4.6.1360° panoramic camera - floor- or ceiling mounted22
4.6.2180° panoramic camera - floor- or ceiling mounted24
4.6.3360° panoramic camera - wall mounted25
4.6.4180° panoramic camera - wall mounted26
4.6.5Cropped view on a panoramic camera27
4.7SSH Tunneling28
5
5.1Starting Operator Client29
5.2Accepting a new configuration30
5.3Accessing the system30
5.4Using Server Lookup30
6
6.1Selecting a time zone32
6.2Displaying a camera in an Image pane33
6.3Displaying a panoramic camera33
6.4Switching the viewing mode of panoramic camera34
6.5Displaying a dual thermal/optical camera34
6.6Displaying cameras from multiple Management Servers35
6.7Finding an item in the Logical Tree35
6.8Changing the number of Image pane rows35
6.9Arranging and resizing Image panes36
6.10Displaying the Alarm Image window36
6.11Starting manual recording37
6.12Starting a pre-configured camera sequence37
6.13Starting an automatic camera sequence38
6.14Using one channel audio mode39
6.15Using multichannel audio mode39
Using the Help7
Introduction9
System overview11
Concepts13
Getting started29
Displaying camera images32
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
4en | Table of contentsBVMS
6.16Using digital zoom40
6.17Saving a single image40
6.18Printing a single image40
6.19Switching to full-screen mode41
6.20Displaying or hiding the Image pane bars41
6.21Displaying information on a camera41
6.22Enabling video content analysis (VCA)42
6.23Showing video content analysis (VCA) rules42
6.24Starting instant playback42
6.25Assigning a camera to a monitor43
6.26Using audio mode43
6.27Using the Intercom functionality43
6.28Locking the control of a PTZ camera45
6.29Updating the reference image45
6.30Displaying a monitor group46
6.31Controlling a monitor wall46
6.32Selecting live stream for display47
6.33Displaying video via low bandwidth47
6.34Using TCP for reliable connection49
6.35Connecting to an unmanaged site49
6.36Displaying a video analytics alarm50
6.37Displaying Intelligent Insights widgets50
7
Using maps and the PTZ cameras51
7.1Displaying a map51
7.2Controlling PTZ cameras51
7.3Using in-window control of a camera52
7.4Using the ROI function52
7.5Using Intelligent Tracking53
8
Using favorites and bookmarks54
8.1Adding items to the Favorites Tree54
8.2Creating/editing views55
8.3Adding a bookmark56
8.4Editing a bookmark57
8.5Loading a bookmark57
8.6Exporting bookmarks57
8.6.1Export Bookmark dialog box58
8.6.2Export Multiple Bookmarks dialog box59
9
Managing recorded videos61
9.1Selecting a time zone61
9.2Finding recorded video62
9.2.1Video Search Results window62
9.3Playing recorded videos63
9.4Using the Timeline63
9.5Changing the playback speed63
9.6Restricting or unrestricting video64
9.6.1Restrict Video dialog box64
9.6.2Unrestrict Video dialog box65
9.7Protecting or unprotecting video65
9.7.1Protect Video dialog box66
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSTable of contents | en5
9.7.2Unprotect Video dialog box66
9.8Deleting video data67
9.9Verifying the authenticity of video data67
9.9.1Authenticity verification result dialog box68
9.10Exporting video data69
9.10.1Exporting a time period71
9.10.2Exporting a single search entry71
9.10.3Exporting into a single file72
9.10.4Providing a password for export72
9.10.5Export Video dialog box73
9.10.6Export dialog box74
9.11Loading exported video75
9.12Enabling video content analysis (VCA)75
9.13Performing a Forensic Search76
9.14Forensic Search Results window77
9.15Finding logbook entries77
9.15.1Finding logons to an unmanaged site78
9.15.2Please select a Server78
9.15.3Select Search Parameters dialog box78
9.15.4Event Selection dialog box82
9.15.5Device Selection dialog box82
9.15.6Search Conditions dialog box82
9.15.7Logbook Results: dialog box82
9.16Displaying text data83
9.17Searching for text data84
9.18Searching for text data in logbook entries85
9.19Erasing text data from logbook entries85
9.20Displaying video via low bandwidth86
9.21Switching the recording source87
9.22Connecting to an unmanaged site88
10
Handling events and alarms90
10.1Accepting an alarm90
10.2Adding comments to an alarm91
10.3Clearing an alarm91
10.4Customizing the Alarm List window92
10.5Displaying the Live Image window92
