In the Control priorities field, you can set the priority for acquiring
the control of a camera.
Allegiant trunk lines
Select the check box to allow accessing Bosch Allegiant trunk lines.
Control priorities page: In the Control priorities field, you can set the priority for acquiring
Bosch Allegiant trunk lines.
Notice!
VRM
Configure the user permissions for restricting and unrestricting video data in BVMS as
i required.
Only a user, that has the Restrict video (restricted video can only be viewed by users that
have this permission) permission, can see restricted video in the timeline of the
Operator Client. The restricted time range is otherwise displayed as No Recording.
Notice!
DIVAR AN
Configure the user permissions for restricting and unrestricting video data on your DIVAR AN
i device as required. Create a user in BVMS with the same credentials and configure the
permissions for restricting and unrestricting video data accordingly.
Display of restricted video is not affected and must be configured separately on the DIVAR AN
device.
Delete video
Select the check box to allow deleting video data.
Access to video that has been recorded in periods when the user group has not been
allowed to log on
Select the check box to allow accessing the described video data.
Logbook access
Select the check box to allow accessing the Logbook.
Erase text data from logbook entries (for erasing person-related data)
Select the check box to allow erasing text data from logbook entries.
Operator event buttons
Select the check box to allow user event buttons in the Operator Client.
Close Operator Client
Select the check box to allow closing the Operator Client.
Minimize Operator Client
Select the check box to allow minimizing the Operator Client.
Audio Intercom
Select the check box to allow the user to speak on the loudspeakers of an encoder with audio-
in and audio-out function.
Manual alarm recording
Select the check box to allow manual alarm recording.
Access VRM monitor
Select the check box to allow access to the VRM Monitor software.
Set reference image
Select the check box to allow updating the reference image in the Operator Client.
Set area selection for reference image
Select the check box to allow selecting the area in the camera image for updating the
reference image in the Operator Client.
Change password
Select the check box to allow a user of Operator Client to change the password for logging on.
Arm intrusion panel areas
Select the check box to allow a user of Operator Client to arm areas configured in an intrusion
panel that is part of your BVMS configuration.
Force arm intrusion panel areas
Select the check box to allow a user of Operator Client to force the arming of areas configured
in an intrusion panel that is part of your BVMS configuration.
Disarm intrusion panel areas
Select the check box to allow a user of Operator Client to disarm areas configured in an
intrusion panel that is part of your BVMS configuration.
Silence bells for intrusion panel areas
Select the check box to allow a user of Operator Client to switch off alarm sirens of areas
configured in an intrusion panel that is part of your BVMS configuration.
Bypass intrusion panel points
Select the check box to allow a user of Operator Client to change the state of a point
configured in an intrusion panel to the Point bypassed state. A bypassed point cannot send an
alarm. When the state is changed back to Point unbypassed, a pending alarm is sent if
available
Unlock intrusion panel doors
Select the check box to allow a user of Operator Client to unlock a door configured in an
intrusion panel.
Refer to
– Inactivity logoff, page 43
Main window > User groups > User Groups tab > > Operating permissions tab
> Priorities tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Priorities tab
Allows you to configure the timeout for explicit PTZ locking. You can set the priorities for PTZ
control and the display of incoming alarms.
Automatic popup behavior
Move the slider to adjust the priority value of Live Image window or Playback Image window.
This value is required for incoming alarms to decide whether this alarm is automatically
displayed in the Alarm Image window.
For example: If you move the slider for Live Image window to 50 and for the Playback Display
to 70 and an alarm comes in with a priority of 60, the alarm is only automatically displayed if
the user has Playback Display active. The alarm is not automatically displayed when the user
has Live Display active.
Refer to
– Configuring various priorities, page 348
Main window > User groups > User Groups tab > > Operating permissions tab
> User interface tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > User interface tab
Allows you to configure the user interface of 4 monitors used by Operator Client.
You can configure a multi monitor mode with up to 4 monitors. You set for every monitor what
is displayed on it, e.g. monitor 2 only displays Live Image panes or Monitor 1 and Monitor 2
use the 16:9 aspect ratio for HD cameras.
Control Monitor
Select the monitor which should be used as a control monitor.
Max. rows of image panes in playback
Select the maximum rows of Image panes displayed in the Playback Image window on the
Control monitor.
Alarm Monitor
Select the alarm monitor which can display either live and alarm content or only alarm
content.
Monitor 1 - 4
In the corresponding list of each monitor, select the required entry.
– For the Control monitor the entry Control is preselected and cannot be changed.
– For the Alarm monitor you can select one of the following entries:
– Live video and alarm content
– Alarm content only
– For the remaining monitors you can select one of the following entries:
– Live video only
– Map and document
– Two maps and document
– Fullscreen live video
– Quad live image
Max. rows of image panes
Select the maximum rows of Image panes displayed in the Image window on the appropriate
monitor.
