A computer with Microsoft Internet Explorer is used to receive
live images, control the unit, and replay stored sequences. The
unit is configured over the network using the browser.
System requirements
–Network access (Intranet or Internet)
–Microsoft Internet Explorer version 9 (32-bit)
–Screen resolution at least 1024 × 768 pixels
–16- or 32-bit color depth
–JVM installed
The Web browser must be configured to enable Cookies from
the IP address of the unit.
In Windows Vista, deactivate protected mode on the Security
tab under Internet Options.
To play back live video images, an appropriate ActiveX must be
installed on the computer. If necessary, install
Bosch Video Client.
Establishing the connection
The unit must have a valid IP address to operate on your
network and a compatible subnet mask. By default, DHCP is preset at the factory to On and so your DHCP server assigns an IP
address. With no DHCP server the default address is
192.168.0.1
1.Start the Web browser.
2.Enter the IP address of the unit as the URL.
3.During initial installation, confirm any security questions
that appear.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Camera Browser
Interface
Note:
If you do not connect, the unit may have reached its maximum
number of connections. Depending on the device and network
configuration, each unit can have up to 50 web browser
connections, or up to 100 connections via Bosch Video Client or
Bosch Video Management System.
Browser connection | en11
1.2.1
1.3
Password protection in camera
A unit offers the option of limiting access across various
authorization levels. If the unit is password-protected, a
message to enter the password appears.
1.Enter the user name and the associated password in the
appropriate fields.
2.Click OK. If the password is correct, the desired page is
displayed.
Protected network
If a RADIUS server is used for network access control (802.1x
authentication), the unit must be configured first. To configure
the unit, connect it directly to a computer using a network cable
and configure the two parameters, Identity and Password. Only
after these have been configured can communication with the
unit via the network occur.
When a connection is established, the LIVE page is initially
displayed. The application title bar displays three items: LIVE,
PLAYBACK, SETTINGS.
Note:
The PLAYBACK link is only visible if a storage medium has been
configured for recording. (With VRM recording this option is not
active.)
Live page
The LIVE page is used to display the live video stream and
control the unit.
Playback
The PLAYBACK page is used for playing back recorded
sequences.
Settings
The SETTINGS page is used to configure the unit and the
application interface.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Camera Browser
Interface
Operation via the browser | en13
3
3.1
Operation via the browser
Live page
After the connection is established, the LIVE page is initially
displayed. It shows the live video image on the right of the
browser window. Depending on the configuration, various text
overlays may be visible on the live video image.
Other information may also be shown next to the live video
image. The items shown depend on the settings on the LIVE
Click a tab below the video image to display a camera image
stream.
14en | Operation via the browser
Camera Browser
Interface
3.1.2
3.1.3
3.1.4
System Log / Event Log
The System Log field contains information about the operating
status of the camera and the connection.
Events such as the triggering or the end of alarms are shown in
the Event Log field.
1.To view, filter and save these messages to a file, click
in the top right-hand corner.
2.To clear the log, click in the top right-hand corner of
the relevant field.
Saving snapshots
Individual images from the video sequence that is currently
being shown can be saved in JPEG format on the computer's
hard drive.
4Click the camera icon
The storage location depends on the configuration of the
camera.
to save a single image.
Recording video sequences
Sections of the video sequence that is currently being shown on
the LIVE page can be saved on the computer's hard drive. The
sequences are recorded at the resolution specified in the
encoder configuration. The storage location depends on the
configuration of the camera.
1.Click the recording icon
–Saving begins immediately. The red dot on the icon
indicates that a recording is in progress.
2.Click the recording icon again to stop recording.
Play back saved video sequences using the Player from
Bosch Security Systems.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
to record video sequences.
Camera Browser
Interface
Operation via the browser | en15
3.1.5
3.1.6
3.1.7
Running recording program
The hard drive icon below the camera images on the LIVE page
changes during an automatic recording.
The icon lights up and displays a moving graphic
indicate a running recording. If no recording is taking place, a
static icon is displayed.
to
Processor load
When accessing the unit with a browser, the processor load and
network information is available in the upper right of the
window next to the Bosch logo.
Move the mouse cursor over the icons to display numerical
values. This information can help with problem solving or when
fine tuning the device.
Status icons
Various overlays in the video image provide important status
information. The overlays provide the following information:
Decoding error
The frame might show artefacts due to decoding errors. If other
frames reference this frame, they might also show decoding
errors but won’t be marked with the icon.
Alarm flag
Shown on a media item to indicate an alarm.
A communication error, such as a connection failure to the
storage medium, a protocol violation or a timeout, is indicated
by this icon. An automatic reconnection procedure is started in
the background to recover from this error.
