2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
Browser connection | en11
1
1.1
Browser connection
A computer with Microsoft Internet Explorer is used to receive
live images, control the unit, and replay stored sequences. The
unit is configured over the network using the browser.
System requirements
–Network access (Intranet or Internet)
–Microsoft Internet Explorer version 9 (32-bit)
–Screen resolution at least 1024 × 768 pixels
–16- or 32-bit color depth
–JVM installed
The Web browser must be configured to enable Cookies from
the IP address of the unit.
In Windows Vista, deactivate protected mode on the Security
tab under Internet Options.
To play back live video images, an appropriate ActiveX must be
installed on the computer. If necessary, install
Bosch Video Client. This can be downloaded from the following
address:
http://downloadstore.boschsecurity.com/
The unit must have a valid IP address to operate on your
network and a compatible subnet mask. By default, DHCP is preset at the factory to On and so your DHCP server assigns an IP
address. With no DHCP server the default address is
192.168.0.1
1.Start the Web browser.
2.Enter the IP address of the unit as the URL.
3.During initial installation, confirm any security questions
that appear.
12en | Browser connection
Note:
If you cannot connect, the unit may have reached its maximum
number of connections. Depending on the device and network
configuration, each unit can have up to 50 web browser
connections, or up to 100 connections via Bosch Video Client or
Bosch Video Management System.
Camera Browser
Interface
1.2.1
1.3
Password protection in camera
A unit offers the option of limiting access across various
authorization levels. If the unit is password-protected, a
message to enter the password appears.
1.Enter the user name and the associated password in the
appropriate fields.
2.Click OK. If the password is correct, the desired page is
displayed.
Protected network
If a RADIUS server is used for network access control (802.1x
authentication), the unit must be configured first. To configure
the unit, connect it directly to a computer using a network cable
and configure the two parameters, Identity and Password. Only
after these have been configured can communication with the
unit via the network occur.
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
System overview | en13
2
2.1
2.2
2.3
System overview
When a connection is established, the LIVE page is initially
displayed. The application title bar displays three items: LIVE,
PLAYBACK, SETTINGS.
Note:
The PLAYBACK link is only visible if a storage medium has been
configured for recording. (With VRM recording this option is not
active.)
Live page
The LIVE page is used to display the live video stream and
control the unit.
Playback
The PLAYBACK page is used for playing back recorded
sequences.
Settings
The SETTINGS page is used to configure the unit and the
application interface.
After the connection is established, the LIVE page is initially
displayed. It shows the live video image on the right of the
browser window. Depending on the configuration, various text
overlays may be visible on the live video image.
Other information may also be shown next to the live video
image. The items shown depend on the settings on the LIVE
Functions page.
Image selection
Figure 3.1: Live page
Click a tab below the video image to display a camera image
stream.
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
Operation via the browser | en15
3.1.2
Digital I/O
The alarm input and the PIR alarm indicators are displayed in
the Digital I/O pane next to the image. These alarm symbols
light when an alarm input is detected or when the PIR sensor
detects movement.
The camera alarm Output 1 symbol allows the operation of an
external device (for example, a light or a door opener).
4To operate the alarm output, click the Output 1 relay
symbol.
The symbol is red when the output is activated.
The PIR detector can also be used to trigger the alarm output.
Refer to Output follows, page 83 to set up this function.
The white LED illuminator is switched on and off using the
illuminator symbol.
4To operate the illuminator, click the Illumination relay
symbol.
The symbol is red when the illuminator is activated.
The white LED illuminator can also be switched on and off by
various events, including PIR movement detection. Refer to
Output follows, page 83 to set up this function.
The System Log field contains information about the operating
status of the camera and the connection.
Events such as the triggering or the end of alarms are shown in
the Event Log field.
1.To view, filter and save these messages to a file, click
in the top right-hand corner.
2.To clear the log, click in the top right-hand corner of
the relevant field.
16en | Operation via the browser
Camera Browser
Interface
3.1.4
3.1.5
Saving snapshots
Individual images from the video sequence that is currently
being shown can be saved in JPEG format on the computer's
hard drive.
4Click the camera icon
The storage location depends on the configuration of the
camera.
to save a single image.
Recording video sequences
Sections of the video sequence that is currently being shown on
the LIVE page can be saved on the computer's hard drive. The
sequences are recorded at the resolution specified in the
encoder configuration. The storage location depends on the
configuration of the camera.
1.Click the recording icon
–Saving begins immediately. The red dot on the icon
indicates that a recording is in progress.
