Camera Browser Interface
Bosch IP Cameras FW5
en Software manual
1Browser connection
A computer with Microsoft Internet Explorer is used to receive live images from the camera, control the camera, and replay stored sequences. The camera is configured over the network using the browser.
1.1System requirements
???Network access (Intranet or Internet)
???Microsoft Internet Explorer version 7.0 or higher
???Screen resolution at least 1024 ?? 768 pixels
???16- or
???Sun JVM installed
The Web browser must be configured to enable Cookies from the IP address of the unit.
In Windows Vista, deactivate protected mode on the Security tab under Internet Options.
To play back live video images, an appropriate ActiveX must be installed on the computer. If necessary, install the Bosch Video Client.
1.2Establishing the connection
The camera must have a valid IP address to operate on your network and a compatible subnet mask. The default address
1.Start the Web browser.
2.Enter the IP address of the camera as the URL.
3.During initial installation, confirm any security questions that appear.
Note:
If you do not connect, the camera may have reached its maximum number of connections. Depending on the device and network configuration, each camera can have up to 25 web browser connections, or up to 50 connections via Bosch Video Client or Bosch Video Management System.
1.2.1Password protection in camera
A camera offers the option of limiting access across various authorization levels. If the camera is
1.Enter the user name and the associated password in the appropriate fields.
2.Click OK. If the password is correct, the desired page is displayed.
1.3Protected network
If a RADIUS server is used for network access control (802.1x authentication), the camera must be configured first. To configure the camera, connect it directly to a computer using a network cable and configure the two parameters, Identity and Password. Only after these have been configured can communication with the camera via the network occur.
2System Overview
When a connection is established, the Livepage is initially displayed. The application title bar displays three items:
LIVEPAGE, RECORDINGS, SETTINGS.
Note:
The RECORDINGS link is only visible if a storage medium has been configured for recording. (With VRM recording this option is not active.)
2.1Livepage
The LIVEPAGE is used to display the live video stream and control the camera.
2.2Recordings
The RECORDINGS page is used for playing back recorded sequences.
2.3Settings
The SETTINGS page is used to configure the camera and the application interface.
3Operation via the browser
3.1Livepage
After the connection is established, the Livepage is initially displayed. It shows the live video image on the right of the browser window. Depending on the configuration, various text overlays may be visible on the live video image.
Other information may also be shown next to the live video image. The items shown depend on the settings on the
LIVEPAGE Functions page.
Figure 3.1 Livepage
3.1.1Image selection
Click a tab below the video image to display a camera image stream.
3.1.2Status icons
Various overlays in the video image provide important status information. The overlays provide the following information:
Decoding error
The frame might show artefacts due to decoding errors. If other frames reference this frame, they might also show decoding errors but won???t be marked with the icon.
Alarm flag
Shown on a media item to indicate an alarm.
Communication error
A communication error, such as a connection failure to the storage medium, a protocol violation or a timeout, is indicated by this icon. An automatic reconnection procedure is started in the background to recover from this error.
Gap
Indicates a gap in the recorded video.
Watermark flag
Watermark is set on media item.
Invalid watermark flag
Indicates that the watermark is not valid.
Motion flag
Indicates that motion is dectected.
Storage discovery
Indicates that recorded video is being retrieved.
3.1.3View Control
For cameras where PTZ control is possible, the View Control panel is activated.
Pan and tilt
To control the pan and tilt of PTZ cameras:
???Click and hold the up or down arrows to tilt.
???Click and hold the left or right arrows to pan.
???Click and hold the center area to control both.
Move the mouse cursor over the video image; additional options for controlling peripherals are displayed with the mouse cursor.
Zoom, focus, and iris
To control the zoom, focus, and iris of PTZ cameras:
1.Click and hold to zoom out; click and hold to zoom in.
2.Click and hold for far focus; click and hold for near focus.
3.Click and hold to close the iris; click and hold
to open the iris.
To move the camera to a
To store the current position of the camera in a
1.Position the camera.
2.Enter a
3.Click Set.
3.1.4Digital I/O
Depending on the configuration of the unit, the alarm input and the relay output are displayed next to the camera image.
The alarm symbol is for information and indicates the input status of the alarm input:
???Active 1 = Symbol lights
???Active 0 = Symbol not lit.
The camera relay allows the operation of an external device (for example, a light or a door opener).
??? To operate, click the relay symbol.
??? The symbol is red when the relay is activated.
3.1.5System Log / Event Log
The System Log field contains information about the operating status of the camera and the connection.
Events such as the triggering or the end of alarms are shown in the Event Log field.
???To view, filter and save these messages to a file, click in the top
???To clear the log, click in the top
3.1.6Saving snapshots
Individual images from the video sequence that is currently being shown on the Livepage can be saved in JPEG format on the computer's hard drive.
???The storage location depends on the configuration of the camera.
3.1.7Recording video sequences
Sections of the video sequence that is currently being shown on the Livepage can be saved on the computer's hard drive. The sequences are recorded at the resolution specified in the encoder configuration. The storage location depends on the configuration of the camera.
1.Click the recording icon to record video sequences.
???Saving begins immediately. The red dot on the icon indicates that a recording is in progress.
2.Click the recording icon again to stop recording.
Play back saved video sequences using the Player from
Bosch Security Systems.
3.1.8Running recording program
The hard drive icon below the camera images on the Livepage changes during an automatic recording.
The icon lights up and displays a moving graphic to indicate a running recording. If no recording is taking place, a static icon is displayed.
3.1.9Audio communication
Audio can be sent and received via the Livepage if the active monitor and the remote station of the camera support audio.
1.Press and hold the F12 key on the keyboard to send an audio signal to the camera.
2.Release the key to stop sending audio.
All connected users receive audio signals sent from the camera but only the user who first pressed the F12 key can send audio signals; others must wait for the first user to release the key.
3.1.10Processor load
When accessing the camera with a browser, the processor load and network information is available in the upper right of the window next to the Bosch logo.
Move the mouse cursor over the icons to display numerical values. This information can help with problem solving or when fine tuning the device.
3.2Recordings page
Click Recordings to access the Recordings page from the Livepage or Settings page. The Recordings link is only visible if a direct iSCSI or microSD card has been configured for recording. (With VRM recording this option is not active.)
Selecting Recordings
All saved sequences are displayed in a list. A track number is assigned to each sequence. Start time and stop time, recording duration, number of alarms, and recording type are displayed. To play back recorded video sequences:
1.Select Recording 1 or 2 in the
2.Use the arrow buttons to browse the list.
3.Click a track. The playback for the selected sequence starts.
Export to FTP
Click Export to FTP to send the current track to the FTP server. If required, change the times within the selected range.
Note:
The FTP server address is set on the Network/FTP Posting page.
3.2.1Controlling playback
The time bar below the video image allows quick orientation. The time interval associated with the sequence is displayed in the bar in gray. A green arrow above the bar indicates the position of the image currently being played back within the sequence.
The time bar offers various options for navigation in and between sequences.
???Change the time interval displayed by clicking the plus or minus icons. The display can span a range from two months to a few seconds.
???If required, drag the green arrow to the point in time at which the playback should begin.
???Red bars indicate the points in time where alarms were triggered. Drag the green arrow to navigate to these points quickly.
Control buttons
Control playback by means of the buttons below the video image. The buttons have the following functions:
Start/Pause playback
Jump to start of active sequence or to previous sequence
Jump to start of the next video sequence in the list
Slide control
Select the playback speed using the speed regulator:
.
Bookmarks
You can set markers in a sequence and jump to these directly. These bookmarks are indicated as small yellow arrows above the time interval. Use the bookmarks as follows:
Jump to the previous bookmark
Set bookmark
Jump to the following bookmark
Bookmarks are only valid while in the Recordings page; they are not saved with the sequences. All bookmarks are deleted when you leave the page.
4Settings Overview
4.1Configuration Menu
The settings page provides access to the configuration menu which contains all the unit's parameters arranged in groups.
There are two options for configuring the unit or checking the current settings:
???Basic Mode
???Advanced Mode
In Basic Mode the most important parameters are arranged in seven groups. This allows you to change the basic settings with just a few entries and then put the device into operation.