Gap
Indicates a gap in the recorded video.
Watermark flag
Watermark is set on media item.
Invalid watermark flag
Indicates that the watermark is not valid.
Camera Browser
Interface
Motion flag
Indicates that motion is dectected.
Storage discovery
Indicates that recorded video is being retrieved.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Camera Browser
Interface
Operation via the browser | en17
3.2
3.2.1
Playback
Click PLAYBACK from the Livepage or Settings page to view,
search or export recordings. This link is only visible if a direct
iSCSI or SD card has been configured for recording. (With VRM
recording this option is not active.)
A collapsible panel on the left of the display has four tabs:
–Track list
–Export
–Search
–Search results
Select the stream number to be shown in the Recording dropdown menu at the top of the window.
Selecting recordings for playback
To see all saved sequences:
1.Click the track list tab .
2.A list of tracks with a number assigned to each sequence is
displayed. Start time and stop time, recording duration,
number of alarms, and recording type are shown for each
track.
3.At the bottom of the window, select the maximum number
of tracks to be displayed in the list.
4.Use the arrow buttons at the bottom to browse the list.
5.To view tracks beginning from a particular time, enter the
time code and click Get Tracks.
6.Click a track. The playback for the selected sequence
3.The start and stop time are filled-in for the selected track. If
required, change the times.
4.Select a target.
5.Select the original or a condensed speed.
Camera Browser
Interface
3.2.3
3.2.4
6.Click the save icon
Note:
The target server address is set on the Network / Accounts
page.
.
Searching for tracks
1.Click the search tab .
2.Click one of the Search mode buttons to define the search
parameters.
3.To limit the search to a particular time range, enter the
start and stop times.
4.Click Start Search.
5.The results are shown in the search results tab .
6.Click a result to play it back.
7.Click the search tab
again to define a new search.
Controlling playback
The time bar below the video image allows quick orientation.
The time interval associated with the sequence is displayed in
the bar in gray. A green arrow above the bar indicates the
position of the image currently being played back within the
sequence.
The time bar offers various options for navigation in and
between sequences.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Camera Browser
Interface
–Change the time interval displayed by clicking the plus or
–If required, click in the bar at the point in time at which the
–Red bars indicate the points in time where alarms were
To view the current live image, click Now.
Controls
Control playback by means of the buttons below the video
image.
Use the jog dial to quickly scan the
sequences. The time code is displayed above it.
The buttons have the following functions:
Select the playback speed using the speed regulator:
Operation via the browser | en19
minus icons. The display can span a range from two months
to a few seconds.
playback should begin.
triggered.
Start/Pause playback
Jump to start of active sequence or to previous sequence
Jump to start of the next video sequence in the list
Bookmarks
You can set markers in a sequence and jump to these directly.
These bookmarks are indicated as small yellow arrows above
the time interval. Use the bookmarks as follows:
Jump to the previous bookmark
Set bookmark
Jump to the following bookmark
Bookmarks are only valid while in the Recordings page; they are
not saved with the sequences. All bookmarks are deleted when
you leave the page.
Assign a unique name to assist in identification. This name
simplifies the management of multiple devices in more extensive
systems.
The name is used for remote identification, for example, in the
event of an alarm. Choose a name that makes it as easy as
possible to identify the location unambiguously.
A password prevents unauthorized access to the device. You can
use different authorization levels to limit access.
Proper password protection is only guaranteed when all higher
authorization levels are also protected with a password.
Therefore, you always have to start from the highest
authorization level when assigning passwords.
You can define and change a password for each authorization
level if you are logged in as service or if the unit is not password
protected.
Enter the password for the appropriate authorization level here.
The maximum password text length is 19 characters and no
special characters are allowed.
The device has three authorization levels: service, user, and live.
–service is the highest authorization level. Entering the
correct password gives access to all the functions and
allows all configuration settings to be changed.
–user is the middle authorization level. At this level you can
operate the device, play back recordings, and also control
camera, for example, but you cannot change the
configuration.
–live is the lowest authorization level. At this level you can
only view the live video image and switch between the
different live image displays.
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Camera Browser
Interface
Define and change a separate password for each level. Enter the
password (19 characters maximum; no special characters) for
the selected level.
Re-enter the new password to ensure that there are no typing
mistakes.
Basic Mode | en21
4.2
Date/Time
If there are multiple devices operating in the system or network,
it is important to synchronize their internal clocks. For example,
it is only possible to identify and correctly evaluate simultaneous
recordings when all devices are operating on the same time.
Device time, date and time zone are shown.