10.6Switching alarm modes of Alarm Image window92
10.7Starting a workflow93
10.8Un-accepting an alarm93
10.9Triggering a user event94
10.10Alarm List window94
11
Managing Person Identification alarms95
11.1Managing persons for a Person Identification alarm95
12
Controlling intrusion panel functions97
12.1Switching off alarm sirens97
12.2Operating doors97
12.3Bypassing a point97
12.3.1Arming an area98
13
Controlling access control functions99
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
6en | Table of contentsBVMS
13.1Granting and denying access99
13.2Operating doors99
14
Using a CCTV keyboard100
14.1Using KBD Universal XF keyboard100
14.1.1KBD Universal XF keyboard user interface100
14.2Bosch IntuiKey keyboard user interface102
14.2.1Status display103
14.3Using a Bosch IntuiKey keyboard connected to a workstation103
14.3.1Starting the keyboard104
14.3.2Entering operation modes104
14.3.3Displaying cameras104
14.3.4Using the joystick105
14.3.5Using softkeys105
14.4Using a Bosch IntuiKey keyboard connected to a decoder107
14.4.1Starting the keyboard107
14.4.2Displaying cameras108
14.4.3Using the joystick108
14.4.4Using softkeys108
15
User interface109
15.1Live Mode109
15.2Playback Mode111
15.3Alarm Mode (Alarm Display)113
15.4Icons used115
15.5Menu commands119
15.6Options dialog box122
15.6.1Control tab123
15.6.2Display tab123
15.6.3Audio tab124
15.6.4Transcoding tab124
15.7Logical Tree window124
15.8Favorites Tree window125
15.9Bookmarks window125
15.10Image window126
15.11Image pane127
15.12Search box127
15.13Exports window128
15.14Map window128
15.15Monitor Wall Image window128
15.16PTZ Control window129
15.17Timeline window130
16
Keyboard shortcuts132
16.1General controls132
16.2Playback controls132
16.3Image window controls132
17
Troubleshooting133
17.1Reestablishing the connection to a Bosch IntuiKey keyboard134
Glossary135
Index140
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSUsing the Help | en7
1Using the Help
To find out more about how to do something in BVMS, access the online Help using any of the
following methods.
To use the Contents, Index, or Search:
4On the Help menu, click Display Help. Use the buttons and links to navigate.
To get help on a window or dialog:
4On the toolbar, click .
OR
4Press F1 for help on any program window or dialog.
1.1Finding information
You can find information in the Help in several ways.
To find information in the Online Help:
1.On the Help menu, click Help.
2.If the left-hand pane is not visible, click the Show button.
3.In the Help window, do the following:
Click:To:
ContentsDisplay the table of contents for the Online Help. Click each book to
display pages that link to topics, and click each page to display the
corresponding topic in the right-hand pane.
IndexSearch for specific words or phrases or select from a list of index
keywords. Double-click the keyword to display the corresponding topic
in the right-hand pane.
SearchLocate words or phrases within the content of your topics. Type the
word or phrase in the text field, press ENTER, and select the topic you
want from the list of topics.
Texts of the user interface are marked bold.
4The arrow invites you to click on the underlined text or to click an item in the application.
Related Topics
4Click to display a topic with information on the application window you currently use.
This topic provides information on the application window controls.
Concepts, page 13
Notice!
This symbol indicates a potential risk of property damage or data loss.
provides background information on selected issues.
1.2Printing the Help
While using the Online Help, you can print topics and information right from the browser
window.
To print a Help topic:
1.Right-click in the right pane and select Print.
The Print dialog box opens.
2.Click Print.
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
8en | Using the HelpBVMS
PThe topic is printed to the specified printer.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSIntroduction | en9
2Introduction
Click the link to access the Open Source Software licenses used by BVMS and the Mobile App:
http://www.boschsecurity.com/oss/
Covered by one or more claims of the patents listed at patentlist.hevcadvance.com.