Advanced Mode is recommended only for expert users or system support personnel. You can access all device parameters in this mode. Settings that affect the fundamental functionality of the device (such as firmware updates) can only be changed in this mode.
4.2Settings
Navigation
To view the current settings:
1.Click the Basic Mode menu or the Advanced Mode menu to expand it.
2.For the Advanced Mode menu, click a menu
3.Click a
Making Changes
You can change the settings by entering new values or by selecting a predefined value from a list field.
Note:
When entering names do not use any special characters, for example &. Special characters are not supported by the internal recording management system.
Saving changes
After making changes in a window, click Set to send the new settings to the device and save them there.
Clicking Set saves only the settings in the current window. Changes in any other windows are ignored.
Click SETTINGS in the applications title bar to close the window without saving the changes made.
Note:
All settings are backed up in the device memory so they are not lost even if the power fails. The exception is the time settings, which are lost after 1 hour without power if no central time server is selected.
5Menu Trees
5.1Basic Mode menu tree
The Basic Mode configuration menu allows a set of basic camera parameters to be configured.
Basic Mode
>Device Access
>Date/Time
>Network
>Encoder
>Audio
>Recording
>System Overview
5.2Advanced Mode menu tree
The advanced mode configuration menu contains all camera parameters that can be configured.
Advanced Mode
6Basic Mode
6.1Device Access
6.1.1Naming
Enter a unique name to assist in identification. This name simplifies the management of multiple devices in more extensive systems.
The name is used for remote identification, for example, in the event of an alarm. Choose a name that makes it as easy as possible to identify the location unambiguously.
6.1.2Password
A password prevents unauthorized access to the device. The device has three authorization levels: service, user, and live.
???service is the highest authorization level. Entering the correct password gives access to all the functions of the camera and allows all configuration settings to be changed.
???user is the middle authorization level. This user can operate the device, play back recordings, and also control a camera but cannot change the configuration.
???live is the lowest authorization level. It can only be used to view the live video image and switch between the different live image displays.
You can define and change a password for each authorization level if you are logged in as service or if the camera is not password protected.
Use the various authorization levels to limit access. Proper password protection is only guaranteed if all higher authorization levels are also protected with a password. For example, if a live password is assigned, a service and a user password should also be set. When assigning passwords, always start from the highest authorization level, service, and use different passwords.
Password
Define or change a separate password for each level. Enter the password (19 characters maximum) for the selected level.
Confirm password
The new password is only saved after clicking Set. Therefore, click Set immediately after entering and confirming the password, even if assigning a password at another level.
6.2Date/Time
Device date, time and zone
If there are multiple devices operating in the system or network, it is important to synchronize their internal clocks. For example, it is only possible to identify and correctly evaluate simultaneous recordings when all devices are operating on the same time. Device time, date and time zone are shown.
???Click Sync to PC to apply the system time from your computer to the device.
Time server IP address
The camera can receive the time signal from a time server using various time server protocols and then use it to set the internal clock. The device polls the time signal automatically once every minute.
???Enter the IP address of a time server.
Time server type
Select the protocol that is supported by the selected time server. It is recommended that you select the SNTP server protocol. This protocol provides high accuracy and is required for special applications and future function extensions. Select Time server if the server uses the RFC 868 protocol.
Note:
It is important that the date/time is correct for recording. An incorrect date/time setting could prevent correct recording.
6.3Network
Use the settings on this page to integrate the device into a network. Some changes only take effect after a reboot. In this case, the Set button changes to Set and Reboot.
1.Make the desired changes.
2.Click Set and Reboot.
???The device is rebooted and the changed settings are activated. If the IP address, subnet mask, or gateway address is changed, then the device is only accessible under the new addresses after the reboot.
DHCP
If the network has a DHCP server for dynamic IP address allocation, set this parameter to On to activate the automatic acceptance of
For certain applications, the DHCP server must support the fixed assignment between IP address and MAC address, and must be appropriately set up so that, once an IP address is assigned, it is retained each time the system is rebooted.
IP address
Enter the desired IP address for the camera. The IP address must be valid for the network.
Subnet mask
Enter the appropriate subnet mask for the set IP address.
Gateway address
Enter the IP address of the gateway to establish a connection to a remote location in a different subnet. Otherwise, this field can remain empty (0.0.0.0).
6.4Encoder
Select a profile for encoding the video signal on stream 1 (this is not a selection of the recording profile).
When a profile is selected, its details are displayed.
6.5Audio
Switch the camera audio On or Off. Use the slider to adjust the level.
6.6Recording
Record the images from the camera to a storage medium. For
Storage medium
1.Select the required storage medium from the list.
2.Click Start to start recording or Stop to end recording.
6.7System Overview
This page provides general information on the hardware and firmware system, including version numbers. No items can be changed on this page but they can be copied for information purposes when troubleshooting.
7Advanced General Settings
General
>Identification
>Password
>Date/Time
>Display Stamping
7.1Identification
7.1.1ID
Each device should be assigned a unique identifier that can be entered here as an additional means of identification.
7.1.2Naming
Assign a unique name to assist in identification. This name simplifies the management of multiple devices in more extensive systems.
The name is used for remote identification, for example, in the event of an alarm. Choose a name that makes it as easy as possible to identify the location unambiguously.
7.1.3iSCSI Initiator extension
Add text to an initiator name to make identification easier in large iSCSI systems. This text is added to the initiator name, separated from it by a full stop.
7.2Password
A password prevents unauthorized access to the device. The device has three authorization levels: service, user, and live.
???service is the highest authorization level. Entering the correct password gives access to all the functions of the camera and allows all configuration settings to be changed.
???user is the middle authorization level. This user can operate the device, play back recordings, and also control a camera but cannot change the configuration.
???live is the lowest authorization level. It can only be used to view the live video image and switch between the different live image displays.
You can define and change a password for each authorization level if you are logged in as service or if the camera is not password protected.
Use the various authorization levels to limit access. Proper password protection is only guaranteed if all higher authorization levels are also protected with a password. For example, if a live password is assigned, a service and a user password should also be set. When assigning passwords, always start from the highest authorization level, service, and use different passwords.
7.2.1Password
Define and change a separate password for each level. Enter the password (19 characters maximum) for the selected level.
7.2.2Confirm password
The new password is only saved after clicking Set. Therefore, click Set immediately after entering and confirming the password, even if assigning a password at another level.
7.3Date/Time
7.3.1Date format
Select the required date format.
7.3.2Device date / Device time
If there are multiple devices operating in your system or network, it is important to synchronize their internal clocks. For example, it is only possible to identify and correctly evaluate simultaneous recordings when all devices are operating on the same time.
1.Enter the current date. Since the device time is controlled by the internal clock, it is not necessary to enter the day of the week ??? it is added automatically.
2.Enter the current time or click Sync to PC to apply the system time from your computer to the device.
Note:
It is important that the date/time is correct for recording. An incorrect date/time setting could prevent correct recording.
7.3.3Device time zone
Select the time zone in which the system is located.
7.3.4Daylight saving time
The internal clock can switch automatically between normal and daylight saving time (DST). The device already contains the data for DST
Note:
If a table is not created, there is no automatic switching. When editing the table, note that values occur in linked pairs (DST start and end dates).
First, check the time zone setting. If it is not correct, select the appropriate time zone for the system:
1.Click Set.
2.Click Details. A new window opens showing an empty table.
3.Click Generate to fill the table with the preset values from the camera.
4.Select the region or the city which is closest to the system's location from the list box below the table.
5.Click one of the entries in the table to make changes. The entry is highlighted.
6.Click Delete to remove the entry from the table.
7.Choose other values from the list boxes under the table, to change the selected entry. Changes are immediate.
8.If there are empty lines at the bottom of the table, for example after deletions, add new data by marking the row and selecting values from the list boxes.
9.When finished, click OK to save and activate the table.
7.3.5Time server IP address
The camera can receive the time signal from a time server using various time server protocols and then use it to set the internal clock. The device polls the time signal automatically once every minute.
Enter the IP address of a time server.
7.3.6Time server type
Select the protocol that is supported by the selected time server. It is recommended to select the SNTP server protocol. This protocol provides high accuracy and is required for special applications and future function extensions.
Select Time server if the server uses the RFC 868 protocol.
