Bosch NWD-495V03-20P Operating Instructions Manual

Bosch NWD-495V03-20P Operating Instructions Manual

Operating instructions
Table of Contents
DN
FlexiDome
IP
NWD-495V03-10 | NWD-495V03-20
en
Operating Instructions
Table of Contents
loading

Summary of Contents for Bosch NWD-495V03-20P

  • Page 1 FlexiDome NWD-495V03-10 | NWD-495V03-20 Operating Instructions...
  • Page 3: Table Of Contents

    Mounting the unit Attach the mounting plate Make the connections 3.2.1 Power connection 3.2.2 Network (and PoE) connection Mount the camera Camera set-up Camera positioning Focal length and focus Basic settings Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 4 Password protection 7.2.3 Language selection 7.2.4 Date and time 7.2.5 Time server Display Settings 7.3.1 Display stamping Encoder Settings 7.4.1 Selecting an encoder profile 7.4.2 Changing profiles 7.4.3 JPEG posting Camera settings V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 5: Flexidome Dn Ip | En

    7.8.4 Deleting partitions Recording profile 7.10 Recording scheduler 7.10.1 Activating recording 7.10.2 Recording status 7.11 Alarm Settings 7.11.1 Alarm connections 7.12 7.12.1 Analysis 7.12.2 Analysis type 7.12.3 Motion detector 7.12.4 Sensitivity Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 6 Establishing the connection 8.0.3 Connect on alarm 8.0.4 Connecting with a Web browser 8.0.5 Closing the connection Operation with decoder software Maintenance 10.1 Testing the network connection 10.2 Repairs 10.2.1 Transfer and disposal V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 7 FlexiDome | en 7 Troubleshooting Specifications 12.1 Dimensions (mm/inch) 12.2 Accessories 12.2.1 Power transformers Glossary Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 8: Important Safety Instructions

    Power cord and plug protection - Protect the plug and power cord from foot traffic, being pinched by items placed upon or against them at electrical outlets, and its exit from the unit. For units intended to operate with V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 9 (rain, snow, etc.); – liquid has been spilled in or on the equipment; – an object has fallen into the unit; – unit has been dropped or the unit cabinet is damaged; Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 10 14. Attachments, changes, or modifications - Only use attach- ments/accessories specified by the manufacturer. Any change or modification of the equipment, not expressly approved by Bosch, could void the warranty or, in the case of an authorization agreement, authority to operate the equipment.
  • Page 11 Alerts the user to important instructions accompanying the unit. NOTICE! This symbol indicates information or a company policy that relates directly or indirectly to the safety of personnel or pro- tection of property. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 12 Video loss Video loss is inherent to digital video recording; therefore, Bosch Security Systems cannot be held liable for any damage that results from missing video information. To minimize the risk of lost digital information, Bosch Security Systems recom- mends multiple, redundant recording systems, and a procedure to back up all analog and digital information.
  • Page 13 UL MAKES NO REPRESENTATIONS, WARRANTIES, OR CERTIFI- CATIONS WHATSOEVER REGARDING THE PERFORMANCE OR RELIABILITY OF ANY SECURITY OR SIGNALING RELATED FUNC- TIONS OF THIS PRODUCT. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 14 Please dispose of these units at an environmentally compatible recycling facility, per European Directive 2002/96/EC. Bosch has a strong commitment towards the environment. This unit has been designed to respect the environment as much as possible.
  • Page 15: Introduction

    – Event-driven, automatic connection – Convenient maintenance via uploads – Flexible control and data channel encryption – Authentication according to the 802.1x standard – Day/Night camera with mechanically switching IR filter. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 16: Type Number Overview

    Player and archive player – Adobe Acrobat Reader NOTICE! If equipment appears to have been damaged during shipment, repack it in the original packaging and notify the shipping agent or supplier. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 17: System Requirements

    VIDOS, BMVS or DIBOS 8.0 – MPEG-4 compatible hardware decoder from Bosch Security Systems (such as VIP XD) as a receiver and a connected video monitor The minimum PC requirements are: – Operating platform: a PC running Windows 2000 or Win- dows XP with IE 6.0...
  • Page 18: Wide Dynamic Range

    The camera uses the MPEG-4 compression standard. Thanks to efficient encoding, the data rate remains low even with high image quality and can also be adapted to local conditions within wide limits. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 19: Tri Streaming

