Security Escort | Setup Guide for v2.04 or later | Trademarks
Trademarks
Microsoft® and Windows® are either
registered trademarks or trademarks of
Microsoft Corporation in the United
States and/or other countries.
Software License
Agreement
Security Escort’s Central Control
Software for Microsoft Windows™.
IMPORTANT: This software relates to
security. Access should be limited to
authorized individuals. This software
contains provisions for setting
security passwords. Appropriate
security levels should be established
and passwords should be set before
allowing operating personnel access to
this software. The original disk should
be safeguarded against unauthorized
use. In addition, Bosch security/fire
controls contain passwords to prevent
unauthorized access; these passwords
must also be set and their identity
carefully safeguarded.
Please read the following license
agreement prior to installing and
operating the software: Do not install
this software unless you agree to the
following terms:
You MAY:
Use the Security Escort program only on
a single Security Escort system, with a
single master computer and a single
optional slave computer.
Copy the program into another computer
only for backup purposes in support of
your use of the program on one Security
Escort system.
You may NOT:
Transfer this program or license to any
other party without the express written
approval of Bosch Security Systems,
Inc.
Limited Warranty: Bosch Security
Systems, Inc. (Bosch) warrants that the
program will substantially conform to
the published specifications and
documentation, provided that it is used
on the computer hardware and with the
operating system for which it was
designed. Bosch also warrants that the
magnetic media on which the program is
distributed and the documentation are
free of defects in materials and
workmanship. No Bosch dealer,
distributor, agent, or employee is
authorized to make any modification or
addition to this warranty, oral or
written. Except as specifically
provided above, Bosch makes no warranty
or representation, either express or
implied, with respect to this program
or documentation, including their
quality, performance, merchantability,
or fitness for a particular purpose.
Remedy: Bosch will replace defective
media or documentation, or correct
substantial program errors at no
charge, provided you return the item
with proof of purchase to Bosch within
90 days of the date of delivery. If
Bosch is unable to replace defective
media or documentation, or correct
substantial program errors, Bosch will
refund the license fee. These are your
sole remedies for any breach of
warranty.
Because programs are inherently complex
and may not be completely free of
errors, you are advised to verify your
work. In no event will Bosch be liable
for direct, indirect, incidental, or
consequential damages arising out of
the use of or inability to use the
program or documentation, even if
advised of the possibility of such
damages. Specifically, Bosch is not
responsible for any costs including,
but not limited to, those incurred as a
result of lost profits or revenue, loss
of use of the computer programs or
data, the cost of any substitute
program, claims by third parties, or
for other similar costs. Bosch does not
represent that the licensed programs
may not be compromised or circumvented.
In no case shall Bosch’s liability
exceed the amount of the license.
2 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 1.0
Introduction
Some states do not allow the exclusion
or limitation of implied warranties, or
limitation of liability for incidental
or consequential damages, so the above
limitation or exclusion may not apply
to you.
Bosch retains all rights not expressly
granted. Nothing in this license
constitutes a waiver of Bosch rights
under the U.S. Copyright laws or any
other Federal or state law.