1Menu barAllows you to select a menu command.
2ToolbarDisplays the available buttons. Point to an icon to
display a tooltip.
3Playback controlsAllows you to control instant playback or a camera
sequence or alarm sequence.
4Performance meterDisplays the CPU usage and the memory usage.
5Time zone selectorSelect an entry for the time zone to be displayed in
most time related fields.
Only available if at least one Management Server or
unmanaged site in the Logical Tree is located in
another time zone as your OperatorClient.
6Controls for Image panesAllows you to select the required number of Image
panes and to close all Image panes.
7Image windowDisplays the Image panes. Allows you to arrange the
Image panes.
8Image paneDisplays a camera, a map, an image, a document
(HTML file).
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
10en | IntroductionBVMS
9
10
11
Alarm List window
PTZ Control window
Logical Tree window
Favorites Tree window
Bookmarks window
Map window
Displays all alarms that the system generates.
Allows you to accept or clear an alarm or to start a
workflow, for example, by sending an E-mail to a
maintenance person.
The Alarm List is not being displayed, when the
connection to the Management Server is lost.
Allows you to control a PTZ camera.
Displays the devices your user group has access to.
Allows you to select a device for assigning it to an
Image pane.
Allows you to organize the devices of the Logical Tree
as required.
Allows to manage bookmarks.
Displays a site map. Allows you to drag the map to
display a particular section of the map.
If activated, a map is displayed automatically for each
camera displayed in an Image pane. In this case, the
camera must be configured on a map.
This manual guides you through the basic steps of the configuration and operation with BVMS.
For detailed help and step-by-step instructions read the Configuration Manual and the User
Manual or use the Online Help.
BVMS Export Player displays exported recordings.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSSystem overview | en11
3System overview
If you plan to install and configure BVMS, participate in a system training on BVMS.
Refer to the Release Notes of the current BVMS version for supported versions of firmware
and hardware and other important information.
See data sheets on Bosch workstations and servers for information on computers where
BVMS can be installed.
The BVMS software modules can optionally be installed on one PC.
Important components
ComponentDescription
Management Server (selectable
in Setup)
Config WizardEasy and fast setup of a recording system.
ConfigurationClient (selectable
in Setup)
OperatorClient (selectable in
Setup)
Video Recording Manager
(selectable in Setup)
Mobile Video Service
(selectable in Setup)
Stream management, alarm management, priority
management, Management logbook, user management,
device state management. Additional Enterprise System
license: Managing Enterprise User Groups and Enterprise
Accounts.
System configuration and administration for
OperatorClient.
Live monitoring, storage retrieval and playback, alarm and
accessing multiple Management Server computers
simultaneously.
Distributing storage capacities on iSCSI devices to the
encoders, while handling load balancing between multiple
iSCSI devices.
Streaming playback video and audio data from iSCSI to
Operator Clients.
Provides a transcoding service that transcodes the live and
recorded video stream from a camera configured in BVMS
to the available network bandwidth. This service enables
video clients like an iPhone or a Web client to receive
transcoded streams, for example for unreliable network
connections with limited bandwidth.
Web ClientYou can access live and playback videos via Web browser.
Mobile AppYou can use the Mobile App on iPhone or iPad to access
live and playback video.
Bosch Video Streaming Gateway
(selectable in Setup)
CameoSDK (selectable in
Setup)
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
Provides the integration of 3rd party cameras and NVR-like
recording, e.g. in low-bandwidth networks.
The CameoSDK is used to embed BVMS live and playback
Image panes to your external third-party application. The
Image panes follow the BVMS based user permissions.
The CameoSDK provides a subset of the BVMS
OperatorClient functionalities that enables you to create
applications similar to the OperatorClient.
12en | System overviewBVMS
ComponentDescription
Client EnterpriseSDKThe Client EnterpriseSDK is meant to control and monitor
the behaviour of OperatorClient of an Enterprise System
by external applications. The SDK allows to browse devices
that are accessible by the running, connected
OperatorClient and to control some UI functionalities.