    An algorithm for detecting movement in the video image is also part of the scope of delivery and can optionally be extended to include special video analysis algorithms. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 20: Snapshots

    Clicking this icon stores the video sequences and they can be replayed with the Player from Bosch Security Systems included with the package. 1.4.14 Intelligent Video Motion Detection...
  • Page 21: Disassembly

    Remove the trim ring with dome by pulling it off of the base. Remove the inner liner by pulling it off of the base. Loosen the three Phillips captive screws until the mount- ing plate separates from the body Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 22: Mounting The Unit

    Solid surface (three Mounting plate pre-drilled 8mm holes) Three screws (supplied with camera) Suspension wire Integrated camera unit and base Three screws (M5, supplied) Fig. 3.2 Surface mounting - top connection V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 23: Attach The Mounting Plate

    To open the connection box, loosen the Phillips screws, and open the cover flips. CAUTION! Never supply power via the Ethernet connection (PoE) when power is supplied via the power connector. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 24: Power Connection

    Slide the connection box back into its position in the base. Push the connections back through the surface wire hole. Secure the integrated camera and base to the mounting plate with three screws. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 25: Camera Set-Up

    For horizontal adjustment (pan), rotate the camera module in the base. Do not rotate more than 360°. – For vertical adjustment (tilt), loosen thumbscrews, posi- tion camera, then gently tighten thumbscrews to secure camera. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 26: Focal Length And Focus

    The camera has an Installer menu in which basic installation settings (IP address) can be accessed. Five keys, located on the side panel, are used for nav- igating through the basic set-up menu. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 27: Install Menu

    Use SELECT to exit the address edit screen. Subnet Mask Enter the Subnet mask (default 255.255.255.0) Gateway Enter a Gateway address. Exit Return to the Install menu Table 4.2 IP address submenu Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 28: Defaults

    Place the sealing ring and the trim ring over the dome. Align the tamper-resistant screws in the trim ring with threaded ends in the mounting base. Use the supplied special screwdriver bit to tighten the three tamper-resistant screws. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 29: Network Connection

    The camera must be assigned a valid IP address to operate on your network. The default address pre-set at the factory is 192.168.0.1 Start the Web browser. Enter the IP address of the camera as the URL. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 30 NOTICE! If the connection is not established, the maximum number of possible connections may already have been reached. Depending on the device and network configuration, up to 20 web browsers, or 50 VIDOS or BVMS connections are supported. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 31: Secured Network

    Radius network, connect it directly to a PC via a crossed network cable and configure the two parameters, identity and password. Only after these have been configured can you communicate with the camera via the network. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 32: Operation Via The Browser

    6.1.1 Processor load When accessing the camera with a browser, the processor load is displayed in the upper right of the window next to the Bosch logo. Move the mouse cursor over the icons to display numerical val- ues. This information can help with problem solving or when fine tuning the device.
  • Page 33: Image Selection

    Livepage can be saved on the computer's hard drive. The sequences are recorded at the resolution specified in the encoder configuration. The storage location depends on the configuration of the camera. Click the recording icon to record video sequences. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 34: Running Recording Program

    Click the symbol for recording video sequences again. Sav- ing is terminated. Installing Player You can play back saved video sequences using the Player from Bosch Security Systems, which can be found on the software CD supplied. NOTICE! A corresponding MPEG ActiveX (located on the CD provided with the product) must be installed on the computer in order to play back saved video sequences using the Player.
  • Page 35: Recordings Page

    Click a partition name from the list to display the record- ings for this partition. Click a list entry. The playback for the selected sequence starts immediately in the video window. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 36: Controlling Playback

    The date and time display below the bar provides orienta- tion to the second. You can control playback by means of the buttons below the video image. The buttons have the following functions: Start playback Pause playback V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 37 Use the bookmarks as follows: Jump to the previous bookmark Set bookmark Jump to the following bookmark – Right-click a bookmark to delete it. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 38 FlexiDome NOTICE! Bookmarks are only valid while you are in the Recordings page; they are not saved with the sequences. As soon as you leave the page all bookmarks are deleted. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 39: Configuration Via The Browser

    All unit parameters can be accessed in this mode. Changes that influence the fun- damental functioning of the unit (for example firmware updates) can only be made using the configuration menu. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 40 NOTICE! Save the changes made in each window by clicking Set. Clicking the Set button saves only the settings in the current window. Changes in any other fields are ignored. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 41: General Settings