Note: This option is only available for the following views:
– Control
– Alarm content only
Main window > User groups > Enterprise User Groups tab > > Server access
tab
You configure the server access on an Enterprise Management Server.
You enter the name of the Enterprise Account and its password for each Management Server
of your Enterprise System. This account is configured on each Management Server.
Management Server
Displays the name of the Management Server that you configured on this Enterprise
Management Server.
Network address
Displays the private IP address or DNS name of the Management Server.
Server Number
Displays the number of the Management Server. This number is used by a Bosch IntuiKey
keyboard to select the desired Management Server.
Access
Click to check when you want to grant access to the Management Server. This Management
Server is now an Enterprise Management Server.
Access
Type the name of the Enterprise Account that has been configured on the Management Server.
Enterprise Account Key
Click to display a dialog box for typing the key of the Enterprise Account that has been
configured on the Management Server.
Enterprise Account Password
Displays the descriptive text for this server.
Further columns are displayed if they have been added to the Server List.
Refer to
– Creating a group or account, page 341
– Creating an Enterprise System, page 89
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS User Groups page | en 333
Main window > User groups > User Groups tab > > Operating permissions tab
> Configuration permissions tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Configuration permissions tab
Allows you to configure various user permissions for the Configuration Client.
Permission to start the Configuration Client implies read-only access.
Logon Permissions
Select the check box to allow logon to Configuration Client application.
Device Tree
In this section you can specify the permissions on the Devices page. Select the check box for
the respective permission.
Maps and Structure
In this section you can specify the permissions on the Maps and Structure page. Select the
check box of the respective permission.
Schedules
In this section you can specify the permissions on the Schedules page. Select the check box
of the respective permission.
Cameras and Recording
In this section you can specify the permissions on the Cameras and Recording page. Select
the check box of the respective permission.
Events
In this section you can specify the permissions on the Events page. Select the check box of
the respective permission.
Alarms
In this section you can specify the permissions on the Alarms page. Select the check box of
the respective permission.
User Groups
In this section you can specify the permissions for configuring user groups. Select the check
box of the respective permission.
Notice!
i To select the Configure User Groups and LDAP server settings check box and the Configure
Users check box are mutually exclusive options for security reasons.
Menu commands
In this section you can specify the permissions for configuring menu commands. Select the
check box of the respective permission.
Reports
In this section you can specify the permissions for configuring reports. Select the check box of
the respective permission.
Main window > User groups > User Groups tab > > Operating permissions tab
> User group permissions tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > User group permissions tab
Allows you to assign in which user groups the users of a specific user group can add new
users.
Notice!
i You can only assign user group permissions to a user group, to which you have assigned the
permission to configure users before. You assign this permission on the Configuration
permissions page.
Notice!
i The users of a standard user group are not allowed to add new users to the Admin Group.
This check box is not active.
Refer to
– Configuration Permissions page, page 333
Main window > User groups > User Groups tab > > Security tab > Account
policies tab
or
Main window > User groups > Enterprise User Groups tab > > Security tab >
Account policies tab
Notice!
The Strong password policy setting is only applied to the users if the check box is selected in
i the corresponding user group.
We highly recommend to keep this setting to enhance the protection of your computer
against unauthorized access.
Notice!
If the maximum number of invalid logon attempts exceeds, the account is disabled.
i If the Account lockout duration check box is not selected, the account has to be enabled
manually.
If the Account lockout duration check box is selected, the account automatically becomes
enabled after the defined time period.
Notice!
The counter of invalid logon attempts resets to zero:
i After a successful login.
Or after the specified duration, if the Reset account lockout counter after check box is
selected.
Additional information
From BVMS 9.0 on the following Account policies settings apply as default:
– The Strong password policy check box is pre-selected.
– The Minimum password length check box is pre-selected. The default value is 10.
– The Maximum password age in days check box is not pre-selected. The default value is
90.
– The Number of used passwords in history check box is not pre-selected. The default
value is 10.
– The Maximum invalid logon attempts check box is not pre-selected. The default value is
1.
– The Disable offline client check box is not pre-selected.
From BVMS 10.0.1 on the following Account policies settings are selected by default for all
user groups:
– Maximum invalid logon attempts
– Account lockout duration
– Reset account lockout counter after
Notice!
When a password change on the Management Server occurs during the period when
Operator Client is offline, this password change is not propagated to this Operator Client.
i When Operator Client is online, the user must log on using the new password.
When Operator Client is offline, the user must again use the old password for logon. This is
not changed until a new configuration is activated and transferred to the Operator Client
workstation.