7.4Display Stamping
Various overlays or stamps in the video image provide important supplementary information. These overlays can be enabled individually and arranged on the image in a clear manner.
7.4.1Camera name stamping
Select the position of the camera name overlay in the drop- down box. It can be displayed at the Top, at the Bottom, or at a position of choice using the Custom option, or it can be set to Off for no overlay information.
If the Custom option is selected, enter values in the X and Y position fields.
7.4.2Time stamping
Select the position of the time and date overlay in the drop- down box. It can be displayed at the Top, at the Bottom, or at a position of choice using the Custom option, or it can be set to Off for no overlay information.
If the Custom option is selected, enter values in the X and Y position fields.
7.4.3Display milliseconds
If necessary, display milliseconds for Time stamping. This information can be useful for recorded video images; however, it does increase the processor's computing time. Select Off if displaying milliseconds is not needed.
7.4.4Alarm mode stamping
Select On in the
If the Custom option is selected, enter values in the X and Y position fields.
7.4.5Alarm message
Enter the message to be displayed on the image in the event of an alarm. The maximum text length is 31 characters.
7.4.6Video watermarking
Select On in the
8Web Interface
Web Interface
>Appearance
>LIVEPAGE Functions
>Logging
8.1Appearance
You can adapt the appearance of the web interface and change the website language to meet your requirements.
GIF or JPEG images can be used to replace the company and device logos. The image can be stored on a local computer, a local network, or at an Internet address. The file paths must correspond to the access mode, for example:
???C:\Images\Logo.gif for access to local files, or
???http://www.myhostname.com/images/logo.gif for access via the Internet/Intranet).
There must be a network connection to display the images. The image files are not stored on the camera.
To restore the original graphics, delete the entries in the
Company logo and Device logo fields.
8.1.1Website language
Select the language for the user interface.
8.1.2Company logo
To replace the company's logo in the
8.1.3Device logo
To replace the device name in the
8.2LIVEPAGE Functions
You can adapt the Livepage functions to meet your requirements. Choose from a variety of different options for displaying information and controls.
1.Mark the check boxes for the functions to be displayed on the Livepage. The selected elements are checked.
2.Look at the Livepage to see if the desired items are shown.
8.2.1Transmit audio
When selected, the audio from the camera (if on) is sent to the computer. This setting applies only to the computer on which it is made.
8.2.2Show alarm inputs
The alarm inputs are displayed next to the video image as icons along with their assigned names. If an alarm is active, the corresponding icon changes color.
8.2.3Show relay outputs
The relay output is shown next to the video image as an icon along with its assigned name. If a relay is switched, the icon changes color.
8.2.4Show VCA trajectories
The trajectories (motion lines of objects) from the video content analysis are displayed in the live video image if a corresponding analysis type is activated.
8.2.5Show VCA metadata
When video content analysis (VCA) is activated, additional information is displayed in the live video stream. In Motion+ mode, the sensor areas for motion detection are marked.
8.2.6Show event log
The event messages are displayed with the date and time in a field next to the video image.
8.2.7Show system log
The system messages are displayed with the date and time in a field next to the video image and provide information about the establishment and termination of connections, etc.
8.2.8Allow snapshots
Specify whether the icon for saving individual images should be displayed below the live image. Individual images can only be saved if this icon is visible.
8.2.9Allow local recording
Specify whether the icon for saving video sequences locally should be displayed below the live image. Video sequences can only be saved if this icon is visible.
8.2.10Path for JPEG and video files
Enter the path for the storage location of individual images and video sequences saved from the Livepage. If necessary, click Browse to find a suitable folder.
8.3Logging
8.3.1Save event log
Select this option to save event messages in a text file on the local computer. This file can be viewed, edited, and printed with any text editor or standard office software.
File for event log
Enter the path for saving the event log here. If necessary, click Browse to find a suitable folder.
8.3.2Save system log
Select this option to save system messages in a text file on the local computer. This file can be viewed, edited, and printed with any text editor or standard office software.
File for system log
Enter the path for saving the system log here. If necessary, click Browse to find a suitable folder.
9Camera
Camera
>Installer Menu
>Picture Settings
>ALC
>Enhance
>Encoder Profile
>Encoder Streams
>Privacy Masks
>Audio
9.1Installer Menu
9.1.1Base frame rate
Select 25 ips or 30 ips as the base frame rate for the camera.
Note:
Shutter times and frame rates are affected by this value.
9.1.2Mirror image
Select On to output a mirror image of the camera picture.
9.1.3Flip image
Select On to output an upside down camera image.
9.1.4Menu button
Select Disabled to prevent access to the install wizard via the menu button on the camera itself.
9.1.5Heater (dome cameras only)
Select Auto to let the camera determine when the heater should be switched on.
9.1.6Restore all defaults
Click Restore all defaults to restore the factory defaults for the camera. A confirmation screen appears. Allow 5 seconds for the camera to optimize the picture after a mode reset.
9.1.7Lens Wizard
Click Lens Wizard... to open a separate window which can be used to focus the camera lens.
9.2Lens Wizard
A
Step 1:
1.Displays the lens type.
2.Allows you to center the back focus to obtain the widest adjustment range by clicking the Center button.
3.Suggests that you should first adjust the lens manually if required.
Step 2:
1.Use the mouse to adjust the size and position of the shaded area in the preview window.
???Check the Show only selected area box to make the main window zoom in on the selected area.
2.Check the IR corrected lens box to have the same focus positions for day and night. (To adjust the night focus for a
3.Click Full range autofocus to focus the lens across its full range.
???The motorised automatic back focus process runs.
???The focus position, state and indicator are shown.
4.Click Local range autofocus to fine focus the lens across the set range.
???The motorised automatic back focus process runs.
???The focus position, state and indicator are shown.
5.If necessary, manually adjust the focus position with the slider.
9.3Picture Settings
Contrast (0...255)
Adjust the contrast with the slider from 0 to 255.
Saturation (0...255)
Adjust the color saturation with the slider from 0 to 255..
Brightness (0...255)
Adjust the brightness with the slider from 0 to 255.
9.3.1White balance
???ATW: Auto tracking white balance allows the camera to continually adjust for optimal color reproduction.
???In Manual mode the Red, Green, and Blue gain can be manually set to a desired position.
Hold
Click Hold to put ATW on hold and save the color settings.
In Manual white balance mode, adjust the red gain from
In Manual white balance mode, adjust the blue gain from
In Manual white balance mode, adjust the green gain from
It is only necessary to change the white point offset for special scene conditions.
9.4ALC
ALC mode
Select the mode:
???Fluorescent 50 Hz
???Fluorescent 60 Hz
???Outdoor
ALC level
Adjust the video output level
Select the range within which the ALC will operate. A positive value is more useful for
9.4.1Exposure/frame rate
Auto exposure/frame rate
Select to let the camera automatically set the optimum shutter speed. The camera tries to maintain the selected default shutter speed as long as the light level of the scene permits. Select the minimum frame rate for automatic exposure:
???1.6 to 1/25 ips
or
???1.9 to 1/30 ips
The values available depend on the value set for the Base Frame Rate in the Installer Menu.
Fixed exposure
Select to set a fixed shutter speed.
Select the shutter speed for fixed exposure:
???(1/25, 1/50, 1/100, 1/250, 1/500, 1/1000, 1/2000, 1/5000, 1/7500, 1/15000)
or
???1/30, 1/60, 1/120 1/250, 1/500, 1/1000, 1/2000, 1/5000,
1/7500, 1/15000)
The values available depend on the value set for the ALC mode.
9.4.2Day/night
Auto - the camera switches the IR
Monochrome - the IR
Color - the camera always produces a color signal regardless of light levels.
Switch level
Set the video level at which the camera in Auto mode switches to monochrome operation
A low (negative) value means that the camera switches to monochrome at a lower light level. A high (positive) value means that the camera switches to monochrome at a higher light level.
9.5Enhance
9.5.1Sharpness level
Adjusts the black level between
A low (negative) value makes the picture less sharp. Increasing sharpness brings out more detail. Extra sharpness can enhance the details of license plates, facial features and the edges of certain surfaces but can increase bandwidth requirements.
9.5.2Backlight Compensation
Select On to capture details in
9.5.3Contrast enhancement
Select On to increase the contrast in low contrast conditions.
