Bosch SE2005, SE2010, SE2050 Installation Manual

Security Escort
Setup Guide for v2.04 or later
Central Control Software
Security Escort | Setup Guide for v2.04 or later | Trademarks

Trademarks

Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Software License Agreement

Security Escort’s Central Control Software for Microsoft Windows.
IMPORTANT: This software relates to security. Access should be limited to authorized individuals. This software contains provisions for setting security passwords. Appropriate security levels should be established and passwords should be set before allowing operating personnel access to this software. The original disk should be safeguarded against unauthorized use. In addition, Bosch security/fire controls contain passwords to prevent unauthorized access; these passwords must also be set and their identity carefully safeguarded.
Please read the following license agreement prior to installing and operating the software: Do not install
this software unless you agree to the following terms:
You MAY: Use the Security Escort program only on
a single Security Escort system, with a single master computer and a single optional slave computer.
Copy the program into another computer only for backup purposes in support of your use of the program on one Security Escort system.
You may NOT: Transfer this program or license to any
other party without the express written approval of Bosch Security Systems, Inc.
Limited Warranty: Bosch Security Systems, Inc. (Bosch) warrants that the program will substantially conform to the published specifications and documentation, provided that it is used on the computer hardware and with the operating system for which it was designed. Bosch also warrants that the magnetic media on which the program is distributed and the documentation are free of defects in materials and workmanship. No Bosch dealer, distributor, agent, or employee is authorized to make any modification or addition to this warranty, oral or written. Except as specifically provided above, Bosch makes no warranty or representation, either express or implied, with respect to this program or documentation, including their quality, performance, merchantability, or fitness for a particular purpose.
Remedy: Bosch will replace defective media or documentation, or correct substantial program errors at no charge, provided you return the item with proof of purchase to Bosch within 90 days of the date of delivery. If Bosch is unable to replace defective media or documentation, or correct substantial program errors, Bosch will refund the license fee. These are your sole remedies for any breach of warranty.
Because programs are inherently complex and may not be completely free of errors, you are advised to verify your work. In no event will Bosch be liable for direct, indirect, incidental, or consequential damages arising out of the use of or inability to use the program or documentation, even if advised of the possibility of such damages. Specifically, Bosch is not responsible for any costs including, but not limited to, those incurred as a result of lost profits or revenue, loss of use of the computer programs or data, the cost of any substitute program, claims by third parties, or for other similar costs. Bosch does not represent that the licensed programs may not be compromised or circumvented. In no case shall Bosch’s liability exceed the amount of the license.
2 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 1.0 Introduction
Some states do not allow the exclusion or limitation of implied warranties, or limitation of liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you.
Bosch retains all rights not expressly granted. Nothing in this license constitutes a waiver of Bosch rights under the U.S. Copyright laws or any other Federal or state law.
Should you have any questions concerning this license, write to: Bosch Security Systems, Inc., 130 Perinton Parkway, Fairport, New York 14450
EN | 3
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 3
Security Escort | Setup Guide for v2.04 or later | 1.0 Introduction

Contents

1.0 Introduction.................... 5
2.0 Demo Installations.............. 5
3.0 Non-Network Installations....... 6
4.0 Network Installations........... 6
5.0 Installing the Security Escort
Software.............................. 6
5.1 Software Installation Procedure. 6
5.2 Uninstalling the Security Escort
program......................... 9
6.0 Network Setup.................. 10
6.1 Install a Network Interface Card
in the Master and Slave Computers
............................... 10
6.2 Network Setup on Windows 2000 and
Later.......................... 10
6.3 Install the Security Escort
Software on the Master and Slave
Computers...................... 12
6.4 Configure the Escort Folder to be
Shared......................... 12
6.5 Install the Software Key on the
Master Computer................ 13
6.6 Configure the Escort Software on
the Master Computer............ 14
6.6.1 Checkboxes..................... 14
6.6.2 IP Addresses and Ports......... 15
6.6.3 File Paths..................... 15
6.7 Map the Master’s Network Drive
from each Slave and Workstation 16
6.8 Map the Slave’s Network Drive
from Each Master and Workstation
............................... 17
6.9 Configure the software on the
Slave Computer................. 17
6.10 Configure the Security Escort
Software on the Workstation
Computers...................... 18
7.0 Troubleshooting................ 19
7.1 If the “CAN'T OPEN THE
OPERATOR.EDB FILE” Error is Shown
............................... 19
7.2 If the Network Connection Fails 20
7.3 If the “THE MASTER COMPUTER MUST
BE ON-LINE TO RETURN THE SYSTEM TO OPERATIONAL STATUS” message is
shown.......................... 20
8.0 Workstation and Slave system
synchronization...................... 21
9.0 Reloading database to the
workstation or slave................. 21
10.0 Files Required for Security Escort
v2.04 ............................... 21