ClientSDK / ServerSDKThe ServerSDK is used to control and monitor the
Management Server by scripts and external applications.
You can use those interfaces with a valid administrator
account.
The ClientSDK is used to control and monitor the
OperatorClient by external applications and scripts (part
of the related server configuration).
3.1Hardware requirements
See the data sheet for BVMS. Data sheets for platform PCs are also available.
3.2Software requirements
See the data sheet for BVMS.
3.3License requirements
See the data sheet for BVMS for the available licenses.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en13
4Concepts
This chapter provides background information on selected issues.
4.1BVMS design concepts
Single Management Server System, page 13
A single BVMS Management Server System provides management, monitoring and control of
up to 2000 cameras/encoders.
Enterprise System, page 14
An Enterprise Management Server provides simultaneous access to multiple
ManagementServers. The Enterprise System allows full access to events and alarms from
multiple subsystems.
Server Lookup, page 15
The Server Lookup feature provides a list of available BVMS ManagementServers to the BVMS
OperatorClient. The Operator can select a server out of the list of available server. Connected
to the Management Server the Client has full access to the Management Server.
Unmanaged site, page 16
Devices can be grouped to unmanaged sites. Devices under unmanaged sites are not
monitored by the Management Server. The Management Server provides a list of unmanaged
sites to the OperatorClient. The Operator can connect on demand to the site and gets access
to live video data and recorded video data. Event and alarm handling is not available in the
unmanaged site concept.
4.1.1Single Management Server System
–A single BVMS Management Server can manage up to 2000 channels.
–A BVMS Management Server provides management, monitoring, and control of the entire
system.
–The BVMS OperatorClient is connected to the Management Server and receives events
and alarms from the BVMS Management Server and shows live and playback.
–In most cases all devices are in one local area network with a high bandwidth and a low
latency.
Responsibilities:
–Configuring data
–Event log (logbook)
–User profiles
–User priorities
–Licensing
–Event- and alarm-management
Live, playback, events, alarms
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
14en | ConceptsBVMS
Management Server
OperatorClient / ConfigurationClient
Cameras
VRM
iSCSI
Other devices
4.1.2Enterprise System
–The target of a BVMS Enterprise System is to enable a user of an Operator Client to
–Clients connected to an Enterprise Server have full access to all cameras and recordings
from the subsystems.
–Clients connected to an Enterprise Server have full real time awareness of events and
alarms of all subsystems.
–Typical application areas:
–Metros
–Airports
Live, playback, events, alarms
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en15
BVMS Enterprise Management Server
BVMS OperatorClient / ConfigurationClient
BVMS Subsystem
Refer to
–Accessing the system, page 30
4.1.3Server Lookup
–The BVMS Server Lookup feature allows Operators to connect to a BVMS Management
Server out of a provided list of servers.
–A single user of ConfigurationClient or OperatorClient can connect to multiple system
access points sequentially.
–System access points can be Management Server or Enterprise Management Server.
–Server Lookup uses dedicated Management Server to host the Server List.
–Server Lookup and Management Server or Enterprise Management Server functionally can
be run on one machine.
–Server Lookup supports you in locating system access points by their names or
descriptions.
–Once connected to the Management Server the OperatorClient receives events and
alarms from the BVMS Management Server and shows live and playback
On demand live, playback, events, alarms - connected
On demand live, playback, events, alarms - not connected
Management Server
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
16en | ConceptsBVMS
Server list
OperatorClient
Connected BVMS from server list
Not connected BVMS from server list
Refer to
–Using Server Lookup, page 30
4.1.4Unmanaged site
–A system design option in BVMS with a large number of small subsystems.
–It allows to configure up to 9999 locations in one BVMS Management Server
–Operators can access live and recorded video data from up to 20 sites simultaneously.
–For an easy navigation sites can be grouped in folders or can be placed on maps.
Predefined username and password allow operators to quickly connect to a site .
The unmanaged site concept supports IP based BVMS system as well as analog DVR solutions:
–Bosch DIVAR AN 3000 / 5000 analog recorders
–DIVAR hybrid recorders
–DIVAR network recorders
–DIP 3000/7000 units IP based recording
–Single BVMS Management Server System
Adding a site for central monitoring only requires a license per site and is independent of the
number of channels in thesite.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en17
Live, playback, events, alarms
4.2Recording
This chapter explains the different recording and replay related functions in the system.