Notice!
i When a camera is called up for display in a monitor group with a workstation connected
Bosch Intuikey keyboard, and the workstation is offline, the keyboard does not send an error
tone.
– CompoundEventManager
– DecoderManager
– DeviceManager
– DomeCameraManager
– EventManager
– InputManager
– LicenseManager
– Logbook
– MatrixManager
– RecorderManager
– RelayManager
– ScheduleManager
– SendManager
– SequenceManager
– VirtualInputManager
– State overlays:
No state overlays of cameras, inputs or relays are available.
States of Operator Client
A BVMS Operator Client gives you a visual and textual feedback of its states.
Following Operator Client states are possible:
–
The Operator Client is connected to the Management Server.
–
The Operator Client is not connected to the Management Server. One reason can be a
physical disconnection from the Management Server to the network.
–
This state can only be displayed after a reestablished connection to the Management
Server. All affected functions are back, but the configuration of the Operator Client is
outdated due to a newer configuration available in the system. Log on again to update the
configuration.
–
This state icon is displayed when the Management Server has an earlier BVMS version
than the Operator Client workstation.
Device state overlay
The device states (recording dot, too noisy, too dark, ...) are processed by the Management
Server. On disconnection between Client and Server the states cannot be updated in the
Client. A new state overlay will give you a visual feedback that all device states are not
available at the moment. If the client has an established connection to the server again, the
state overlays are updated automatically.
– State unknown
The state overlay of a device in the Logical Tree or on a map when client is disconnected
from the Management Server computer.
Reasons for disconnection
Reasons for disconnection between Operator Client and Management Server can be:
i BVMS Viewer offers only basic features. Advanced features are included in BVMS
Professional. For detailed information about the different BVMS editions refer to
www.boschsecurity.com and the BVMS Quick Selection Guide: BVMS Quick Selection Guide.
When creating new user groups in Configuration Client the strong password policy setting is
enabled by default. If you do not set passwords for the new user accounts of the appropriate
user group, you cannot activate the configuration. The Password policy is violated dialog box
is displayed listing all users for whom no password has been set.
Refer to
– Account policies page, page 334
– User Group Properties page, page 321
– User Properties page, page 321
– Logon Pair Properties page, page 322
– Camera Permissions page, page 323
– Control Priorities page, page 324
– Copy User Group Permissions dialog box, page 325
– Decoder Permissions page, page 325
– Events and Alarms page, page 326
– LDAP Server Settings dialog box (Settings menu), page 117
– Credentials page, page 326
– Logical Tree page, page 327
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
– Server Access page, page 332
2. Click .
The New user group dialog box is displayed.
3. Type in the name and a description.
4. Click OK.
A new group is added to the corresponding tree.
5. Right-click the new user group and click Rename.
6. Enter the desired name and press ENTER.
Refer to
– User Group Properties page, page 321
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
2. Click .
The New enterprise user group dialog box is displayed.
3. Type in the name and a description.
4. Click OK.
The Enterprise User Group is added to the corresponding tree.
5. Right-click the new Enterprise group and click Rename.
6. Enter the desired name and press ENTER.
7. On the Operating permissions page, configure the operating permissions and server
access for the configured Management Server computers as required.
Refer to
– User Group Properties page, page 321
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
– Server Access page, page 332
Notice!
i At least one device must be configured in the Device Tree before you can add an Enterprise
Account.
You perform the task of creating an Enterprise Account on a Management Server. Repeat this
task on each Management Server that is a member of your Enterprise System.
You create an Enterprise Account to configure the device permissions for an Operator Client
using an Enterprise System.
2. Click .
The New enterprise account dialog box is displayed.
3. Type in the name and a description.
4. The User must change password at next logon check box is pre-selected for all newly
created user accounts.
Type the key according to the key policy rules and confirm this key.
5. Click OK.
A new Enterprise Account is added to the corresponding tree.
6. Right-click the new Enterprise Account and click Rename.
7. Enter the desired name and press ENTER.
8. On the Device permissions page, configure the credentials and the device permissions as
required.
Refer to
– Strong password policy , page 340
– Credentials page, page 326
– Logical Tree page, page 327
– Events and Alarms page, page 326
– Control Priorities page, page 324
– Camera Permissions page, page 323
– Decoder Permissions page, page 325
Main window > User groups > Enterprise User Groups tab
You create a user as a new member of an existing standard user group or Enterprise User
Group.
Notice!
i A user who wants to operate a Bosch IntuiKey keyboard connected to a decoder, must have a
number-only user name and password. The user name can have maximum 3 numbers; the
password can have maximum 6 numbers.
To create a user:
1. Select a group and click or right-click the desired group and click New user.
A new user is added to the User groups tree.