Figures

Figure 1: Setup Welcome Dialog ........ 7
Figure 2: License Agreement .......... 7
Figure 3: Readme Information Dialog .. 7 Figure 4: Choose Destination Location
Dialog ...................... 7
Figure 5: Choose Directory Dialog .... 8
Figure 6: Setup Type Dialog ........... 8
Figure 7: Start Copying Files Dialog . 8
Figure 8: Setup Complete Dialog ...... 9
Figure 9: Add/Remove Programs Properties
Dialog ...................... 9
Figure 10: Confirm File Deletion Dialog Figure 11: Uninstall Complete Dialog . 10
Figure 12: Selecting the Local Area
Figure 13: Local Area Connection Status Figure 14: Local Area Connection
Figure 15: Local Area Connection
Figure 16: Internet Protocol (TCP/IP)
Figure 17: Selecting the System Control
Figure 18: System Properties ......... 12
Figure 19: Identification Changes Figure 20: Selecting the Escort Folder12
Figure 21: Configuring Sharing in the Figure 22: Setting Share Permissions 13
Figure 23: Edit System Directories and
Figure 24: Map Network Drive ........ 16
................... 9
Connection ................. 10
dialog .................. 10
Properties Dialog - Fire and
Printer Sharing ............ 10
Properties Dialog - TCP/IP . 11
Properties ................. 11
Panel .................. 11
Dialog .................. 12
Escort Properties Dialog ... 13
Network Address ............ 14

Tables

Table 1: Files stored in same directory
as the Security Escort
executable ................. 21
Table 2: Files for workstation
preferences ................ 22
Table 3: Files for databases and global
preferences ................ 22
Table 4: Files in the Windows\Media
directory .................. 22
Table 5: Sample image files for demos
and tests .................. 22
4 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 1.0 Introduction
.

1.0 Introduction

2.0 Demo
If this is a live system, back up the databases, maps, and preferences before installing
This document describes the Security Escort software setup for Security Escort versions 2.04 and later. The system setup for Windows connections for master computers, slave computers, and workstation computers is also covered.
Version 2.0 and later of the Security Escort software requires a Software Key connected to the universal serial bus (USB) port of the master computer to operate.
The system can communicate with the transponders and modifies the operator’s database and preference settings. The sole exception to this is software that is used for demo purposes only.
The software key is programmed with the allowable number of slave and workstation computers that may be concurrently connected to the master computer. This setting is displayed in Security Escort’s About Screen under the About Menu.
the software! Refer to the
Security Escort Technical Reference Manual (P/N: 38947),
Utilities Menu, Backup Dialog.
®
network
If you do not have a programmed software key, do not install the program on a live system.
Installations
When the software is used for demo purposes, it is limited to ten records in the subscriber database and one transponder in the transponder database. Only receivers zero through three on bus zero can be defined for that transponder (no other points can be programmed for that transponder). If these limitations are observed, the software communicates with the single transponder and the system is fully functional for demo purposes. Refer to
Section Escort Software
the software. After the software is installed, but before it runs, double click on the HDD32.EXE file in the Security Escort directory (C:\Escort). This installs the driver for the software key. This is required even for demo installations that do not have the software key. If the HDD32.EXE installer is not run before the Security Escort software is run the first time, the Security Escort software stops with an error and the HDD32.EXE automatically runs. The demo installation is complete at this point and you do not need to refer to the rest of this document.
5.0 Installing the Security on page 6 to install
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 5
Security Escort | Setup Guide for v2.04 or later | 3.0 Non-Network Installations
In Demo Mode, communications are allowed to one transponder even if the transponder database has more than one transponder in it for diagnostic purposes. The transponder selected in the Transponder Current Status dialog or Transponder Communications dialog is the transponder that can be communicated with. The transponder can be reselected at any time to change the current transponder in communication. All tests, supervisions, and maintenance alarms function normally; however, only subscriber alarms that contain reports from receivers zero through three on bus zero function. If an alarm also includes other receivers reporting, that alarm is ignored. Actual Security Escort operation can be demonstrated using up to four receivers. A demo system can directly connect to transponders using the actual transponder database from the system to perform all functions except subscriber alarms. A laptop can be plugged directly into a transponder to diagnose problems. In both modes, the subscriber database must have five or fewer subscribers.