2.Click the recording icon again to stop recording.
Play back saved video sequences using the Player from
Bosch Security Systems.
to record video sequences.
3.1.6
3.1.7
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Recording status
The hard drive icon below the camera images on the LIVE page
changes during an automatic recording.
The icon lights up and displays a moving graphic to
indicate a running recording. If no recording is taking place, a
static icon is displayed.
Audio communication
Audio can be sent and received via the LIVE page if the unit and
the computer support audio.
Camera Browser
Interface
1.Press and hold the F12 key on the keyboard to send an
2.Release the key to stop sending audio.
All connected users receive audio signals sent from the unit but
only the user who first pressed the F12 key can send audio
signals; others must wait for the first user to release the key.
Operation via the browser | en17
audio signal to the unit.
3.1.8
Storage, CPU and network status
When accessing the unit with a browser, the local storage,
processor and network status icons are shown in the upper
right of the window next to the Bosch logo.
When a local storage card is available, the memory card icon
changes color (green, orange or red) to indicate the local
storage activity. If you hover over this icon with the mouse the
storage activity is shown as a percentage.
If you hover over the middle icon, the CPU load is shown.
If you hover over the right-hand icon, the network load is shown.
This information can help with problem solving or when fine
tuning the unit. For example:
–if the storage activity is too high, change the recording
profile,
–if the CPU load is too big, change the IVA settings,
–if the network load is too big, change the encoder profile to
Various overlays in the video image provide important status
information. The overlays provide the following information:
Decoding error
The frame might show artifacts due to decoding errors.
Alarm flag
Indicates that an alarm has occurred.
Communication error
A communication error, such as a connection failure to the
storage medium, a protocol violation or a timeout, is indicated
by this icon.
Gap
Indicates a gap in the recorded video.
Watermark valid
The watermark set on the media item is valid. The color of the
check mark changes according to the video authentication
method that has been selected.
Watermark invalid
Indicates that the watermark is not valid.
Motion alarm
Indicates that a motion alarm has occurred.
Storage discovery
Indicates that recorded video is being retrieved.
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
Operation via the browser | en19
3.2
3.2.1
Playback
Click PLAYBACK in the application title bar to view, search or
export recordings. This link is only visible if a direct iSCSI or
memory card has been configured for recording. (With VRM
recording this option is not active.)
A collapsible panel on the left of the display has four tabs:
–Track list
–Export
–Search
–Search results
Select the recording number to be shown in the Recording
drop-down menu at the top of the window.
Selecting recordings for playback
To see all saved sequences:
1.Click the track list tab .
2.A list of tracks with a number assigned is displayed. Start
time and stop time, recording duration, number of alarms
and recording type are shown for each track.
3.At the bottom of the window, select the maximum number
of tracks to be displayed in the list.
4.Use the arrow buttons at the bottom to browse the list.
5.To view tracks beginning from a particular time, enter the
time code and click Get Tracks.
6.Click a track. The playback for the selected track starts.
3.The start and stop time are filled-in for the selected track. If
required, change the times.
4.Select a target.
5.Select the original or a condensed speed.
Camera Browser
Interface
3.2.3
3.2.4
6.Click the save icon
Note:
The target server address is set on the Network / Accounts
page.
.
Searching for tracks
1.Click the search tab .
2.Click one of the Search mode options to define the search
parameters.
3.To limit the search to a particular time range, enter the
start and stop times.
4.Click Start Search.
5.The results are shown in the search results tab .
6.Click a result to play it back.
7.Click the search tab
again to define a new search.
Controlling playback
The time bar below the video image allows quick orientation.
The time interval associated with the sequence is displayed in
the bar in gray. A green arrow above the bar indicates the
position of the image currently being played back within the
sequence.
The time bar offers various options for navigation in and
between sequences.
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
–Change the time interval displayed by clicking the plus or
–If required, click in the bar at the point in time at which the
–Red bars indicate the points in time where alarms were
To view the current live image, click Now.
Controls
Control playback by means of the buttons below the video
image.
Use the jog dial to quickly scan the
sequences. The time code is displayed above it.
The buttons have the following functions:
Select the playback speed using the speed regulator:
Operation via the browser | en21
minus icons. The display can span a range from two months
to a few seconds.
playback should begin.
triggered.
Start/Pause playback
Jump to start of active sequence or to previous sequence
Jump to start of the next video sequence in the list
Bookmarks
You can set markers in a sequence and jump to these directly.