2. Right-click the new user and click Rename.
3. Enter the desired name and press ENTER.
4. On the User Properties page, type the user name and a description.
5. The User must change password at next logon check box is pre-selected for all newly
created user accounts.
Type the password according to the password policy rules and confirm this password.
6. Click Apply to apply the settings.
Refer to
– User Properties page, page 321
– Strong password policy , page 340
– User Groups page, page 319
Main window > User groups > Enterprise User Groups tab
You can create a dual authorization for a standard user group or for an Enterprise User Group.
For Enterprise Access, a dual authorization is not available.
You select two user groups. The members of these user groups are the members of the new
dual authorization group.
To create a dual authorization group:
1. Click .
The New dual authorization group dialog box respectively the New enterprise dual
authorization group dialog box is displayed.
2. Type in a name and a description.
3. Click OK.
A new dual authorization group is added to the corresponding tree.
4. Right-click the new dual authorization group and click Rename.
5. Enter the desired name and press ENTER.
Refer to
– Adding a logon pair to dual authorization group, page 344
– User Group Properties page, page 321
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
Main window > User groups > User Groups tab > New dual authorization
group
Main window > User groups > Enterprise User Groups tab > New enterprise
dual authorization group
To add a logon pair to a dual authorization group:
1. Select the desired dual authorization group and click or right-click the group and
click New logon pair.
The appropriate dialog box is displayed.
2. Select a user group in each list.
The users of the first user group are the users that must log on in the first dialog box for
logging on, the users of the second user group confirm the logon.
It is possible to select the same group in both lists.
3. For each group, select Force dual authorization if required.
When this check box is selected, each user of the first group can only log on together
with a user of the second group.
When this check box is cleared, each user of the first group can log on alone but he only
has the access rights of his group.
4. Click OK.
A new logon pair is added tot he appropriate dual authorization group.
5. Right-click the new logon pair and click Rename.
6. Enter the desired name and press ENTER
Refer to
– Creating a dual authorization group, page 344
– Logon Pair Properties page, page 322
Main window > User groups > User Groups tab Admin Group
Allows you to add new admin users to the Admin Group, to rename admin users and to
remove them from the Admin Group.
1. Click or right-click the Admin Group and click Add new user.
A new admin user is added to the Admin Group.
2. On the User Properties page, type the user name and a description.
3. The User must change password at next logon check box is pre-selected for all newly
created user accounts.
Type the password according to the password policy rules and confirm this password.
4. Click Apply to apply the settings.
Refer to
– User Groups page, page 319
– User Properties page, page 321
– Strong password policy , page 340
Main window > User groups > User Groups tab > > Operating permissions tab
> User group properties tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Enterprise user group properties tab
You configure LDAP groups in standard user groups or Enterprise User Groups.
To select an associated LDAP group:
1. Click the Search for groups button.
2. In the Associated LDAP group list, select the respective LDAP group.
For detailed information on the various fields, follow the link to the appropriate application
window below.
Refer to
– LDAP Server Settings dialog box (Settings menu), page 117
– User Group Properties page, page 321
Main window > User groups > User Groups tab > > Operating permissions tab
> User group properties tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Enterprise user group properties tab
You can limit the members of a user group or Enterprise User Group to log on to their
computers at specified time periods.
Main window > User groups > User Groups tab > > Operating permissions tab
> User group properties tab
or
Main window > User groups > Enterprise User Groups tab > > Operating
permissions tab > Enterprise user group properties tab
– You can configure operating permissions like Logbook access or user interface settings.
– You cannot change these settings for a default user group.
– You configure operating permissions in standard user groups or Enterprise User Groups.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
For detailed information on the various fields, follow the link to the appropriate application
window below.
Refer to
– User Group Properties page, page 321
– Operator Features page, page 327
– Priorities page, page 330
– User Interface page, page 331
– Server Access page, page 332
Main window > User groups > User Groups tab > Device permissions tab
or
Main window > User groups > Enterprise Access tab > Device permissions tab
You can set the permissions for all devices of the Logical Tree independently.
After you have moved permitted devices to a folder that is not permitted for this user group,
you must set the permissions for the folder to grant access to its devices.
– You cannot change these settings for a default user group.
– You configure device permissions in standard user groups or Enterprise Accounts.
For detailed information on the various fields, see the Online Help for the appropriate
application window.
For detailed information on the various fields, follow the link to the appropriate application
window below.
Refer to
– Logical Tree page, page 327
– Events and Alarms page, page 326
– Control Priorities page, page 324
– Camera Permissions page, page 323
– Decoder Permissions page, page 325
Main window > User groups > Enterprise User Groups tab
or
Refer to
– Control Priorities page, page 324
– Priorities page, page 330
Main window > User groups > Enterprise User Groups tab
or
2. Click .
The Copy User Group Permissions dialog box is displayed.