9.6Encoder Settings
The Encoder Profile and Encoder Streams settings allow you to adapt the video data transmission characteristics for your operating environment (network structure, bandwidth, data structures). The camera simultaneously generates two H.264 video streams and an
Select the compression settings of these streams individually, for example, one setting for transmissions to the Internet and one for LAN connections.
Refer to Section 10.1 Encoder Profile, page 50 for more information on setting up the encoder profile.
Refer to Section 10.2 Encoder Streams, page 53 for more information on setting up the encoder streams.
9.7Privacy Masks
Four privacy mask areas can be defined. The activated masked areas are filled with the selected pattern in live view.
1.Select the pattern to be used for all masks.
2.Check the box of the mask you wish to activate.
3.Use the mouse to define the area for each of the masks.
9.8Audio
Switch the audio On or Off.
Adust the Line In and Line Out levels with the sliders. Select G.711 or ACC as the audio Recording format. The default value is G.711.
Note:
The audio signals are sent in a separate data stream parallel to the video data, and so increase the network load. The audio data requires an additional bandwidth of approximately
80 kbps to 640 Kbps, depending on type of audio compression selected, for each connection. If you do not want any audio data to be transmitted, select Off.
10 Encoder Settings
The encoder settings determine the characteristics of the four streams generated by the camera. The type of streams that can be generated are:
???HD streams (1080p, 720p)
???SD streams (480p, 240p)
???
???
The bit rates, the encoding interval, and the
The resolution of the two H.264 streams and the
The streams and profiles for recording are selected on the
Recording Profiles page.
10.1Encoder Profile
Profiles are rather complex and include a number of parameters that interact with one another, so it is generally best to use the
10.1.1
Eight definable profiles are available. The
???HD high quality / low latency
High resolution for high bandwidth connections
???HD high quality
High resolution with lower data rate
???HD low bandwidth
High resolution for low bandwidth connections
???SD high quality / low latency
Standard resolution for high bandwidth connections
???SD high quality
Standard resolution with lower data rate
???SD low bandwidth
Standard resolution for low bandwidth connections
???DSL
Standard resolution for DSL connections
???ISDN (2B)
Low resolution for mobile phone connections
10.1.2Changing a profile
The
To change a profile, select it by clicking its tab, then change the parameters within that profile.
If a setting outside the permitted range for a parameter is entered, the nearest valid value is substituted when the settings are saved.
10.1.3Profile name
If required, enter a new name for the profile.
10.1.4Target bit rate
To optimize use of the bandwidth in the network, limit the data rate for the camera. The target data rate should be set according to the desired picture quality for typical scenes with no excessive motion.
For complex images or frequent changes of image content due to frequent movements, this limit can temporarily be exceeded up to the value entered in the Maximum bit rate field.
10.1.5Maximum bit rate
This maximum data rate is not exceeded under any circumstances. Depending on the video quality settings for the
The value entered here must be at least 10% higher than the value entered in the Target bit rate field. If the value entered here is too low, it is automatically adjusted.
10.1.6Encoding interval
The Encoding interval slider determines the interval at which images are encoded and transmitted. This can be particularly advantageous with low bandwidths. The image rate in ips (images per second) is displayed next to the slider.
10.1.7Standard definition video resolution
Select the desired resolution for the standard definition video image. The following resolutions are available:
???240p
352 ?? 240 pixels (displayed as 432 x 240)
???480p
704 ?? 480 pixels (displayed as 854 x 480)
Note:
These resolutions are not used by a HD stream.
10.1.8Expert Settings
if necessary, use the expert settings to adapt the
GOP structure
Select the structure you require for the Group of Pictures (GOP). Depending on whether you place greater priority on having the lowest possible delay (IP frames only) or using as little bandwidth possible, you choose IP, IBP or IBBP.
Use the slider to set the distance between
This setting sets the image quality of the
This setting adjusts the maximum image quality of the
10.1.9Default
Click Default to return the profile to the factory default values.
10.2Encoder Streams
10.2.1H.264 settings
Select H.264 Settings
1.Select the codec algorithm for stream 1. The following are available:
???H.264 MP 1080p fixed
???H.264 MP 720p25/30 fixed
2.Select the codec algorithm for stream 2. The following are available:
???Copy Stream 1
???H.264 MP SD
3.Select the
???This profile is not used for recording. When a stream is used for recording, the profile selected on the
Recording Profiles page is used.
Note:
The frame rate used for these streams is determined by the value selected for the Base Frequency in the Installer Menu.
Preview >>
Previews of streams 1 and 2 can be shown.
1.Click Preview >> to display a preview of the video for streams 1 and 2. the current profile is shown above the preview.
2.Click 1:1 Live View below a preview to open a viewing window for that stream. Various additional items of information are shown across the top of the window.
3.Click Preview << to close the preview displays.
Note:
Deactivate the display of the video images if the performance of the computer is adversely affected by the decoding of the data stream.
10.2.2JPEG stream
Set the parmeters for the
???Select the Max. frame rate in images per second (IPS).
???The Picture quality slider allows adjustment of the
Note:
The JPEG resolution follows the highest resolution setting of either stream 1 or stream 2. The
11 Recording
Recording
>Storage Management
>Recording Profiles
>Retention Time
>Recording Scheduler
>Recording Status
Camera images can be recorded locally to an SD card or to an appropriately configured iSCSI system.
SD cards are the ideal solution for shorter storage times and temporary recordings. They can be used for local alarm recording or for Automatic Network Replenishment (ANR) to improve the overall reliability of video recording.
For
Two recording tracks are available (Recording 1 and Recording 2). The encoder streams and profiles can be selected for each of these tracks for both standard and alarm recordings.
Ten recording profiles are available where these recording tracks can be defined differently. These profiles are then used for building schedules.
A Video Recording Manager (VRM) can control all recording when accessing an iSCSI system. The VRM is an external program for configuring recording tasks for video servers. For further information, contact your local customer service at Bosch Security Systems.
11.1Storage Management
11.1.1Device manager
Check the Managed by external VRM box to let an external Video Recording Manager (VRM) manage all recording. No further settings can be configured.
Note:
Activating or deactivating VRM causes the current storage settings to be lost; they can only be restored through re- configuration.
11.1.2Recording media
Select a media tab to connect to the available storage media.
iSCSI Media
To use an iSCSI system as the storage medium, a connection to the desired iSCSI system is required to set the configuration parameters.
The storage system selected must be available on the network and completely set up. It must have an IP address and be divided into logical drives (LUNs).
1.Enter the IP address of the required iSCSI destination in the iSCSI IP address field.
2.If the iSCSI destination is password protected, enter the password into the Password field.
3.Click Read.
???The connection to the IP address is established. The Storage overview field displays the logical drives.
Local Media
An SD card inserted in the camera can be used for local recording.
???If the SD card is password protected, enter the password
into the Password field.
The Storage overview field displays the local media.
11.1.3Activating and configuring storage media
Available media or iSCSI drives must be transferred to the Managed storage media list, activated, and configured for storage.
Note:
A iSCSI target storage device can only be associated with one user. If a target is being used by another user, ensure that the current user no longer needs the target before decoupling that user.
1.In the Storage overview section,
???The medium is added as a target in the Managed storage media list.
???Newly added media is shown as Not active in the Status column.
2.Click Set to activate all media in the Managed storage media list.
???The Status column shows all media as Online.
3.Check the box in the Rec. 1 or Rec. 2 column to specify the recording tracks to be recorded on the target selected.
4.Check the Recording 1 or Recording 2 boxes for the Overwrite older recordings option to overwrite the older recording tracks once the available recording capacity has been used.
Note:
If older recordings are not allowed to be overwritten when the available memory is full, the recording in question is stopped. Specify limitations for overwriting old recordings by configuring the retention time.
11.1.4Formatting storage media
All recordings on a storage medium can be deleted at any time. Check the recordings before deleting and
1.Click a storage medium in the Managed storage media list to select it.
2.Click Edit below the list.
3.Click Format in the new window to delete all recordings in the storage medium.
4.Click OK to close the window.
11.1.5Deactivating storage media
A storage medium in the Managed storage media list can be deactivated. It is then no longer used for recordings.
1.Click a storage medium in the Managed storage media list to select it.