On demand live and playback video traffic
Management Server
OperatorClient / ConfigurationClient
site
DVR
4.2.1Automated Network Replenishment (ANR)
Intended use
When a failure of the network or the central storage occurs, the ANR function ensures that the
encoder transmits the locally buffered recording of the missing time period to the central
storage after the failure is fixed.
The following graphic shows the transmission of video data after a network or storage failure
is fixed.
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
18en | ConceptsBVMS
1 Video
2 Encoder, IP network
3 SD card (ring buffer)
4 iSCSI target (central storage)
Example: Work around network failure
If the network fails unexpectedly, the ANR function completes the central storage with the
locally buffered recording when the network is available again.
Example: Store video data when network is not available
A subway has no network connection to the central storage when located between stations.
Only during regular stops the buffered recording can be transmitted to the central storage.
Ensure that the time period that is required for transferring the buffered recording, does not
exceed the time period of a stop.
Example: ANR for alarm recording
The pre-alarm recording is stored locally. Only in case of an alarm, this pre-alarm recording is
transmitted to the central storage. If no alarm occurs, the obsolete pre-alarm recording is not
transmitted to the central storage and, hence, does not burden the network.
Limitations
Notice!
You cannot use playback from the local storage media when the passwords for `user` and
`live` are set on the encoder. Remove the passwords if required.
The ANR function only works with VRM recording.
The ANR function does not work with an encoder for which a secure connection for live
display is configured.
You must have configured the storage media of an encoder to use the ANR function.
The encoder for which you configure the ANR function, must have firmware version 5.90 or
later. Not all encoder types support the ANR function.
You cannot use the ANR function with dual recording.
Your iSCSI storage system must be properly configured.
The following list contains the possible reasons if you cannot configure the ANR function:
–Encoder is not reachable (wrong IP address, network failure, etc.).
–Storage media of the encoder not available or read-only.
–Wrong firmware version.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en19
–Encoder type does not support the ANR function.
–Dual recording is active.
4.3Alarm handling
Alarms can be individually configured to be handled by one or more user groups. When an
alarm occurs, it appears in the Alarm List of all users in the user groups configured to receive
that alarm. When any one of these users starts to work on the alarm, it disappears from the
Alarm List of all other users.
Alarms are displayed on a workstation’s alarm monitor. This behavior is described in the
following paragraphs.
Alarm flow
1.An alarm occurs in the system.
2.Alarm notifications appear in the Alarm Lists of all users configured for this alarm. Alarm
video is immediately displayed on configured monitors. If it is an automatically displayed
alarm (auto pop-up), the alarm video is also automatically displayed on the
OperatorClient workstation’s alarm monitors.
If the alarm is configured as an auto-clear alarm, the alarm is removed from the Alarm List
after the auto-clear time (configured in the ConfigurationClient).
On monitors, any quad views from VIPXDs are temporarily replaced by full-screen
displays.
3.One of the users accepts the alarm. The alarm video is then displayed on this user's
workstation (if it is not already displayed via auto pop-up). The alarm is removed from all
other Alarm Lists and alarm video displays.
4.The user who accepted the alarm invokes a workflow that can include reading an action
plan and entering comments. This step is optional - requirements for workflow can be
configured by the administrator.
5.Finally, the user clears the alarm. This removes the alarm from his Alarm List and alarm
display.
On a monitor group, the monitors return to the cameras that were displayed before the
alarm occurred.
Alarm Image window
1.To display alarm video, the Alarm Image window replaces the Live or Playback Image
window on the monitor that has been configured for alarm display.
2.Each alarm gets a row of Image panes. Up to 5 Image panes can be associated with each
alarm. These Image panes can display live video, playback video, or maps.
On a monitor group, each alarm can call up cameras on a row of monitors. The number of
cameras in the row is limited by the number of columns in the monitor group. Monitors in
the row that are not used for alarm video can be configured to either continue with their
current display or to display a blank screen.