Should you have any questions
concerning this license, write to:
Bosch Security Systems, Inc., 130
Perinton Parkway, Fairport, New York
14450
EN | 3
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 3
Security Escort | Setup Guide for v2.04 or later | 1.0 Introduction
Contents
1.0 Introduction.................... 5
2.0 Demo Installations.............. 5
3.0 Non-Network Installations....... 6
4.0 Network Installations........... 6
5.0 Installing the Security Escort
Software.............................. 6
5.1 Software Installation Procedure. 6
5.2 Uninstalling the Security Escort
program......................... 9
6.0 Network Setup.................. 10
6.1 Install a Network Interface Card
in the Master and Slave Computers
............................... 10
6.2 Network Setup on Windows 2000 and
Later.......................... 10
6.3 Install the Security Escort
Software on the Master and Slave
Computers...................... 12
6.4 Configure the Escort Folder to be
Shared......................... 12
6.5 Install the Software Key on the
Master Computer................ 13
6.6 Configure the Escort Software on
the Master Computer............ 14
6.6.1 Checkboxes..................... 14
6.6.2 IP Addresses and Ports......... 15
6.6.3 File Paths..................... 15
6.7 Map the Master’s Network Drive
from each Slave and Workstation 16
6.8 Map the Slave’s Network Drive
from Each Master and Workstation
............................... 17
6.9 Configure the software on the
Slave Computer................. 17
6.10 Configure the Security Escort
Software on the Workstation
Computers...................... 18
7.0 Troubleshooting................ 19
7.1 If the “CAN'T OPEN THE
OPERATOR.EDB FILE” Error is Shown
............................... 19
7.2 If the Network Connection Fails 20
7.3 If the “THE MASTER COMPUTER MUST
BE ON-LINE TO RETURN THE SYSTEM
TO OPERATIONAL STATUS” message is
Figure 13: Local Area Connection Status
Figure 14: Local Area Connection
Figure 15: Local Area Connection
Figure 16: Internet Protocol (TCP/IP)
Figure 17: Selecting the System Control
Figure 18: System Properties ......... 12
Figure 19: Identification Changes
Figure 20: Selecting the Escort Folder12
Figure 21: Configuring Sharing in the
Figure 22: Setting Share Permissions13
Figure 23: Edit System Directories and
Figure 24: Map Network Drive ........ 16
................... 9
Connection ................. 10
dialog .................. 10
Properties Dialog - Fire and
Printer Sharing ............ 10
Properties Dialog - TCP/IP . 11
Properties ................. 11
Panel .................. 11
Dialog .................. 12
Escort Properties Dialog ... 13
Network Address ............ 14
Tables
Table 1: Files stored in same directory
as the Security Escort
executable ................. 21
Table 2: Files for workstation
preferences ................ 22
Table 3: Files for databases and global
preferences ................ 22
Table 4: Files in the Windows\Media
directory .................. 22
Table 5: Sample image files for demos
and tests .................. 22
4 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 1.0 Introduction
.
1.0 Introduction
2.0 Demo
If this is a live system, back
up the databases, maps, and
preferences before installing
This document describes the Security
Escort software setup for Security
Escort versions 2.04 and later. The
system setup for Windows
connections for master computers, slave
computers, and workstation computers is
also covered.
Version 2.0 and later of the Security
Escort software requires a Software Key
connected to the universal serial bus
(USB) port of the master computer to
operate.
The system can communicate with the
transponders and modifies the
operator’s database and preference
settings. The sole exception to this is
software that is used for demo purposes
only.
The software key is programmed with the
allowable number of slave and
workstation computers that may be
concurrently connected to the master
computer. This setting is displayed in
Security Escort’s About Screen under
the About Menu.
If you do not have a
programmed software key, do
not install the program on a
live system.
Installations
When the software is used for demo
purposes, it is limited to ten records
in the subscriber database and one
transponder in the transponder
database. Only receivers zero through
three on bus zero can be defined for
that transponder (no other points can
be programmed for that transponder). If
these limitations are observed, the
software communicates with the single
transponder and the system is fully
functional for demo purposes. Refer to
Section
Escort Software
the software. After the software is
installed, but before it runs, double
click on the HDD32.EXE file in the
Security Escort directory (C:\Escort).
This installs the driver for the
software key. This is required even for
demo installations that do not have the
software key. If the HDD32.EXE
installer is not run before the
Security Escort software is run the
first time, the Security Escort
software stops with an error and the
HDD32.EXE automatically runs. The demo
installation is complete at this point
and you do not need to refer to the
rest of this document.
5.0 Installing the Security
on page 6 to install
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 5
Security Escort | Setup Guide for v2.04 or later | 3.0 Non-Network Installations
In Demo Mode, communications are
allowed to one transponder even if the
transponder database has more than one
transponder in it for diagnostic
purposes. The transponder selected in
the Transponder Current Status dialog
or Transponder Communications dialog is
the transponder that can be
communicated with. The transponder can
be reselected at any time to change the
current transponder in communication.