2.Click Remove below the list. The storage medium is deactivated and removed from the list.
11.2Recording Profiles
A recording profile contains the characteristics of the tracks that are used for recording. These characteristics can be defined for ten different profiles. The profiles can then be assigned to days or times of day on the Recording Scheduler page.
Each profile is
To configure a profile click its tab to open its settings page.
???To copy the currently visible settings to other profiles, click Copy Settings. A window opens to select the target profiles for the copied settings.
???If you change a profile???s settings, click Set to save.
???If necessary, click Default to return all settings to their factory defaults.
Stream profile settings
Select the encoder profile setting that is to be used with stream 1 and 2 when recording. This selection is independent of the selection for live stream transmission. (The properties of the encoder profiles are defined on the Encoder Profile page.)
Recording includes
Specify whether, in addition to video data, audio or metadata (for example alarms or VCA data) should also be recorded. Including metadata could make subsequent searches of recordings easier but it requires additional memory capacity. Without metadata, it is not possible to include video content analysis in recordings.
11.2.1Recording track selection
Standard and alarm recording can be defined for the two recording tracks. You must first select the track before setting up the standard and alarm recording parameters.
1.Click the Recording 1 entry in the list.
2.Set up the standard and alarm recording parameters for track 1 as described below.
3.Click the Recording 2 entry in the list.
4.Set up the standard and alarm recording parameters for track 2 as described below.
11.2.2Standard recording
Select the mode for standard recordings:
???Continuous: the recording proceeds continuously. If the maximum recording capacity is reached, older recordings are overwritten automatically.
???
???Off: no automatic recording takes place.
Stream
Select the stream to be used for standard recordings:
???Stream 1
???Stream 2
???
11.2.3Alarm recording
Select a period for the
Select a period for the
Alarm stream
Select the stream to be used for alarm recordings:
???Stream 1
???Stream 2
???
Check the with encoding interval from profile: box and select an encoder profile to set the associated encoding interval for alarm recording.
Check the Export to FTP box to send standard H.264 files to the FTP server whose address is displayed.
If an FTP server has not yet been defined, click Configure FTP server to jump to the FTP Posting page where the server information can be entered.
Alarm triggers
Select the alarm type that is to trigger an alarm recording:
???Alarm input
???Motion/Audio alarm
???Video loss alarm
Select the Virtual alarm sensors that are to trigger a recording, via RCP+ commands or alarm scripts, for example.
11.3Retention Time
If the available capacity of a medium has been fully used, older recordings are only overwritten when the retention time entered here has expired.
???Enter the required retention time in hours or days for each
recording track.
Make sure that the retention time does not exceed the available recording capacity.
11.4Recording Scheduler
The recording scheduler allows you to link the created recording profiles to the days and times at which the camera's images are to be recorded. Schedules can be defined for weekdays and for holidays.
11.4.1Weekdays
Assign as many time periods (in
1.Click the profile to be assigned in the Time periods box.
2.Click a field in the table and, while holding down the left mouse button, drag the cursor across all of the fields to be assigned to the selected profile.
3.Use the right mouse button to deselect any of the intervals.
4.Click Select All to select all of the intervals to be assigned to the selected profile.
5.Click Clear All to deselect all of the intervals.
6.When finished, click Set to save the settings to the device.
11.4.2Holidays
Define holidays whose settings will override the settings for the normal weekly schedule.
1.Click the Holidays tab. Days that have already been defined are shown in the table.
2.Click Add. A new window opens.
3.Select the desired date from the calendar. Drag the mouse to select a range of dates. These are handled as a single entry in the table.
4.Click OK to accept the selection(s). The window closes.
5.Assign the defined holidays to the recording profile as described above.
Delete
1.Click Delete in the Holidays tab. A new window opens.
2.Click the date to be deleted.
3.Click OK. The selection is removed from the table and the window is closed.
4.Repeat for any other dates to be deleted.
11.4.3Profile names
Change the names of the recording profiles listed in the Time periods box.
1.Click a profile.
2.Click Rename.
3.Enter the new name and click Rename again.
11.4.4Activate recording
After completing configuration, activate the recording schedule and start scheduled recording. Once activated, the Recording Profiles and the Recording Scheduler are deactivated and the configuration cannot be modified. Stop scheduled recording to modify the configuration.
1.Click Start to activate the recording schedule.
2.Click Stop to deactivate the recording schedule. Recordings that are currently running are interrupted and the configuration can be modified.
11.4.5Recording status
The graphic indicates the recording activity. An animated graphic is displayed when recording is taking place.
11.5Recording Status
Details of the recording status are displayed here for information. These settings cannot be changed.
12 Alarm
Alarm
>Alarm Connections
>VCA
>Audio Alarm
>Alarm
>Alarm Task Editor
12.1Alarm Connections
In the event of an alarm, the camera can automatically connect to a
12.1.1Connect on alarm
Select On so that the camera automatically connects to a pre- defined IP address in the event of an alarm. Select Follows input 1 so that the device maintains the connection for as long as an alarm exists.
12.1.2Number of destination IP address
Specify the numbers of the IP addresses to be contacted in the event of an alarm. The device contacts the remote locations one after the other in the numbered sequence until a connection is made.
12.1.3Destination IP address
For each number, enter the corresponding IP address for the desired remote station.
12.1.4Destination password
If the remote station is password protected, enter the password here.
Only ten passwords can be defined here. Define a general password if more than ten connections are required, for
example, when connections are initiated by a controlling system such as the Bosch Video Client or the Bosch Video Management System. The camera connects to all remote stations protected by the same general password. To define a general password:
1.Select 10 in the Number of destination IP address list box.
2.Enter 0.0.0.0 in the Destination IP address field.
3.Enter the password in the Destination password field.
4.Set the user password of all the remote stations to be
accessed using this password.
Setting destination 10 to the
12.1.5Video transmission
If the device is operated behind a firewall, select TCP (HTTP port) as the transfer protocol. For use in a local network, select
UDP.
To enable multicast operation, select the UDP option for the Video transmission parameter here and on the Network page.
Note:
In the event of an alarm, a larger network bandwidth is sometimes required for additional video streams (if multicast operation is not possible).
12.1.6Remote port
Select an appropriate browser port depending on the network configuration. The ports for HTTPS connections are only available if the On option in SSL encryption is selected.
12.1.7Video output
If a decoder device is used, select the analog video output to which the signal should be switched. If the destination device is unknown, select the First available option. This places the image on the first video output with no signal.
The connected monitor only displays images when an alarm is triggered.
12.1.8Decoder
If a split image is set for the selected video output, select a decoder to display the alarm image. The decoder selected determines the position of the image.
12.1.9SSL encryption
SSL encryption protects data used for establishing a connection, such as the password. By selecting On, only encrypted ports are available for the Remote port parameter. SSL encryption must be activated and configured on both sides of a connection. The appropriate certificates must also have been uploaded. Configure and activate encryption for media data (video, metadata) on the Encryption page.
12.1.10
Select On to automatically
12.1.11Audio
Select On to transmit the audio stream with an alarm connection.
12.2Video Content Analyses (VCA)
The camera has integrated Video Content Analyses (VCA) which detects and analyze changes in the picture using image processing algorithms. Such changes can be due to movements in the camera's field of view. Detection of movement can be used to trigger an alarm and to transmit metadata.
Various VCA configurations can be selected and adapted to your application, as required.
Refer to Section 13 Setting up VCA, page 74 for more information on setting up video content analyses.
Note:
If there is not enough computing power, priority is given to live images and recordings. This can lead to impairment of the VCA system. Observe the processor load and optimize the encoder settings or the VCA settings if necessary, or turn off VCA completely.
12.3Audio Alarm
Alarms can be generated based on audio signals. Configure signal strengths and frequency ranges so that false alarms, for example, machine noise or background noise, are avoided. Set up normal audio transmission before configuring the audio alarm.
12.3.1Audio alarm
Select On for the device to generate audio alarms.
12.3.2Name
The name makes it easier to identify the alarm in extensive video monitoring systems, for example with the Bosch Video Client and the Bosch Video Management System. Enter a unique and clear name here.
12.3.3Signal Ranges
Exclude particular signal ranges in order to avoid false alarms. For this reason the total signal is divided into 13 tonal ranges (mel scale). Check or uncheck the boxes below the graphic to include or exclude individual ranges.
