Bosch Appliances Security Camera PT-400 Benutzerhandbuch

Seite von 86
Security Escort | Technical Reference Manual | 3.0  System Menus 
and Screens 
EN | 66 
 
 
Bosch Security Systems | 6/12 | 38947D 
 
Option 6:  This checkbox currently has 
no function and should be left 
unchecked. 
Master’s Network Address:  The IP 
address of the master computer. There 
is no need to program the IP addresses 
of the workstation computers into the 
Security Escort software since they 
always establish the connection with 
the master and the slave. The Security 
Escort system requires a fixed IP 
address for the master computer. 
Master's Network Listen Port:  A unique 
number that indicates the Security 
Escort System software is attempting to 
set up a connection. Other software 
uses different port numbers, allowing 
the Network Interface Card to be shared 
with other network applications. 
Typically, this is set to 4561. 
Learn address button. Clicking this 
button on the master computer 
automatically programs the master’s IP 
address in the Master’s Network 
Address
. If the computer has more than 
one Network Interface Card (NIC), you 
must verify the correct IP address was 
selected by comparing this address to 
the IP address that was programmed in 
the network control panel TCP/IP 
protocol for the master computer’s 
network card. If the address is not 
correct, manually edit it to the IP 
address programmed in the network 
control panel TCP/IP protocol for the 
master computer’s network card. 
Clicking this button on the slave 
computer automatically programs the 
slave’s IP address in the Slave’s 
Network Address
 field. 
Slave’s Network Address:  The IP 
address of the slave computer. There is 
no need to program the IP addresses of 
the workstation computers into the 
Security Escort software since they 
always establish the connection with 
the master and the slave. The Security 
Escort System requires a fixed IP 
address for the optional slave 
computer. 
Slave’s Network Listen Port: A unique 
number that indicates the Security 
Escort software is attempting to set up 
a connection. Other software use 
different port numbers, allowing the 
NIC to be shared with other network 
applications. Typically, this is set to 
4561. 
Remote Control Listening Port 
The Security Escort will be listening 
on this port to communicate with the 
OPC Server. 
A separate OPC Server is created to 
communicate between the OPC Client and 
the Security Escort system. The OPC 
Server holds the alarm and trouble 
messages and sends the same to the 
available client once it is connected. 
The OPC server will send the status of 
the Security Escort to the OPC Client. 
The OPC sever also acknowledges and 
deletes alarm and trouble messages from 
OPC Client. If the connection between 
OPC Server and Security Escort goes 
down, the OPC server will try to 
reconnect with SE. Once the connection 
to the SE becomes active, the SE will 
send all the available alarms to the 
OPC server. The OPC server in turn 
sends the alarm back to OPC client; 
hence the OPC client may display some 
duplicate alarms. 
Master Database Path:  The path this 
slave or workstation computer uses to 
access the shared database files on the 
master computer. This path may have a 
different drive letter on the different 
slave and workstation computers. They 
are typically on the master computer 
but they may be on a file server or any 
other network accessible drive.  
Note: 
With version 2.04 of the software it 
is possible to use UNC path names 
rather than mapping drive letters. 
Therefore, the path to the master 
computer’s database is 
. 
Autobackup to the slave database:  If 
checked, the slave computer backs up 
all databases in the Master Database 
Path to the Slave Database Path each 
night at 3:00 AM. 
Slave Database Path:  The path this 
master or workstation computer uses to 
access the hot backup database files on 
the slave computer. This path may have 
a different drive letter on the 
different master and workstation 
computers. They are usually on the 
slave computer, but they may be on a 
file server or any other network 
accessible drive. Typically, they would 
not be stored on the same computer as 
the Master Database Path so a single 
failure would not prevent access to 
both the master and slave database 
files.