4Click Sync to PC to apply the system time from your
computer to the device.
Note:
It is important that the date/time is correct for recording. An
incorrect date/time setting could prevent correct recording.
The unit can receive the time signal from a time server using
various time server protocols and then use it to set the internal
clock. The device polls the time signal automatically once every
minute.
Enter the IP address of a time server.
Select the protocol that is supported by the selected time
server. It is recommended to select the SNTP server protocol.
This protocol provides high accuracy and is required for special
applications and future function extensions.
Select Time server if the server uses the RFC 868 protocol.
The settings on these pages are used to integrate the device
into a network. Some changes only take effect after a reboot. In
this case Set changes to Set and Reboot.
1.Make the desired changes.
2.Click Set and Reboot.
22en | Basic Mode
The device is rebooted and the changed settings are activated.
If the network has a DHCP server for the dynamic assignment of
IP addresses, select On to automatically accept the DHCPassigned IP address.
For certain applications, the DHCP server must support the
fixed assignment between IP address and MAC address, and
must be appropriately set up so that, once an IP address is
assigned, it is retained each time the system is rebooted.
IP address
Enter the desired IP address for the camera. The IP address
must be valid for the network.
Subnet mask
Enter the appropriate subnet mask for the set IP address.
Gateway address
For the device to establish a connection to a remote location in
a different subnet, enter the IP address of the gateway here.
Otherwise, this field can remain empty (0.0.0.0).
Camera Browser
Interface
4.4
4.5
4.6
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Encoder
Select a profile for encoding the video signal on stream 1 (this is
not a selection of the recording profile).
Pre-programmed profiles are available that give priority to
different parameters and they should be selected based on your
operating environment.
When a profile is selected, its details are displayed.
Audio
Switch the camera audio On or Off.
Use the slider to adjust the level for the applicable audio signal.
Recording
Record the images from the camera to a storage medium. For
long-term authoritative images, it is essential to use VRM or an
appropriately sized iSCSI system.
Camera Browser
Interface
Storage medium
1.Select the required storage medium from the list.
2.Click Start to start recording or Stop to end recording.
Basic Mode | en23
4.7
System Overview
This page provides general information on the hardware and
firmware system, including version numbers. No items can be
changed on this page but they can be copied for information
purposes when troubleshooting.
Assign a unique name to assist in identification. This name
simplifies the management of multiple devices in more extensive
systems.
The name is used for remote identification, for example, in the
event of an alarm. Choose a name that makes it as easy as
possible to identify the location unambiguously.
You can use additional lines to enter kanji characters.
1.Click the + sign to add a new line
2.Click the icon next to the new line. A window with a
character map opens.
3.Click the required character. The character is inserted into
the Result field.
4.In the character map, click the << and >> icons to move
between the different pages of the table, or select a page
from the list field.
5.Click the < icon to the right of the Result field to delete the
last character, or click the X icon to delete all characters.
6.Click the OK button to apply the selected characters to the
new line of the name. The window closes.
5.1.2
5.1.3
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
ID
Each device should be assigned a unique identifier that can be
entered here as an additional means of identification.
iSCSI Initiator extension
Add text to an initiator name to make identification easier in
large iSCSI systems. This text is added to the initiator name,
separated from it by a full stop. (You can see the initiator name
in the System Overview page.)
Camera Browser
Interface
General settings | en25
5.2
Password
A password prevents unauthorized access to the device. You can
use different authorization levels to limit access.
Proper password protection is only guaranteed when all higher
authorization levels are also protected with a password.
Therefore, you always have to start from the highest
authorization level when assigning passwords.
You can define and change a password for each authorization
level if you are logged in as service or if the unit is not password
protected.
Enter the password for the appropriate authorization level here.
The maximum password text length is 19 characters and no
special characters are allowed.
The device has three authorization levels: service, user, and live.
–service is the highest authorization level. Entering the
correct password gives access to all the functions and
allows all configuration settings to be changed.
–user is the middle authorization level. At this level you can
operate the device, play back recordings, and also control
camera, for example, but you cannot change the
configuration.
–live is the lowest authorization level. At this level you can
only view the live video image and switch between the
different live image displays.
Define and change a separate password for each level. Enter the
password (19 characters maximum; no special characters) for
the selected level.
Confirm password
Re-enter the new password to ensure that there are no typing
mistakes.
26en | General settings
Camera Browser
Interface
5.3
5.3.1
5.3.2
Date/Time
Date format
Select the required date format.
Device date / Device time
If there are multiple devices operating in your system or
network, it is important to synchronize their internal clocks. For
example, it is only possible to identify and correctly evaluate
simultaneous recordings when all devices are operating on the
same time.