12.3.4Threshold
Set up the threshold on the basis of the signal visible in the graphic Set the threshold using the slide control or, alternatively, move the white line directly in the graphic using the mouse.
12.3.5Sensitivity
Use this setting to adapt the sensitivity to the sound environment and effectively suppress individual signal peaks. A high value represents a high level of sensitivity.
12.4Alarm
Alarm states can be documented by
12.4.1Send alarm
Select On for the device to automatically send an alarm
12.4.2Mail server IP address
Enter the IP address of a mail server that operates on the SMTP standard (Simple Mail Transfer Protocol). Outgoing
12.4.3SMTP user name
Enter a registered user name for the chosen mail server.
12.4.4SMTP password
Enter the required password for the registered user name.
12.4.5Format
Select the data format of the alarm message.
???Standard (with JPEG):
???SMS:
When a mobile phone is used as the receiver, make sure to activate the
12.4.6Attach JPEG from camera
Check the box to specify that JPEG images are sent from the camera.
12.4.7Destination address
Enter the
12.4.8Sender name
Enter a unique name for the
12.4.9Test
Click Send Now to test the
12.5Alarm Task Editor
Editing scripts on this page overwrites all settings and entries on the other alarm pages. This procedure cannot be reversed. To edit this page, you should have programming knowledge and be familiar with the information in the Alarm Task Script Language document and the English language.
As an alternative to the alarm settings on the various alarm pages, enter the desired alarm functions in script form here. This will overwrite all settings and entries on the other alarm pages.
1.Click Examples under the Alarm Task Editor field to see some script examples. A new window opens.
2.Enter new scripts in the Alarm Task Editor field or change existing scripts in line with your requirements.
3.When finished, click Set to transmit the scripts to the device. If the transfer was successful, the message Script successfully parsed. is displayed over the text field. If it was not successful, an error message is displayed with further information.
13 Setting up VCA
Several VCA configurations are available.
???Off
???Silent MOTION+
???Profile #1
???Profile #2
???Scheduled
???Event triggered
13.1VCA - Silent MOTION+
The Silent MOTION+ configuration is active by default. In this configuration, metadata is created to facilitate searches of recordings, however, no alarm is triggered.
???In the VCA configuration
No parameters can be changed for this selection.
13.2VCA - Profiles
Two profiles can be set up with different VCA configurations. You can save profiles on your computer's hard drive and load saved profiles from there. This can be useful if testing a number of different configurations. Save a functioning configuration and test new settings. Use the saved configuration to restore the original settings at any time.
1.In the VCA configuration
2.If necessary, click Default to return all settings to default values.
3.Click the Save... to save the profile settings to another file. A new window opens where you specify the file name and the location.
4.Click Load... to load a saved profile. A new window opens where you select the location and the profile file.
To rename a profile:
1.To rename the file, click the icon to the right of the list field and enter the new profile name in the field.
2.Click the icon again. The new profile name is saved.
The current alarm status is displayed for information purposes.
13.2.1Aggregation time [s]
Set an aggregation time of between 0 and 20 seconds. The aggregation time always starts when an alarm event occurs. It extends the alarm event by the value set. This prevents alarm events that occur in quick succession from triggering several alarms and successive events in a rapid sequence. No further alarm is triggered during the aggregation time.
The
13.2.2Analysis type
Select the required analysis algorithm. By default, only Motion+ is available ??? this offers a motion detector and essential recognition of tampering.
Metadata is always created for a video content analysis, unless this is explicitly excluded. Depending on the analysis type selected and the relevant configuration, additional information overlays the video image in the preview window next to the parameter settings. With the Motion+ analysis type, for example, the sensor fields in which motion is recorded are marked with rectangles.
Note:
Additional analysis algorithms with comprehensive functions, such as IVMD and IVA, are available from Bosch Security Systems.
13.2.3Motion detector
Motion detection is available for the Motion+ analysis type. For the detector to function, the following conditions must be met:
???Analysis must be activated.
???At least one sensor field must be activated.
???The individual parameters must be configured to suit the operating environment and the desired responses.
???The sensitivity must be set to a value greater than zero.
Note:
Reflections of light (from glass surfaces, etc.), lights switching on and off, or changes in the light level caused by cloud movement on a sunny day can trigger unintended responses from the motion detector and generate false alarms. Run a series of tests at different times of the day and night to ensure that the video sensor is operating as intended. For indoor surveillance, ensure constant lighting of the areas during the day and at night.
Sensitivity
Sensitivity is available for the Motion+ analysis type. The basic sensitivity of the motion detector can be adjusted for the
environmental conditions to which the camera is subject. The sensor reacts to variations in the brightness of the video image. The darker the observation area, the higher the value that must be selected.
Minimum object size
Specify the number of sensor fields that a moving object must cover to generate an alarm. This setting prevents objects that are too small from triggering an alarm. A minimum value of 4 is recommended. This value corresponds to four sensor fields.
Debounce time 1 s
The debounce time prevents very brief alarm events from triggering individual alarms. If the Debounce time 1 s option is activated, an alarm event must last at least 1 second to trigger an alarm.
Selecting the area
Select the areas of the image to be monitored by the motion detector. The video image is subdivided into square sensor fields. Activate or deactivate each of these fields individually. To exclude particular regions of the camera's field of view from monitoring due to continuous movement (by a tree in the wind, for example), the relevant fields can be deactivated.
1.Click Select Area to configure the sensor fields. A new window opens.
2.If necessary, click Clear All first to clear the current selection (fields marked red).
3.
4.If necessary, click Select All to select the entire video- frame for monitoring.
5.
6.Click OK to save the configuration.
7.Click the close button (X) in the window title bar to close the window without saving the changes.
13.2.4Tamper detection
Detect tampering of cameras and video cables by means of various options. Run a series of tests at different times of the day and night to ensure that the video sensor is operating as intended.
Sensitivity and Trigger delay [s] can only be changed if
Reference check is selected.
Sensitivity
The basic sensitivity of the tamper detection can be adjusted for the environmental conditions to which the camera is subject. The algorithm reacts to the differences between the reference image and the current video image. The darker the observation area, the higher the value that must be selected.
Trigger delay [s]
Set delayed alarm triggering here. The alarm is only triggered after a set time interval in seconds has elapsed and then only if the triggering condition still exists. If the original condition has been restored before this time interval elapses, the alarm is not triggered. This avoids false alarms triggered by
Global change (slider)
Set how large the global change in the video image must be for an alarm to be triggered. This setting is independent of the sensor fields selected under Select Area. Set a high value if fewer sensor fields need to change to trigger an alarm. With a low value, it is necessary for changes to occur simultaneously in a large number of sensor fields to trigger an alarm. This option allows detection, independently of motion alarms, manipulation of the orientation or location of a camera resulting from turning the camera mount bracket, for example.
Global change
Activate this function if the global change, as set with the Global change slide control, should trigger an alarm.
Scene too bright
Activate this function if tampering associated with exposure to extreme light (for instance, shining a flashlight directly on the objective) should trigger an alarm. The average brightness of the scene provides a basis for recognition.
Scene too dark
Activate this function if tampering associated with covering the objective (for instance, by spraying paint on it) should trigger an alarm. The average brightness of the scene provides a basis for recognition.
Scene too noisy
Activate this function if tampering associated with EMC interference (noisy scene as the result of a strong interference signal in the vicinity of the video lines) should trigger an alarm.
Reference check
Save a reference image that can be continuously compared with the current video image. If the current video image in the marked areas differs from the reference image, an alarm is triggered. This detects tampering that would otherwise not be detected, for example, if the camera is turned.
1.Click Reference to save the currently visible video- image as a reference.
2.Click Select Area and select the areas in the reference image that are to be monitored.
3.Check the box Reference check to activate the
4.Select the Disappearing edges or Appearing edges option to specify the reference check once again.
Disappearing edges
The area selected in the reference image should contain a prominent structure. If this structure is concealed or moved, the reference check triggers an alarm. If the selected area is too homogenous, so that concealing and moving the structure
would not trigger an alarm, then an alarm is triggered immediately to indicate the inadequate reference image.