4.0 Network Installations

The Security Escort software supports a single master computer, a single slave computer (optional), and a maximum of eight workstations (limited to the number programmed in the software key). The master computer normally processes the real time communications to the transponders and controls the system. The slave computer can assume the master’s role by using A/B switches to direct the transponder communications to the slave computer. The workstation computers allow other computers to respond to alarms, perform maintenance, and edit the databases.

5.0 Installing the Security Escort Software

5.1 Software Installation Procedure

A CD-ROM contains the Security Escort program.

3.0 Non-Network Installations

If this system is not using the network to connect master, slaves, and workstation computers, refer to
5.0 Installing the Security Escort
Software
the software is installed, but before it runs, plug the software key into the USB port connector on the back of the computer and double click on the HDD32.EXE file in the Security Escort directory (C:\Escort). This installs the driver for the software key. If the HDD32.EXE installer is not run before the Security Escort software is run the first time, the Security Escort software stops with an error and the HDD32.EXE automatically runs. A non­network installation is complete at this point and you do not need to refer to the rest of this document.
to install the software. After
Exit all other programs before inserting the CD-ROM.
An Autorun feature should automatically start the installation program. If not, run SETUP.EXE by one of the following methods:
Double click the My Computer icon on
the desktop. Select the Compact Disc (X:), double-click in the INSTALL directory and then the DISK1 directory. Run SETUP.EXE from it. X is the letter of the CD-ROM drive.
Click Start Æ Programs Æ Windows
Explorer. In Windows Explorer, select the Compact Disc (X:), double-click in the INSTALL directory and then the DISK1 directory. Double-click on the SETUP.EXE icon.
Click Start Æ Run. Type
X:\INSTALL\DISK1\SETUP.EXE in the Open box and click the OK button. X is the drive letter for the CD-ROM drive.
6 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 5.0 Installing the Security
Escort Software
.
Once SETUP.EXE is running, displays.
Figure 1
Figure 3: Readme Information Dialog
Figure 1: Setup Welcome Dialog
4. Read the entire file before
proceeding (use the scroll bar on
1. Click the Next button or hold the
[ALT] key and press the [N] key. The Software License Agreement displays (refer to
Figure 2).
Figure 2: License Agreement
the right side to see the portion not currently displayed). When done, click the Next button or hold the [ALT] key and press the [N] key. The Choose Destination Location dialog reappears.
Figure 4 selects the location on the hard disk drive to install the Security Escort program. Typically the default location is best (C:\Escort).
Figure 4: Choose Destination
Location Dialog
2. Click the Yes button or hold the
[ALT] key and press the [Y] key to accept the Software License Agreement. If you chose No, the installation terminates.
3. The Readme Information appears
(refer to Figure 3). You can click the Cancel button at any time to exit the installation procedure.
5. If you want to install the program
in a different location click the
rowse button and Figure 5 appears.
B
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 7
Loading...
+ 16 hidden pages