3. Select the appropriate permissions and the appropriate target group or account.
4. Click OK. The group permissions of this group are copied to the other group or account.
The dialog box is closed.
Refer to
– Adding an encoder to a VRM pool, page 351
– Adding a live only encoder, page 216
– Adding a local storage encoder, page 216
– Configuring a fire event, page 353
– Configuring a fire alarm, page 353
Main window > Devices > Expand > Expand > Expand >
or
Main window > Devices > Expand > Expand > Expand >
or
Refer to
– Adding a device, page 124
1. In the Device Tree right-click and click Scan for Local Storage Encoders.
The BVMS Scan Wizard dialog box is displayed.
2. Select the desired check boxes for the devices that you want to add.
3. Click Next >>.
The Authenticate Devices dialog box of the wizard is displayed.
4. Type in the password for each device that is protected by a password.
Password check is performed automatically, when you do not enter a further character in
the password field for a few seconds or you click outside the password field.
If the passwords of all devices are identical, you can enter it in the first Password field.
Then right-click this field and click Copy cell to column.
28 Troubleshooting
This chapter contains information on how to handle known problems using BVMS
Configuration Client.
Problems during installation
Setup stops with a message OPC Server files cannot be Uninstall OPC Core
that OPC Server cannot be overwritten. Components Redistributable
installed. and restart BVMS Setup.
BVMS displays the wrong Windows is not switched to Configuring the language of
language. the desired language. Configuration Client, page 74
or
Configuring the language of
Operator Client, page 74
The logon dialog box of Although you have changed Configuring the desired
Operator Client shows the the language for language in Windows, page
wrong language. Operator Client in 357
Configuration Client, the
language for the logon dialog
box of Operator Client
depends on the Windows
language.
The Bosch IntuiKey keyboard The connection to the Reestablishing the connection
triggers an alarm and the workstation is lost. Either the to a Bosch IntuiKey keyboard,
softkey display displays Off cable is damaged or page 357
Line. unplugged, or the workstation
has been reset.
Feedbacks occur when using In the recording control of Change the setting in the
a microphone for Intercom your soundcard the configuration file of
functionality. microphone must be Operator Client to
selected, not the stereo mix microphone.
(or something else).
Operator Client checks its
configuration file during
startup and changes the
settings in the recording
control accordingly. This
configuration file contains a
default entry which might not
match your system
configuration. This setting is
restored during each start of
Operator Client.
Configuration Client crashes. If there are many cameras See Reducing the number of
configured in an Allegiant file Allegiant cameras, page 357.
which are not connected to
Bosch Video Management
System, you can reduce this
number. This avoids
unnecessary system load.
Support
Access our support services at www.boschsecurity.com/xc/en/support/.
Bosch Security and Safety Systems offers support in these areas:
– Apps & Tools
– Building Information Modeling
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Troubleshooting | en 357
– Warranty
– Troubleshooting
– Repair & Exchange
– Product Security
Management TCP 5395 Configuration Client, Operator Client User preferences, File
Server transfer
VRM UDP 1757 Management Server, Operator Client Scan Target Broadcast
VRM UDP 1800 Management Server, Operator Client Scan Target Multicast
Mobile Video TCP 80 Management Server, Operator Client, Access via http
Service Configuration Client, HTML Client,
Mobile Apps
Mobile Video TCP 443 Management Server, Operator Client, Access via https
Service Configuration Client, HTML Client,
Mobile Apps
Mobile Video TCP 5382 Mobile Video Service mobile provider Media stream
Service
transcoder
Mobile Video TCP 5385 Mobile Video Service mobile provider Media stream
Service
transcoder
Mobile Video TCP 5384 HTML Client, Mobile Apps Media stream
Service mobile
provider
Mobile Video TCP 5385 Mobile Video Service mobile provider Media stream
Service
transcoder
Bosch Video TCP 1757 VRM Configuration Client Scan Target Broadcast
Streaming
Gateway
Bosch Video TCP 1800 VRM Configuration Client Scan Target Multicast
Streaming
Gateway
ONVIF camera TCP 443 Management Server, VSG, Access via https
Configuration Client,
Operator Client
Encoder ports
Configure port forwarding at the connected router for this device.
Encoder TCP 1756 Decoder, Management Server, VRM, Via RCP+, if secure
Operator Client, Configuration Client, connection is not
BVMS SDK Application enabled
Encoder TCP 443 Operator Client, BVMS SDK Access via https, if
Application, VSG, VRM secure connection is
enabled
FTP TCP 21
DVR ports
Configure port forwarding at the connected router for this device.