3.Higher priority alarms are displayed above lower priority alarms on both monitor rows
and the OperatorClient workstation display alarm rows.
4.If the Alarm image window is completely full of Alarm image rows and an additional alarm
must be displayed, the lowest priority alarms "stack up" in the bottom row of the Alarm
image window. You can step through the stacked alarms with the controls at the left side
of the alarm row.
You can step through the alarm stacks on monitor groups with control buttons in the
Monitors window of the OperatorClient workstation display. Monitors in alarm are
indicated by red icons with blinking "LEDs".
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
20en | ConceptsBVMS
The alarm title, time, and date can be optionally be displayed on all monitors, or only the
first monitor in the alarm row.
5.For equal priority alarms, the administrator can configure the order behavior:
–Last-in-First-out (LIFO) mode: in this configuration, new alarms are inserted above
older alarms of the same priority.
–First-in-First-out (FIFO) mode; in this configuration, new alarms are inserted below
older alarms of the same priority.
6.An alarm's Image row can appear in the Alarm Image window in one of two ways:
–When it is generated (auto pop-up). This occurs when the alarm priority is higher
than display priority.
–When the alarm is accepted. This occurs when the alarm priority is lower than
display priority.
Auto pop-up alarms
Alarms can be configured to automatically display (pop up) in the Alarm Image window, based
on the alarm priority. Each user group's live and playback displays are also assigned priorities.
When alarms are received with priority higher than that of the user's display, the alarm
automatically displays its alarm row in the Alarm Image window. If the Alarm Image window is
not currently displayed, it automatically replaces the Live or Playback Image window on the
alarm-enabled monitor.
Although auto pop-up alarms are displayed in the Alarm Image window, they are not
automatically accepted. They can be displayed on multiple users' displays simultaneously.
When a user accepts an auto pop-up alarm, it is removed from all other users Alarm Lists and
alarm displays.
Alarm handling in case of shutdown
On a server shutdown all active alarms are preserved. The alarms are restored and reappear in
the Alarm List window, when the system restarts.
Alarms in the state Accepted or Workflow are automatically set back to the state Active when
the system restarts. Comments entered for alarms in the state Workflow are preserved.
Notice!
The alarm data is automatically saved every minute, so the maximum data loss is the data
accumulated in one minute.
Intended use of inactivity logoff is to protect an OperatorClient or ConfigurationClient during
the absence of the operator or administrator.
You can configure per user group that OperatorClient shall be logged off automatically after a
specified time period without activity.
For ConfigurationClient no user groups are available. The inactivity logoff setting is valid only
for the admin user.
All operations with keyboard, mouse and CCTV keyboard affect the specified time period for
inactivity logoff. Automatic activities of OperatorClient do not affect the time period.
Automatic activities of ConfigurationClient like firmware upload or iSCSI setup prevent the
inactivity logoff.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en21
You can also configure the inactivity logoff for a BVMS Web Client.
Short before an inactivity logoff, a dialog box reminds the user to actively prevent the
inactivity logoff.
The Logbook records an occurred inactivity logoff.
Example
If a workstation is located in a public area, the inactivity logoff minimizes the risk that on an
unattended workstation OperatorClient is accessed by an unauthorized person.
An administrator group member shall logoff automatically after inactivity but a desk officer
(operator group) might just watch video without operating the system and does not want an
inactivity logoff.
Limitations
ClientSDK activity does not support the inactivity logoff, this means that the activity of
ClientSDK does not affect the specified time period.
4.5Version independent Operator Client
For Compatibility Mode both OperatorClient and Management Server must have a
versionlater than 5.5.
A user of OperatorClient can successfully log on to a Management Server where a previous
software version is running.
If the server provides a newer configuration than available on the OperatorClient workstation,
this configuration is automatically copied to the OperatorClient workstation. The user can
decide to download the new configuration.
OperatorClient provides a reduced feature set and is connected to this Management Server.
The following Management Server related features are available after logon to a Management
Server with a previous version:
–User preferences
–Start manual recording
–Display of device states
–Toggling relay states
–Searching the Logbook
Search for events is not possible.
–Server Lookup
–Remote export
4.5.1Working with Compatibility Mode
This feature is available in versions later than 5.5.
