General settings
Identification
Naming
Assign a unique name to assist in identification. This name simplifies the management of
multiple devices in more extensive systems.
The name is used for remote identification, for example, in the event of an alarm. Choose a
name that makes it as easy as possible to identify the location unambiguously.
You can use additional lines to enter kanji characters.
1.
Click the + sign to add a new line
2.
Click the icon next to the new line. A window with a character map opens.
3.
Click the required character. The character is inserted into the Result field.
4.
In the character map, click the << and >> icons to move between the different pages of
the table, or select a page from the list field.
5.
Click the < icon to the right of the Result field to delete the last character, or click the X
icon to delete all characters.
6.
Click the OK button to apply the selected characters to the new line of the name. The
window closes.
ID
Each device should be assigned a unique identifier that can be entered here as an additional
means of identification.
iSCSI Initiator extension
Add text to an initiator name to make identification easier in large iSCSI systems. This text is
added to the initiator name, separated from it by a full stop. (You can see the initiator name in
the System Overview page.)
Password
A password prevents unauthorized access to the device. You can use different authorization
levels to limit access.
Proper password protection is only guaranteed when all higher authorization levels are also
protected with a password. Therefore, you always have to start from the highest authorization
level when assigning passwords.
You can define and change a password for each authorization level if you are logged in as
service or if the unit is not password protected.
Enter the password for the appropriate authorization level here. The maximum password text
length is 19 characters and no special characters are allowed.
The device has three authorization levels: service, user, and live.
–
service is the highest authorization level. Entering the correct password gives access to
all the functions and allows all configuration settings to be changed.
–
user is the middle authorization level. At this level you can operate the device, play back
recordings, and also control camera, for example, but you cannot change the
configuration.
–
live is the lowest authorization level. At this level you can only view the live video image
and switch between the different live image displays.
7
7.1
7.1.1
7.1.2
7.1.3
7.2
VIDEOJET connect 7000
General settings | en
29
Bosch Security Systems
Operation Manual
2014.10 | 1.4 | F.01U.291.524
Summary of Contents for VIDEOJET connect 7000
Page 1: ...VIDEOJET connect 7000 VJC 7000 90 en Operation Manual ...
Page 2: ......
Page 58: ......
Page 59: ......