Appearing edges
Select this option if the selected area of the reference image includes a largely homogenous surface. If structures appear in this area, then an alarm is triggered.
Selecting the area
Select the image areas in the reference image that are to be monitored. The video image is subdivided into square fields. Activate or deactivate each of these fields individually.
Select only those areas for reference monitoring in which no movement takes place and that are always evenly lit, as false alarms could otherwise be triggered.
1.Click Select Area to configure the sensor fields. A new window opens.
2.If necessary, click Clear All first to clear the current selection (fields marked yellow).
3.
4.If necessary, click Select All to select the entire video- frame for monitoring.
5.
6.Click OK to save the configuration.
7.Click the close button (X) in the window title bar to close the window without saving the changes.
13.3VCA - Scheduled
A scheduled configuration allows you to link a VCA profile with the days and times at which the video content analysis is to be active.
???In the VCA configuration
Scheduled.
Schedules can be defined for weekdays and for holidays.
The current alarm status is displayed for information purposes.
13.3.1Weekdays
Link any number of
1.Click the profile to link in the Time periods field.
2.Click in a field in the table, hold down the mouse button and drag the cursor over all the periods to be assigned to the selected profile.
3.Use the right mouse button to deselect any of the intervals.
4.Click Select All to link all time intervals to the selected profile.
5.Click Clear All to deselect all of the intervals.
6.When finished, click Set to save the settings in the device.
13.3.2Holidays
Define holidays on which a profile should be active that are different to the standard weekly schedule.
1.Click the Holidays tab. Any days that have already been selected are shown in the table.
2.Click Add. A new window opens.
3.Select the desired date from the calendar. Select several consecutive calendar days by holding down the mouse button. These will later be displayed as a single entry in the table.
4.Click OK to accept the selection. The window closes.
5.Assign the individual holidays to the VCA profiles, as described above.
Deleting Holidays
Delete defined holidays at any time:
1.Click Delete. A new window opens.
2.Click the date to delete.
3.Click OK. The item is deleted from the table and the window closes.
4.The process must be repeated for deleting additional days.
13.4VCA - Event triggered
This configuration allows you to stipulate that the video content analysis is only to be activated when triggered by an event.
???In the VCA configuration
As long as no trigger is activated, the Silent MOTION+ configuration in which metadata is created is active; this metadata facilitates searches of recordings, but does not trigger an alarm.
The current alarm status is displayed for information purposes.
13.4.1Trigger
Select a physical alarm or a virtual alarm as a trigger. A virtual alarm is created using software, with RCP+ commands or alarm scripts, for example.
13.4.2Trigger active
Select the VCA configuration here that is to be enabled via an active trigger. A green check mark to the right of the list field indicates that the trigger is active.
13.4.3Trigger inactive
Select the VCA configuration here that is to be activated if the trigger is not active. A green check mark to the right of the list field indicates that the trigger is inactive.
13.4.4Delay [s]
Select the delay period for the reaction of the video content analysis to trigger signals. The alarm is only triggered after a set time interval in seconds has elapsed and then only if the triggering condition still exists. If the original condition has been restored before this time interval elapses, the alarm is not triggered. A delay period may be useful in avoiding false alarms or frequent triggering. During the delay period, the Silent MOTION+ configuration is always enabled.
14 Interfaces
Interfaces
>Alarm input
>Relay
>COM1
14.1Alarm input
Configure the alarm triggers for the camera.
Select N.C. (Normally Closed) if the alarm is to be triggered by closing the contact.
Select N.O. (Normally Open) if the alarm is to be triggered by opening the contact.
14.1.1Name
Enter a name for the alarm input. This is then displayed below the icon for the alarm input on the LIVEPAGE (if configured).
14.2Relay
Configure the switching behavior of the relay output.
Select different events that automatically activate an output. For example, turn on a floodlight by triggering a motion alarm and then turn the light off again when the alarm has stopped.
14.2.1Idle state
Select Open for the relay to operate as an N.O. contact, or select Closed if the relay is to operate as an N.C. contact.
14.2.2Operating mode
Select the way the relay works.
14.2.3Relay follows
Select the event that triggers the relay.
14.2.4Relay name
The relay can be assigned a name here. The name is shown on the button next to Trigger relay. The LIVEPAGE can also be configured to display the name next to the relay icon.
14.2.5Trigger relay
Click the button to switch the relay manually (for example, for testing purposes or to operate a door opener).
14.3COM1
For cameras with a data connector, use this menu to configure the data transfer.
14.3.1Serial port function
Select a controllable unit from the list. If you wish to use the serial port to transmit transparent data, select Transparent. Select Terminal if you wish to operate the unit from a terminal. After selecting a unit, the remaining parameters in the window are set automatically and should not be changed.
14.3.2Camera ID
If necessary, enter the ID of the peripheral you wish to control (for example a dome camera or pan/tilt head).
14.3.3Baud rate
Select the value for the transmission rate in bps.
14.3.4Data bits
The number of data bits per character cannot be changed.
14.3.5Stop bits
Select the number of stop bits per character.
14.3.6Parity check
Select the type of parity check.
14.3.7Interface mode
Select the desired protocol for the serial interface.
15 Network
Network
>Network Access
>Advanced
>Multicast
>JPEG posting
>Encryption
15.1Network Access
The settings on this page are used to integrate the device into a network. Some changes only take effect after a reboot. In this case Set changes to Set and Reboot.
1.Make the desired changes.
2.Click Set and Reboot.
The device is rebooted and the changed settings are activated. If the IP address, subnet mask, or gateway address is changed, then the device is only available under the new addresses after the reboot.
15.1.1Automatic IP assignment
If a DHCP server is employed in the network for the dynamic assignment of IP addresses, activate acceptance of IP addresses automatically assigned to the device.
Certain applications (VIDOS, Bosch Video Management System, Archive Player, Configuration Manager) use the IP address for the unique assignment of the device. If using these applications, the DHCP server must support the fixed assignment between IP address and MAC address, and must be appropriately set up so that, once an IP address is assigned, it is retained each time the system is rebooted.
15.1.2IP address
Enter the desired IP address for the camera. The IP address must be valid for the network.
15.1.3Subnet mask
Enter the appropriate subnet mask for the set IP address.
15.1.4Gateway address
For the device to establish a connection to a remote location in a different subnet, enter the IP address of the gateway here. Otherwise, this field can remain empty (0.0.0.0).
15.1.5DNS server address
The device is easier to access if it is listed on a DNS server. For example, to establish an Internet connection to the camera, it is sufficient to enter the name given to the device on the DNS server as a URL in the browser. Enter the DNS server's IP address. Servers are supported for secure and dynamic DNS.
Details >>
15.1.6Video transmission
If the device is used behind a firewall, TCP (Port 80) should be selected as the transmission protocol. For use in a local network, choose UDP.
Multicast operation is only possible with the UDP protocol. The TCP protocol does not support multicast connections. The MTU value in UDP mode is 1514 bytes.
15.1.7HTTP browser port
Select a different HTTP browser port from the list if required. The default HTTP port is 80. To limit connection to HTTPS, deactivate the HTTP port. To do this, activate the Off option.
15.1.8HTTPS browser port
To limit browser access to encrypted connections, choose an HTTPS port from the list. The standard HTTPS port is 443. Select the Off option to deactivate HTTPS ports and limit connections to unencrypted ports.
The camera uses the TLS 1.0 protocol. Ensure that the browser has been configured to support this protocol. Also ensure that Java application support is activated (in the Java
To limit connections to SSL encryption, set the Off option in the HTTP browser port, the RCP+ port, and Telnet support. This deactivates all unencrypted connections allowing connections on the HTTPS port only.
Configure and activate encryption for media data (video, audio, metadata) on the Encryption page.
15.1.9RCP+ port 1756
Activating RCP+ port 1756 allows unencrypted connections on this port. To allow only encrypted connections, set the Off option to deactivate the port.
15.1.10Telnet support
Activating Telenet support allows unencrypted connections on this port. To allow only encrypted connections, set the Off option to deactivate telnet support, making telnet connections impossible.
15.1.11Interface mode ETH
If necessary, select the Ethernet link type for interface ETH. Depending on the device connected, it may be necessary to select a special operation type.