These bookmarks are indicated as small yellow arrows above
the time interval. Use the bookmarks as follows:
Jump to the previous bookmark
Set bookmark
Jump to the following bookmark
Bookmarks are only valid while in the Recordings page; they are
not saved with the sequences. All bookmarks are deleted when
you leave the page.
Assign a unique name to assist in identification. This name
simplifies the management of multiple devices in more extensive
systems.
The name is used for remote identification, for example, in the
event of an alarm. Choose a name that makes it as easy as
possible to identify the location unambiguously.
Password
A password prevents unauthorized access to the device. You can
use different authorization levels to limit access.
Proper password protection is only guaranteed when all higher
authorization levels are also protected with a password.
Therefore, you always have to start from the highest
authorization level when assigning passwords.
You can define and change a password for each authorization
level if you are logged in as service or if the unit is not password
protected.
Enter the password for the appropriate authorization level here.
The maximum password text length is 19 characters and no
special characters are allowed.
The device has three authorization levels: service, user, and live.
–service is the highest authorization level. Entering the
correct password gives access to all the functions and
allows all configuration settings to be changed.
–user is the middle authorization level. At this level you can
operate the device, play back recordings, and also control
camera, for example, but you cannot change the
configuration.
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Camera Browser
Interface
–live is the lowest authorization level. At this level you can
Define and change a separate password for each level. Enter the
password (19 characters maximum; no special characters) for
the selected level.
Re-enter the new password to ensure that there are no typing
mistakes.
Basic Mode | en23
only view the live video image and switch between the
different live image displays.
4.2
Date/Time
If there are multiple devices operating in the system or network,
it is important to synchronize their internal clocks. For example,
it is only possible to identify and correctly evaluate simultaneous
recordings when all devices are operating on the same time.
Device time, date and time zone are shown.
4Click Sync to PC to apply the system time from your
computer to the device.
Note:
It is important that the date/time is correct for recording. An
incorrect date/time setting could prevent correct recording.
The unit can receive the time signal from a time server using
various time server protocols and then use it to set the internal
clock. The device polls the time signal automatically once every
minute.
Enter the IP address of a time server.
Select the protocol that is supported by the selected time
server. It is recommended to select the SNTP server protocol.
This protocol provides high accuracy and is required for special
applications and future function extensions.
Select Time server if the server uses the RFC 868 protocol.
The settings on these pages are used to integrate the device
into a network. Some changes only take effect after a reboot. In
this case Set changes to Set and Reboot.
1.Make the desired changes.
2.Click Set and Reboot.
The device is rebooted and the changed settings are activated.
If the network has a DHCP server for the dynamic assignment of
IP addresses, select On to automatically accept the DHCPassigned IP address.
For certain applications, the DHCP server must support the
fixed assignment between IP address and MAC address, and
must be appropriately set up so that, once an IP address is
assigned, it is retained each time the system is rebooted.
IP address
Enter the desired IP address for the camera. The IP address
must be valid for the network.
Subnet mask
Enter the appropriate subnet mask for the set IP address.
Gateway address
For the device to establish a connection to a remote location in
a different subnet, enter the IP address of the gateway here.
Otherwise, this field can remain empty (0.0.0.0).
4.4
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Encoder
Select a profile for encoding the video signal on stream 1 (this is
not a selection of the recording profile).
Pre-programmed profiles are available that give priority to
different parameters and they should be selected based on your
operating environment.
When a profile is selected, its details are displayed.
Camera Browser
Interface
Basic Mode | en25
4.5
4.6
4.7
Audio
Switch the camera audio On or Off.
Use the slider to adjust the level for the applicable audio signal.
Recording
Record the images from the camera to a storage medium. For
long-term authoritative images, it is essential to use VRM or an
appropriately sized iSCSI system.
Storage medium
1.Select the required storage medium from the list.
2.Click Start to start recording or Stop to end recording.
System Overview
This page provides general information on the hardware and
firmware system, including version numbers. No items can be
changed on this page but they can be copied for information
purposes when troubleshooting.
Assign a unique name to assist in identification. This name
simplifies the management of multiple devices in more extensive
systems.
The name is used for remote identification, for example, in the
event of an alarm. Choose a name that makes it as easy as
possible to identify the location unambiguously.
You can use additional lines to enter kanji characters.
1.Click the + sign to add a new line
2.Click the icon next to the new line. A window with a
character map opens.
3.Click the required character. The character is inserted into
the Result field.
4.In the character map, click the << and >> icons to move
between the different pages of the table, or select a page
from the list field.