1.Enter the current date. Since the device time is controlled
by the internal clock, it is not necessary to enter the day of
the week – it is added automatically.
2.Enter the current time or click Sync to PC to apply the
system time from your computer to the device.
Note:
It is important that the date/time is correct for recording. An
incorrect date/time setting could prevent correct recording.
5.3.3
5.3.4
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Device time zone
Select the time zone in which the system is located.
Daylight saving time
The internal clock can switch automatically between normal and
daylight saving time (DST). The unit already contains the data
for DST switch-overs for many years in advance. If the date, time
and zone have been set up correctly, a DST table is
automatically created.
If you decide to create alternative daylight saving time dates by
editing the table, note that values occur in linked pairs (DST
start and end dates).
Camera Browser
Interface
First, check the time zone setting. If it is not correct, select the
appropriate time zone and click Set.
1.Click Details to edit the DST table.
2.Select the region or the city which is closest to the
3.Click Generate to fill the table with the preset values from
4.Click one of the entries in the table to make changes. The
5.Click Delete to remove the entry from the table.
6.Choose other values from the list boxes under the table, to
7.If there are empty lines at the bottom of the table, for
8.When finished, click OK to save and activate the table.
General settings | en27
system's location from the list box below the table.
the unit.
entry is highlighted.
change the selected entry. Changes are immediate.
example after deletions, add new data by marking the row
and selecting values from the list boxes.
5.3.5
Time server IP address
The unit can receive the time signal from a time server using
various time server protocols and then use it to set the internal
clock. The device polls the time signal automatically once every
minute.
Enter the IP address of a time server.
5.3.6
Time server type
Select the protocol that is supported by the selected time
server. It is recommended to select the SNTP server protocol.
This protocol provides high accuracy and is required for special
applications and future function extensions.
Select Time server if the server uses the RFC 868 protocol.
Various overlays or stamps in the video image provide important
supplementary information. These overlays can be enabled
individually and arranged on the image in a clear manner.
Camera name stamping
Select the position of the camera name overlay in the dropdown box. It can be displayed at the Top, at the Bottom, or at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Time stamping
Select the position of the time and date overlay in the dropdown box. It can be displayed at the Top, at the Bottom, or at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Display milliseconds
If necessary, display milliseconds for Time stamping. This
information can be useful for recorded video images; however, it
does increase the processor's computing time. Select Off if
displaying milliseconds is not needed.
5.4.4
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Alarm mode stamping
Select On in the drop-down box for a text message to be
displayed in the event of an alarm. It can be displayed at a
position of choice using the Custom option, or it can be set to
Off for no overlay information.
If the Custom option is selected, enter values in the X and Y
position fields.
Camera Browser
Interface
General settings | en29
5.4.5
5.4.6
5.4.7
5.5
Alarm message
Enter the message to be displayed on the image in the event of
an alarm. The maximum text length is 31 characters.
Transparent stamping
Check this box to make the stamp on the image transparent.
Video authentication
Select a method for verifying the integrity of the video in the
Video authentication drop-down box.
If you select Watermarking all images are marked with an icon.
The icon indicates if the sequence (live or saved) has been
manipulated.
If you want to add a digital signature to the transmitted video
images to ensure their integrity, select one of the cryptographic
algorithms for this signature.
Enter the interval (in seconds) between insertions of the digital
signature.
GB/T 28181
This page allows you to set the parameters for conformance to
the GB/T 28181 national standard “Security and protection
video monitoring network system for information transport,
switch and control”.
You can adapt the appearance of the web interface and change
the website language to meet your requirements.
GIF or JPEG images can be used to replace the company and
device logos. The image can be stored on a web server (for
example, http://www.myhostname.com/images/logo.gif).
Ensure that a connection to the web server is always available to
display the image. The image files are not stored on the unit.
To restore the original graphics, delete the entries in the
Company logo and Device logo fields.
Website language
Select the language for the user interface.
Company logo
To replace the company's logo in the top-right part of the
window, enter the path to a suitable image in this field. The
image file must be stored on a web server.
Device logo
To replace the device name in the top-left part of the window,
enter the path to a suitable image in this field. The image file
must be stored on a web server.
6.1.4
6.1.5
2014.03 | v1.59 | AM18-Q0672Bosch Security Systems
Show VCA metadata
When video analysis is activated, additional information from the
video content analysis (VCA) function is displayed in the live
video image. With the MOTION+ analysis type, for example, the
sensor fields in which motion is recorded are marked with
rectangles.
Show overlay icons
When selected, various status icons are displayed as an overlay
on the video images.
Loading...
+ 68 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.