All tests, supervisions, and
maintenance alarms function normally;
however, only subscriber alarms that
contain reports from receivers zero
through three on bus zero function. If
an alarm also includes other receivers
reporting, that alarm is ignored.
Actual Security Escort operation can be
demonstrated using up to four
receivers. A demo system can directly
connect to transponders using the
actual transponder database from the
system to perform all functions except
subscriber alarms. A laptop can be
plugged directly into a transponder to
diagnose problems. In both modes, the
subscriber database must have five or
fewer subscribers.
4.0 Network
Installations
The Security Escort software supports a
single master computer, a single slave
computer (optional), and a maximum of
eight workstations (limited to the
number programmed in the software key).
The master computer normally processes
the real time communications to the
transponders and controls the system.
The slave computer can assume the
master’s role by using A/B switches to
direct the transponder communications
to the slave computer. The workstation
computers allow other computers to
respond to alarms, perform maintenance,
and edit the databases.
5.0 Installing the
Security Escort
Software
5.1 Software Installation
Procedure
A CD-ROM contains the Security Escort
program.
3.0 Non-Network
Installations
If this system is not using the network
to connect master, slaves, and
workstation computers, refer to
5.0 Installing the Security Escort
Software
the software is installed, but before
it runs, plug the software key into the
USB port connector on the back of the
computer and double click on the
HDD32.EXE file in the Security Escort
directory (C:\Escort). This installs
the driver for the software key. If the
HDD32.EXE installer is not run before
the Security Escort software is run the
first time, the Security Escort
software stops with an error and the
HDD32.EXE automatically runs. A nonnetwork installation is complete at
this point and you do not need to refer
to the rest of this document.
to install the software. After
Exit all other programs before
inserting the CD-ROM.
An Autorun feature should automatically
start the installation program. If not,
run SETUP.EXE by one of the following
methods:
Double click the My Computer icon on
•
the desktop. Select the Compact Disc
(X:), double-click in the INSTALL
directory and then the DISK1
directory. Run SETUP.EXE from it. X
is the letter of the CD-ROM drive.
Click Start Æ Programs Æ Windows
•
Explorer. In Windows Explorer,
select the Compact Disc (X:),
double-click in the INSTALL
directory and then the DISK1
directory. Double-click on the
SETUP.EXE icon.
Click Start Æ Run. Type
•
X:\INSTALL\DISK1\SETUP.EXE in the
Open box and click the OK button. X
is the drive letter for the CD-ROM
drive.
6 Bosch Security Systems, Inc. | 04/07 | F01U035646-02
Security Escort | Setup Guide for v2.04 or later | 5.0 Installing the Security
Escort Software
.
Once SETUP.EXE is running,
displays.
Figure 1
Figure 3: Readme Information Dialog
Figure 1: Setup Welcome Dialog
4. Read the entire file before
proceeding (use the scroll bar on
1. Click the Next button or hold the
[ALT] key and press the [N] key. The
Software License Agreement displays
(refer to
Figure 2).
Figure 2: License Agreement
the right side to see the portion
not currently displayed). When done,
click the Next button or hold the
[ALT] key and press the [N] key. The
Choose Destination Location dialog
reappears.
Figure 4 selects the
location on the hard disk drive to
install the Security Escort program.
Typically the default location is
best (C:\Escort).
Figure 4: Choose Destination
Location Dialog
2. Click the Yes button or hold the
[ALT] key and press the [Y] key to
accept the Software License
Agreement. If you chose No, the
installation terminates.
3. The Readme Information appears
(refer to
Figure 3). You can click the Cancel
button at any time to exit the
installation procedure.
5. If you want to install the program
in a different location click the
rowse button and Figure 5 appears.
B
Bosch Security Systems, Inc. | 04/07 | F01U035646-02 7
Loading...
+ 16 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.