    Camera ID Each camera should be assigned a unique identifier that can be entered here as an additional means of identification. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 42: Password Protection

    Service or if the unit is not pro- tected by a password. Enter the password for the selected user name here. Confirm password Re-enter the new password to rule out typing mistakes. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 43: Language Selection

    This is added automatically. Enter the current time or click Synchr. PC to apply the sys- tem time from your computer to the camera. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 44: Time Server

    If there are empty lines at the bottom of the table, for example after deletions, you can add new data by marking the row and selecting values from the list boxes. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 45: Display Settings

    Top, at the Bottom or at a position of your choice, which you have pre-defined using HyperTerminal, using the Custom option. Or it can be set to Off if no overlay of this information is to be shown. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 46: Encoder Settings

    For encoding the video signal, you can select two profiles and change the presets for the profiles. 7.4.1 Selecting an encoder profile You can adapt the MPEG-4 data transmission to the operating environment (for example network structure, bandwidth, data V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 47 You will see a preview for each data stream in the right section of the window. The preview of the data stream currently selected is marked by a frame. Various additional items of infor- mation regarding data transmission are displayed and continu- Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 48: Changing Profiles

    Therefore it is generally best to use the default profiles. The profiles should only be changed if you are completely familiar with all the configuration options. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 49 CIF 352 × 288/240 pixels – 1/2 D1 352 × 576/480 pixels – 2CIF 704 × 288/240 pixels – 4CIF/D1 704 × 576/480 pixels – 2/3 D1 464 × 576/480 pixels Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 50 4 and 31 on a slide bar. The value 4 represents the best quality with, if necessary, a lower frame refresh rate depending on the settings for the maximum data V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 51: Jpeg Posting

    Date/time suffix: The date and time are automatically added to the file name. When setting this parameter, please ensure that the date and time of the unit are always correctly set. Example: the file snap021606_124530.jpg Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 52 Check the box to activate one or more camera inputs for the JPEG image. An enabled camera input is indicated by a check mark. NOTICE! The numbering follows the labeling of the video inputs on the actual unit. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 53: Camera Settings

    At -15 the camera controls the average video level, at +15 the camera controls the peak video level. ALC Speed Adjust the speed of the video level control loop (Slow, Medium or Fast). Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 54: Shutter/Agc

    This is normal camera behavior. Sensitivity Up may cause some motion blur on moving objects. Gain In AGC mode the camera automatically sets the gain to the low- est possible value needed to maintain a good picture. Select V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 55: Day/Night

    Color: the camera gives color pictures as long as the light level permits. The camera recognizes IR illuminated scenes to prevent unwanted switching to color mode. There are two modes for IR contrast: Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 56: Enhance

    In AUTO mode the camera automatically reduces the noise in the picture. This may cause some motion blur on moving objects. Enhanced Dynamic Range In XF-DYN mode the camera automatically optimizes the con- trast in the picture. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 57: Color

    Blue Gain ATW mode and AWB hold mode: adjusts the B gain to optimize around the white point. Saturation Adjusts the color saturation. -15 gives a monochrome image Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 58: Back Light Compensation (Blc)

    When you click Area Selection a pop-up window appears with a still picture of the received video. Use your mouse to select an area in the picture. BLC Level adjusts the balance between the selected BLC area and its surrounding. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 59: Installer Options

    Recording Manager (VRM) control all recording when accessing an iSCSI server. The VRM is an external program that configures recording tasks for video servers. For further information, con- tact your local customer service at Bosch Security Systems. Bosch Security Systems Operating Instructions...
  • Page 60: Type

    Click Log to view a status report with logged actions. A new window opens. In this window, click Delete to delete all entries. Entries are deleted immediately; you cannot undo this process. Click Close to close the window. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 61: Iscsi Settings

    Enter the IP address of the required iSCSI server here. Click Connect. The connection to the IP address is estab- lished. The iSCSI LUN map field contains the correspond- ing logical drives. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 62: Iscsi Lun Map

    Enter the LUN of the required drive. 7.7.6 Target password If the drive is password protected, enter the password. NOTICE! You may not enter a new password. This is only possible by configuring the iSCSI storage device. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 63: Initiator Name

    Click Log to view a status report with logged actions. A new window opens. In this window, click Delete to delete all entries. Entries are deleted immediately; you cannot undo this process. Click Close to close the window. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 64: Partitioning