You can enable logging for ONVIF events for example when you encounter problems with
receiving BVMS events. Logging then helps you to find the issue.
To enable logging:
1. Open the file %programfiles%\Bosch\VMS\AppData\Server\CentralServer
\BVMSLogCfg.xml in an appropriate editor, for example Notepad. Run the Notepad
application as administrator.
2. Navigate to the line containing the following string:
Add logging for onvif events of a device by network address
The commented lines contain a brief explanation.
3. As the logger name, type in OnvifEvents.<Networkaddress>.
Type in only OnvifEvents to log the events for all ONVIF devices.
4. As level value, type in DEBUG for all incoming and outgoing events.
Type in INFO for all outgoing events.
Type in WARN or ERROR to disable.
Note: The activation might require a restart of the central server.
The following lines show an example for logging the events from device 172.11.122.22 with all
outgoing and incoming events:
<logger name="OnvifEvents.172.11.122.22" additivity="false">
<level value = "DEBUG"/>
<appender-ref ref="OnvifRollingFileAppender"/>
</logger>
Refer to
– Starting ONVIF Camera Event Driver Tool from Configuration Client, page 207
– Configuring an ONVIF mapping table, page 235
– ONVIF event mapping, page 42
Glossary
Alarm bypass/unbypass
Event that is configured to create an alarm. This is To bypass a device means to ignore any alarms
a particular situation (motion detected, doorbell that it may generate, usually for the duration of
rung, signal lost, etc.) that requires immediate some extenuating circumstances such as
attention. An alarm can display live video, maintenance. To unbypass means to stop ignoring
playback video, an action plan, a web page, or a them.
map. CCL emulation
Alarm Image window Emulation of the Command Console Language
Image window for displaying one or more Alarm used for controlling an Allegiant matrix. You can
Image panes. use this set of commands to switch a BVMS IP
Alarm List camera / encoder to a BVMS IP decoder. You
cannot control old analog cameras or the Allegiant
Window in Bosch Video Management System used
matrix itself directly.
to display a list of active alarms.
Command Script
Allegiant
Macro, that the administrator can program to
Bosch family of analog matrix switching systems.
build an automatic action like positioning a PTZ
ANR camera or send E-mails. For that functionality
Automated Network Replenishment. Integrated Bosch Video Management System provides a
process that copies missing video data from a specific set of commands. Command Scripts are
video transceiver to the network video recorder divided into Client Scripts and Server Scripts.
after a network failure. The copied video data Client Scripts are used on client workstations to
exactly fills the gap that occurred after the execute certain tasks that can run on a client
network failure. Hence the transceiver needs any workstation. Server Scripts are executed
kind of local storage. The recording capacity on automatically by an event that was triggered in the
this local storage is calculated with the following system. They get arguments provided by the event
formula: (network bandwidth x estimated network like date and time. A Command Script can consist
downtime + safety margin) x (1 + 1/backup of several scriptlets. You can create a Command
speed). The resulting recording capacity is Script using the following scripting languages: C#,
required because the continuous recording must VB.Net. Command Scripts are executed in
continue during the copy process. response to events or alarms automatically
area according to a schedule (Server Scripts only),
manually from the Logical Tree, or manually from
A group of detection devices connected to the
icons or on maps.
security system.
Compound Event
ATM
Combination of different events. The combination
Automatic Teller Machine
uses Boolean expressions, i.e. AND and OR. You
B-frame
can combine only state changes, for example the
Bidirectional frame. Part of a video compression change of a connection state to disconnected or
method. the activation of a schedule.
BIS debounce time
Building Integration System Time period starting with the occurrence of an
Bosch ATM/POS Bridge event. During this time period usually no other
event of the same type is accepted. This prevents
Receives string via serial cable / COM interface
for example that a switching sensor creates a
and forwards these strings via Ethernet cable
large number of events. For events with several
(TCP/IP). The strings are usually POS data or
states, you can configure a different priority
transactions from ATMs.
2021.04 | V 1 | Configuration Client Configuration Manual Bosch Security Systems B.V.
BVMS Glossary | en 365
Event I-frame
A circumstance or state that is linked to an alarm Intra frame. Part of a video compression method.
and/or an action. Events can arise from many Contains the information of a complete image,
sources such as cameras, archivers, directories, unlike P- or B-frames that contain information of
digital inputs, etc. They can include start- the changes compared to the previous or next
recording states, loss of signal states, disk full frame.
messages, user logons, digital input triggers, etc. Image pane
Failover VRM Used for displaying live or recorded video of a
Software in the BVMS environment. Takes over single camera, a site map, a document, a
the task of the assigned Primary VRM or sequence, a monitor group, an external
Secondary VRM in case of failure. application or a map viewport.
GSM Image pane bar
Global System for Mobile Communication. Toolbar of an Image pane.