5.Click the < icon to the right of the Result field to delete the
last character, or click the X icon to delete all characters.
6.Click the OK button to apply the selected characters to the
new line of the name. The window closes.
5.1.2
5.1.3
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
ID
Each device should be assigned a unique identifier that can be
entered here as an additional means of identification.
iSCSI Initiator extension
Add text to an initiator name to make identification easier in
large iSCSI systems. This text is added to the initiator name,
separated from it by a full stop. (You can see the initiator name
in the System Overview page.)
Camera Browser
Interface
General settings | en27
5.2
Password
A password prevents unauthorized access to the device. You can
use different authorization levels to limit access.
Proper password protection is only guaranteed when all higher
authorization levels are also protected with a password.
Therefore, you always have to start from the highest
authorization level when assigning passwords.
You can define and change a password for each authorization
level if you are logged in as service or if the unit is not password
protected.
Enter the password for the appropriate authorization level here.
The maximum password text length is 19 characters and no
special characters are allowed.
The device has three authorization levels: service, user, and live.
–service is the highest authorization level. Entering the
correct password gives access to all the functions and
allows all configuration settings to be changed.
–user is the middle authorization level. At this level you can
operate the device, play back recordings, and also control
camera, for example, but you cannot change the
configuration.
–live is the lowest authorization level. At this level you can
only view the live video image and switch between the
different live image displays.
Define and change a separate password for each level. Enter the
password (19 characters maximum; no special characters) for
the selected level.
Confirm password
Re-enter the new password to ensure that there are no typing
mistakes.
28en | General settings
Camera Browser
Interface
5.3
5.3.1
5.3.2
Date/Time
Date format
Select the required date format.
Device date / Device time
If there are multiple devices operating in your system or
network, it is important to synchronize their internal clocks. For
example, it is only possible to identify and correctly evaluate
simultaneous recordings when all devices are operating on the
same time.
1.Enter the current date. Since the device time is controlled
by the internal clock, it is not necessary to enter the day of
the week – it is added automatically.
2.Enter the current time or click Sync to PC to apply the
system time from your computer to the device.
Note:
It is important that the date/time is correct for recording. An
incorrect date/time setting could prevent correct recording.
5.3.3
5.3.4
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Device time zone
Select the time zone in which the system is located.
Daylight saving time
The internal clock can switch automatically between normal and
daylight saving time (DST). The unit already contains the data
for DST switch-overs for many years in advance. If the date, time
and zone have been set up correctly, a DST table is
automatically created.
If you decide to create alternative daylight saving time dates by
editing the table, note that values occur in linked pairs (DST
start and end dates).
Camera Browser
Interface
First, check the time zone setting. If it is not correct, select the
appropriate time zone and click Set.
1.Click Details to edit the DST table.
2.Select the region or the city which is closest to the
3.Click Generate to fill the table with the preset values from
4.Click one of the entries in the table to make changes. The
5.Click Delete to remove the entry from the table.
6.Choose other values from the list boxes under the table, to
7.If there are empty lines at the bottom of the table, for
8.When finished, click OK to save and activate the table.
General settings | en29
system's location from the list box below the table.
the unit.
entry is highlighted.
change the selected entry. Changes are immediate.
example after deletions, add new data by marking the row
and selecting values from the list boxes.
5.3.5
Time server IP address
The unit can receive the time signal from a time server using
various time server protocols and then use it to set the internal
clock. The device polls the time signal automatically once every
minute.
Enter the IP address of a time server.
5.3.6
Time server type
Select the protocol that is supported by the selected time
server. It is recommended to select the SNTP server protocol.
This protocol provides high accuracy and is required for special
applications and future function extensions.
Select Time server if the server uses the RFC 868 protocol.
Various overlays or stamps in the video image provide important
supplementary information. These overlays can be enabled
individually and arranged on the image in a clear manner.
Camera name stamping
Select the position of the camera name overlay in the dropdown box. It can be displayed at the Top, at the Bottom, or at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Time stamping
Select the position of the time and date overlay in the dropdown box. It can be displayed at the Top, at the Bottom, or at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Display milliseconds
If necessary, display milliseconds for Time stamping. This
information can be useful for recorded video images; however, it
does increase the processor's computing time. Select Off if
displaying milliseconds is not needed.
5.4.4
2015.01 | v1.59x | AM18-Q0676Bosch Security Systems
Alarm mode stamping
Select On in the drop-down box for a text message to be
displayed in the event of an alarm. It can be displayed at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Loading...
+ 76 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.