A BVMS OperatorClient gives you a visual and textual feedback of its states.
Following OperatorClient states are possible:
–
The OperatorClient is connected to the Management Server.
–
The OperatorClient is not connected to the Management Server. One reason can be a
physical disconnection from the Management Server to the network.
–
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
22en | ConceptsBVMS
This state can only be displayed after a reestablished connection to the Management
Server. All affected functions are back, but the configuration of the OperatorClient is
outdated due to a newer configuration available in the system. Log on again to update the
configuration.
–
This state icon is displayed when the Management Server has an earlier BVMS version
than the OperatorClient workstation.
4.6Viewing modes of a panoramic camera
This chapter illustrates the viewing modes of a panoramic camera which are available in
BVMS.
The following viewing modes are available:
–Circle view
–Panorama view
–Cropped view
Panorama and cropped view modes are created by the dewarping process in BVMS. Edge
dewarping is not used.
The administrator must configure the mounting position of a panoramic camera in
ConfigurationClient.
You can resize the Image pane of a camera as required. The Image pane ratio is not restricted
to the 4:3 or 16:9 aspect ratio.
Refer to
–Displaying a panoramic camera, page 33
–Switching the viewing mode of panoramic camera, page 34
–Arranging and resizing Image panes, page 36
4.6.1360° panoramic camera - floor- or ceiling mounted
The following figure illustrates the dewarping of a 360° camera which is floor- or ceiling
mounted.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en23
1 Full circle image3 Dewarping
2 Snipping line (operator can change its
4 Panorama view
position when not zoomed in)
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
24en | ConceptsBVMS
4.6.2180° panoramic camera - floor- or ceiling mounted
The following figure illustrates the dewarping of a 180° camera which is floor- or ceiling
mounted.
1 Full circle image3 Dewarping
2 Snipping line (operator can change its
4 Panorama view
position when not zoomed in)
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en25
4.6.3360° panoramic camera - wall mounted
The following figure illustrates the dewarping of a 360° camera which is wall mounted.
1 Full circle image3 Panorama view
2 Dewarping
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
26en | ConceptsBVMS
4.6.4180° panoramic camera - wall mounted
The following figure illustrates the dewarping of a 180° camera which is wall mounted.
1 Full circle image3 Panorama view
2 Dewarping
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSConcepts | en27
4.6.5Cropped view on a panoramic camera
The following example figure illustrates the cropping of a 360° camera which is floor- or ceiling
mounted.
The rectilinear section used for cropping is fixed. You can change the section in the cropped
Image pane using the available PTZ controls.
1 Full circle image4 Panorama view
2 Snipping line (operator can change its
5 Cropping
position when not zoomed in)
3 Dewarping6 Cropped Image pane
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
28en | ConceptsBVMS
4.7SSH Tunneling
BVMS provides remote connectivity utilizing Secure Shell (SSH) tunneling.
SSH tunneling constructs an encrypted tunnel established by an SSH protocol/socket
connection. This encrypted tunnel can provide transport to both encrypted and un-encrypted
traffic. The Bosch SSH implementation also utilizes Omni-Path protocol, which is a high
performance low latency communications protocol developed by Intel.
Technical aspects and restrictions
–SSH tunneling utilizes port 5322. This port cannot be modified.
–The SSH Service must be installed on the same server as the BVMS Management Server.
–(Enterprise) user accounts must have a configured password. (Enterprise) user accounts
without a password cannot log on utilizing a SSH connection.
–Local storage cameras do not support SSH connection.
–ConfigurationClient cannot connect remotely via SSH. ConfigurationClient connection
must be done via port mapping.
–OperatorClient checks connection with SSH service every 15 seconds. If the connection
is interrupted, OperatorClient retests the connection every minute.
Port mapping
4Configure one port forwarding for the BVMS Management Server to utilize port 5322 for
both internal and external connections.
This is the only port mapping entry that you need to make for the entire system.
BVMS port mapping is not required.
Encrypted communication
After the connection is established via a SSH tunnel, all communications between the BVMS
Management Server and a remote client are encrypted.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
BVMSGetting started | en29
5Getting started
This chapter provides information on how to get started with BVMS.