Standard for digital mobile phones. Image window
H.264 Container for Image panes, structured by an
Standard for encoding (compressing) digital audio Image window pattern.
and video for multimedia applications. This Instant playback
standard includes different profiles that can be
Plays the recorded image of the selected camera
manufacturer-dependent. The following profiles
in an Image pane on the live screen. The start time
are available: Baseline, Baseline+, Main Profile.
(number of seconds in the past, or rewind time)
Baseline (not used in Bosch Video Management
can be configured.
System) supports 2 CIF. Baseline+ supports 4 CIF
and provides a better image quality than Baseline. Intercom functionality
Main Profile supports 4 CIF and provides a high Used to talk on the loudspeakers of an encoder.
efficient compression algorithm called CABAC This encoder must have audio-in and audio-out.
(Context-adaptive binary arithmetic coding). This The Intercom functionality can be granted per
serves for high quality encoding for storage. user group.
H.265 intrusion control panel
H.265 is a video compression standard defined by Generic name for the core device in a Bosch
ISO2 and ITU3 and ratified on the 29th of intrusion (burglary) security system. Keypads,
October, 2014. It is seen as the successor of modules, detectors, and other devices connect to
MPEG-4 AVC (Advanced Video Codec), also called the control panel.
H.264, to address the compression of resolutions IPS
from 4K and ultra HD up to 36 megapixels.
Images per second. Number of video images
Hotspot transmitted or recorded per second.
Mouse sensitive icon on a map. Hotspots are IQN
configured in Configuration Client. Hotspots can
iSCSI Qualified Name. The initiator name in IQN
be for example cameras, relays, inputs. The
format is used for provisioning addresses for both
operator uses it for localizing and selecting a
iSCSI initiators and targets. With IQN mapping
device in a building. If configured, hotspots can
you create an initiator group that controls the
display a blinking background color when a
access to the LUNs on an iSCSI target and you
specific state event or alarm occurs.
write the initiator names of each encoder and the
VRM into this initiator group. Only the devices
whose initiator names are added to an initiator
group are permitted to access a LUN. See LUN
and see iSCSI.
iSCSI LUN
Internet Small Computer System Interface. Logical Unit Number. Used in the iSCSI
Protocol that manages storage via a TCP/IP environment to address an individual disk drive or
network. iSCSI enables access to stored data a virtual partition (volume). The partition is part of
from everywhere in the network. Especially with a RAID disk array (the iSCSI target).
the advent of Gigabit Ethernet, it has become Management Server
affordable to attach iSCSI storage servers simply
BVMS server managing devices.
as remote hard disks to a computer network. In
iSCSI terminology, the server providing storage Map files
resources is called an iSCSI target, while the BVMS supports the following map files: PNG and
client connecting to the server and accessing the JPG.
resources of the server is called iSCSI initiator. Map viewport
JPEG A map viewport is a region of the screen used to
Joint Photographic Expert Group display a defined part of the global geolocation
JPEG map.
number. Port numbers are from 0 to 65535. Ports of Operator Client can access Management Server
1 to 1023 are reserved for use by certain or Enterprise Management Server and their
privileged services. For the HTTP service, port 80 devices via remote access.
is defined as a default and it does not have to be Rewind time
specified in the Uniform Resource Locator (URL).
Number of seconds when an Image pane is
Port mapping switched to instant playback.
Port mapping allows remote computers to ROI
connect to a specific computer or service within a
Region of Interest. Intended use of ROI is to save
private local area network (LAN).
bandwidth when zooming into a section of the
POS camera image with a fixed HD camera. This
Point of sale. section behaves like a PTZ camera.
Primary VRM RTP
Synonym for VRM. Real-Time Transport Protocol; a transmission
PTZ camera protocol for real-time video and audio
Skimming UDP
Sabotage of a foyer card reader. A skimming User Datagram Protocol. A connectionless
device reads the card data of the magnetic stripe protocol used to exchange data over an IP
without the knowledge of the cardholder. network. UDP is more efficient than TCP for video
SNMP transmission because of lower overhead.