    Click Create partition to start the wizard for creating parti- tions. The first window appears. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 65 Finish button. CAUTION! All modifications to settings are only effective if you complete the configuration in the last window by clicking Finish. Switch to the last window if necessary. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 66: Partition Status

    CAUTION! Changes to a partition lead to a re-organization which results in the loss of all sequences stored on that partition. Consequently, you should back up all important sequences on the computer's hard drive before modifying the partition. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 67 In Linear mode the recording proceeds until the entire hard drive space is full. The recording is then stopped until old recordings have been deleted. Number of alarm tracks NOTICE! Alarm tracks must be set up for alarm recording. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 68 You can delete all recordings in a partition at any time. CAUTION! Check the recordings before deleting and back-up important sequences on the computer's hard drive. – Click Format! to delete all recordings in the current parti- tion. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 69: Deleting Partitions

    You can define up to ten separate recording profiles. You then assign these to individual days or times of day in the recording scheduler. Modify the names of the recording profiles on the tabs in the Recording planner page. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 70 Select the encoder profile to use for continual recording. NOTICE! The recording profile can deviate from the standard setting Active profile and is only used during an active recording. Encoder Select which data stream to record here. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 71 Select the encoder profile to use for recording during the post- alarm time. The Standard profile option sets this to the same as the standard profile. Motion detection/video alarm Select the alarm type that is to trigger a recording. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 72: Recording Scheduler

    Use the right mouse button to deselect any of the intervals. Click Select all to select all of the intervals to be assigned to the selected profile. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 73: Activating Recording

    Recording scheduler are deactivated and the configura- tion cannot be modified. You can terminate recording at any time to modify the configuration. Click Start to activate the recording schedule. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 74: Recording Status

    IP address in the event of an alarm. NOTICE! Stream 2 is always transmitted for alarm connections. This should be taken into account when assigning the profile. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 75 If you select On, only encrypted ports are available for the destination port. SSL encryption must be activated and configured on both sides of a Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 76 IP addresses after each restart, connection breakdown or network failure. NOTICE! Stream 2 is always transmitted for automatic connections. This should be taken into account when assigning the profile. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 77: Vca

    If you select Motion+ analysis, for example, the sensor fields in which movement is registered light up. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 78: Analysis Type

    The current alarm status is displayed for information purposes. NOTICE! Additional analysis algorithms with comprehensive functions such as IVMD are available from Bosch Security Systems. 7.12.3 Motion detector Motion detection is available for the Motion+ analysis type. For the detector to function, the following conditions must be met: –...
  • Page 79: Sensitivity

    Click Select area to configure the sensor fields. A new win- dow opens. If necessary, click Clear all first to clear the current selec- tion (fields marked red). Left-click the fields to be activated. Activated fields are marked red. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 80: Tamper Detection

    Scene too bright Activate this function if tampering associated with exposure to extreme light (for instance, shining a flashlight directly on the objective) should trigger an alarm. The average brightness of V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 81 You can activate or deactivate each of these fields indi- vidually. NOTICE! Select only those areas for reference monitoring in which no movement takes place and that are always evenly lit, as false alarms could otherwise be triggered. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 82: Alarm E-Mail

    7.13.2 Mail server IP address Enter the IP address of a mail server that operates on the SMTP standard (Simple Mail Transfer Protocol). Outgoing e-mails are V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 83: Layout

    This makes it easier to identify the origin of the e-mail. 7.13.6 Send e-mail for testing Test the e-mail function by clicking Send now. An alarm e-mail is immediately created and sent. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 84: Service Settings

    Click Set after entering a new IP address. – To do this, enter the old IP address followed by / reset (for instance 192.168.0.80/reset) in the address bar of your web browser. When the camera is V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 85 The camera uses the TLS 1.0 protocol. Ensure that the browser has been configured to support this protocol. Also ensure that Java application support is activated (in the Java Plug-in Con- trol Panel of the Windows Control Panel). Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 86 1. SNMP host address / 2. SNMP host address The camera supports the SNMP V2 (Simple Network Manage- ment Protocol) for managing and monitoring network compo- V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 87: Multicasting

    VIDOS or BVMS, will not find the camera. 7.14.2 Multicasting In addition to a 1:1 connection between an encoder and a sin- gle receiver (unicast), the camera can enable multiple receivers Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 88 The camera supports multi-unicast connections for up to five simultaneously connected receivers. NOTICE! Duplication of data places a heavy demand on the CPU and can lead to impairment of the image quality under certain circumstances. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 89: Encryption