15.1.12Network MSS [Byte]
Set the maximum segment size for the IP packet's user data here. This gives the option to adjust the size of the data packets to the network environment and to optimize data transmission. Please comply with the MTU value of 1,514 bytes in UDP mode.
15.1.13iSCSI MSS [Byte]
Specify a higher MSS value for a connection to the iSCSI system than for the other data traffic via the network. The potential value depends on the network structure. A higher value is only useful if the iSCSI system is located in the same subnet as the camera.
15.1.14Enable DynDNS
DynDNS.org is a DNS hosting service that stores IP addresses in a database ready for use. It allows selecting the device via the Internet using a host name, without having to know the current IP address of the device. Enable this service here. To do this, obtain an account with DynDNS.org and register the required host name for the device on that site.
Note:
Information about the service, registration process and available host names can be found at DynDNS.org.
15.1.15Host name
Enter the host name registered on DynDNS.org for the device here.
15.1.16User name
Enter the user name registered at DynDNS.org here.
15.1.17Password
Enter the password registered at DynDNS.org here.
15.1.18Force registration now
Force the registration by transferring the IP address to the DynDNS server. Entries that change frequently are not provided in the Domain Name System. It is a good idea to force the registration when setting up the device for the first time. Only use this function when necessary and no more than once a day, to avoid the possibility of being blocked by the service provider. To transfer the IP address of the device, click the Register button.
15.1.19Status
The status of the DynDNS function is displayed here for information purposes; these settings cannot be changed.
15.2Advanced
The settings on this page are used to set advanced settings the network. Some changes only take effect after a reboot. In this case Set changes to Set and Reboot.
1.Make the desired changes.
2.Click Set and Reboot.
The device is rebooted and the changed settings are activated.
15.2.1SNMP
The camera supports the SNMP V2 (Simple Network Management Protocol) for managing and monitoring network components, and can send SNMP messages (traps) to IP addresses. It supports SNMP MIB II in the unified code.
If On is selected for the SNMP parameter and a SNMP host address is not entered, the device does not send the traps automatically and will only reply to SNMP requests. If one or two SNMP host addresses are entered, SNMP traps are sent automatically. Select Off to deactivate the SNMP function.
15.2.21. SNMP host address / 2. SNMP host address
To send SNMP traps automatically, enter the IP addresses of one or two target devices here.
15.2.3SNMP traps
To choose which traps are sent:
1.Click Select. A dialog box appears.
2.Click the check boxes of the appropriate traps.
3.Click Set to close the window and send all of the checked traps.
15.2.4Authentication (802.1x)
To configure Radius server authentication, connect the camera directly to a computer using a network cable. If a Radius server controls access rights over the network, select On to activate authentication to communicate with the device.
1.Enter the user name that the Radius server uses for the camera in the Identity field.
2.Enter the Password that the Radius server expects from the camera.
15.2.5RTSP port
If necessary, select a different port for the exchange of the RTSP data from the list. The standard RTSP port is 554. Select Off to deactivate the RTSP function.
15.3Multicast
The camera can enable multiple receivers to receive the video signal simultaneously. The stream is either duplicated and then distributed to multiple receivers
Multicast operation requires a
A special IP address from 225.0.0.0 to 239.255.255.255
(class D address) must be configured for multicast operation in a
The settings must be made individually for each stream. Enter a dedicated multicast address and port for each stream. Switch between the streams by clicking the appropriate tabs.
15.3.1Enable
Enable simultaneous data reception on receivers that need to activate the multicast function. To do this, check the box and enter the multicast address.
15.3.2Multicast Address
Enter a valid multicast address to be operated in multicast mode (duplication of the data stream in the network).
With a 0.0.0.0 setting, the encoder for the stream operates in
Duplication of data places a heavy demand on the CPU and can lead to impairment of the image quality under certain circumstances.
15.3.3Port
Enter the port address for the stream here.
15.3.4Streaming
Click the checkbox to activate multicast streaming mode. An activated stream is marked with a check. (Streaming is typically not required for standard multicast operation.)
15.3.5Multicast packet TTL
A value can be entered to specify how long the multicast data packets are active on the network. If multicast is to be run via a router, the value must be greater than 1.
15.4FTP Posting
The FTP server is used for JPEG posting and the export of recordings.
15.4.1JPEG posting
Save individual JPEG images on an FTP server at specific intervals. JPEG resolution corresponds to the highest setting from the two data streams.
File name
Select how file names are created for the individual images that are transmitted.
???Overwrite: The same file name is always used and any existing file will be overwritten by the current file.
???Increment: A number from 000 to 255 is added to the file name and automatically incremented by 1. When it reaches 255, it starts again from 000.
???Date/time suffix: The date and time are automatically added to the file name. When setting this parameter, ensure that the date and time of the device are always set correctly. For eample, the file snap011005_114530.jpg was stored on October 1, 2005 at 11.45 and 30 seconds.
Posting interval
Enter the interval in seconds at which the images are sent to an FTP server. Enter zero for no images to be sent.
15.4.2FTP server
FTP server IP address
Enter the IP address of the FTP server.
FTP server login
Enter your login name for the FTP server.
FTP server password
Enter the password that gives access to the FTP server.
Path on FTP server
Enter an exact path to post the images on the FTP server.
15.5Encryption
If an encryption license is installed, this submenu gives access to the encryption parameters.
16 Service
Service
>Maintenance
>Licenses
>System Overview
16.1Maintenance
CAUTION!
Before starting a firmware update, make sure to select the correct upload file. Uploading the wrong files can result in the device no longer being addressable, requiring it to be replaced. Do not interrupt the firmware installation. Even changing to another page or closing the browser window leads to interruption. Interruption may lead to faulty coding of the Flash memory. This can result in the device no longer being addressable, requiring it to be replaced.
16.1.1Firmware
The camera functions and parameters can be updated by uploading new firmware. To do this, the latest firmware package is transferred to the device via the network. The firmware is installed there automatically. Thus, a camera can be serviced and updated remotely without requiring a technician to make changes to the device on site. The latest firmware can be obtained from your customer service center or from the Bosch Security Systems download area.
To update the firmware:
1.First, store the firmware file on your hard disk.
2.Enter the full path for the firmware file in the field or click Browse to locate and select the file.
3.Click Upload to begin transferring the file to the device. The progress bar allows monitoring of the transfer.
The new firmware is unpacked and the Flash memory is reprogrammed. The time remaining is shown by the message going to reset Reconnecting in ... seconds. When the upload is completed successfully, the device reboots automatically.
If the operating status LED lights up red, the upload has failed and must be repeated. To perform the upload, switch to a special page:
1.In the address bar of your browser, enter /main.htm after the device IP address, for example: 192.168.0.10/main.htm
2.Repeat the upload.
16.1.2Configuration
Save configuration data for the camera to a computer and load saved configuration data from a computer to the device.
To save the camera settings:
1.Click Download; a dialog box appears.
2.Follow the instructions to save the current settings.
To load configuration data from the computer to the device:
1.Enter the full path of the file to upload or click Browse to select the desired file.
2.Make certain that the file to be loaded comes from the same device type as the device to be reconfigured.
3.Click Upload to begin transmission to the device. The
progress bar allows monitoring of the transfer. Once the upload is complete, the new configuration is
activated. The time remaining is shown by the message going to reset Reconnecting in ... seconds. When the upload is completed successfully, the device reboots automatically.
16.1.3SSL certificate
To work with an SSL connection, both sides of the connection must have the appropriate certificates. Upload one or more certificate files, one at a time, to the camera.
1.Enter the full path of the file to upload or click Browse to locate the file.
2.Click Upload to start the file transfer.
Once all files have been successfully uploaded, the device must be rebooted. In the address field of the browser, enter /reset after the camera's IP address, for example:
192.168.0.10/reset
The new SSL certificate is valid.
16.1.4Maintenance log
Download an internal maintenance log from the device to send it to Customer Service for support purposes. Click Download and select a storage location for the file.
16.2Licenses
This window is for the activation of additional functions by entering activation codes. An overview of installed licenses is shown.
16.3System Overview
This window is for information only and cannot be modified. Keep this information at hand when seeking technical support. Select the text on this page with a mouse and copy it so that it can be pasted into an
Bosch Security Systems
www.boschsecurity.com
?? Bosch Security Systems, 2011