Bosch Appliances PT-400 manual Bosch Security Systems 6/12 38947D

Models: PT-400

1 86
Download 86 pages 44.52 Kb
Page 66
Image 66

Security Escort Technical Reference Manual 3.0 System Menus and Screens

EN 66

Option 6: This checkbox currently has no function and should be left unchecked.

Master’s Network Address: The IP address of the master computer. There is no need to program the IP addresses of the workstation computers into the Security Escort software since they always establish the connection with the master and the slave. The Security Escort system requires a fixed IP address for the master computer.

Master's Network Listen Port: A unique number that indicates the Security Escort System software is attempting to set up a connection. Other software uses different port numbers, allowing the Network Interface Card to be shared with other network applications. Typically, this is set to 4561.

Learn address button. Clicking this button on the master computer automatically programs the master’s IP address in the Master’s Network Address. If the computer has more than one Network Interface Card (NIC), you must verify the correct IP address was selected by comparing this address to the IP address that was programmed in the network control panel TCP/IP protocol for the master computer’s network card. If the address is not correct, manually edit it to the IP address programmed in the network control panel TCP/IP protocol for the master computer’s network card. Clicking this button on the slave computer automatically programs the slave’s IP address in the Slave’s Network Address field.

Slave’s Network Address: The IP address of the slave computer. There is no need to program the IP addresses of the workstation computers into the Security Escort software since they always establish the connection with the master and the slave. The Security Escort System requires a fixed IP address for the optional slave computer.

Slave’s Network Listen Port: A unique number that indicates the Security Escort software is attempting to set up a connection. Other software use different port numbers, allowing the NIC to be shared with other network applications. Typically, this is set to 4561.

Remote Control Listening Port

The Security Escort will be listening on this port to communicate with the OPC Server.

A separate OPC Server is created to communicate between the OPC Client and the Security Escort system. The OPC Server holds the alarm and trouble messages and sends the same to the available client once it is connected. The OPC server will send the status of the Security Escort to the OPC Client. The OPC sever also acknowledges and deletes alarm and trouble messages from OPC Client. If the connection between OPC Server and Security Escort goes down, the OPC server will try to reconnect with SE. Once the connection to the SE becomes active, the SE will send all the available alarms to the OPC server. The OPC server in turn sends the alarm back to OPC client; hence the OPC client may display some duplicate alarms.

Master Database Path: The path this slave or workstation computer uses to access the shared database files on the master computer. This path may have a different drive letter on the different slave and workstation computers. They are typically on the master computer but they may be on a file server or any other network accessible drive.

Note:

With version 2.04 of the software it is possible to use UNC path names rather than mapping drive letters. Therefore, the path to the master computer’s database is \\MASTER\C\ESCORT.

Autobackup to the slave database: If checked, the slave computer backs up all databases in the Master Database Path to the Slave Database Path each night at 3:00 AM.

Slave Database Path: The path this master or workstation computer uses to access the hot backup database files on the slave computer. This path may have a different drive letter on the different master and workstation computers. They are usually on the slave computer, but they may be on a file server or any other network accessible drive. Typically, they would not be stored on the same computer as the Master Database Path so a single failure would not prevent access to both the master and slave database files.

Bosch Security Systems 6/12 38947D

Page 66
Image 66
Bosch Appliances PT-400 manual Bosch Security Systems 6/12 38947D