    Click an entry to select it (select multiple entries by hold- ing the control key while clicking). Click Clear keys to delete the keys for the marked streams. These streams are no longer encrypted. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 90: Version Information

    This window is for information only and cannot be modified. Keep this information at hand when seeking technical support. For example, you can copy the hardware and firmware version numbers to paste them into an e-mail. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 91: Livepage Configuration

    Mark the check boxes for the information to be displayed on the Livepage. The selected elements are checked. Check on the Livepage whether and how the desired items are displayed. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 92 When the IVMD 2.0 algorithm is activated, object trajectories from VCA are displayed in the live video stream. Show event log The event messages are displayed with the date and time in a field next to the video image. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 93: Licenses

    Livepage. – If necessary, click Search to find a suitable folder. 7.14.6 Licenses You can enter the activation key to release additional functions or software modules. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 94: Maintenance

    The latest firmware can be obtained from your customer service center or from the Bosch Security Systems download area. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 95 You can save configuration data for the camera to a computer and load saved configuration data from a computer to the unit. Click Download; a dialog box appears. Follow the instructions to save the current settings. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 96: Function Test

    Can the camera be called remotely? – Does the camera transmit all the data required? – Does the camera respond as desired to alarm events? – Is it possible to control peripheral devices if necessary? V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 97: Connections Between Video Servers

    This connection option can also be used to connect a transmit- ter and a compatible receiver using a switch connected to the alarm input. In this case, no computer is needed to establish the connection. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 98: Connecting With A Web Browser

    In the title bar of the Monitor window on the page Connec- tions, click the X icon to end the display of the video images on the connected monitor. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 99: Operation With Decoder Software

    IP video security solution that provides seamless management of digital video, audio and data across any IP net- work. It is designed to work with Bosch CCTV products as part of a total video security management system. Now you can inte- grate your existing components into one easy-to-manage sys- tem, or use Bosch’s full-line capabilities and benefit from a...
  • Page 100: Maintenance

    Defective or superfluous devices and parts should be disposed of profes- sionally or taken to your local collection point for hazardous materials. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 101: Troubleshooting

    Troubleshooting | en 101 Troubleshooting If you cannot resolve a fault, please contact your supplier or system integrator or go direct to Bosch Security Systems Cus- tomer Service. The version numbers of the internal processors can be viewed on a special page. Please note this information before contact- ing Customer Service.
  • Page 102 LUN mapping not The iSCSI system does not Delete the identity on the iSCSI- possible. support the use of initiator parameter configuration page. identification. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 103: Specifications

    OSD with softkey operation; web browser; Configuration Man- ager LAN interface 1 × Ethernet 10/100 Base-T, auto-sensing, half/full duplex, RJ45 Video standards MPEG-4, JPEG Video data rate 9.6 Kbps to 6 Mbps (constant and variable) Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 104 120 ms (PAL/NTSC, MPEG-4, no network delay) Image refresh rate 1 ... 50/60 fields/s adjustable (PAL/NTSC) field/image-based cod- Network protocols TCP, UDP, IP, HTTP(S), IGMP v2/v3, ICMP, ARP, RTP, Telnet, DHCP, SNMP V2, 802.1x V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 105: Dimensions (Mm/Inch)

    FlexiDome Specifications | en 105 12.1 Dimensions (mm/inch) 40.37 42.03 1.59 1.65 22.5 12.2 Accessories Contact your Bosch representative for the latest available accessories. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 106: Glossary

    Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol Internet Protocol The main protocol used on the Internet, normally in con- junction with the Transfer Control Protocol (TCP): TCP/IP V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 107 RADIUS is the de-facto standard for centralized authentication of dial-ins for modems, ISDN, VPN, wireless LAN (see 802.1x), and DSL. RFC 868 A protocol for synchronizing computer clocks over the Inter- Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
  • Page 108 Time-To-Live; life cycle of a data packet in station transfers User Datagram Protocol Uniform Resource Locator Unshielded Twisted Pair See wide area network Wide area network A long distance link used to extend or connect remotely located local area networks V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
  • Page 110 Bosch Security Systems Robert-Koch-Straße 100 D-85521 Ottobrunn Germany www.boschsecuritysystems.com © Bosch Security Systems, 2007...

Table of Contents