Index
A aspect ratio 16/9 331
Access control systems 162 ATM POS device 124
access denied Audio Intercom functionality 329
Allegiant CCL emulation 158 automatic alarm popup behavior 41
accessing the Help 14 automatic display of alarms 41
acquire PTZ control 348 automatic logoff 120
activate 95 automatic recording mode 179
Bosch Video Management System 79 automatic relogon 95
previous configuration 96 automatic restart 95
activation 98
B
configuration 95 basic configuration 192
delayed 95, 107 blinking device icons 297, 317
add Bosch Allegiant input alarm 101 Bosch IntuiKey keyboard 51, 52, 55, 125, 136, 144,
add Bosch ATM/POS bridge 100 155
add BVIP decoder 140, 181, 209 Bosch Script API help 92
add BVIP encoder 140, 141, 181, 209, 218 Bosch Video Management System 16
add encoder 177, 186, 215, 351 activate 79
add pool GUI language 355
VRM 175 licensing 79
add text data to continuous recording 300 Online Help 14
add unmanaged site 211, 213 overview 16
add video analytics device 164 BVIP decoder 85, 217
add VRM 170 add 140, 181, 209
alarm map 302 BVIP device
alarm priority 348 password 142, 215, 222
alarm recording 302, 315, 316 Web page 215
alarm recording mode 288 BVIP encoder 85, 217
alarm sequence 302, 315 add 140, 181, 209
alarms BVIP encoder:add 141, 218
sort order 302 bypass
Allegiant point 329, 330
CCL emulation 125, 159
control channel 59, 60
C
CABAC 287
firmware version 51, 52
camera round 252, 261, 262
Network Host program 59
camera sequence 252, 261, 262
PTZ camera 280
CCL emulation 159
Satellite System 60
CCTV keyboard 155
too many cameras 357
connection loss 356
Allegiant CCL commands 61
change IP address 109, 124, 139, 225
Allegiant CCL emulation 159
change network address 139, 225
access denied 158
change password 142, 175, 215, 222, 322
Allegiant CCL Emulation page 158
change pool 224
Allegiant file 357
chattering sensors 314
Allegiant matrix 124, 133
Client Command Script
all-in-one system 63
alarm accepted 306
analog matrix 133
executed on startup 93, 94, 137
analog monitor group 120, 125
CLL commands 159
ANR 87, 225, 280
Forensic Search 102, 136, 137, 138 LDAP user groups 119, 321, 346
licensing
G
global alarm settings 314 Bosch Video Management System 79
global default password 73, 95, 108 Config Wizard 73
GUI language 355 Stratus server 79
link to map 263
H Logbook database 120
H.264 287
connection string 120
H.264 deblocking filter 287
logging 173, 311, 314
HD cameras 331
logging ONVIF events 363
help 14, 15
Logical Tree 254, 306
holidays 275
LUNS
hotspots 252
larger than 2 TB 180
HTML files 252
I M
malfunction relay 268
I/O modules 125
Management Server 20, 23, 336
import
manual recording 43, 302, 315
Command Script 93
map
resource files 255
blinking hot spots 297, 317
inactivity 120
map link 263
Independent Operator Client 336
map viewport 265
initial camera 146
Map-based tracking assistant 268
Intercom functionality 329
maps 252
interface settings
menu commands 104
VIP XD 144
MIC IP 7000 354
intrusion panel 161
Mobile Video Service 63, 160
IntuiKey keyboard 155
monitor group 145, 146, 302, 307
IP address
add 145
change 109, 124, 139, 225
initial camera 146
duplicates 108
OSD 146
iPad 159, 160
quad view 146
iPhone 159, 160
single view 146
IQN mapping 192
startup camera 146
iSCSI device 192
MOV 328
iSCSI storage pool 169, 188
move device 195, 205, 223
iSCSI storage system 188
multi monitor mode 331
K multicast 202
KBD Universal XF keyboard 51, 125, 136 multi-select 254, 255
L N
language 355 network address
Configuration Client 119 change 139, 225
Operator Client 321 network monitoring device 124
large LUN 180, 184, 190, 196 new DiBos devices 131, 132
Large LUNs 180 no password 95
LDAP group 119, 346 NVR 20
LDAP user 321
O
offline 322, 336
Offline Mode 336
online application Help 14
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
376 en | Index BVMS
T
Target data rate 286
time server 87
time synchronization 87
time zone 211, 212
too many Allegiant cameras 357
transcoding service 159, 160
trigger text data recording 316
U
UHD cameras 138
unreliable network 159
update
device capabilities 85, 217
user
delete 322
remove 322
user event button 311, 312
user groups 319, 321
V
verify authenticity 220
video analytics 163
Video Streaming Gateway 124
VIDEOJET 7000 connect 354
viewing modes of panoramic camera 44
VIP X1600 XFM4 287
VIP XD 51
half-duplex mode 144
interface settings 144
quad view 146
virtual input 124
VPN 76
VRM
add 170
add pool 175
Failover 28, 126, 175
pool 175, 224
Primary 28, 126, 171
Primary Failover 175
Redundant 28, 126, 176
Secondary 28, 126, 171
Secondary Failover 175
VRM 3.50 178
VRM storage pool 169, 188
Bosch Security Systems B.V. Configuration Manual 2021.04 | V 1 | Configuration Client
378 | Index BVMS
202104291953