Bosch Appliances PT-400 Security Camera User Manual


 
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 66
Bosch Security Systems | 6/12 | 38947D
Option 6: This checkbox currently has
no function and should be left
unchecked.
Master’s Network Address: The IP
address of the master computer. There
is no need to program the IP addresses
of the workstation computers into the
Security Escort software since they
always establish the connection with
the master and the slave. The Security
Escort system requires a fixed IP
address for the master computer.
Master's Network Listen Port: A unique
number that indicates the Security
Escort System software is attempting to
set up a connection. Other software
uses different port numbers, allowing
the Network Interface Card to be shared
with other network applications.
Typically, this is set to 4561.
Learn address button. Clicking this
button on the master computer
automatically programs the master’s IP
address in the Master’s Network
Address. If the computer has more than
one Network Interface Card (NIC), you
must verify the correct IP address was
selected by comparing this address to
the IP address that was programmed in
the network control panel TCP/IP
protocol for the master computer’s
network card. If the address is not
correct, manually edit it to the IP
address programmed in the network
control panel TCP/IP protocol for the
master computer’s network card.
Clicking this button on the slave
computer automatically programs the
slave’s IP address in the Slave’s
Network Address field.
Slave’s Network Address: The IP
address of the slave computer. There is
no need to program the IP addresses of
the workstation computers into the
Security Escort software since they
always establish the connection with
the master and the slave. The Security
Escort System requires a fixed IP
address for the optional slave
computer.
Slave’s Network Listen Port: A unique
number that indicates the Security
Escort software is attempting to set up
a connection. Other software use
different port numbers, allowing the
NIC to be shared with other network
applications. Typically, this is set to
4561.
Remote Control Listening Port
The Security Escort will be listening
on this port to communicate with the
OPC Server.
A separate OPC Server is created to
communicate between the OPC Client and
the Security Escort system. The OPC
Server holds the alarm and trouble
messages and sends the same to the
available client once it is connected.
The OPC server will send the status of
the Security Escort to the OPC Client.
The OPC sever also acknowledges and
deletes alarm and trouble messages from
OPC Client. If the connection between
OPC Server and Security Escort goes
down, the OPC server will try to
reconnect with SE. Once the connection
to the SE becomes active, the SE will
send all the available alarms to the
OPC server. The OPC server in turn
sends the alarm back to OPC client;
hence the OPC client may display some
duplicate alarms.
Master Database Path: The path this
slave or workstation computer uses to
access the shared database files on the
master computer. This path may have a
different drive letter on the different
slave and workstation computers. They
are typically on the master computer
but they may be on a file server or any
other network accessible drive.
Note:
With version 2.04 of the software it
is possible to use UNC path names
rather than mapping drive letters.
Therefore, the path to the master
computer’s database is
\\MASTER\C\ESCORT.
Autobackup to the slave database: If
checked, the slave computer backs up
all databases in the Master Database
Path to the Slave Database Path each
night at 3:00 AM.
Slave Database Path: The path this
master or workstation computer uses to
access the hot backup database files on
the slave computer. This path may have
a different drive letter on the
different master and workstation
computers. They are usually on the
slave computer, but they may be on a
file server or any other network
accessible drive. Typically, they would
not be stored on the same computer as
the Master Database Path so a single
failure would not prevent access to
both the master and slave database
files.