5.1Starting Operator Client
Note:
–Before using the system, activate the licenses that you have ordered. The Configuration
Manual or the Configuration Client Online Help describe how to activate the licenses.
–To be sure that your BVMS uses the language that you need, please configure this
language in your ConfigurationClient. See the Online Help for details.
If a newer version of BVMS is running on the Management Server, this version is installed
automatically by no-touch deployment when you log on.
To start the OperatorClient:
1. From the Start menu, select Programs > BVMS > OperatorClient.
The dialog box for logging on is displayed.
2.Type your user name in the User Name: field.
3.Type your password in the Password: field.
Note: When you start the application for the first time, type Admin as user name, no
password required.
To access multiple Management Server computers simultaneously, type the user name of
a member of an Enterprise User Group.
4.In the Connection: list, select the IP address or the DNS name of the Management Server
or Enterprise Management Server.
Note: If you use a SSH connection, select <New...> and enter the address in the following
format: ssh://IP or servername:5322.
To use a SSH connection user accounts must have a configured password (see
Tunneling, page 28
5.Click Ok.
If dual authorization has been configured for your user group, the next logon dialog is
displayed.
A user of the configured second user group enters the required information.
The application starts.
If dual authorization is optional, just click Ok again on the second logon dialog box. But
you then only have the user rights of your user group and not the potentially extended
user rights of your dual authorization group.
).
SSH
To start the OperatorClient using Single Sign-on:
Notice!
To start the OperatorClient using Single Sign-on, the user has to be associated to a LDAP
user group that is configured in the Configuration Client.
SSH connection and dual authorization are not supported if a user connects to the
OperatorClient using Single Sign-on.
1. From the Start menu, select Programs > BVMS > OperatorClient.
The dialog box for logging on is displayed.
2.Select the Use Windows session credentials check box.
3.In the Connection: list, select the IP address or the DNS name of the Management Server
or Enterprise Management Server.
4.Click Ok.
Bosch Security Systems B.V.Operation manual2020.08 | V 1 | Operator Client
30en | Getting startedBVMS
To quit Operator Client:
1.On the System menu, click Exit.
The application quits.
If you logged on to Operator Client as a user who is not authorized to quit the
application, the Enter Logoff Password dialog box is displayed.
2.Ask a user with corresponding user rights to enter his user name and password to
confirm the process.
Refer to
–SSH Tunneling, page 28
5.2Accepting a new configuration
When the system administrator activates a new configuration from within ConfigurationClient,
each OperatorClient is either immediately restarted automatically or the user of a workstation
is informed about the new configuration and can accept it later. The system administrator
configures which of these 2 cases occurs.
If the system administrator activated a new configuration without forcing each Operator Client
workstation to accept the new configuration, a dialog box is displayed on all OperatorClient
workstations. The users can refuse or accept the new configuration. The dialog box is closed
after a few seconds without user interaction. In this case the new configuration is refused. If a
device (for example a camera) is removed from the system in the new configuration, some
functions of this device are not available if you have refused the new configuration.
If you change the password for a user or delete a user while this user is logged on, this user
can still continue working with OperatorClient after password change or deletion. If after
password change or deletion the connection to Management Server is interrupted (for
example after activating the configuration), the user cannot automatically reconnect to the
Management Server again without logoff/logon at OperatorClient.
To accept a new configuration:
4Log off and then log on again.
The new configuration is used now.
5.3Accessing the system
You access a system performing the following steps:
1.Perform one of the following steps to select the network address of the desired system:
–Click a preselected list entry.
–Enter a network address manually.
–Select a network address using Server Lookup.
2.Log on to the desired system:
–Single server system
–Enterprise System
5.4Using Server Lookup
–The BVMS Server Lookup feature allows Operators to connect to a BVMS Management
Server out of a provided list of servers.
–A single user of ConfigurationClient or OperatorClient can connect to multiple system
access points sequentially.
–System access points can be Management Server or Enterprise Management Server.
–Server Lookup uses dedicated Management Server to host the Server List.
2020.08 | V 1 | Operator ClientOperation manualBosch Security Systems B.V.
Loading...
+ 116 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.